首页 > 最新文献

2019 First International Conference of Computer and Applied Sciences (CAS)最新文献

英文 中文
A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System 基于混沌系统的两种密码算法与Salsa20相结合的混合改进轻量级算法
Pub Date : 2019-12-01 DOI: 10.1109/CAS47993.2019.9075488
Zaid M. Jawad Kubba, Haider K. Hoomod
Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterises the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is applied to generate pseudo-random keys that produce more complexity for the proposed cipher algorithm. The goal of the proposed algorithm is to present a hybrid algorithm by enhancing the complexity of the current PRESENT algorithm while keeping the performance of computational operations as minimal. The proposed algorithm proved working efficiently with fast executed time, and the analysed result of the generated sequence keys passed the randomness of the NIST suite.
在数字时代,密码算法在抵御各种攻击的信息技术中起着至关重要的作用。为了实现信息系统的安全问题,人们做了许多研究和算法。传统的密码学算法具有运算复杂度高的特点。另一方面,轻量级算法是解决在受限设备中应用传统加密时遇到的大多数安全问题的方法。然而,对称密码被广泛用于保证约束设备中数据通信的安全性。在本研究中,我们提出了一种基于PRESENT和Salsa20两种加密算法的混合算法。同时,利用混沌系统的二维逻辑映射生成伪随机密钥,提高了算法的复杂度。该算法的目标是通过提高当前present算法的复杂性,同时保持计算操作的性能最小化,从而提出一种混合算法。该算法运行效率高,执行时间短,生成的序列密钥的分析结果通过了NIST套件的随机性。
{"title":"A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System","authors":"Zaid M. Jawad Kubba, Haider K. Hoomod","doi":"10.1109/CAS47993.2019.9075488","DOIUrl":"https://doi.org/10.1109/CAS47993.2019.9075488","url":null,"abstract":"Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterises the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is applied to generate pseudo-random keys that produce more complexity for the proposed cipher algorithm. The goal of the proposed algorithm is to present a hybrid algorithm by enhancing the complexity of the current PRESENT algorithm while keeping the performance of computational operations as minimal. The proposed algorithm proved working efficiently with fast executed time, and the analysed result of the generated sequence keys passed the randomness of the NIST suite.","PeriodicalId":202291,"journal":{"name":"2019 First International Conference of Computer and Applied Sciences (CAS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116473825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
One Shoot In-Door Surveillance Module Based On MCA Associative Memory 一种基于MCA联想记忆的室内拍摄监控模块
Pub Date : 2019-12-01 DOI: 10.1109/CAS47993.2019.9075724
Ghassan Ahmed Mubarak, Emad I Abdul Kareem
Several studies and researches had been made to develop In-Door Surveillance module. Most of them had depended on traditional techniques tend to be more complicated. After revolutionary development in Artificial intelligence that simulates the human brain, many industrial companies has started to build more efficient and intelligent surveillance systems depending on artificial intelligence techniques. Thus, this research would deal with an Indoor surveillance module depending on non-traditional techniques, which is Multi-Connect Architecture Associative Memory (MMCA). The proposed module would process any given pre-processed image-stream and decide whether it is secured or non-secured case. This process had been done by training the proposed module with one selected secured image. The study found that accuracy values were between (74.6 – 97.2%). Accuracy was almost around 95% which is considered a promising results in real-time of execution.
