首页 > 最新文献

2013 8th International Conference on Computer Engineering & Systems (ICCES)最新文献

英文 中文
Brain EEG signal processing for controlling a robotic arm 机械臂控制的脑电信号处理
Pub Date : 2013-11-01 DOI: 10.1109/ICCES.2013.6707191
H. Shedeed, M. F. Issa, S. El-Sayed
Researchers recently proposed new scientific methods for restoring function to those with motor impairments. one of these methods is to provide the brain with a new non-muscular communication and control channel, a direct Brain-Machine Interface (BMI). This paper presents a Brain Machine Interface (BMI) system based on using the brain electroencephalography (EEG) signals associated with 3 arm movements (close, open arm and close hand) for controlling a robotic arm. Signals recorded from one subject using Emotive Epoc device. Four channels only were used, in our experiment, AF3, which located at the prefrontal cortex and F7, F3, FC5 which located at the supplementary motor cortex of the brain. Three different techniques were used for features extraction which are: Wavelet Transform (WT), Fast Fourier Transform (FFT) and Principal Component Analysis (PCA). Multi-layer Perceptron Neural Network trained by a standard back propagation algorithm was used for classifying the three considered tasks. Classification rates of 91.1%, 86.7% and 85.6% were achieved with the three used features extraction techniques respectively. Experimental results show that the proposed system achieved high classification rates than other systems in the same application.
研究人员最近提出了新的科学方法来恢复运动障碍患者的功能。其中一种方法是为大脑提供一种新的非肌肉通信和控制通道,即直接脑机接口(BMI)。提出了一种基于脑脑电信号(EEG)控制机械臂的脑机接口(BMI)系统。用情绪记录仪记录一个实验对象的信号。我们的实验只使用了四个通道,分别是位于前额皮质的AF3通道和位于大脑辅助运动皮质的F7、F3、FC5通道。三种不同的特征提取技术分别是:小波变换(WT)、快速傅立叶变换(FFT)和主成分分析(PCA)。使用标准反向传播算法训练的多层感知器神经网络对三个考虑的任务进行分类。三种特征提取方法的分类率分别为91.1%、86.7%和85.6%。实验结果表明,在相同的应用中,该系统取得了较高的分类率。
{"title":"Brain EEG signal processing for controlling a robotic arm","authors":"H. Shedeed, M. F. Issa, S. El-Sayed","doi":"10.1109/ICCES.2013.6707191","DOIUrl":"https://doi.org/10.1109/ICCES.2013.6707191","url":null,"abstract":"Researchers recently proposed new scientific methods for restoring function to those with motor impairments. one of these methods is to provide the brain with a new non-muscular communication and control channel, a direct Brain-Machine Interface (BMI). This paper presents a Brain Machine Interface (BMI) system based on using the brain electroencephalography (EEG) signals associated with 3 arm movements (close, open arm and close hand) for controlling a robotic arm. Signals recorded from one subject using Emotive Epoc device. Four channels only were used, in our experiment, AF3, which located at the prefrontal cortex and F7, F3, FC5 which located at the supplementary motor cortex of the brain. Three different techniques were used for features extraction which are: Wavelet Transform (WT), Fast Fourier Transform (FFT) and Principal Component Analysis (PCA). Multi-layer Perceptron Neural Network trained by a standard back propagation algorithm was used for classifying the three considered tasks. Classification rates of 91.1%, 86.7% and 85.6% were achieved with the three used features extraction techniques respectively. Experimental results show that the proposed system achieved high classification rates than other systems in the same application.","PeriodicalId":277807,"journal":{"name":"2013 8th International Conference on Computer Engineering & Systems (ICCES)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130249272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 52
Image compression ratio enhancement based on conformal mapping 基于保角映射的图像压缩比增强
Pub Date : 2013-11-01 DOI: 10.1109/ICCES.2013.6707219
Hamdy M. Mousa, Mostafa A. Ahmad, A. El-Sisi
The main goal of compression is to reduce the amount of data required to represent a digital image. Conformal mapping has long been an important topic in complex analysis. In this paper, the proposed image compression technique based on conformal mapping transformation is introduced. The most recent standard compression technique, JPEG2000 compression algorithm, is used. The proposed technique is tested with various images types. Two categories of image compression techniques (lossless and lossy) and with/without conformal mapping are studied. The experimental results show that the compression ratio improves by 14% in average, and in case lossy image compression using JPEG2000 image quality gains over 2 dB in average.
