Pub Date : 2020-10-24DOI: 10.1109/NILES50944.2020.9257886
Samaa Khaled, Omar M. Shehata, E. I. Morgan
Intersection management is one of the big challenges in traffic control. Autonomous vehicles are becoming more realistic. A lot of research efforts has been done to develop control systems for the autonomous vehicles in order to guarantee safety and reduce the average travel time and fuel Consumption while increasing the intersection throughput. This paper applies the concept of Control barrier function on a four way intersection. Several parametric studies were conducted to validate the the Control barrier function approach. Moreover, in order to evaluate the efficiency of the proposed approach , it is compared to a baseline scenario where the conventional vehicles operate under traffic lights. It shows better performance in terms of the average travel time and the intersection throughput. The average travel time is reduced by 14.91 to 15.11%. The intersection throughput is increased by almost 173%.
{"title":"Intersection Control for Autonomous Vehicles Using Control Barrier Function Approach","authors":"Samaa Khaled, Omar M. Shehata, E. I. Morgan","doi":"10.1109/NILES50944.2020.9257886","DOIUrl":"https://doi.org/10.1109/NILES50944.2020.9257886","url":null,"abstract":"Intersection management is one of the big challenges in traffic control. Autonomous vehicles are becoming more realistic. A lot of research efforts has been done to develop control systems for the autonomous vehicles in order to guarantee safety and reduce the average travel time and fuel Consumption while increasing the intersection throughput. This paper applies the concept of Control barrier function on a four way intersection. Several parametric studies were conducted to validate the the Control barrier function approach. Moreover, in order to evaluate the efficiency of the proposed approach , it is compared to a baseline scenario where the conventional vehicles operate under traffic lights. It shows better performance in terms of the average travel time and the intersection throughput. The average travel time is reduced by 14.91 to 15.11%. The intersection throughput is increased by almost 173%.","PeriodicalId":253090,"journal":{"name":"2020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123319236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-24DOI: 10.1109/NILES50944.2020.9257981
Salma Abd El Monem, A. Khalafallah, S. Shaheen
The route leaks problem is considered one of the unsolved Border Gateway Protocol problems for more than fifteen years ago. It has a large negative impact on global internet stability and reliability. This problem is hard to be prevented due to human errors and misconfigurations, and hard to be detected due to the confidentiality of autonomous systems relationships.The paper proposes a new taxonomy to the different types of route leaks depending on their effects on the Border Gateway Protocol traffic, the first real route leaks incidents dataset, and a complete real-time detection system based on a supervised learning classification method. The work compares three classifiers (Decision Tree, Random Forest Trees, and Support Vector Machines). The proposed system prototype can detect and classify route leaks from normal updates with an accuracy of 87% and time complexity of O(NM), where N is the number of prefixes each with M prefix length.
{"title":"BGP Route Leaks Detection Using Supervised Machine Learning Technique","authors":"Salma Abd El Monem, A. Khalafallah, S. Shaheen","doi":"10.1109/NILES50944.2020.9257981","DOIUrl":"https://doi.org/10.1109/NILES50944.2020.9257981","url":null,"abstract":"The route leaks problem is considered one of the unsolved Border Gateway Protocol problems for more than fifteen years ago. It has a large negative impact on global internet stability and reliability. This problem is hard to be prevented due to human errors and misconfigurations, and hard to be detected due to the confidentiality of autonomous systems relationships.The paper proposes a new taxonomy to the different types of route leaks depending on their effects on the Border Gateway Protocol traffic, the first real route leaks incidents dataset, and a complete real-time detection system based on a supervised learning classification method. The work compares three classifiers (Decision Tree, Random Forest Trees, and Support Vector Machines). The proposed system prototype can detect and classify route leaks from normal updates with an accuracy of 87% and time complexity of O(NM), where N is the number of prefixes each with M prefix length.","PeriodicalId":253090,"journal":{"name":"2020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115768042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-24DOI: 10.1109/NILES50944.2020.9257898
Hady Hafez, S. Maged, A. Osama, M. Abdelaziz
This paper presents the transformation of a 14- seater multi- passenger golf cart to an autonomous level 3 vehicle by the Autotronics Research Lab team in Ain Shams University. The developed vehicle is to be used in closed environments such as campuses, resorts and clubs. Through this paper, we will discuss the mechanical and electrical modifications as well as the sensor suite of the car. In addition, the used algorithms in perception, localization and mapping, and the safety approaches taken in case of emergency for the passenger safety are discussed.