对室内监控模块的开发进行了若干研究。他们大多依靠传统的技术,往往更复杂。在模拟人类大脑的人工智能取得革命性发展之后,许多工业公司已经开始依靠人工智能技术建立更高效、更智能的监控系统。因此,本研究将处理基于非传统技术的室内监控模块,即多连接架构联想记忆(MMCA)。提出的模块将处理任何给定的预处理图像流,并决定它是安全的还是非安全的情况。这个过程是通过用一个选定的安全图像训练所提议的模块来完成的。研究发现,准确率值在(74.6 - 97.2%)之间。准确率几乎在95%左右,这被认为是实时执行的一个有希望的结果。
{"title":"One Shoot In-Door Surveillance Module Based On MCA Associative Memory","authors":"Ghassan Ahmed Mubarak, Emad I Abdul Kareem","doi":"10.1109/CAS47993.2019.9075724","DOIUrl":"https://doi.org/10.1109/CAS47993.2019.9075724","url":null,"abstract":"Several studies and researches had been made to develop In-Door Surveillance module. Most of them had depended on traditional techniques tend to be more complicated. After revolutionary development in Artificial intelligence that simulates the human brain, many industrial companies has started to build more efficient and intelligent surveillance systems depending on artificial intelligence techniques. Thus, this research would deal with an Indoor surveillance module depending on non-traditional techniques, which is Multi-Connect Architecture Associative Memory (MMCA). The proposed module would process any given pre-processed image-stream and decide whether it is secured or non-secured case. This process had been done by training the proposed module with one selected secured image. The study found that accuracy values were between (74.6 – 97.2%). Accuracy was almost around 95% which is considered a promising results in real-time of execution.","PeriodicalId":202291,"journal":{"name":"2019 First International Conference of Computer and Applied Sciences (CAS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128297950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Smart real-time tracking system using GSM/GPRS technologies 采用GSM/GPRS技术的智能实时跟踪系统
Pub Date : 2019-12-01 DOI: 10.1109/CAS47993.2019.9075739
A. Mustafa, Mohammed I. A al-Nouman, O. A. Awad
The cases of kidnapping and vehicle theft is increasing continuously. Therefore the need for mobile applications to track the vehicle in real-time become very important, so the user can track and monitor the vehicle using the mobile phone. This type of system sends large data to the server/cloud every day, which will increase the expenses every month for transmitting the data to this cloud/server. This paper introduced an embedded system that designed and implemented for vehicle tracking based on an android application, the main contribution of this paper is to reduce the data that sent from the embedded system in the vehicle to the cloud server via picking only necessary data for vehicle tracking from Global Position System GPS and decreasing the number of Hypertext Transfer Protocol HTTP request that transmitted to the cloud server by construing the transmission of information with the movement of vehicles. This system is divided into three parts: embedded system that is attached with the vehicle, cloud/server part which has the database of every single move every car did, and the monitoring part which is the main user interface so they can monitor the vehicle.
绑架和车辆盗窃案件不断增加。因此需要移动应用程序对车辆进行实时跟踪变得非常重要,这样用户就可以使用手机对车辆进行跟踪和监控。这种类型的系统每天向服务器/云发送大量数据,这会增加每月向该云/服务器传输数据的费用。本文介绍了一种基于android应用程序的嵌入式车辆跟踪系统的设计与实现。本文的主要贡献是通过从全球定位系统(GPS)中选取车辆跟踪所需的数据,减少从车载嵌入式系统发送到云服务器的数据量,并通过将信息的传输与车辆的运动相结合,减少传输到云服务器的超文本传输协议HTTP请求的数量。该系统分为三个部分:嵌入式系统,它与车辆相连;云/服务器部分,它拥有每辆车的每一个动作的数据库;监控部分,它是主要的用户界面,可以对车辆进行监控。
{"title":"A Smart real-time tracking system using GSM/GPRS technologies","authors":"A. Mustafa, Mohammed I. A al-Nouman, O. A. Awad","doi":"10.1109/CAS47993.2019.9075739","DOIUrl":"https://doi.org/10.1109/CAS47993.2019.9075739","url":null,"abstract":"The cases of kidnapping and vehicle theft is increasing continuously. Therefore the need for mobile applications to track the vehicle in real-time become very important, so the user can track and monitor the vehicle using the mobile phone. This type of system sends large data to the server/cloud every day, which will increase the expenses every month for transmitting the data to this cloud/server. This paper introduced an embedded system that designed and implemented for vehicle tracking based on an android application, the main contribution of this paper is to reduce the data that sent from the embedded system in the vehicle to the cloud server via picking only necessary data for vehicle tracking from Global Position System GPS and decreasing the number of Hypertext Transfer Protocol HTTP request that transmitted to the cloud server by construing the transmission of information with the movement of vehicles. This system is divided into three parts: embedded system that is attached with the vehicle, cloud/server part which has the database of every single move every car did, and the monitoring part which is the main user interface so they can monitor the vehicle.","PeriodicalId":202291,"journal":{"name":"2019 First International Conference of Computer and Applied Sciences (CAS)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121709252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Comparison for Some of the estimation methods of the Parallel Stress-Strength model In the case of Inverse Rayleigh Distribution 反瑞利分布情况下平行应力-强度模型几种估计方法的比较
Pub Date : 2019-12-01 DOI: 10.1109/CAS47993.2019.9075835
Sairan Hamza Raheem, Hassan Kadum Mansor, B. A. Kalaf, A. N. Salman
In this study, we consider the system reliability of parallel stress-strength model as an important part of system reliability by assuming the stress and the strengths random variables follows the one parameter Inverse Rayleigh Distribution. Some estimation methods, namely; Maximum Likelihood, Moment method, and Uniformly Minimum Variance Unbiased estimator and three types of shrinkage estimation methods were considered for estimating the system reliability. As well as, Monte Carlo simulation was used to get a comparison among all the suggested methods depends on the statistical indicator Mean Squared Error.
