首页 > 最新文献

2022 10th International Japan-Africa Conference on Electronics, Communications, and Computations (JAC-ECC)最新文献

英文 中文
Parking Occupancy Prediction and Traffic Assignment in a University Environment 大学环境下停车占用预测与交通分配
Mohamed M. G. Farag, Amr E. Hilal, Samy El-Tawab
The fourth industrial revolution has given rise to large-scale data-driven models like smart cities and Intelligent transportation. Within these models, applications like smart parking have been growing rapidly in research and industry. However, different scenarios and environments (e.g., shopping areas, residential places, and business complexes) can require special handling due to the various factors impacting people’s schedules and behavior. In this paper, we provide an initial investigation of traffic assignment based on parking prediction for a mid-size university environment where parking is concentrated in three parking garages around the campus. Our initial investigation includes results for parking prediction using a statistical method and plans for an augmenting study using variations of Neural Networks. On top of the parking prediction layer, we propose an application layer that directs and fuses the model predictions to produce the parking options provided to the application user. The presented investigation can help the university administration in their consideration of building additional garages.
第四次工业革命催生了智能城市、智能交通等大规模数据驱动模式。在这些模型中,智能停车等应用在研究和工业中迅速发展。然而,由于影响人们日程安排和行为的各种因素,不同的场景和环境(例如,购物区、住宅区和商业综合体)可能需要特殊处理。本文对一个中等规模的大学环境进行了基于停车预测的交通分配问题的初步研究,该环境的停车集中在校园周围的三个停车场中。我们的初步调查包括使用统计方法进行停车预测的结果,以及使用神经网络变体进行扩展研究的计划。在停车预测层之上,我们提出了一个应用层,用于指导和融合模型预测,以生成提供给应用程序用户的停车选项。所提出的调查可以帮助大学管理层考虑增建车库。
{"title":"Parking Occupancy Prediction and Traffic Assignment in a University Environment","authors":"Mohamed M. G. Farag, Amr E. Hilal, Samy El-Tawab","doi":"10.1109/JAC-ECC56395.2022.10044079","DOIUrl":"https://doi.org/10.1109/JAC-ECC56395.2022.10044079","url":null,"abstract":"The fourth industrial revolution has given rise to large-scale data-driven models like smart cities and Intelligent transportation. Within these models, applications like smart parking have been growing rapidly in research and industry. However, different scenarios and environments (e.g., shopping areas, residential places, and business complexes) can require special handling due to the various factors impacting people’s schedules and behavior. In this paper, we provide an initial investigation of traffic assignment based on parking prediction for a mid-size university environment where parking is concentrated in three parking garages around the campus. Our initial investigation includes results for parking prediction using a statistical method and plans for an augmenting study using variations of Neural Networks. On top of the parking prediction layer, we propose an application layer that directs and fuses the model predictions to produce the parking options provided to the application user. The presented investigation can help the university administration in their consideration of building additional garages.","PeriodicalId":326002,"journal":{"name":"2022 10th International Japan-Africa Conference on Electronics, Communications, and Computations (JAC-ECC)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130339130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Highly Accurate Multi-Modal LTE Channel Prediction via Semantic Segmentation of Satellite Images 基于卫星图像语义分割的高精度多模态LTE信道预测
Mohamed Tharwat Waheed, Ahmed K. F. Khattab, Y. Fahmy
Predicting the coverage of the base stations in mobile networks is a critical task for mobile operators to identify the geographical area covered by the cellular base stations. It also enables the network operators to discover the coverage gaps and optimally choose the locations for new base stations. Existing prediction models use ray tracing techniques that are computationally expensive and depend on three-dimensional maps, which are costly and need to be regularly updated. This paper proposes an efficient and highly accurate multi-modal channel model prediction algorithm using numerical features and satellite images with semantic segmentation (SS) to extract the environmental characteristics. Experimental measurements were gathered and combined with two-dimensional satellite maps from a real LTE network in the Cairo region for an accurate evaluation. Using the proposed architecture with SS and introducing new numerical features, we achieved a mean absolute error (MAE) of 1.57 dB and 2.21 root-mean-square error (RMSE) with a 23.7% enhancement over the state-of-theart techniques and a 61.04% reduction in system complexity in terms of the number of trainable parameters.