{"title":"Platform Modifications Towards an Autonomous Multi-Passenger Golf Cart","authors":"Hady Hafez, S. Maged, A. Osama, M. Abdelaziz","doi":"10.1109/NILES50944.2020.9257898","DOIUrl":"https://doi.org/10.1109/NILES50944.2020.9257898","url":null,"abstract":"This paper presents the transformation of a 14- seater multi- passenger golf cart to an autonomous level 3 vehicle by the Autotronics Research Lab team in Ain Shams University. The developed vehicle is to be used in closed environments such as campuses, resorts and clubs. Through this paper, we will discuss the mechanical and electrical modifications as well as the sensor suite of the car. In addition, the used algorithms in perception, localization and mapping, and the safety approaches taken in case of emergency for the passenger safety are discussed.","PeriodicalId":253090,"journal":{"name":"2020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128067573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-24DOI: 10.1109/NILES50944.2020.9257902
Ahmed M. Radwan, I. E. A. Rahman, Ahmed W. Roshdy, I. Fahim
This study presents proposed solutions for increasing the productivity of a production line in the perfumes industry in Egypt using lean manufacturing methodology. Enhancing efficiency is a major significant objective to consider in a typical manufacturing firm to improve the overall performance. Increasing productivity is achieved through applying an extensive lean program implementing appropriate lean tools to solve problems identified as wastage in materials and activities as well as bottlenecks increasing lead time. Information of current problems and gaps are gathered through visits and interviews. Problems are showed and analyzed using some lean tools and charts as bottleneck analysis, workflow sequence and fishbone diagrams. Lean methodology is selected to be applied due to its ability to achieve desired results, solve current gaps and maintain outstanding performance and continuous improvement enabling competitiveness within marketplace. Proposed lean tools and the fully lean manufacturing system are presented to increase efficiency and solve problems identified. Expected results showed decreased inventories by 20-30% as well as reduction in costs by 10-20%.
{"title":"Improving Productivity of A Production Line in Perfumes Industry in Egypt Using Lean Manufacturing Methodology","authors":"Ahmed M. Radwan, I. E. A. Rahman, Ahmed W. Roshdy, I. Fahim","doi":"10.1109/NILES50944.2020.9257902","DOIUrl":"https://doi.org/10.1109/NILES50944.2020.9257902","url":null,"abstract":"This study presents proposed solutions for increasing the productivity of a production line in the perfumes industry in Egypt using lean manufacturing methodology. Enhancing efficiency is a major significant objective to consider in a typical manufacturing firm to improve the overall performance. Increasing productivity is achieved through applying an extensive lean program implementing appropriate lean tools to solve problems identified as wastage in materials and activities as well as bottlenecks increasing lead time. Information of current problems and gaps are gathered through visits and interviews. Problems are showed and analyzed using some lean tools and charts as bottleneck analysis, workflow sequence and fishbone diagrams. Lean methodology is selected to be applied due to its ability to achieve desired results, solve current gaps and maintain outstanding performance and continuous improvement enabling competitiveness within marketplace. Proposed lean tools and the fully lean manufacturing system are presented to increase efficiency and solve problems identified. Expected results showed decreased inventories by 20-30% as well as reduction in costs by 10-20%.","PeriodicalId":253090,"journal":{"name":"2020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124980868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-24DOI: 10.1109/NILES50944.2020.9257978
S. Sharroush
Multi-threshold-voltage complementary metal-oxide semiconductor (MTCMOS) technology finds a wide variety of applications in reducing the subthreshold-leakage current in both combinational and sequential circuits. This is due to the fact that slightly increasing the threshold voltage causes a dramatic decrease in the subthreshold-leakage current. However, the decision on the sizing of the sleep transistor is a critical issue because there are various trade-offs that the designer must face with this respect. In this paper, the area, the static and dynamic-power consumption, and the time delay are investigated with respect to the aspect ratio of the sleep transistor with compact-form expressions derived for them. Accordingly, the optimal size of the sleep transistor is determined quantitatively. The results are discussed for NAND and NOR gates. The results obtained are based on adopting the Berkeley predictive technology model (BPTM) of the 22 nm CMOS technology with a power-supply voltage, VDD, equal to 0.8 V.