在本研究中,我们假设应力和强度随机变量服从单参数反瑞利分布,将平行应力-强度模型中的系统可靠性作为系统可靠性的重要组成部分。一些估计方法,即;采用极大似然法、矩法、均匀最小方差无偏估计法和三种收缩估计法对系统可靠性进行了估计。同时,利用蒙特卡罗模拟方法,根据统计指标均方误差对各建议方法进行比较。
{"title":"A Comparison for Some of the estimation methods of the Parallel Stress-Strength model In the case of Inverse Rayleigh Distribution","authors":"Sairan Hamza Raheem, Hassan Kadum Mansor, B. A. Kalaf, A. N. Salman","doi":"10.1109/CAS47993.2019.9075835","DOIUrl":"https://doi.org/10.1109/CAS47993.2019.9075835","url":null,"abstract":"In this study, we consider the system reliability of parallel stress-strength model as an important part of system reliability by assuming the stress and the strengths random variables follows the one parameter Inverse Rayleigh Distribution. Some estimation methods, namely; Maximum Likelihood, Moment method, and Uniformly Minimum Variance Unbiased estimator and three types of shrinkage estimation methods were considered for estimating the system reliability. As well as, Monte Carlo simulation was used to get a comparison among all the suggested methods depends on the statistical indicator Mean Squared Error.","PeriodicalId":202291,"journal":{"name":"2019 First International Conference of Computer and Applied Sciences (CAS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130047056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Mixed Methods for Solving Classical Optimal Control Governing by Nonlinear Hyperbolic Boundary Value Problem 求解非线性双曲型边值问题经典最优控制的混合方法
Pub Date : 2019-12-01 DOI: 10.1109/CAS47993.2019.9075615
E. H. Al-Rawdanee, Jamil A. Ali Al-Hawasy
This paper is concerned with studying the numerical solution for the discrete classical optimal control problem governing by a nonlinear hyperbolic boundary value problem. When the discrete classical control is given, the existence theorem for a unique discrete solution of the discrete weak form is proved. The existence theorem for the discrete classical optimal control and the necessary theorem “conditions” for optimality of the problem are proved under a suitable assumption. The discrete classical optimal control problem is solved by mixing the Galerkin finite element method for space variable with the implicitfinite difference method for the time variable to find the discrete state of discrete weak form (and the discrete adjoint solution of discrete adjoint weak form), while the Gradient Projection method or of the Gradient method or of the Frank Wolfe method are used to find the discrete classical optimal control. Inside these three methods the Armijo step option or the optimal step option are used to improve the (solution) discrete classical control. Finally, an illustrative example for the problem is given to show the accuracy and efficiency of the methods.