压缩的主要目标是减少表示数字图像所需的数据量。保角映射一直是复分析中的一个重要课题。本文介绍了一种基于保角映射变换的图像压缩技术。使用了最新的标准压缩技术JPEG2000压缩算法。用不同的图像类型对所提出的技术进行了测试。研究了两类图像压缩技术(无损和有损)和带/不带保角映射。实验结果表明,JPEG2000压缩比平均提高14%,在有损图像压缩情况下,图像质量平均提高2 dB以上。
{"title":"Image compression ratio enhancement based on conformal mapping","authors":"Hamdy M. Mousa, Mostafa A. Ahmad, A. El-Sisi","doi":"10.1109/ICCES.2013.6707219","DOIUrl":"https://doi.org/10.1109/ICCES.2013.6707219","url":null,"abstract":"The main goal of compression is to reduce the amount of data required to represent a digital image. Conformal mapping has long been an important topic in complex analysis. In this paper, the proposed image compression technique based on conformal mapping transformation is introduced. The most recent standard compression technique, JPEG2000 compression algorithm, is used. The proposed technique is tested with various images types. Two categories of image compression techniques (lossless and lossy) and with/without conformal mapping are studied. The experimental results show that the compression ratio improves by 14% in average, and in case lossy image compression using JPEG2000 image quality gains over 2 dB in average.","PeriodicalId":277807,"journal":{"name":"2013 8th International Conference on Computer Engineering & Systems (ICCES)","volume":"2010 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125606660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Hand gesture recognition using fourier descriptors 使用傅立叶描述子的手势识别
Pub Date : 2013-11-01 DOI: 10.1109/ICCES.2013.6707218
Heba Gamal, H. M. Abdul-Kader, E. Sallam
Accurate, real-time hand gesture recognition is a challenging and crucial task due to the need of more natural human-computer interaction methods. The major problem lies in fining a good compromise between the accuracy of recognition and the computational load for the algorithm to run in real-time. In this paper we propose a method for static hand gesture recognition using Fourier descriptors for feature extraction with different classifiers. Fourier descriptors have the advantage of giving a set of features that are invariant to rotation, translation and scaling. They are also efficient in terms of speed as they only use a small number of points from the entire image. The proposed method is evaluated using images from the Cambridge Hand Gesture Dataset at different number of features and different classifiers. The effectiveness of the method is shown through simulation results.
由于需要更自然的人机交互方法,准确、实时的手势识别是一项具有挑战性和关键的任务。主要问题在于如何在识别精度和计算量之间找到一个好的平衡点,使算法能够实时运行。本文提出了一种利用傅立叶描述子提取不同分类器特征的静态手势识别方法。傅里叶描述子的优点是给出了一组对旋转、平移和缩放不变的特征。它们在速度方面也很高效,因为它们只使用整个图像中的少量点。使用来自剑桥手势数据集的图像在不同数量的特征和不同的分类器上对所提出的方法进行评估。仿真结果表明了该方法的有效性。
{"title":"Hand gesture recognition using fourier descriptors","authors":"Heba Gamal, H. M. Abdul-Kader, E. Sallam","doi":"10.1109/ICCES.2013.6707218","DOIUrl":"https://doi.org/10.1109/ICCES.2013.6707218","url":null,"abstract":"Accurate, real-time hand gesture recognition is a challenging and crucial task due to the need of more natural human-computer interaction methods. The major problem lies in fining a good compromise between the accuracy of recognition and the computational load for the algorithm to run in real-time. In this paper we propose a method for static hand gesture recognition using Fourier descriptors for feature extraction with different classifiers. Fourier descriptors have the advantage of giving a set of features that are invariant to rotation, translation and scaling. They are also efficient in terms of speed as they only use a small number of points from the entire image. The proposed method is evaluated using images from the Cambridge Hand Gesture Dataset at different number of features and different classifiers. The effectiveness of the method is shown through simulation results.","PeriodicalId":277807,"journal":{"name":"2013 8th International Conference on Computer Engineering & Systems (ICCES)","volume":"16 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126093805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
A novel approach to allow multiple resales of DRM-protected contents 一种允许多重转售受drm保护的内容的新方法
Pub Date : 2013-11-01 DOI: 10.1109/ICCES.2013.6707177
