Pub Date : 2020-12-15DOI: 10.1109/icces51560.2020.9334551
{"title":"[ICCES 2020 Back cover]","authors":"","doi":"10.1109/icces51560.2020.9334551","DOIUrl":"https://doi.org/10.1109/icces51560.2020.9334551","url":null,"abstract":"","PeriodicalId":247183,"journal":{"name":"2020 15th International Conference on Computer Engineering and Systems (ICCES)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115367313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-15DOI: 10.1109/icces51560.2020.9334593
{"title":"[ICCES 2020 Front cover]","authors":"","doi":"10.1109/icces51560.2020.9334593","DOIUrl":"https://doi.org/10.1109/icces51560.2020.9334593","url":null,"abstract":"","PeriodicalId":247183,"journal":{"name":"2020 15th International Conference on Computer Engineering and Systems (ICCES)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132557545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-15DOI: 10.1109/ICCES51560.2020.9334572
G. Attia
The current paper proposes to remedy the problem of corrupted images using efficient digital signal processing (DSP) scheme. The proposed scheme named Curvelet denoising followed by Blind Source Separation (BSS) by Wavelet Packets Decomposition (WPD) and Kurtosis standard. The proposed scheme aims to enhance the performance of removing the noise from corrupted images. Two source images for Lena and Boat have been chosen for testing the simulations. The source images have been corrupted by sources of noise. A comparison study has been performed between the performance of the last studies and the proposed scheme. The outcomes of the results have confirmed that; of all the addressed techniques, the proposed technique is the most efficient for improving the picture quality.
{"title":"Performance Enhancement of Corrupted Images Using Independent Component Analysis by Kurtosis for Blind Source Separation After Curvelet Denoising","authors":"G. Attia","doi":"10.1109/ICCES51560.2020.9334572","DOIUrl":"https://doi.org/10.1109/ICCES51560.2020.9334572","url":null,"abstract":"The current paper proposes to remedy the problem of corrupted images using efficient digital signal processing (DSP) scheme. The proposed scheme named Curvelet denoising followed by Blind Source Separation (BSS) by Wavelet Packets Decomposition (WPD) and Kurtosis standard. The proposed scheme aims to enhance the performance of removing the noise from corrupted images. Two source images for Lena and Boat have been chosen for testing the simulations. The source images have been corrupted by sources of noise. A comparison study has been performed between the performance of the last studies and the proposed scheme. The outcomes of the results have confirmed that; of all the addressed techniques, the proposed technique is the most efficient for improving the picture quality.","PeriodicalId":247183,"journal":{"name":"2020 15th International Conference on Computer Engineering and Systems (ICCES)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123537076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-15DOI: 10.1109/ICCES51560.2020.9334685
Abdelrahman H. Hefny, Georgios A. Dafoulas, Manal A. Ismail
Intent classification is an essential step in processing user input to a conversational assistant. This work investigates techniques of intent classification of chat messages used for communication among software development teams with the aim of building an intent classifier for a management conversational assistant integrated into modern communication platforms used by developers. Experiments conducted using rule-based and common ML techniques have shown that careful choice of classification features has a significant impact on performance, and the best performing model was able to obtain a classification accuracy of 72%. A set of techniques for extracting useful features for text classification in the software engineering domain was also implemented and tested.