本文研究了一类非线性双曲型边值问题的离散经典最优控制问题的数值解。当给定离散经典控制时,证明了离散弱形式的唯一离散解的存在性定理。在适当的假设下,证明了离散经典最优控制的存在性定理和问题最优性的必要定理“条件”。将空间变量的Galerkin有限元法与时间变量的隐有限差分法混合求解离散弱形式的离散状态(以及离散伴随弱形式的离散伴随解),而采用梯度投影法或梯度法或Frank Wolfe法求解离散经典最优控制。在这三种方法中,分别使用Armijo阶跃选项或最优阶跃选项来改进(解)离散经典控制。最后,通过一个算例说明了该方法的准确性和有效性。
{"title":"Mixed Methods for Solving Classical Optimal Control Governing by Nonlinear Hyperbolic Boundary Value Problem","authors":"E. H. Al-Rawdanee, Jamil A. Ali Al-Hawasy","doi":"10.1109/CAS47993.2019.9075615","DOIUrl":"https://doi.org/10.1109/CAS47993.2019.9075615","url":null,"abstract":"This paper is concerned with studying the numerical solution for the discrete classical optimal control problem governing by a nonlinear hyperbolic boundary value problem. When the discrete classical control is given, the existence theorem for a unique discrete solution of the discrete weak form is proved. The existence theorem for the discrete classical optimal control and the necessary theorem “conditions” for optimality of the problem are proved under a suitable assumption. The discrete classical optimal control problem is solved by mixing the Galerkin finite element method for space variable with the implicitfinite difference method for the time variable to find the discrete state of discrete weak form (and the discrete adjoint solution of discrete adjoint weak form), while the Gradient Projection method or of the Gradient method or of the Frank Wolfe method are used to find the discrete classical optimal control. Inside these three methods the Armijo step option or the optimal step option are used to improve the (solution) discrete classical control. Finally, an illustrative example for the problem is given to show the accuracy and efficiency of the methods.","PeriodicalId":202291,"journal":{"name":"2019 First International Conference of Computer and Applied Sciences (CAS)","volume":"10 3 Suppl 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123666003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Three Prior and Double Prior Selection to Comparison Estimate Parameter Rayleigh Distribution under Data Type II Censoring 数据类型II下比较估计参数瑞利分布的三先验和双先验选择
Pub Date : 2019-12-01 DOI: 10.1109/CAS47993.2019.9075761
A. M. Salman, N. A. Hussein, A. H. Hussain, S. A. Abbas
In this study, we present estimation scale parameter of Rayleigh distribution under data the control of type II by using methods Proposed Bayesian as only prior and Double priors with a new suggestion used three Prior by using distributions Exponential and Gamma and Chi-Square. An experimental study was conducted to compare these methods and to demonstrate the efficiency of the methods proposed in practice by relying on the generated observations from Rayleigh distribution. We compare these methods by using Mean square error (MSE). We did this study by using simulation with different values parameter $(theta)$ and different sample sizes $(mathrm{N}=10,25,50,100)$. It has been shown through computational results that the best way to estimate is the Bayes method proposed (BAY3).
本文采用贝叶斯单先验和双先验方法,并采用指数分布、伽玛分布和卡方分布的三先验方法,给出了二类数据控制下瑞利分布尺度参数的估计。利用瑞利分布生成的观测值,对这些方法进行了实验研究,并在实践中验证了所提出方法的有效性。我们使用均方误差(MSE)对这些方法进行比较。我们通过模拟不同的参数$(theta)$和不同的样本量$( mathm {N}=10,25,50,100)$来进行这项研究。计算结果表明,最好的估计方法是贝叶斯方法(BAY3)。
{"title":"Three Prior and Double Prior Selection to Comparison Estimate Parameter Rayleigh Distribution under Data Type II Censoring","authors":"A. M. Salman, N. A. Hussein, A. H. Hussain, S. A. Abbas","doi":"10.1109/CAS47993.2019.9075761","DOIUrl":"https://doi.org/10.1109/CAS47993.2019.9075761","url":null,"abstract":"In this study, we present estimation scale parameter of Rayleigh distribution under data the control of type II by using methods Proposed Bayesian as only prior and Double priors with a new suggestion used three Prior by using distributions Exponential and Gamma and Chi-Square. An experimental study was conducted to compare these methods and to demonstrate the efficiency of the methods proposed in practice by relying on the generated observations from Rayleigh distribution. We compare these methods by using Mean square error (MSE). We did this study by using simulation with different values parameter $(theta)$ and different sample sizes $(mathrm{N}=10,25,50,100)$. It has been shown through computational results that the best way to estimate is the Bayes method proposed (BAY3).","PeriodicalId":202291,"journal":{"name":"2019 First International Conference of Computer and Applied Sciences (CAS)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114419568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure web of things based on a lightweight Algorithm 基于轻量级算法的安全物联网
Pub Date : 2019-12-01 DOI: 10.1109/CAS47993.2019.9075831
A. H. Mohammed, M. Jafer
There are so many modern technologies for the future, the most important one to look for is the web of things (with), this technology supposed to connect billions of devices with lead to a massive number of communication between the devices that will produce a huge amount of the information but come with that another type of challenge which is protecting this information from being at risk. We need to put in mind that this device is small in shape and uses low power so when we use numerous rounds to encrypt the data it is will be expensive also it will be very complicated, as you know when we use less complex calculations, we may put the integrity in risk. We propose an algorithm based on lightweight encryption named (LWAES). The first goal of the LWAES scheme is to Highest speed in the encryption and decryption. The Mix Columns stage is the most computational demanding stage in the AES design, and therefore it consumes most of the time needed for encryption and decryption. In the LWAES design, the Mix Columns stage is replaced by simple SHIFT operations. This operation takes the time from the beginning of reading the sensors to the moment they were retrieved to the user 1–8 seconds. In addition to that, the modified LWAES algorithm provides good security With speed in the encryption process and lightweight in the storage process.