T. Gaber, Ning Zhang, A. Hassanien
This paper describes a novel approach to support multiple resellings of DRM-Protected contents. The approach allows a consumer to resell his/her content (license) to a second consumer who can also resell the same content to a third one, and so on. This reselling process can continue till the license is resold N-times. To ensure that the reselling process is secure and fair, the approach has built-in security measures to enable a buyer to verify that the license for sale is not faked/forged and that it is resalable before engaging in the payment process. In addition, the approach ensures fairness in a reselling process, i.e. the buyer will not get the license without making the due payment, and the reseller will not get the payment if he does not surrender the license. These properties are achieved through the use of a number of building blocks, including a License Revocation List (LRL), a digital token called Reselling Permission (RP) and a special contract signing protocol called Reselling Deal Signing (RDS) protocol. A security analysis of the method demonstrates that the approach is effective in thwart possible threats and attacks on license reselling.
本文描述了一种支持drm保护内容的多重转售的新方法。这种方法允许消费者将他/她的内容(许可)转售给第二个消费者,第二个消费者也可以将相同的内容转售给第三个消费者,以此类推。这个转售过程可以持续到许可证被转售n次。为了确保转售过程的安全和公平,该方法内置了安全措施,使买方能够在参与付款过程之前验证出售的许可证不是伪造/伪造的,并且可以转售。此外,该方法还保证了转售过程中的公平性,即买方不支付到期费用就无法获得许可证,而经销商不放弃许可证也无法获得付款。这些属性是通过使用一些构建块来实现的,包括许可证撤销列表(LRL)、称为转售许可(RP)的数字令牌和称为转售交易签名(RDS)协议的特殊合同签署协议。对该方法的安全性分析表明,该方法可以有效地阻止针对许可证转售的威胁和攻击。
{"title":"A novel approach to allow multiple resales of DRM-protected contents","authors":"T. Gaber, Ning Zhang, A. Hassanien","doi":"10.1109/ICCES.2013.6707177","DOIUrl":"https://doi.org/10.1109/ICCES.2013.6707177","url":null,"abstract":"This paper describes a novel approach to support multiple resellings of DRM-Protected contents. The approach allows a consumer to resell his/her content (license) to a second consumer who can also resell the same content to a third one, and so on. This reselling process can continue till the license is resold N-times. To ensure that the reselling process is secure and fair, the approach has built-in security measures to enable a buyer to verify that the license for sale is not faked/forged and that it is resalable before engaging in the payment process. In addition, the approach ensures fairness in a reselling process, i.e. the buyer will not get the license without making the due payment, and the reseller will not get the payment if he does not surrender the license. These properties are achieved through the use of a number of building blocks, including a License Revocation List (LRL), a digital token called Reselling Permission (RP) and a special contract signing protocol called Reselling Deal Signing (RDS) protocol. A security analysis of the method demonstrates that the approach is effective in thwart possible threats and attacks on license reselling.","PeriodicalId":277807,"journal":{"name":"2013 8th International Conference on Computer Engineering & Systems (ICCES)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134164294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An efficient identity-based signeryption scheme without bilinear pairings 无双线性对的高效身份签名方案
Pub Date : 2013-11-01 DOI: 10.1109/ICCES.2013.6707176
H. Elkamchouchi, Eman Abou El-kheir, Y. Abouelseoud
Signcryption combines the functionalities of encryption and digital signing in a single logical step in order to obtain confidentiality, integrity, authentication and non-repudiation. It is more efficient than the sign-then-encrypt approach. Identity-based cryptography serves as an efficient alternative to the traditional certificate-based cryptosystems. The idea of identity-based cryptography is to enable a user to use any arbitrary string that uniquely identifies him as his public key. This paper proposes two new schemes. The first scheme involves a single recipient and the second is its extension in the multi-receiver setting. Both schemes outperform other schemes in literature as they do not involve any bilinear pairings in neither signcryption nor verification phases. Moreover, both satisfy various desirable security properties.