预测移动网络中基站的覆盖范围是移动运营商确定蜂窝基站所覆盖的地理区域的关键任务。它还使网络运营商能够发现覆盖缺口,并最佳地选择新基站的位置。现有的预测模型使用的光线追踪技术在计算上很昂贵,而且依赖于三维地图,这是昂贵的,需要定期更新。本文提出了一种高效、高精度的多模态信道模型预测算法,该算法利用数值特征和带有语义分割(SS)的卫星图像提取环境特征。收集了实验测量数据,并将其与开罗地区实际LTE网络的二维卫星地图相结合,以进行准确的评估。使用SS和引入新的数字特征,我们实现了平均绝对误差(MAE)为1.57 dB和均方根误差(RMSE)为2.21,比最先进的技术提高了23.7%,就可训练参数的数量而言,系统复杂性降低了61.04%。
{"title":"Highly Accurate Multi-Modal LTE Channel Prediction via Semantic Segmentation of Satellite Images","authors":"Mohamed Tharwat Waheed, Ahmed K. F. Khattab, Y. Fahmy","doi":"10.1109/JAC-ECC56395.2022.10043911","DOIUrl":"https://doi.org/10.1109/JAC-ECC56395.2022.10043911","url":null,"abstract":"Predicting the coverage of the base stations in mobile networks is a critical task for mobile operators to identify the geographical area covered by the cellular base stations. It also enables the network operators to discover the coverage gaps and optimally choose the locations for new base stations. Existing prediction models use ray tracing techniques that are computationally expensive and depend on three-dimensional maps, which are costly and need to be regularly updated. This paper proposes an efficient and highly accurate multi-modal channel model prediction algorithm using numerical features and satellite images with semantic segmentation (SS) to extract the environmental characteristics. Experimental measurements were gathered and combined with two-dimensional satellite maps from a real LTE network in the Cairo region for an accurate evaluation. Using the proposed architecture with SS and introducing new numerical features, we achieved a mean absolute error (MAE) of 1.57 dB and 2.21 root-mean-square error (RMSE) with a 23.7% enhancement over the state-of-theart techniques and a 61.04% reduction in system complexity in terms of the number of trainable parameters.","PeriodicalId":326002,"journal":{"name":"2022 10th International Japan-Africa Conference on Electronics, Communications, and Computations (JAC-ECC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129770590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards a Comprehensive Model for the Study of Computer Networks Performance using Information Theory 用信息理论研究计算机网络性能的综合模型
M. Nomeir, B. Mokhtar
Improving computer networks performance is a tremendous need in our life for meeting ever-changing quality of service (QoS) requirements of interesting applications. We are searching continuously on how to increase the performance of computer networks. One of the most important factors that aid in determining network performance is the available and accessible network information. In this paper, we deal with this problem in an information theoretic framework. Our approach is different than most recent papers in this field, where we use predefined measures that normally work on any computer network and we apply it to a general network model. We examine these measures on a specific model that is more comprehensive and more applicable than previous models discussed in other papers. Also, one of the important reasons in our extended study is to investigate the shortcomings in adopting these measures and how they appear in the results. We discuss briefly how to enhance these measures to be compatible with real networks and to give more precise and efficient results. Our analytical study of the developed model shows that obtained results can be used to guide future network designs since our model can be easily manipulated to get many real network models.