未来有很多现代技术,最重要的是物联网,这项技术应该连接数十亿台设备,导致设备之间的大量通信,这些设备将产生大量信息,但同时也带来了另一种挑战,即保护这些信息免受风险。我们需要记住,这个设备体积小,功耗低,所以当我们使用许多轮来加密数据时,它将是昂贵的,也将是非常复杂的,正如你所知道的,当我们使用不那么复杂的计算时,我们可能会把完整性置于危险之中。我们提出了一种基于轻量级加密的算法(LWAES)。LWAES方案的第一个目标是实现最高的加密和解密速度。混合列阶段是AES设计中计算量要求最高的阶段,因此它消耗了加密和解密所需的大部分时间。在LWAES设计中,Mix Columns阶段被简单的SHIFT操作所取代。该操作从开始读取传感器到将其检索到用户所需的时间为1-8秒。此外,改进后的LWAES算法具有良好的安全性,加密过程速度快,存储过程轻量。
{"title":"Secure web of things based on a lightweight Algorithm","authors":"A. H. Mohammed, M. Jafer","doi":"10.1109/CAS47993.2019.9075831","DOIUrl":"https://doi.org/10.1109/CAS47993.2019.9075831","url":null,"abstract":"There are so many modern technologies for the future, the most important one to look for is the web of things (with), this technology supposed to connect billions of devices with lead to a massive number of communication between the devices that will produce a huge amount of the information but come with that another type of challenge which is protecting this information from being at risk. We need to put in mind that this device is small in shape and uses low power so when we use numerous rounds to encrypt the data it is will be expensive also it will be very complicated, as you know when we use less complex calculations, we may put the integrity in risk. We propose an algorithm based on lightweight encryption named (LWAES). The first goal of the LWAES scheme is to Highest speed in the encryption and decryption. The Mix Columns stage is the most computational demanding stage in the AES design, and therefore it consumes most of the time needed for encryption and decryption. In the LWAES design, the Mix Columns stage is replaced by simple SHIFT operations. This operation takes the time from the beginning of reading the sensors to the moment they were retrieved to the user 1–8 seconds. In addition to that, the modified LWAES algorithm provides good security With speed in the encryption process and lightweight in the storage process.","PeriodicalId":202291,"journal":{"name":"2019 First International Conference of Computer and Applied Sciences (CAS)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115597704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Web-Based Management System of water pollution using Classification Techniques 基于web的水污染分类管理系统
Pub Date : 2019-12-01 DOI: 10.1109/CAS47993.2019.9075730
Thekra Abbas, A. M. Mkelif, A. K. Abdulkareem
This paper describes an implementation of a web-based system using classification techniques for prediction of water pollution type and appropriate treatments depending on the water quality Index. The benefits of data mining lie in the extraction of new knowledge automatically from the raw data to progress decision making. (C4.5) The decision tree was used for classifying water quality into five classes using fourteen parameters according to the World Health Organization's requirements. These parameters are taken for each sample of water in each ten water stations that selected for the investigations. First two classes were suitable for drinking water while other classes were not, therefore two types of classification techniques ((c4.5) decision trees and artificial neural network, millstone machine learning technique) were suggested to produce a decision concerning the type of pollution and devise proposition for the treatment of pollution. The experiment was carried on a real database validated by (Iraqi Ministry of Environment) gathered from ten authenticated treatment stations. The results show that using C4.5 decision tree classifier found to be the better in terms of the execution time while using NNT algorithm gave slightly better results in terms of the accuracy and error percentages. Also, the work shows that the techniques of data mining have the prospect to fast predict of the water quality class, as long as the given data are a true representation of the scope of knowledge.