签名加密将加密和数字签名的功能结合在一个逻辑步骤中,以获得机密性、完整性、身份验证和不可否认性。它比先签名后加密的方法更有效。基于身份的加密可以作为传统的基于证书的加密系统的有效替代方案。基于身份的加密的思想是允许用户使用唯一标识他的任意字符串作为他的公钥。本文提出了两种新的方案。第一种方案涉及单个接收者,第二种方案是其在多接收者设置中的扩展。这两种方案都优于文献中的其他方案,因为它们在签名加密和验证阶段都不涉及任何双线性配对。此外,两者都满足各种理想的安全特性。
{"title":"An efficient identity-based signeryption scheme without bilinear pairings","authors":"H. Elkamchouchi, Eman Abou El-kheir, Y. Abouelseoud","doi":"10.1109/ICCES.2013.6707176","DOIUrl":"https://doi.org/10.1109/ICCES.2013.6707176","url":null,"abstract":"Signcryption combines the functionalities of encryption and digital signing in a single logical step in order to obtain confidentiality, integrity, authentication and non-repudiation. It is more efficient than the sign-then-encrypt approach. Identity-based cryptography serves as an efficient alternative to the traditional certificate-based cryptosystems. The idea of identity-based cryptography is to enable a user to use any arbitrary string that uniquely identifies him as his public key. This paper proposes two new schemes. The first scheme involves a single recipient and the second is its extension in the multi-receiver setting. Both schemes outperform other schemes in literature as they do not involve any bilinear pairings in neither signcryption nor verification phases. Moreover, both satisfy various desirable security properties.","PeriodicalId":277807,"journal":{"name":"2013 8th International Conference on Computer Engineering & Systems (ICCES)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128028867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Optimized hardware implementation of the advanced encryption standard algorithm 优化了先进加密标准算法的硬件实现
Pub Date : 2013-11-01 DOI: 10.1109/ICCES.2013.6707202
A. Elfatah, I. Tarrad, A. Awad, H. Hamed
Data encryption has become a vital need for protecting the user data in most of communication areas. Advanced Encryption Standard (AES) algorithm has become the optimum choice for various security services in numerous applications due to its reliability and flexibility. The AES algorithm faces two main challenges which included in both encryption/decryption speed, and the consumed implementation area. This paper presents an optimized implementation of the AES algorithm with respect to the consumed implementation area by combining both data and key expansion approaches. The optimized implementation of AES increases its applicability in the small sized devices such as mobile phones and smart cards. The experimental outcomes prove the superiority of the proposed optimization approach compared to the available approaches in the literature with acceptable frequency and throughput for low throughput applications.