{"title":"Intent Classification for a Management Conversational Assistant","authors":"Abdelrahman H. Hefny, Georgios A. Dafoulas, Manal A. Ismail","doi":"10.1109/ICCES51560.2020.9334685","DOIUrl":"https://doi.org/10.1109/ICCES51560.2020.9334685","url":null,"abstract":"Intent classification is an essential step in processing user input to a conversational assistant. This work investigates techniques of intent classification of chat messages used for communication among software development teams with the aim of building an intent classifier for a management conversational assistant integrated into modern communication platforms used by developers. Experiments conducted using rule-based and common ML techniques have shown that careful choice of classification features has a significant impact on performance, and the best performing model was able to obtain a classification accuracy of 72%. A set of techniques for extracting useful features for text classification in the software engineering domain was also implemented and tested.","PeriodicalId":247183,"journal":{"name":"2020 15th International Conference on Computer Engineering and Systems (ICCES)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127957168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-15DOI: 10.1109/ICCES51560.2020.9334638
M. Gad, M. Mohamed, M. Elkhatib
Technological growth had changed the conduction way of the warfare. This work is paying attention with developing the performance of a SSM (surface-to-surface missile) aerodynamically controlled system via both predictive and Neuro-Fuzzy controllers. The analysis and design demand somehow precise system model with different uncertainties via 6-DOF simulation. The executive differential equations of the missile motion are obtained from the model of missile’s aerodynamic that built by means of the Missile Datcom software. Hence getting the required aerodynamics stability derivatives by the resulted aerodynamics data, the required transfer functions are calculated based on the equations of motion for the missile. Then the yaw autopilot is designed using the calculated transfer functions and to recognize the command signal produced by the guidance laws. The form of guidance commands are in the lateral acceleration components. By using the whole system model, the computer simulators are made by using the Matlab-Simulink software, where predictive and hybrid AI (Artificial Intelligence) Neuro-Fuzzy Yaw autopilots are compared proving that the more stability and less processing time.
{"title":"Design of an Intelligent Lateral Autopilot for Short Range Surface-to-Surface Aerodynamically Controlled Missile","authors":"M. Gad, M. Mohamed, M. Elkhatib","doi":"10.1109/ICCES51560.2020.9334638","DOIUrl":"https://doi.org/10.1109/ICCES51560.2020.9334638","url":null,"abstract":"Technological growth had changed the conduction way of the warfare. This work is paying attention with developing the performance of a SSM (surface-to-surface missile) aerodynamically controlled system via both predictive and Neuro-Fuzzy controllers. The analysis and design demand somehow precise system model with different uncertainties via 6-DOF simulation. The executive differential equations of the missile motion are obtained from the model of missile’s aerodynamic that built by means of the Missile Datcom software. Hence getting the required aerodynamics stability derivatives by the resulted aerodynamics data, the required transfer functions are calculated based on the equations of motion for the missile. Then the yaw autopilot is designed using the calculated transfer functions and to recognize the command signal produced by the guidance laws. The form of guidance commands are in the lateral acceleration components. By using the whole system model, the computer simulators are made by using the Matlab-Simulink software, where predictive and hybrid AI (Artificial Intelligence) Neuro-Fuzzy Yaw autopilots are compared proving that the more stability and less processing time.","PeriodicalId":247183,"journal":{"name":"2020 15th International Conference on Computer Engineering and Systems (ICCES)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116687544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-15DOI: 10.1109/ICCES51560.2020.9334648
Khaled A. M. Ahmed, S. Saraya, John F. Wanis, Amr M. T. Ali-Eldin
The need to use a wide variety of online services is rising every day in today’s digital age. In order to authenticate and authorize users to access services, identity management is essential. To solve several problems such as fragment identity repositories, aim for identity theft and data breaches and identity correlation, the evolution of identity models across siloes, centralized and presently self-sovereign identity based on distributed ledger is emerging. Self-sovereign identity returns the power to the proprietor of the identity and puts the user at the core of the model. In this paper, we propose a framework to identify scam bank service calls and avoid possible loss of personal accounts. Our framework is based on Hyperledger Indy, a public and permissioned Distributed Ledger Technology. The proposed framework strengthens the Know Your Customer process and enhances the trust of third party agencies delegated by banks to deliver many financial items.