{"title":"Optimum Sizing of the Sleep Transistor in MTCMOS Technology","authors":"S. Sharroush","doi":"10.1109/NILES50944.2020.9257978","DOIUrl":"https://doi.org/10.1109/NILES50944.2020.9257978","url":null,"abstract":"Multi-threshold-voltage complementary metal-oxide semiconductor (MTCMOS) technology finds a wide variety of applications in reducing the subthreshold-leakage current in both combinational and sequential circuits. This is due to the fact that slightly increasing the threshold voltage causes a dramatic decrease in the subthreshold-leakage current. However, the decision on the sizing of the sleep transistor is a critical issue because there are various trade-offs that the designer must face with this respect. In this paper, the area, the static and dynamic-power consumption, and the time delay are investigated with respect to the aspect ratio of the sleep transistor with compact-form expressions derived for them. Accordingly, the optimal size of the sleep transistor is determined quantitatively. The results are discussed for NAND and NOR gates. The results obtained are based on adopting the Berkeley predictive technology model (BPTM) of the 22 nm CMOS technology with a power-supply voltage, VDD, equal to 0.8 V.","PeriodicalId":253090,"journal":{"name":"2020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116507279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Traffic Characterization, Application Identification, Per Application Classification, and VPN/Non-VPN Traffic Characterization have been some of the most notable research topics over the past few years. Deep Packet Inspection (DPI) promises an increase in Quality of Service (QoS) for Internet Service Providers (ISPs), simplifies network management and plays a vital role in content censoring. DPI has been used to help ease the flow of network traffic. For instance, if there is a high priority message, DPI could be used to enable high-priority information to pass through immediately, ahead of other lower priority messages. It can be used to prioritize packets that are mission-critical, ahead of ordinary browsing packets. Throttling or slowing down the rate of data transfer can be achieved using DPI for certain traffic types like peer-to-peer downloads. It can also be used to enhance the capabilities of ISPs to prevent the exploitation of Internet of Things (IoT) devices in Distributed Denial-Of-Service (DDOS) attacks by blocking malicious requests from devices. In this paper, we introduce a novel architecture for DPI using neural networks utilizing layers of word embedding, convolutional neural networks and bidirectional recurrent neural networks which proved to have promising results in this task. The proposed architecture introduces a new mix of layers which outperforms the proposed approaches before.
{"title":"nnDPI: A Novel Deep Packet Inspection Technique Using Word Embedding, Convolutional and Recurrent Neural Networks","authors":"Mahmoud Bahaa, Ayman Aboulmagd, Khaled Adel, Hesham Fawzy, Nashwa Abdelbaki","doi":"10.1109/NILES50944.2020.9257912","DOIUrl":"https://doi.org/10.1109/NILES50944.2020.9257912","url":null,"abstract":"Traffic Characterization, Application Identification, Per Application Classification, and VPN/Non-VPN Traffic Characterization have been some of the most notable research topics over the past few years. Deep Packet Inspection (DPI) promises an increase in Quality of Service (QoS) for Internet Service Providers (ISPs), simplifies network management and plays a vital role in content censoring. DPI has been used to help ease the flow of network traffic. For instance, if there is a high priority message, DPI could be used to enable high-priority information to pass through immediately, ahead of other lower priority messages. It can be used to prioritize packets that are mission-critical, ahead of ordinary browsing packets. Throttling or slowing down the rate of data transfer can be achieved using DPI for certain traffic types like peer-to-peer downloads. It can also be used to enhance the capabilities of ISPs to prevent the exploitation of Internet of Things (IoT) devices in Distributed Denial-Of-Service (DDOS) attacks by blocking malicious requests from devices. In this paper, we introduce a novel architecture for DPI using neural networks utilizing layers of word embedding, convolutional neural networks and bidirectional recurrent neural networks which proved to have promising results in this task. The proposed architecture introduces a new mix of layers which outperforms the proposed approaches before.","PeriodicalId":253090,"journal":{"name":"2020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132597534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-24DOI: 10.1109/NILES50944.2020.9257953
M. Hebaish, Mohamed A. Olwan, M. Ayman, AbdELRahman A. Genidy, W. Habib, N. Hassan, Omar Tarek Seada, E. I. Morgan
Multi-Vehicle Formation is an important step towards an efficient transportation system. In this paper, a 3-tier hybrid formation control architecture for connected vehicles is introduced. This architecture adopts the principle of a Hybrid StateChart in deliberative decision making layer for trajectories assignment, followed by an intermediate executional control layer for vehicles’ trajectory tracking. Finally, a functional control layer for low-level feedback control. The architecture is simulated using a set of miniature vehicles for parallel straight-line vehicle formation trajectory separated with an offset in the lateral direction. Furthermore, an experimental point to point control test was conducted on a single miniature vehicle for verifying the intermediate control layer. Results from the performed simulated experiments illustrate the effectiveness and the high precision of the proposed control architecture in terms of the minimum error between the vehicle’s longitudinal positions for straight-line formation trajectories tracking. While the experimental test illustrate the effectiveness of the used intermediate control layer.