在大多数通信领域,数据加密已经成为保护用户数据的一项重要需求。高级加密标准AES (Advanced Encryption Standard, AES)算法以其可靠性和灵活性成为众多应用中各种安全服务的最佳选择。AES算法面临两个主要挑战,包括加密/解密速度和消耗的实现区域。本文结合数据扩展和密钥扩展两种方法,提出了一种针对已消耗的实现区域的AES算法的优化实现。AES的优化实现提高了其在手机、智能卡等小型设备中的适用性。实验结果证明了所提出的优化方法与文献中可用的方法相比具有优势,并且在低吞吐量应用中具有可接受的频率和吞吐量。
{"title":"Optimized hardware implementation of the advanced encryption standard algorithm","authors":"A. Elfatah, I. Tarrad, A. Awad, H. Hamed","doi":"10.1109/ICCES.2013.6707202","DOIUrl":"https://doi.org/10.1109/ICCES.2013.6707202","url":null,"abstract":"Data encryption has become a vital need for protecting the user data in most of communication areas. Advanced Encryption Standard (AES) algorithm has become the optimum choice for various security services in numerous applications due to its reliability and flexibility. The AES algorithm faces two main challenges which included in both encryption/decryption speed, and the consumed implementation area. This paper presents an optimized implementation of the AES algorithm with respect to the consumed implementation area by combining both data and key expansion approaches. The optimized implementation of AES increases its applicability in the small sized devices such as mobile phones and smart cards. The experimental outcomes prove the superiority of the proposed optimization approach compared to the available approaches in the literature with acceptable frequency and throughput for low throughput applications.","PeriodicalId":277807,"journal":{"name":"2013 8th International Conference on Computer Engineering & Systems (ICCES)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116898746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Vehicle localization system based on IR-UWB for V2I applications 基于IR-UWB的车载定位系统
Pub Date : 2013-11-01 DOI: 10.1109/ICCES.2013.6707188
O. Hassan, I. Adly, K. Shehata
This paper investigates the implementation of Impulse Radio - Ultra Wide Band (IR-UWB) to locate vehicles in a Vehicle-to-Infrastructure (V2I) network for traffic management application. Localization techniques such as Time of Arrival (TOA), Time Difference of Arrival (TDOA) and Direction of Arrival (DOA) are proposed and tested aiming at better location accuracy. These techniques are evaluated in terms of position error between the actual vehicle's position and the estimated one. The proposed Matlab simulation scenarios consider different vehicle's locations going from one edge to the center then to the other edge of the network, at various ranges from three equally distant roadside units (RSUs) that extend from 1-20m. The evaluation shows that the optimum localization technique will be a hybrid one that combines TDOA and DOA techniques.
本文研究了脉冲无线电-超宽带(IR-UWB)在车辆到基础设施(V2I)网络中的交通管理应用定位车辆的实现。为了提高定位精度,提出了到达时间(TOA)、到达时间差(TDOA)和到达方向(DOA)等定位技术并进行了测试。这些技术是根据车辆的实际位置和估计位置之间的位置误差来评估的。所提出的Matlab仿真场景考虑了不同车辆的位置,从网络的一个边缘到中心,然后到另一个边缘,在从1-20米的三个等距离路边单元(rsu)的不同范围内。评价结果表明,最优定位技术将是TDOA和DOA技术相结合的混合定位技术。
{"title":"Vehicle localization system based on IR-UWB for V2I applications","authors":"O. Hassan, I. Adly, K. Shehata","doi":"10.1109/ICCES.2013.6707188","DOIUrl":"https://doi.org/10.1109/ICCES.2013.6707188","url":null,"abstract":"This paper investigates the implementation of Impulse Radio - Ultra Wide Band (IR-UWB) to locate vehicles in a Vehicle-to-Infrastructure (V2I) network for traffic management application. Localization techniques such as Time of Arrival (TOA), Time Difference of Arrival (TDOA) and Direction of Arrival (DOA) are proposed and tested aiming at better location accuracy. These techniques are evaluated in terms of position error between the actual vehicle's position and the estimated one. The proposed Matlab simulation scenarios consider different vehicle's locations going from one edge to the center then to the other edge of the network, at various ranges from three equally distant roadside units (RSUs) that extend from 1-20m. The evaluation shows that the optimum localization technique will be a hybrid one that combines TDOA and DOA techniques.","PeriodicalId":277807,"journal":{"name":"2013 8th International Conference on Computer Engineering & Systems (ICCES)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127981982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