为了满足各种有趣的应用程序不断变化的服务质量(QoS)要求,提高计算机网络的性能是我们生活中一个巨大的需求。我们一直在研究如何提高计算机网络的性能。帮助确定网络性能的最重要因素之一是可用的和可访问的网络信息。在本文中,我们用信息理论的框架来处理这个问题。我们的方法与该领域最近的大多数论文不同,在这些论文中,我们使用通常在任何计算机网络上工作的预定义度量,并将其应用于一般网络模型。我们在一个特定的模型上检验这些措施,该模型比其他论文中讨论的先前模型更全面,更适用。此外,我们扩展研究的一个重要原因是调查采用这些措施的缺点以及它们如何在结果中表现出来。我们简要讨论了如何改进这些措施,使其与实际网络兼容,并给出更精确、更有效的结果。对所建立的网络模型进行分析研究表明,所得到的结果可以用于指导未来的网络设计,因为我们的模型可以很容易地得到许多真实的网络模型。
{"title":"Towards a Comprehensive Model for the Study of Computer Networks Performance using Information Theory","authors":"M. Nomeir, B. Mokhtar","doi":"10.1109/JAC-ECC56395.2022.10043897","DOIUrl":"https://doi.org/10.1109/JAC-ECC56395.2022.10043897","url":null,"abstract":"Improving computer networks performance is a tremendous need in our life for meeting ever-changing quality of service (QoS) requirements of interesting applications. We are searching continuously on how to increase the performance of computer networks. One of the most important factors that aid in determining network performance is the available and accessible network information. In this paper, we deal with this problem in an information theoretic framework. Our approach is different than most recent papers in this field, where we use predefined measures that normally work on any computer network and we apply it to a general network model. We examine these measures on a specific model that is more comprehensive and more applicable than previous models discussed in other papers. Also, one of the important reasons in our extended study is to investigate the shortcomings in adopting these measures and how they appear in the results. We discuss briefly how to enhance these measures to be compatible with real networks and to give more precise and efficient results. Our analytical study of the developed model shows that obtained results can be used to guide future network designs since our model can be easily manipulated to get many real network models.","PeriodicalId":326002,"journal":{"name":"2022 10th International Japan-Africa Conference on Electronics, Communications, and Computations (JAC-ECC)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129036180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integrating Smart Contracts with WDNs Framework for Energy Management and Secure Transactions 集成智能合约与wdn框架的能源管理和安全交易
D. Tarek, T. Ismail
The management of energy consumption and payment transactions using a secure, decentralized energy system framework is essential in the water distribution network (WDN). The water energy market, in which energy may be transformed into a digital asset that is potentially monitored, trackable and tradable, might greatly benefit from the deployment of blockchain technology. This is because the blockchain has transaction privacy, decentralization, security, and immutability features. Furthermore, using blockchain smart contracts enables energy market management operations such as consumers, prosumers, and enterprises to register and track their utilization as well as to be aware of the financial transactions. In this paper, we optimize a secure peer-to-peer (P2P) Ethereum blockchain platform for water energy consumption and payment transactions among WDN reservoirs and customer nodes. Additionally, we developed a WDN energy trading and payment Ethereum smart contract to monitor autonomous pay-per-use payment and energy distribution on the decentralized P2P trade network.
在供水网络(WDN)中,使用安全、分散的能源系统框架来管理能源消耗和支付交易是必不可少的。在水能市场,能源可能被转化为一种可能被监控、跟踪和交易的数字资产,这可能会从区块链技术的部署中受益匪浅。这是因为区块链具有事务隐私、去中心化、安全性和不变性等特性。此外,使用区块链智能合约使能源市场管理操作(如消费者、生产消费者和企业)能够注册和跟踪其使用情况,并了解金融交易。在本文中,我们优化了一个安全的点对点(P2P)以太坊区块链平台,用于WDN水库和客户节点之间的水能源消耗和支付交易。此外,我们开发了一个WDN能源交易和支付以太坊智能合约,以监控分散的P2P交易网络上的自主按使用付费支付和能源分配。
{"title":"Integrating Smart Contracts with WDNs Framework for Energy Management and Secure Transactions","authors":"D. Tarek, T. Ismail","doi":"10.1109/JAC-ECC56395.2022.10044027","DOIUrl":"https://doi.org/10.1109/JAC-ECC56395.2022.10044027","url":null,"abstract":"The management of energy consumption and payment transactions using a secure, decentralized energy system framework is essential in the water distribution network (WDN). The water energy market, in which energy may be transformed into a digital asset that is potentially monitored, trackable and tradable, might greatly benefit from the deployment of blockchain technology. This is because the blockchain has transaction privacy, decentralization, security, and immutability features. Furthermore, using blockchain smart contracts enables energy market management operations such as consumers, prosumers, and enterprises to register and track their utilization as