{"title":"Adoption of Hybrid StateChart Principle in a Hierarchical Formation Architecture for Configurable Vehicles","authors":"M. Hebaish, Mohamed A. Olwan, M. Ayman, AbdELRahman A. Genidy, W. Habib, N. Hassan, Omar Tarek Seada, E. I. Morgan","doi":"10.1109/NILES50944.2020.9257953","DOIUrl":"https://doi.org/10.1109/NILES50944.2020.9257953","url":null,"abstract":"Multi-Vehicle Formation is an important step towards an efficient transportation system. In this paper, a 3-tier hybrid formation control architecture for connected vehicles is introduced. This architecture adopts the principle of a Hybrid StateChart in deliberative decision making layer for trajectories assignment, followed by an intermediate executional control layer for vehicles’ trajectory tracking. Finally, a functional control layer for low-level feedback control. The architecture is simulated using a set of miniature vehicles for parallel straight-line vehicle formation trajectory separated with an offset in the lateral direction. Furthermore, an experimental point to point control test was conducted on a single miniature vehicle for verifying the intermediate control layer. Results from the performed simulated experiments illustrate the effectiveness and the high precision of the proposed control architecture in terms of the minimum error between the vehicle’s longitudinal positions for straight-line formation trajectories tracking. While the experimental test illustrate the effectiveness of the used intermediate control layer.","PeriodicalId":253090,"journal":{"name":"2020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES)","volume":"31 4-5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132594343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-24DOI: 10.1109/NILES50944.2020.9257914
Ayman Gaber, Mohamed Adel ElBahaay, A. M. Mohamed, M. Zaki, Ahmed Samir Abdo, Nashwa Abdelbaki
Development of 5G system as a global telecommunication infrastructure is accelerating to realize the concept of a unified network infrastructure incorporating all access technologies. The potential of Low Earth Orbit (LEO) constellation systems has emerged to support wide range of services. This could help to achieve 5G key service requirements for enhanced Mobile Broadband (eMBB), Massive Machine-Type Communications (mMTC), and Ultra-Reliable Low-Latency Communication (URLLC). The integration of satellite communications with the 5G New Radio (NR) is stimulated by technology advancement to support challenging service requirements and demand for ubiquitous connectivity with the best possible quality of service. In this paper, we surveyed the opportunities of integrating terrestrial mobile and satellite networks, key technical challenges and proposed solutions. We also introduced a mobility management scheme that reduces signaling overhead and minimizes service interruption during inter satellite handover process.