An overview of Quantum Information Systems 量子信息系统概述
Pub Date : 2013-11-01 DOI: 10.1109/ICCES.2013.6707155
M. Ghonaimy
In this presentation, an overview of Quantum Information Systems is given. Therefore, the postulates of quantum mechanics are given based on one interpretation that is called the Copenhagen interpretation. The main pillars of quantum mechanics are: Superposition, Interference, and Entanglement. Quantum Information Systems comprise three disciplines: Quantum Computation, Quantum Communication, and Quantum Control. Each one of them has a number of topics with some implementations that have reached the commercial level. Quantum Computation has three models: the circuit model that is using different techniques like superconducting elements and special Silicon-based elements. The Adiabatic quantum model has reached the commercial stage through a start-up company using superconducting chips. The categorical quantum model is based on category theory and one of its main applications is the study and verification of network and cryptographic protocols. Quantum communication started with defining the basic unit of information, the qubit. Then the quantum compression theorem was proved. The quantum channel capacity problem was divided into two problems: transmitting classical information over a quantum channel, and transmitting quantum information over a quantum channel. The first problem was partially resolved. However, the second problem is being researched upon. Two applications will be briefly presented: quantum teleportation and superdense coding. Both of them employs quantum entanglement. Quantum Key Distribution (QKD) using cryptographic protocols has received much attention due its importance in network security. A number of protocols have been proposed and some of them have been implemented, and now a number of commercial products have been announced. Also, some experimental networks have been implemented. QKD using space links have been proposed and experimented with. In few years quantum satellites will be launched. Quantum cryptographic protocols are being proposed to protect infrastructure networks like the electric power grid. Also, it is being used as a countermeasure against global spying networks like ECHELON that are detrimental for national economies. The Quantum Internet is also being considered using quantum teleportation together with Cavity Quantum Electrodynamics with some experimental work going on. Quantum Control is essential for both Quantum Computation and Quantum Communication. Intensive research is going on in: State estimation (called Quantum State Tomography), system identification (called Quantum Process Tomography), and Quantum Feedback Control. The basic concepts will be briefly considered in this presentation. University education has witnessed major changes to support the above developments. At the postgraduate level many universities offer many courses related to the above disciplines. Recently, a number of institutions started to offer undergraduate courses and some of them have even started to introduce Quantum Engin
本文对量子信息系统进行了概述。因此,量子力学的公设是基于一种被称为哥本哈根解释的解释给出的。量子力学的主要支柱是:叠加、干涉和纠缠。量子信息系统包括三个学科:量子计算、量子通信和量子控制。它们中的每一个都有许多主题,其中一些实现已经达到了商业级别。量子计算有三种模型:电路模型使用不同的技术,如超导元件和特殊的硅基元件。绝热量子模型已经通过一家使用超导芯片的初创公司进入商业阶段。范畴量子模型基于范畴理论,其主要应用之一是网络和密码协议的研究和验证。量子通信始于定义信息的基本单位——量子比特。然后证明了量子压缩定理。将量子信道容量问题分为两个问题:在量子信道上传输经典信息和在量子信道上传输量子信息。第一个问题得到了部分解决。然而,第二个问题正在研究中。本文将简要介绍两种应用:量子隐形传态和超密编码。它们都使用了量子纠缠。基于加密协议的量子密钥分发(QKD)由于其对网络安全的重要性而受到广泛关注。已经提出了许多协议,其中一些已经实现,现在已经宣布了许多商业产品。此外,还实现了一些实验网络。使用空间链接的QKD已经被提出并进行了实验。几年后将发射量子卫星。量子密码协议被提议用来保护像电网这样的基础设施网络。此外,它还被用来对付像ECHELON这样对国家经济有害的全球间谍网络。量子互联网也正在考虑将量子隐形传态与空腔量子电动力学结合起来,并进行一些实验工作。量子控制对于量子计算和量子通信都是必不可少的。深入的研究正在进行:状态估计(称为量子态断层扫描),系统识别(称为量子过程断层扫描)和量子反馈控制。本报告将简要介绍基本概念。为支持上述发展,大学教育发生了重大变化。在研究生阶段,许多大学提供与上述学科相关的许多课程。最近,一些机构开始开设本科课程,其中一些甚至开始引入量子工程4年制本科课程。将对这些发展作一个简短的叙述。
