Pub Date : 2013-11-01DOI: 10.1109/ICCES.2013.6707191
H. Shedeed, M. F. Issa, S. El-Sayed
Researchers recently proposed new scientific methods for restoring function to those with motor impairments. one of these methods is to provide the brain with a new non-muscular communication and control channel, a direct Brain-Machine Interface (BMI). This paper presents a Brain Machine Interface (BMI) system based on using the brain electroencephalography (EEG) signals associated with 3 arm movements (close, open arm and close hand) for controlling a robotic arm. Signals recorded from one subject using Emotive Epoc device. Four channels only were used, in our experiment, AF3, which located at the prefrontal cortex and F7, F3, FC5 which located at the supplementary motor cortex of the brain. Three different techniques were used for features extraction which are: Wavelet Transform (WT), Fast Fourier Transform (FFT) and Principal Component Analysis (PCA). Multi-layer Perceptron Neural Network trained by a standard back propagation algorithm was used for classifying the three considered tasks. Classification rates of 91.1%, 86.7% and 85.6% were achieved with the three used features extraction techniques respectively. Experimental results show that the proposed system achieved high classification rates than other systems in the same application.
{"title":"Brain EEG signal processing for controlling a robotic arm","authors":"H. Shedeed, M. F. Issa, S. El-Sayed","doi":"10.1109/ICCES.2013.6707191","DOIUrl":"https://doi.org/10.1109/ICCES.2013.6707191","url":null,"abstract":"Researchers recently proposed new scientific methods for restoring function to those with motor impairments. one of these methods is to provide the brain with a new non-muscular communication and control channel, a direct Brain-Machine Interface (BMI). This paper presents a Brain Machine Interface (BMI) system based on using the brain electroencephalography (EEG) signals associated with 3 arm movements (close, open arm and close hand) for controlling a robotic arm. Signals recorded from one subject using Emotive Epoc device. Four channels only were used, in our experiment, AF3, which located at the prefrontal cortex and F7, F3, FC5 which located at the supplementary motor cortex of the brain. Three different techniques were used for features extraction which are: Wavelet Transform (WT), Fast Fourier Transform (FFT) and Principal Component Analysis (PCA). Multi-layer Perceptron Neural Network trained by a standard back propagation algorithm was used for classifying the three considered tasks. Classification rates of 91.1%, 86.7% and 85.6% were achieved with the three used features extraction techniques respectively. Experimental results show that the proposed system achieved high classification rates than other systems in the same application.","PeriodicalId":277807,"journal":{"name":"2013 8th International Conference on Computer Engineering & Systems (ICCES)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130249272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/ICCES.2013.6707219
Hamdy M. Mousa, Mostafa A. Ahmad, A. El-Sisi
The main goal of compression is to reduce the amount of data required to represent a digital image. Conformal mapping has long been an important topic in complex analysis. In this paper, the proposed image compression technique based on conformal mapping transformation is introduced. The most recent standard compression technique, JPEG2000 compression algorithm, is used. The proposed technique is tested with various images types. Two categories of image compression techniques (lossless and lossy) and with/without conformal mapping are studied. The experimental results show that the compression ratio improves by 14% in average, and in case lossy image compression using JPEG2000 image quality gains over 2 dB in average.
{"title":"Image compression ratio enhancement based on conformal mapping","authors":"Hamdy M. Mousa, Mostafa A. Ahmad, A. El-Sisi","doi":"10.1109/ICCES.2013.6707219","DOIUrl":"https://doi.org/10.1109/ICCES.2013.6707219","url":null,"abstract":"The main goal of compression is to reduce the amount of data required to represent a digital image. Conformal mapping has long been an important topic in complex analysis. In this paper, the proposed image compression technique based on conformal mapping transformation is introduced. The most recent standard compression technique, JPEG2000 compression algorithm, is used. The proposed technique is tested with various images types. Two categories of image compression techniques (lossless and lossy) and with/without conformal mapping are studied. The experimental results show that the compression ratio improves by 14% in average, and in case lossy image compression using JPEG2000 image quality gains over 2 dB in average.","PeriodicalId":277807,"journal":{"name":"2013 8th International Conference on Computer Engineering & Systems (ICCES)","volume":"2010 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125606660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/ICCES.2013.6707218
Heba Gamal, H. M. Abdul-Kader, E. Sallam
Accurate, real-time hand gesture recognition is a challenging and crucial task due to the need of more natural human-computer interaction methods. The major problem lies in fining a good compromise between the accuracy of recognition and the computational load for the algorithm to run in real-time. In this paper we propose a method for static hand gesture recognition using Fourier descriptors for feature extraction with different classifiers. Fourier descriptors have the advantage of giving a set of features that are invariant to rotation, translation and scaling. They are also efficient in terms of speed as they only use a small number of points from the entire image. The proposed method is evaluated using images from the Cambridge Hand Gesture Dataset at different number of features and different classifiers. The effectiveness of the method is shown through simulation results.