well as to be aware of the financial transactions. In this paper, we optimize a secure peer-to-peer (P2P) Ethereum blockchain platform for water energy consumption and payment transactions among WDN reservoirs and customer nodes. Additionally, we developed a WDN energy trading and payment Ethereum smart contract to monitor autonomous pay-per-use payment and energy distribution on the decentralized P2P trade network.","PeriodicalId":326002,"journal":{"name":"2022 10th International Japan-Africa Conference on Electronics, Communications, and Computations (JAC-ECC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116336702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent IoT-Based Tracking System for Constant Supervision of Health Status and Daily Activities of Children 基于物联网的智能跟踪系统,持续监控儿童健康状况和日常活动
M. Abo-Zahhad, M. Sayed, Ahmed H. Abd El‐Malek, Mayar Hossam, Nora Atef, Sarah Reda
At some point, kids start to grow and acquire more independence to explore the world independently. And while it is a natural stage of kids’ growth, parents usually feel restless during this stage, fearing that their children might face dangers in the absence of their supervision. This problem is the main motivation behind the system introduced in this paper. It is aimed to assist parents in maintaining the safety of their children by tracking the child’s relative location and monitoring the health status to ensure his/her wellbeing. It also follows up and supervises the daily activities and prevents any potential danger that can befall the child. The system consists of two main units. The first unit is implemented in form of a bracelet worn by the child, while a mobile application acts as the second unit on the parents’ side. In comparison to the prior introduced systems, this system is designed to be a comprehensive system that combines most of the features that exist in the introduced systems. It especially enhances the commercially introduced systems by inaugurating the feature of indoor tracking for people monitoring. The system is designed to boost performance by linking the children to their parents through the merit of IoT technologies. Results show that the system successfully detects falling as well as exceeding the safe distance and immediately notifies the parents upon occurrence. The medical parameters have been effectively, monitored with percentage errors ranging from 0.3% to 9%.
在某种程度上,孩子们开始成长,获得更多的独立性,独立探索世界。虽然这是孩子成长的一个自然阶段,但在这个阶段,父母通常会感到不安,担心孩子在没有他们监督的情况下可能会面临危险。这个问题是本文所介绍的系统背后的主要动机。其目的是通过跟踪儿童的相对位置和监测儿童的健康状况来帮助父母维护其子女的安全,以确保儿童的健康。它还跟踪和监督日常活动,防止可能降临到儿童身上的任何潜在危险。该系统由两个主要单元组成。第一个单元以孩子佩戴的手镯的形式实现,而移动应用程序则作为父母一方的第二个单元。与之前介绍的系统相比,该系统被设计成一个综合系统,它结合了所介绍系统中存在的大部分功能。特别是通过开创室内跟踪功能来实现人员监控,从而增强了商用系统的功能。该系统旨在通过物联网技术的优点将孩子与父母联系起来,从而提高成绩。结果表明,该系统成功地检测到摔倒和超过安全距离,并在发生时立即通知父母。医学参数得到了有效的监测,误差率在0.3%到9%之间。
{"title":"Intelligent IoT-Based Tracking System for Constant Supervision of Health Status and Daily Activities of Children","authors":"M. Abo-Zahhad, M. Sayed, Ahmed H. Abd El‐Malek, Mayar Hossam, Nora Atef, Sarah Reda","doi":"10.1109/JAC-ECC56395.2022.10044030","DOIUrl":"https://doi.org/10.1109/JAC-ECC56395.2022.10044030","url":null,"abstract":"At some point, kids start to grow and acquire more independence to explore the world independently. And while it is a natural stage of kids’ growth, parents usually feel restless during this stage, fearing that their children might face dangers in the absence of their supervision. This problem is the main motivation behind the system introduced in this paper. It is aimed to assist parents in maintaining the safety of their children by tracking the child’s relative location and monitoring the health status to ensure his/her wellbeing. It also follows up and supervises the daily activities and prevents any potential danger that can befall the child. The system consists of two main units. The first unit is implemented in form of a bracelet worn by the child, while a mobile application acts as the second unit on the parents’ side. In comparison to the prior introduced systems, this system is designed to be a comprehensive system that combines most of the features that exist in the introduced systems. It especially enhances the commercially introduced systems by inaugurating the feature of indoor tracking for people monitoring. The system is designed to boost performance by linking the children to their parents through the merit of IoT technologies. Results show that the system successfully detects falling as well as exceeding the safe distance and immediately notifies the parents upon occurrence. The medical parameters have been effectively, monitored with percentage errors ranging from 0.3% to 9%.","PeriodicalId":326002,"journal":{"name":"2022 10th International Japan-Africa Conference on Electronics, Communications, and Computations (JAC-ECC)","volume":"638 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116085266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Armed Bandit and Repeated Auction Approaches for User Admission and Channel Allocation in 5G HetNets 5G网络中用户准入和信道分配的多臂强盗和重复拍卖方法