本文描述了一个基于web的系统的实现,该系统使用分类技术来预测水污染类型并根据水质指数进行适当的处理。数据挖掘的好处在于从原始数据中自动提取新知识,以推进决策。(C4.5)决策树根据世界卫生组织的要求,使用14个参数将水质分为5类。这些参数是为选择进行调查的每十个水站的每个水样本所取的。前两类适合饮用水,而其他类别不适合,因此建议使用两种分类技术((c4.5)决策树和人工神经网络,磨石机器学习技术)来产生关于污染类型的决策并提出污染处理的建议。实验是在一个经伊拉克环境部验证的真实数据库上进行的,该数据库收集自十个经过认证的处理站。结果表明,使用C4.5决策树分类器在执行时间上更胜一筹,而使用NNT算法在准确率和错误率上更胜一筹。此外,该工作表明,只要给定的数据是知识范围的真实表示,数据挖掘技术就有可能快速预测水质类别。
{"title":"Web-Based Management System of water pollution using Classification Techniques","authors":"Thekra Abbas, A. M. Mkelif, A. K. Abdulkareem","doi":"10.1109/CAS47993.2019.9075730","DOIUrl":"https://doi.org/10.1109/CAS47993.2019.9075730","url":null,"abstract":"This paper describes an implementation of a web-based system using classification techniques for prediction of water pollution type and appropriate treatments depending on the water quality Index. The benefits of data mining lie in the extraction of new knowledge automatically from the raw data to progress decision making. (C4.5) The decision tree was used for classifying water quality into five classes using fourteen parameters according to the World Health Organization's requirements. These parameters are taken for each sample of water in each ten water stations that selected for the investigations. First two classes were suitable for drinking water while other classes were not, therefore two types of classification techniques ((c4.5) decision trees and artificial neural network, millstone machine learning technique) were suggested to produce a decision concerning the type of pollution and devise proposition for the treatment of pollution. The experiment was carried on a real database validated by (Iraqi Ministry of Environment) gathered from ten authenticated treatment stations. The results show that using C4.5 decision tree classifier found to be the better in terms of the execution time while using NNT algorithm gave slightly better results in terms of the accuracy and error percentages. Also, the work shows that the techniques of data mining have the prospect to fast predict of the water quality class, as long as the given data are a true representation of the scope of knowledge.","PeriodicalId":202291,"journal":{"name":"2019 First International Conference of Computer and Applied Sciences (CAS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115392507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Audio Covering Signal For Speech Signal Hiding 音频覆盖信号用于语音信号隐藏
Pub Date : 2019-12-01 DOI: 10.1109/CAS47993.2019.9075827
Tariq A. Hassan, Duraid T. Salim, Jawad Kadem, Rehab I. Ajel
The demands for exchange secret information among many institutions simulate the rapid development of new strategies. Steganography is a well-known method for hiding data from not permitted access. One of the Steganographic techniques is to hide secret data in one of the file formats such as image, text, audio. In this paper, a steganography technique based on the energy of the audio signal that is used to hide a speech signal is presented. The objective is to examine the effect of the energy parameter in hiding the speech signal within an audio signal without being perceptible by the listener. A technique is to test the different level of energies and durations of both the source and the cover signal. Experimental results show that, in the case of cleaned signals, the technique performing well in the case when the duration of the cover signal is much longer than the duration of the source signal, i.e. the much rooms for the source signal to hide the better performance. Also, the results show that the additive noise can have a tremendous negative impact on system performance.