{"title":"Hand gesture recognition using fourier descriptors","authors":"Heba Gamal, H. M. Abdul-Kader, E. Sallam","doi":"10.1109/ICCES.2013.6707218","DOIUrl":"https://doi.org/10.1109/ICCES.2013.6707218","url":null,"abstract":"Accurate, real-time hand gesture recognition is a challenging and crucial task due to the need of more natural human-computer interaction methods. The major problem lies in fining a good compromise between the accuracy of recognition and the computational load for the algorithm to run in real-time. In this paper we propose a method for static hand gesture recognition using Fourier descriptors for feature extraction with different classifiers. Fourier descriptors have the advantage of giving a set of features that are invariant to rotation, translation and scaling. They are also efficient in terms of speed as they only use a small number of points from the entire image. The proposed method is evaluated using images from the Cambridge Hand Gesture Dataset at different number of features and different classifiers. The effectiveness of the method is shown through simulation results.","PeriodicalId":277807,"journal":{"name":"2013 8th International Conference on Computer Engineering & Systems (ICCES)","volume":"16 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126093805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/ICCES.2013.6707177
T. Gaber, Ning Zhang, A. Hassanien
This paper describes a novel approach to support multiple resellings of DRM-Protected contents. The approach allows a consumer to resell his/her content (license) to a second consumer who can also resell the same content to a third one, and so on. This reselling process can continue till the license is resold N-times. To ensure that the reselling process is secure and fair, the approach has built-in security measures to enable a buyer to verify that the license for sale is not faked/forged and that it is resalable before engaging in the payment process. In addition, the approach ensures fairness in a reselling process, i.e. the buyer will not get the license without making the due payment, and the reseller will not get the payment if he does not surrender the license. These properties are achieved through the use of a number of building blocks, including a License Revocation List (LRL), a digital token called Reselling Permission (RP) and a special contract signing protocol called Reselling Deal Signing (RDS) protocol. A security analysis of the method demonstrates that the approach is effective in thwart possible threats and attacks on license reselling.
{"title":"A novel approach to allow multiple resales of DRM-protected contents","authors":"T. Gaber, Ning Zhang, A. Hassanien","doi":"10.1109/ICCES.2013.6707177","DOIUrl":"https://doi.org/10.1109/ICCES.2013.6707177","url":null,"abstract":"This paper describes a novel approach to support multiple resellings of DRM-Protected contents. The approach allows a consumer to resell his/her content (license) to a second consumer who can also resell the same content to a third one, and so on. This reselling process can continue till the license is resold N-times. To ensure that the reselling process is secure and fair, the approach has built-in security measures to enable a buyer to verify that the license for sale is not faked/forged and that it is resalable before engaging in the payment process. In addition, the approach ensures fairness in a reselling process, i.e. the buyer will not get the license without making the due payment, and the reseller will not get the payment if he does not surrender the license. These properties are achieved through the use of a number of building blocks, including a License Revocation List (LRL), a digital token called Reselling Permission (RP) and a special contract signing protocol called Reselling Deal Signing (RDS) protocol. A security analysis of the method demonstrates that the approach is effective in thwart possible threats and attacks on license reselling.","PeriodicalId":277807,"journal":{"name":"2013 8th International Conference on Computer Engineering & Systems (ICCES)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134164294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/ICCES.2013.6707176
H. Elkamchouchi, Eman Abou El-kheir, Y. Abouelseoud
Signcryption combines the functionalities of encryption and digital signing in a single logical step in order to obtain confidentiality, integrity, authentication and non-repudiation. It is more efficient than the sign-then-encrypt approach. Identity-based cryptography serves as an efficient alternative to the traditional certificate-based cryptosystems. The idea of identity-based cryptography is to enable a user to use any arbitrary string that uniquely identifies him as his public key. This paper proposes two new schemes. The first scheme involves a single recipient and the second is its extension in the multi-receiver setting. Both schemes outperform other schemes in literature as they do not involve any bilinear pairings in neither signcryption nor verification phases. Moreover, both satisfy various desirable security properties.