Boniface Uwizeyimana, Ahmed H. Abd El‐Malek, O. Muta, M. Abo-Zahhad, M. Elsabrouty
Heterogeneous network and cognitive radio technology were introduced as part of 5G architecture to improve spectrum utilization and user capacity. Admitting secondary users in the wireless network is a challenge in the deployment of 5G. This paper presents a learning algorithm based on the multi-armed bandit technique to intelligently associate secondary users to the secondary base stations available in the network. Availing spectrum to secondary base stations and their associated users is done through a repeated auction game. The multi-armed bandit algorithm applied to the problem of user association enables secondary users oblivious about the channel environment to achieve higher data rates through association with the adequate secondary base station. Simulation results show a noticeably superior performance of the proposed multi-armed bandit algorithm compared to the matching game and random selection.
引入异构网络和认知无线电技术作为5G架构的一部分,以提高频谱利用率和用户容量。在无线网络中接纳辅助用户是5G部署中的一个挑战。本文提出了一种基于多臂强盗技术的学习算法,将辅助用户智能地关联到网络中可用的辅助基站。向次级基站及其相关用户提供频谱是通过重复拍卖游戏完成的。将多臂盗匪算法应用于用户关联问题,使不受信道环境影响的辅助用户通过与适当的辅助基站关联来获得更高的数据速率。仿真结果表明,与匹配博弈和随机选择算法相比,该算法具有明显的优越性。
{"title":"Multi-Armed Bandit and Repeated Auction Approaches for User Admission and Channel Allocation in 5G HetNets","authors":"Boniface Uwizeyimana, Ahmed H. Abd El‐Malek, O. Muta, M. Abo-Zahhad, M. Elsabrouty","doi":"10.1109/JAC-ECC56395.2022.10043930","DOIUrl":"https://doi.org/10.1109/JAC-ECC56395.2022.10043930","url":null,"abstract":"Heterogeneous network and cognitive radio technology were introduced as part of 5G architecture to improve spectrum utilization and user capacity. Admitting secondary users in the wireless network is a challenge in the deployment of 5G. This paper presents a learning algorithm based on the multi-armed bandit technique to intelligently associate secondary users to the secondary base stations available in the network. Availing spectrum to secondary base stations and their associated users is done through a repeated auction game. The multi-armed bandit algorithm applied to the problem of user association enables secondary users oblivious about the channel environment to achieve higher data rates through association with the adequate secondary base station. Simulation results show a noticeably superior performance of the proposed multi-armed bandit algorithm compared to the matching game and random selection.","PeriodicalId":326002,"journal":{"name":"2022 10th International Japan-Africa Conference on Electronics, Communications, and Computations (JAC-ECC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127910852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Machine Learning Method to Screen Anemia From Conjunctiva Images Taken by Smartphone. 从智能手机拍摄的结膜图像中筛选贫血症的机器学习方法。
Sherif H.Elgohary, Ahmed Osama Ismail, Zeiad Ayman Mohamed, Ahmed Gamal Elmahdy, Omar Ayman Mohamed, Mostafa Ibraheem Basheer
Anemia is one of the most common health issues in third world countries. According to the World Health Organization (WHO), nearly a quarter of the human population suffers from anemia. The prevalence of anemia as indicated by hemoglobin was found among more than a third of preschool children in Egypt. Symptoms associated with anemia make them more at risk of illness and infection. With the world′s current situation due to the pandemic; it’s very difficult to get access to medical facilities since they could be vulnerable to any diseases, not to mention the high costs and dangers of invasive methods, which are the current standard. The paper aims to provide a remote, non-invasive standardized approach that enables a quick screening to detect hemoglobin levels using smartphones and AI techniques. The image of the eye is captured and the eye conjunctiva is automatically extracted from the image as a Region of Interest (ROI). The ROI is then processed and features are extracted from it to train a machine-learning algorithm to determine if the patient is anemic or not. The model was run over 200 subjects and reached an accuracy of 85%, precision of 86%, and recall of 81%.