{"title":"An overview of Quantum Information Systems","authors":"M. Ghonaimy","doi":"10.1109/ICCES.2013.6707155","DOIUrl":"https://doi.org/10.1109/ICCES.2013.6707155","url":null,"abstract":"In this presentation, an overview of Quantum Information Systems is given. Therefore, the postulates of quantum mechanics are given based on one interpretation that is called the Copenhagen interpretation. The main pillars of quantum mechanics are: Superposition, Interference, and Entanglement. Quantum Information Systems comprise three disciplines: Quantum Computation, Quantum Communication, and Quantum Control. Each one of them has a number of topics with some implementations that have reached the commercial level. Quantum Computation has three models: the circuit model that is using different techniques like superconducting elements and special Silicon-based elements. The Adiabatic quantum model has reached the commercial stage through a start-up company using superconducting chips. The categorical quantum model is based on category theory and one of its main applications is the study and verification of network and cryptographic protocols. Quantum communication started with defining the basic unit of information, the qubit. Then the quantum compression theorem was proved. The quantum channel capacity problem was divided into two problems: transmitting classical information over a quantum channel, and transmitting quantum information over a quantum channel. The first problem was partially resolved. However, the second problem is being researched upon. Two applications will be briefly presented: quantum teleportation and superdense coding. Both of them employs quantum entanglement. Quantum Key Distribution (QKD) using cryptographic protocols has received much attention due its importance in network security. A number of protocols have been proposed and some of them have been implemented, and now a number of commercial products have been announced. Also, some experimental networks have been implemented. QKD using space links have been proposed and experimented with. In few years quantum satellites will be launched. Quantum cryptographic protocols are being proposed to protect infrastructure networks like the electric power grid. Also, it is being used as a countermeasure against global spying networks like ECHELON that are detrimental for national economies. The Quantum Internet is also being considered using quantum teleportation together with Cavity Quantum Electrodynamics with some experimental work going on. Quantum Control is essential for both Quantum Computation and Quantum Communication. Intensive research is going on in: State estimation (called Quantum State Tomography), system identification (called Quantum Process Tomography), and Quantum Feedback Control. The basic concepts will be briefly considered in this presentation. University education has witnessed major changes to support the above developments. At the postgraduate level many universities offer many courses related to the above disciplines. Recently, a number of institutions started to offer undergraduate courses and some of them have even started to introduce Quantum Engin","PeriodicalId":277807,"journal":{"name":"2013 8th International Conference on Computer Engineering & Systems (ICCES)","volume":"97-98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121244201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Hybrid cluster of multicore CPUs and GPUs for accelerating hyperspectral image hierarchical segmentation 用于加速高光谱图像分层分割的多核cpu和gpu混合集群
Pub Date : 2013-11-01 DOI: 10.1109/ICCES.2013.6707216
M. Hossam, H. M. Ebied, M. Abdel-Aziz
Hierarchical image segmentation is a well-known image analysis and clustering method that is used for hyperspectral image analysis. This paper introduces a parallel implementation of hybrid CPU/GPU for the Recursive Hierarchical Segmentation method (RHSEG) algorithm, in which CPU and GPU work cooperatively and seamlessly, combining benefits of both platforms. RHSEG is a method developed by National Aeronautics and Space Administration (NASA) which is more efficient than other traditional methods for high spatial resolution images. The RHSEG algorithm is also implemented on both GPU cluster and hybrid CPU/GPU cluster and the results are compared with the hybrid CPU/GPU implementation. For single hybrid computational node of 8 cores, a speedup of 6x is achieved using both CPU and GPU. On a computer cluster of 16 hybrid CPU/GPU nodes, an average speed up of 112x times is achieved over the sequential CPU implementation.