{"title":"An efficient identity-based signeryption scheme without bilinear pairings","authors":"H. Elkamchouchi, Eman Abou El-kheir, Y. Abouelseoud","doi":"10.1109/ICCES.2013.6707176","DOIUrl":"https://doi.org/10.1109/ICCES.2013.6707176","url":null,"abstract":"Signcryption combines the functionalities of encryption and digital signing in a single logical step in order to obtain confidentiality, integrity, authentication and non-repudiation. It is more efficient than the sign-then-encrypt approach. Identity-based cryptography serves as an efficient alternative to the traditional certificate-based cryptosystems. The idea of identity-based cryptography is to enable a user to use any arbitrary string that uniquely identifies him as his public key. This paper proposes two new schemes. The first scheme involves a single recipient and the second is its extension in the multi-receiver setting. Both schemes outperform other schemes in literature as they do not involve any bilinear pairings in neither signcryption nor verification phases. Moreover, both satisfy various desirable security properties.","PeriodicalId":277807,"journal":{"name":"2013 8th International Conference on Computer Engineering & Systems (ICCES)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128028867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/ICCES.2013.6707202
A. Elfatah, I. Tarrad, A. Awad, H. Hamed
Data encryption has become a vital need for protecting the user data in most of communication areas. Advanced Encryption Standard (AES) algorithm has become the optimum choice for various security services in numerous applications due to its reliability and flexibility. The AES algorithm faces two main challenges which included in both encryption/decryption speed, and the consumed implementation area. This paper presents an optimized implementation of the AES algorithm with respect to the consumed implementation area by combining both data and key expansion approaches. The optimized implementation of AES increases its applicability in the small sized devices such as mobile phones and smart cards. The experimental outcomes prove the superiority of the proposed optimization approach compared to the available approaches in the literature with acceptable frequency and throughput for low throughput applications.
{"title":"Optimized hardware implementation of the advanced encryption standard algorithm","authors":"A. Elfatah, I. Tarrad, A. Awad, H. Hamed","doi":"10.1109/ICCES.2013.6707202","DOIUrl":"https://doi.org/10.1109/ICCES.2013.6707202","url":null,"abstract":"Data encryption has become a vital need for protecting the user data in most of communication areas. Advanced Encryption Standard (AES) algorithm has become the optimum choice for various security services in numerous applications due to its reliability and flexibility. The AES algorithm faces two main challenges which included in both encryption/decryption speed, and the consumed implementation area. This paper presents an optimized implementation of the AES algorithm with respect to the consumed implementation area by combining both data and key expansion approaches. The optimized implementation of AES increases its applicability in the small sized devices such as mobile phones and smart cards. The experimental outcomes prove the superiority of the proposed optimization approach compared to the available approaches in the literature with acceptable frequency and throughput for low throughput applications.","PeriodicalId":277807,"journal":{"name":"2013 8th International Conference on Computer Engineering & Systems (ICCES)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116898746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/ICCES.2013.6707188
O. Hassan, I. Adly, K. Shehata
This paper investigates the implementation of Impulse Radio - Ultra Wide Band (IR-UWB) to locate vehicles in a Vehicle-to-Infrastructure (V2I) network for traffic management application. Localization techniques such as Time of Arrival (TOA), Time Difference of Arrival (TDOA) and Direction of Arrival (DOA) are proposed and tested aiming at better location accuracy. These techniques are evaluated in terms of position error between the actual vehicle's position and the estimated one. The proposed Matlab simulation scenarios consider different vehicle's locations going from one edge to the center then to the other edge of the network, at various ranges from three equally distant roadside units (RSUs) that extend from 1-20m. The evaluation shows that the optimum localization technique will be a hybrid one that combines TDOA and DOA techniques.