贫血是第三世界国家最常见的健康问题之一。据世界卫生组织(世卫组织)称,近四分之一的人口患有贫血症。血红蛋白显示的贫血患病率在埃及超过三分之一的学龄前儿童中发现。与贫血相关的症状使他们更容易生病和感染。结合当前世界疫情形势;进入医疗设施是非常困难的,因为它们可能容易受到任何疾病的影响,更不用说目前标准的侵入性方法的高成本和危险。该论文旨在提供一种远程、非侵入性的标准化方法,可以使用智能手机和人工智能技术快速筛查检测血红蛋白水平。捕获眼睛图像,并自动从图像中提取眼结膜作为感兴趣区域(ROI)。然后对ROI进行处理,并从中提取特征来训练机器学习算法,以确定患者是否贫血。该模型在200名受试者中运行,准确率为85%,精密度为86%,召回率为81%。
{"title":"A Machine Learning Method to Screen Anemia From Conjunctiva Images Taken by Smartphone.","authors":"Sherif H.Elgohary, Ahmed Osama Ismail, Zeiad Ayman Mohamed, Ahmed Gamal Elmahdy, Omar Ayman Mohamed, Mostafa Ibraheem Basheer","doi":"10.1109/JAC-ECC56395.2022.10043861","DOIUrl":"https://doi.org/10.1109/JAC-ECC56395.2022.10043861","url":null,"abstract":"Anemia is one of the most common health issues in third world countries. According to the World Health Organization (WHO), nearly a quarter of the human population suffers from anemia. The prevalence of anemia as indicated by hemoglobin was found among more than a third of preschool children in Egypt. Symptoms associated with anemia make them more at risk of illness and infection. With the world′s current situation due to the pandemic; it’s very difficult to get access to medical facilities since they could be vulnerable to any diseases, not to mention the high costs and dangers of invasive methods, which are the current standard. The paper aims to provide a remote, non-invasive standardized approach that enables a quick screening to detect hemoglobin levels using smartphones and AI techniques. The image of the eye is captured and the eye conjunctiva is automatically extracted from the image as a Region of Interest (ROI). The ROI is then processed and features are extracted from it to train a machine-learning algorithm to determine if the patient is anemic or not. The model was run over 200 subjects and reached an accuracy of 85%, precision of 86%, and recall of 81%.","PeriodicalId":326002,"journal":{"name":"2022 10th International Japan-Africa Conference on Electronics, Communications, and Computations (JAC-ECC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128337684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data-Driven Based Algorithm for Joint HetNets Power Allocation and NOMA User Pairing 基于数据驱动的联合HetNets功率分配与NOMA用户配对算法
Donia Mohamed, Ahmed Magdy, Osama M. Elghandour, Ahmed Nasser
Introducing non-orthogonal multiple access (NOMA) to heterogeneous networks (HetNets) improves its spectral efficiency (SE) for the next generation of mobile communication networks. Critical technical challenges on resource allocation in NOMA HetNets due to the inter-user interference of NOMA and the cross-tier interference that occurs in HetNets. The goal of this work is to enhance the NOMA HetNets spectrum efficiency by jointly optimizing both resource block (RB) allocation over NOMA users (i.e., user pairing (UP)) and power allocation (PA) over HetNets base stations (BSs). The formulated problem considers users’ quality of services (QoS) and successive interference cancellation (SIC) constraint, which contribute to a non-convex optimization problem. A linear model-free based technique, data-driven (DD), is applied as an optimization tool to efficiently solve the original NP-hard problem for a near-optimum solution. Our results show that HetNets and NOMA aided with DD for joint UP and PA satisfy the high data rate required and improve the system performance compared to other conventional schemes.