{"title":"5G and Satellite Network Convergence: Survey for Opportunities, Challenges and Enabler Technologies","authors":"Ayman Gaber, Mohamed Adel ElBahaay, A. M. Mohamed, M. Zaki, Ahmed Samir Abdo, Nashwa Abdelbaki","doi":"10.1109/NILES50944.2020.9257914","DOIUrl":"https://doi.org/10.1109/NILES50944.2020.9257914","url":null,"abstract":"Development of 5G system as a global telecommunication infrastructure is accelerating to realize the concept of a unified network infrastructure incorporating all access technologies. The potential of Low Earth Orbit (LEO) constellation systems has emerged to support wide range of services. This could help to achieve 5G key service requirements for enhanced Mobile Broadband (eMBB), Massive Machine-Type Communications (mMTC), and Ultra-Reliable Low-Latency Communication (URLLC). The integration of satellite communications with the 5G New Radio (NR) is stimulated by technology advancement to support challenging service requirements and demand for ubiquitous connectivity with the best possible quality of service. In this paper, we surveyed the opportunities of integrating terrestrial mobile and satellite networks, key technical challenges and proposed solutions. We also introduced a mobility management scheme that reduces signaling overhead and minimizes service interruption during inter satellite handover process.","PeriodicalId":253090,"journal":{"name":"2020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130289542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Industry is increasingly adopting Reinforcement Learning algorithms (RL) in production without thoroughly analyzing their security features. In addition to the potential threats that may arise if the functionality of these algorithms is compromised while in operation. One of the well-known RL algorithms is the Contextual Multi-Armed Bandit (CMAB) algorithm. In this paper, we explore how the CMAB can be used to solve the Link Adaptation problem – a well-known problem in the telecommunication industry by learning the optimal transmission parameters that will maximize a communication link’s throughput. We analyze the potential vulnerabilities of the algorithm and how they may adversely affect link parameters computation. Additionally, we present a provable security assessment for the Contextual Multi-Armed Bandit Reinforcement Learning (CMAB-RL) algorithm in a network simulated environment using Ray. This is by demonstrating CMAB security vulnerabilities theoretically and practically. Some security controls are proposed for CMAB agent and the surrounding environment. In order to fix those vulnerabilities and mitigate the risk. These controls can be applied to other RL agents in order to design more robust and secure RL agents.
{"title":"Security Assessment of the Contextual Multi-Armed Bandit - RL Algorithm for Link Adaptation","authors":"Mariam El-Sobky, Hisham Sarhan, Mervat Abu-Elkheir","doi":"10.1109/NILES50944.2020.9257955","DOIUrl":"https://doi.org/10.1109/NILES50944.2020.9257955","url":null,"abstract":"Industry is increasingly adopting Reinforcement Learning algorithms (RL) in production without thoroughly analyzing their security features. In addition to the potential threats that may arise if the functionality of these algorithms is compromised while in operation. One of the well-known RL algorithms is the Contextual Multi-Armed Bandit (CMAB) algorithm. In this paper, we explore how the CMAB can be used to solve the Link Adaptation problem – a well-known problem in the telecommunication industry by learning the optimal transmission parameters that will maximize a communication link’s throughput. We analyze the potential vulnerabilities of the algorithm and how they may adversely affect link parameters computation. Additionally, we present a provable security assessment for the Contextual Multi-Armed Bandit Reinforcement Learning (CMAB-RL) algorithm in a network simulated environment using Ray. This is by demonstrating CMAB security vulnerabilities theoretically and practically. Some security controls are proposed for CMAB agent and the surrounding environment. In order to fix those vulnerabilities and mitigate the risk. These controls can be applied to other RL agents in order to design more robust and secure RL agents.","PeriodicalId":253090,"journal":{"name":"2020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132297977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-24DOI: 10.1109/NILES50944.2020.9257970
Abduel Rahman Magdy, Muhammad Mahmoud Kamal, A. Guaily
In this contribution, a simple yet effective design for Schlieren photography system is described and implemented. The proposed system is used in the visualization of both heat and mass transfer phenomena. Refractive index gradient is created by a lighter to study mass transfer, then the lighter is ignited to create temperature gradient. Results show the ability of the proposed system in capturing the gradients in both mass and temperature gradients.
{"title":"Design of a Schlieren System for Visualization of Heat and Mass Transfer","authors":"Abduel Rahman Magdy, Muhammad Mahmoud Kamal, A. Guaily","doi":"10.1109/NILES50944.2020.9257970","DOIUrl":"https://doi.org/10.1109/NILES50944.2020.9257970","url":null,"abstract":"In this contribution, a simple yet effective design for Schlieren photography system is described and implemented. The proposed system is used in the visualization of both heat and mass transfer phenomena. Refractive index gradient is created by a lighter to study mass transfer, then the lighter is ignited to create temperature gradient. Results show the ability of the proposed system in capturing the gradients in both mass and temperature gradients.","PeriodicalId":253090,"journal":{"name":"2020 2nd Novel Intelligent and Leading Emerging Sciences Conference (NILES)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122419192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}