{"title":"Vehicle localization system based on IR-UWB for V2I applications","authors":"O. Hassan, I. Adly, K. Shehata","doi":"10.1109/ICCES.2013.6707188","DOIUrl":"https://doi.org/10.1109/ICCES.2013.6707188","url":null,"abstract":"This paper investigates the implementation of Impulse Radio - Ultra Wide Band (IR-UWB) to locate vehicles in a Vehicle-to-Infrastructure (V2I) network for traffic management application. Localization techniques such as Time of Arrival (TOA), Time Difference of Arrival (TDOA) and Direction of Arrival (DOA) are proposed and tested aiming at better location accuracy. These techniques are evaluated in terms of position error between the actual vehicle's position and the estimated one. The proposed Matlab simulation scenarios consider different vehicle's locations going from one edge to the center then to the other edge of the network, at various ranges from three equally distant roadside units (RSUs) that extend from 1-20m. The evaluation shows that the optimum localization technique will be a hybrid one that combines TDOA and DOA techniques.","PeriodicalId":277807,"journal":{"name":"2013 8th International Conference on Computer Engineering & Systems (ICCES)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127981982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/ICCES.2013.6707155
M. Ghonaimy
In this presentation, an overview of Quantum Information Systems is given. Therefore, the postulates of quantum mechanics are given based on one interpretation that is called the Copenhagen interpretation. The main pillars of quantum mechanics are: Superposition, Interference, and Entanglement. Quantum Information Systems comprise three disciplines: Quantum Computation, Quantum Communication, and Quantum Control. Each one of them has a number of topics with some implementations that have reached the commercial level. Quantum Computation has three models: the circuit model that is using different techniques like superconducting elements and special Silicon-based elements. The Adiabatic quantum model has reached the commercial stage through a start-up company using superconducting chips. The categorical quantum model is based on category theory and one of its main applications is the study and verification of network and cryptographic protocols. Quantum communication started with defining the basic unit of information, the qubit. Then the quantum compression theorem was proved. The quantum channel capacity problem was divided into two problems: transmitting classical information over a quantum channel, and transmitting quantum information over a quantum channel. The first problem was partially resolved. However, the second problem is being researched upon. Two applications will be briefly presented: quantum teleportation and superdense coding. Both of them employs quantum entanglement. Quantum Key Distribution (QKD) using cryptographic protocols has received much attention due its importance in network security. A number of protocols have been proposed and some of them have been implemented, and now a number of commercial products have been announced. Also, some experimental networks have been implemented. QKD using space links have been proposed and experimented with. In few years quantum satellites will be launched. Quantum cryptographic protocols are being proposed to protect infrastructure networks like the electric power grid. Also, it is being used as a countermeasure against global spying networks like ECHELON that are detrimental for national economies. The Quantum Internet is also being considered using quantum teleportation together with Cavity Quantum Electrodynamics with some experimental work going on. Quantum Control is essential for both Quantum Computation and Quantum Communication. Intensive research is going on in: State estimation (called Quantum State Tomography), system identification (called Quantum Process Tomography), and Quantum Feedback Control. The basic concepts will be briefly considered in this presentation. University education has witnessed major changes to support the above developments. At the postgraduate level many universities offer many courses related to the above disciplines. Recently, a number of institutions started to offer undergraduate courses and some of them have even started to introduce Quantum Engin
{"title":"An overview of Quantum Information Systems","authors":"M. Ghonaimy","doi":"10.1109/ICCES.2013.6707155","DOIUrl":"https://doi.org/10.1109/ICCES.2013.6707155","url":null,"abstract":"In this presentation, an overview of Quantum Information Systems is given. Therefore, the postulates of quantum mechanics are given based on one interpretation that is called the Copenhagen interpretation. The main pillars of quantum mechanics are: Superposition, Interference, and Entanglement. Quantum Information Systems comprise three disciplines: Quantum Computation, Quantum Communication, and Quantum Control. Each one of them has a number of topics with some implementations that have reached the commercial level. Quantum Computation has three models: the circuit model that is using different techniques like superconducting elements and special Silicon-based elements. The Adiabatic quantum model has reached the commercial stage through a start-up company using superconducting chips. The categorical quantum model is based on category theory and one of its main applications is the study and verification of network and cryptographic protocols. Quantum communication started with defining the basic unit of information, the qubit. Then the quantum compression theorem was proved. The quantum channel capacity problem was divided into two problems: transmitting classical information over a quantum channel, and transmitting quantum information over a quantum channel. The first problem was partially resolved. However, the second problem is being researched upon. Two applications will be briefly presented: quantum teleportation and superdense coding. Both of them employs quantum entanglement. Quantum Key Distribution (QKD) using cryptographic protocols has received much attention due its importance in network security. A number of protocols have been proposed and some of them have been implemented, and now a number of commercial products have been announced. Also, some experimental networks have been implemented. QKD using space links have been proposed and experimented with. In few years quantum satellites will be launched. Quantum cryptographic protocols are being proposed to protect infrastructure networks like the electric power grid. Also, it is being used as a countermeasure against global spying networks like ECHELON that are detrimental for national economies. The Quantum Internet is also being considered using quantum teleportation together with Cavity Quantum Electrodynamics with some experimental work going on. Quantum Control is essential for both Quantum Computation and Quantum Communication. Intensive research is going on in: State estimation (called Quantum State Tomography), system identification (called Quantum Process Tomography), and Quantum Feedback Control. The basic concepts will be briefly considered in this presentation. University education has witnessed major changes to support the above developments. At the postgraduate level many universities offer many courses related to the above disciplines. Recently, a number of institutions started to offer undergraduate courses and some of them have even started to introduce Quantum Engin","PeriodicalId":277807,"journal":{"name":"2013 8th International Conference on Computer Engineering & Systems (ICCES)","volume":"97-98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121244201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/ICCES.2013.6707216
M. Hossam, H. M. Ebied, M. Abdel-Aziz
Hierarchical image segmentation is a well-known image analysis and clustering method that is used for hyperspectral image analysis. This paper introduces a parallel implementation of hybrid CPU/GPU for the Recursive Hierarchical Segmentation method (RHSEG) algorithm, in which CPU and GPU work cooperatively and seamlessly, combining benefits of both platforms. RHSEG is a method developed by National Aeronautics and Space Administration (NASA) which is more efficient than other traditional methods for high spatial resolution images. The RHSEG algorithm is also implemented on both GPU cluster and hybrid CPU/GPU cluster and the results are compared with the hybrid CPU/GPU implementation. For single hybrid computational node of 8 cores, a speedup of 6x is achieved using both CPU and GPU. On a computer cluster of 16 hybrid CPU/GPU nodes, an average speed up of 112x times is achieved over the sequential CPU implementation.