在异构网络(HetNets)中引入非正交多址(NOMA)可以提高其频谱效率(SE),为下一代移动通信网络服务。由于NOMA的用户间干扰和在HetNets中发生的跨层干扰,在NOMA HetNets中资源分配的关键技术挑战。这项工作的目标是通过共同优化NOMA用户上的资源块(RB)分配(即用户配对(UP))和HetNets基站(BSs)上的功率分配(PA)来提高NOMA HetNets频谱效率。该问题考虑了用户服务质量(QoS)和连续干扰消除(SIC)约束,是一个非凸优化问题。采用基于线性无模型技术的数据驱动(DD)作为优化工具,有效地解决了原始np困难问题的近最优解。研究结果表明,与其他传统方案相比,HetNets和NOMA辅助DD进行联合UP和PA满足了高数据速率的要求,提高了系统性能。
{"title":"Data-Driven Based Algorithm for Joint HetNets Power Allocation and NOMA User Pairing","authors":"Donia Mohamed, Ahmed Magdy, Osama M. Elghandour, Ahmed Nasser","doi":"10.1109/JAC-ECC56395.2022.10043858","DOIUrl":"https://doi.org/10.1109/JAC-ECC56395.2022.10043858","url":null,"abstract":"Introducing non-orthogonal multiple access (NOMA) to heterogeneous networks (HetNets) improves its spectral efficiency (SE) for the next generation of mobile communication networks. Critical technical challenges on resource allocation in NOMA HetNets due to the inter-user interference of NOMA and the cross-tier interference that occurs in HetNets. The goal of this work is to enhance the NOMA HetNets spectrum efficiency by jointly optimizing both resource block (RB) allocation over NOMA users (i.e., user pairing (UP)) and power allocation (PA) over HetNets base stations (BSs). The formulated problem considers users’ quality of services (QoS) and successive interference cancellation (SIC) constraint, which contribute to a non-convex optimization problem. A linear model-free based technique, data-driven (DD), is applied as an optimization tool to efficiently solve the original NP-hard problem for a near-optimum solution. Our results show that HetNets and NOMA aided with DD for joint UP and PA satisfy the high data rate required and improve the system performance compared to other conventional schemes.","PeriodicalId":326002,"journal":{"name":"2022 10th International Japan-Africa Conference on Electronics, Communications, and Computations (JAC-ECC)","volume":"557 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133661327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Lightweight Cryptographic Algorithm with a Multi-Purpose Encipher Key for IoT 具有IoT多用途加密密钥的轻量级加密算法
Perry Chimenge Longwani, Israel Mendonça, M. Aritsugi
Internet of Things (IoT) is a rapidly developing technology that has the potential to change how individuals and businesses interact. However, the actual realization of IoT technology has been hampered by numerous security and privacy concerns. Increased number of CPU clock cycles among the traditional error sensitive cryptographic algorithms is an increasing concern in IoT devices. As most IoT devices rely on batteries for power, new low power consumption algorithms are required. As a result, we have created an algorithm that uses an encipher key for more than one security concern with the goal of reducing power consumption while maintaining security. Using a synthetic dataset, this study compared the proposed algorithm’s results against a synthetic algorithm. It results in less CPU time, fewer clock cycles, and higher throughput than the synthetic algorithm. Furthermore, during the encryption process, our algorithm was able to establish an encipher key that was later used to maintain message integrity. In this study, we have addressed the question of multi-purpose and power consumption.