分层图像分割是一种众所周知的用于高光谱图像分析的图像分析和聚类方法。本文介绍了一种用于递归分层分割(RHSEG)算法的混合CPU/GPU并行实现,使CPU和GPU协同无缝工作,结合了两个平台的优势。RHSEG是美国国家航空航天局(NASA)开发的一种比其他传统方法更高效的高空间分辨率图像提取方法。在GPU集群和CPU/GPU混合集群上分别实现了RHSEG算法,并与CPU/GPU混合集群的实现结果进行了比较。对于单个8核混合计算节点,同时使用CPU和GPU可实现6倍的加速。在16个混合CPU/GPU节点的计算机集群上,与顺序CPU实现相比,平均速度提高了112倍。
{"title":"Hybrid cluster of multicore CPUs and GPUs for accelerating hyperspectral image hierarchical segmentation","authors":"M. Hossam, H. M. Ebied, M. Abdel-Aziz","doi":"10.1109/ICCES.2013.6707216","DOIUrl":"https://doi.org/10.1109/ICCES.2013.6707216","url":null,"abstract":"Hierarchical image segmentation is a well-known image analysis and clustering method that is used for hyperspectral image analysis. This paper introduces a parallel implementation of hybrid CPU/GPU for the Recursive Hierarchical Segmentation method (RHSEG) algorithm, in which CPU and GPU work cooperatively and seamlessly, combining benefits of both platforms. RHSEG is a method developed by National Aeronautics and Space Administration (NASA) which is more efficient than other traditional methods for high spatial resolution images. The RHSEG algorithm is also implemented on both GPU cluster and hybrid CPU/GPU cluster and the results are compared with the hybrid CPU/GPU implementation. For single hybrid computational node of 8 cores, a speedup of 6x is achieved using both CPU and GPU. On a computer cluster of 16 hybrid CPU/GPU nodes, an average speed up of 112x times is achieved over the sequential CPU implementation.","PeriodicalId":277807,"journal":{"name":"2013 8th International Conference on Computer Engineering & Systems (ICCES)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123573814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Design criteria and software metrics for efficient and effective web-enabled mobile applications 为高效和有效的网络移动应用程序设计标准和软件指标
Pub Date : 2013-11-01 DOI: 10.1109/ICCES.2013.6707222
G. Alaa, Mahmoud Menshawi, M. Saeed
Design of Web-enabled mobile applications is a complex task as mobile-wireless systems have special emphasis on quality of service (QoS) that covers network bandwidth usage, response time, failure rates, recovery time and others. Beside network constraints, mobile applications have limitations in terms of display size, local storage capacity, processing power, cache memory and battery life time that affect mobile system design features. QoS is related to quality in use features, such as efficiency and effectiveness that characterize quality of the system while it is in use. This research studies software metrics related to the design of mobile system components and their effect on QoS and quality in use. The research classifies the metrics as related to abstraction, coupling, data complexity and file transfer properties. Application of proposed metrics on a real-case Web-enabled mobile application indicates system design criteria required to improve QoS.
设计支持web的移动应用程序是一项复杂的任务,因为移动无线系统特别强调服务质量(QoS),包括网络带宽使用、响应时间、故障率、恢复时间等。除了网络限制,移动应用在显示尺寸、本地存储容量、处理能力、缓存和电池寿命方面也有限制,这些都会影响移动系统的设计特性。QoS与使用中的质量特征有关,例如在系统使用时表征系统质量的效率和有效性。本研究研究了与移动系统组件设计相关的软件度量及其在使用中对QoS和质量的影响。该研究将度量分类为与抽象、耦合、数据复杂性和文件传输属性相关的度量。将建议的度量标准应用于实际的支持web的移动应用程序,表明了改进QoS所需的系统设计标准。
{"title":"Design criteria and software metrics for efficient and effective web-enabled mobile applications","authors":"G. Alaa, Mahmoud Menshawi, M. Saeed","doi":"10.1109/ICCES.2013.6707222","DOIUrl":"https://doi.org/10.1109/ICCES.2013.6707222","url":null,"abstract":"Design of Web-enabled mobile applications is a complex task as mobile-wireless systems have special emphasis on quality of service (QoS) that covers network bandwidth usage, response time, failure rates, recovery time and others. Beside network constraints, mobile applications have limitations in terms of display size, local storage capacity, processing power, cache memory and battery life time that affect mobile system design features. QoS is related to quality in use features, such as efficiency and effectiveness that characterize quality of the system while it is in use. This research studies software metrics related to the design of mobile system components and their effect on QoS and quality in use. The research classifies the metrics as related to abstraction, coupling, data complexity and file transfer properties. Application of proposed metrics on a real-case Web-enabled mobile application indicates system design criteria required to improve QoS.","PeriodicalId":277807,"journal":{"name":"2013 8th International Conference on Computer Engineering & Systems (ICCES)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134041968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2013 8th International Conference on Computer Engineering & Systems (ICCES)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1