{"title":"Hybrid cluster of multicore CPUs and GPUs for accelerating hyperspectral image hierarchical segmentation","authors":"M. Hossam, H. M. Ebied, M. Abdel-Aziz","doi":"10.1109/ICCES.2013.6707216","DOIUrl":"https://doi.org/10.1109/ICCES.2013.6707216","url":null,"abstract":"Hierarchical image segmentation is a well-known image analysis and clustering method that is used for hyperspectral image analysis. This paper introduces a parallel implementation of hybrid CPU/GPU for the Recursive Hierarchical Segmentation method (RHSEG) algorithm, in which CPU and GPU work cooperatively and seamlessly, combining benefits of both platforms. RHSEG is a method developed by National Aeronautics and Space Administration (NASA) which is more efficient than other traditional methods for high spatial resolution images. The RHSEG algorithm is also implemented on both GPU cluster and hybrid CPU/GPU cluster and the results are compared with the hybrid CPU/GPU implementation. For single hybrid computational node of 8 cores, a speedup of 6x is achieved using both CPU and GPU. On a computer cluster of 16 hybrid CPU/GPU nodes, an average speed up of 112x times is achieved over the sequential CPU implementation.","PeriodicalId":277807,"journal":{"name":"2013 8th International Conference on Computer Engineering & Systems (ICCES)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123573814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-11-01DOI: 10.1109/ICCES.2013.6707222
G. Alaa, Mahmoud Menshawi, M. Saeed
Design of Web-enabled mobile applications is a complex task as mobile-wireless systems have special emphasis on quality of service (QoS) that covers network bandwidth usage, response time, failure rates, recovery time and others. Beside network constraints, mobile applications have limitations in terms of display size, local storage capacity, processing power, cache memory and battery life time that affect mobile system design features. QoS is related to quality in use features, such as efficiency and effectiveness that characterize quality of the system while it is in use. This research studies software metrics related to the design of mobile system components and their effect on QoS and quality in use. The research classifies the metrics as related to abstraction, coupling, data complexity and file transfer properties. Application of proposed metrics on a real-case Web-enabled mobile application indicates system design criteria required to improve QoS.
{"title":"Design criteria and software metrics for efficient and effective web-enabled mobile applications","authors":"G. Alaa, Mahmoud Menshawi, M. Saeed","doi":"10.1109/ICCES.2013.6707222","DOIUrl":"https://doi.org/10.1109/ICCES.2013.6707222","url":null,"abstract":"Design of Web-enabled mobile applications is a complex task as mobile-wireless systems have special emphasis on quality of service (QoS) that covers network bandwidth usage, response time, failure rates, recovery time and others. Beside network constraints, mobile applications have limitations in terms of display size, local storage capacity, processing power, cache memory and battery life time that affect mobile system design features. QoS is related to quality in use features, such as efficiency and effectiveness that characterize quality of the system while it is in use. This research studies software metrics related to the design of mobile system components and their effect on QoS and quality in use. The research classifies the metrics as related to abstraction, coupling, data complexity and file transfer properties. Application of proposed metrics on a real-case Web-enabled mobile application indicates system design criteria required to improve QoS.","PeriodicalId":277807,"journal":{"name":"2013 8th International Conference on Computer Engineering & Systems (ICCES)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134041968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}