许多机构之间对交换秘密情报的需求模拟了新战略的快速发展。隐写术是一种众所周知的对不允许的访问隐藏数据的方法。隐写技术之一是将秘密数据隐藏在图像、文本、音频等文件格式中。本文提出了一种基于音频信号能量的隐写技术,用于隐藏语音信号。目的是检查能量参数在隐藏语音信号而不被听者察觉的音频信号中的效果。一种技术是测试源信号和掩蔽信号的不同能量水平和持续时间。实验结果表明,在清洗信号的情况下,当覆盖信号的持续时间远大于源信号的持续时间,即源信号的隐藏空间较大时,该技术的性能较好。结果表明,加性噪声会对系统性能产生巨大的负面影响。
{"title":"Audio Covering Signal For Speech Signal Hiding","authors":"Tariq A. Hassan, Duraid T. Salim, Jawad Kadem, Rehab I. Ajel","doi":"10.1109/CAS47993.2019.9075827","DOIUrl":"https://doi.org/10.1109/CAS47993.2019.9075827","url":null,"abstract":"The demands for exchange secret information among many institutions simulate the rapid development of new strategies. Steganography is a well-known method for hiding data from not permitted access. One of the Steganographic techniques is to hide secret data in one of the file formats such as image, text, audio. In this paper, a steganography technique based on the energy of the audio signal that is used to hide a speech signal is presented. The objective is to examine the effect of the energy parameter in hiding the speech signal within an audio signal without being perceptible by the listener. A technique is to test the different level of energies and durations of both the source and the cover signal. Experimental results show that, in the case of cleaned signals, the technique performing well in the case when the duration of the cover signal is much longer than the duration of the source signal, i.e. the much rooms for the source signal to hide the better performance. Also, the results show that the additive noise can have a tremendous negative impact on system performance.","PeriodicalId":202291,"journal":{"name":"2019 First International Conference of Computer and Applied Sciences (CAS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128678960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Branch and Bound and Local Search Methods to Solve Multi-objective Machine Scheduling Problem 用分支定界法和局部搜索法求解多目标机器调度问题
Pub Date : 2019-12-01 DOI: 10.1109/CAS47993.2019.9075460
Doha Adel Abbass
In this research, we suggested the problem scheduling of n jobs on a single machine to decrease schedule multi-objective function; the sum cost of total completion time, the total number of late jobs, total tardiness and the maximum tardiness $(Sigma C_{i}+ Sigma U_{i}+Sigma T_{i}+T_{max})$, which is NP-hard problem. In this research, we proposed the branch and bound algorithm (BAB) to obtain the optimal solution. We used some local search methods (descent method (DM) and genetic algorithm (GA)) to obtain an optimal solution or a near-optimal solution. Also, we developed a simple algorithm (SPT-MA) to find a solution near the optimum solution. The (SPT-MA) algorithm proofs its good performance in solving the problem in a reasonable time.
在本研究中,我们提出了n个作业在一台机器上调度的问题,以减少调度的多目标函数;总完工时间、总迟到作业数、总迟到时间和最大迟到时间的总成本$(Sigma C_{i}+ Sigma U_{i}+Sigma T_{i}+T_{max})$,这是np困难问题。在本研究中,我们提出了分支定界算法(BAB)来获得最优解。我们使用了一些局部搜索方法(下降法(DM)和遗传算法(GA))来获得最优解或近最优解。此外,我们开发了一个简单的算法(SPT-MA)来寻找接近最优解的解。(SPT-MA)算法在合理的时间内求解问题,具有良好的性能。
{"title":"Using Branch and Bound and Local Search Methods to Solve Multi-objective Machine Scheduling Problem","authors":"Doha Adel Abbass","doi":"10.1109/CAS47993.2019.9075460","DOIUrl":"https://doi.org/10.1109/CAS47993.2019.9075460","url":null,"abstract":"In this research, we suggested the problem scheduling of n jobs on a single machine to decrease schedule multi-objective function; the sum cost of total completion time, the total number of late jobs, total tardiness and the maximum tardiness $(Sigma C_{i}+ Sigma U_{i}+Sigma T_{i}+T_{max})$, which is NP-hard problem. In this research, we proposed the branch and bound algorithm (BAB) to obtain the optimal solution. We used some local search methods (descent method (DM) and genetic algorithm (GA)) to obtain an optimal solution or a near-optimal solution. Also, we developed a simple algorithm (SPT-MA) to find a solution near the optimum solution. The (SPT-MA) algorithm proofs its good performance in solving the problem in a reasonable time.","PeriodicalId":202291,"journal":{"name":"2019 First International Conference of Computer and Applied Sciences (CAS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115029136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2019 First International Conference of Computer and Applied Sciences (CAS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1