{"title":"A Self-Sovereign Identity Architecture Based on Blockchain and the Utilization of Customer’s Banking Cards : The Case of Bank Scam Calls Prevention","authors":"Khaled A. M. Ahmed, S. Saraya, John F. Wanis, Amr M. T. Ali-Eldin","doi":"10.1109/ICCES51560.2020.9334648","DOIUrl":"https://doi.org/10.1109/ICCES51560.2020.9334648","url":null,"abstract":"The need to use a wide variety of online services is rising every day in today’s digital age. In order to authenticate and authorize users to access services, identity management is essential. To solve several problems such as fragment identity repositories, aim for identity theft and data breaches and identity correlation, the evolution of identity models across siloes, centralized and presently self-sovereign identity based on distributed ledger is emerging. Self-sovereign identity returns the power to the proprietor of the identity and puts the user at the core of the model. In this paper, we propose a framework to identify scam bank service calls and avoid possible loss of personal accounts. Our framework is based on Hyperledger Indy, a public and permissioned Distributed Ledger Technology. The proposed framework strengthens the Know Your Customer process and enhances the trust of third party agencies delegated by banks to deliver many financial items.","PeriodicalId":247183,"journal":{"name":"2020 15th International Conference on Computer Engineering and Systems (ICCES)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125880490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-15DOI: 10.1109/icces51560.2020.9334565
{"title":"Session CN2: Computer Network & Security II","authors":"","doi":"10.1109/icces51560.2020.9334565","DOIUrl":"https://doi.org/10.1109/icces51560.2020.9334565","url":null,"abstract":"","PeriodicalId":247183,"journal":{"name":"2020 15th International Conference on Computer Engineering and Systems (ICCES)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126020400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-15DOI: 10.1109/ICCES51560.2020.9334657
G. Attia
Images are indispensable source of information used in different fields, but sometimes suffer from unwanted sources of noise. Last studies used some techniques to tackle the problem of corrupted images. These studies such as; the ordinary scheme of using blind source separation (BSS) based classical independent component analysis (ICA) without de-noising, and the traditional scheme of BSS followed by Curve let de-noising. Despite of the latter scheme provided better quality than the first one; the current manuscript suggests enhancing the performance of noise removal by performing Curve let de-noising first then followed by BSS based fast ICA. Three different experiments using matlab programming have been carried out for both the last studies and the proposed scheme. I have tested the performance of noise extraction of two examples of original source images such as Lena and Boat. This work aims to hold a comparison study among the pervious schemes and the proposed scheme in order to check the quality improvement for a given input signal to noise ratio (SNR) such as +10dB. The outcome of the simulation results revealed that; of all the addressed schemes, the proposed scheme has the best performance enhancement that consists in the key parameters of better (signal quality, output SNR, PSNR, and RMSE).
{"title":"Performance Evaluation for Removing the Noise from the Source Data After Processing in Communication Transceiver Using Three Different Schemes","authors":"G. Attia","doi":"10.1109/ICCES51560.2020.9334657","DOIUrl":"https://doi.org/10.1109/ICCES51560.2020.9334657","url":null,"abstract":"Images are indispensable source of information used in different fields, but sometimes suffer from unwanted sources of noise. Last studies used some techniques to tackle the problem of corrupted images. These studies such as; the ordinary scheme of using blind source separation (BSS) based classical independent component analysis (ICA) without de-noising, and the traditional scheme of BSS followed by Curve let de-noising. Despite of the latter scheme provided better quality than the first one; the current manuscript suggests enhancing the performance of noise removal by performing Curve let de-noising first then followed by BSS based fast ICA. Three different experiments using matlab programming have been carried out for both the last studies and the proposed scheme. I have tested the performance of noise extraction of two examples of original source images such as Lena and Boat. This work aims to hold a comparison study among the pervious schemes and the proposed scheme in order to check the quality improvement for a given input signal to noise ratio (SNR) such as +10dB. The outcome of the simulation results revealed that; of all the addressed schemes, the proposed scheme has the best performance enhancement that consists in the key parameters of better (signal quality, output SNR, PSNR, and RMSE).","PeriodicalId":247183,"journal":{"name":"2020 15th International Conference on Computer Engineering and Systems (ICCES)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126568772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-15DOI: 10.1109/icces51560.2020.9334575
{"title":"ICCES 2020 Table of Contents","authors":"","doi":"10.1109/icces51560.2020.9334575","DOIUrl":"https://doi.org/10.1109/icces51560.2020.9334575","url":null,"abstract":"","PeriodicalId":247183,"journal":{"name":"2020 15th International Conference on Computer Engineering and Systems (ICCES)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122297751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-15DOI: 10.1109/icces51560.2020.9334633
{"title":"Session SE2: Software Engineering II","authors":"","doi":"10.1109/icces51560.2020.9334633","DOIUrl":"https://doi.org/10.1109/icces51560.2020.9334633","url":null,"abstract":"","PeriodicalId":247183,"journal":{"name":"2020 15th International Conference on Computer Engineering and Systems (ICCES)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132115744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}