物联网(IoT)是一项快速发展的技术,有可能改变个人和企业的互动方式。然而,物联网技术的实际实现受到众多安全和隐私问题的阻碍。在物联网设备中,传统错误敏感加密算法中CPU时钟周期数量的增加日益受到关注。由于大多数物联网设备依赖电池供电,因此需要新的低功耗算法。因此,我们创建了一种算法,该算法对多个安全问题使用加密密钥,目的是在保持安全性的同时降低功耗。使用合成数据集,本研究将提出的算法的结果与合成算法进行了比较。与合成算法相比,它的CPU时间更少,时钟周期更少,吞吐量更高。此外,在加密过程中,我们的算法能够建立一个稍后用于维护消息完整性的加密密钥。在这项研究中,我们解决了多用途和功耗的问题。
{"title":"A Lightweight Cryptographic Algorithm with a Multi-Purpose Encipher Key for IoT","authors":"Perry Chimenge Longwani, Israel Mendonça, M. Aritsugi","doi":"10.1109/JAC-ECC56395.2022.10044020","DOIUrl":"https://doi.org/10.1109/JAC-ECC56395.2022.10044020","url":null,"abstract":"Internet of Things (IoT) is a rapidly developing technology that has the potential to change how individuals and businesses interact. However, the actual realization of IoT technology has been hampered by numerous security and privacy concerns. Increased number of CPU clock cycles among the traditional error sensitive cryptographic algorithms is an increasing concern in IoT devices. As most IoT devices rely on batteries for power, new low power consumption algorithms are required. As a result, we have created an algorithm that uses an encipher key for more than one security concern with the goal of reducing power consumption while maintaining security. Using a synthetic dataset, this study compared the proposed algorithm’s results against a synthetic algorithm. It results in less CPU time, fewer clock cycles, and higher throughput than the synthetic algorithm. Furthermore, during the encryption process, our algorithm was able to establish an encipher key that was later used to maintain message integrity. In this study, we have addressed the question of multi-purpose and power consumption.","PeriodicalId":326002,"journal":{"name":"2022 10th International Japan-Africa Conference on Electronics, Communications, and Computations (JAC-ECC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134381926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Privacy-Preserving Model for Big Data 大数据的隐私保护模型
Amr Morad, M. Abougabal, Ayman Khalafallah
In the past few years, the tremendous expansion in the usage of computer programs has resulted in a large amount of data, called “Big Data.” This leads to new challenges for storage, processing, and privacy-preserving. Meanwhile, organizations tend to collect more data about customers for subsequent processing to extract knowledge, resulting in potential threats to their confidentiality. This raises significant questions regarding the security and privacy of data in NoSQL databases. In this paper, a privacy-preserving model for big data protection is proposed, which could be applied to various types of NoSQL databases. This model addresses the challenges of securing NoSQL databases including the lack of predefined schema, the existence of different NoSQL database categories, and the potential threats due to data processing. It also guarantees properties of conditional roles, purposes, tasks, policies, and possible insider threats. Verification and validation for the model using a use case are introduced to demonstrate how it ensures privacy-preserving in NoSQL databases.
在过去的几年中,计算机程序使用的巨大扩展产生了大量的数据,称为“大数据”。这给存储、处理和隐私保护带来了新的挑战。同时,组织倾向于收集更多关于客户的数据,以便后续处理以提取知识,从而对客户的机密性造成潜在的威胁。这就提出了关于NoSQL数据库中数据的安全性和隐私性的重要问题。本文提出了一种适用于各种类型NoSQL数据库的大数据隐私保护模型。该模型解决了保护NoSQL数据库的挑战,包括缺乏预定义的模式,存在不同的NoSQL数据库类别,以及由于数据处理而产生的潜在威胁。它还保证条件角色、目的、任务、策略和可能的内部威胁的属性。使用一个用例对模型进行验证和验证,以演示它如何确保NoSQL数据库中的隐私保护。
{"title":"A Privacy-Preserving Model for Big Data","authors":"Amr Morad, M. Abougabal, Ayman Khalafallah","doi":"10.1109/JAC-ECC56395.2022.10044023","DOIUrl":"https://doi.org/10.1109/JAC-ECC56395.2022.10044023","url":null,"abstract":"In the past few years, the tremendous expansion in the usage of computer programs has resulted in a large amount of data, called “Big Data.” This leads to new challenges for storage, processing, and privacy-preserving. Meanwhile, organizations tend to collect more data about customers for subsequent processing to extract knowledge, resulting in potential threats to their confidentiality. This raises significant questions regarding the security and privacy of data in NoSQL databases. In this paper, a privacy-preserving model for big data protection is proposed, which could be applied to various types of NoSQL databases. This model addresses the challenges of securing NoSQL databases including the lack of predefined schema, the existence of different NoSQL database categories, and the potential threats due to data processing. It also guarantees properties of conditional roles, purposes, tasks, policies, and possible insider threats. Verification and validation for the model using a use case are introduced to demonstrate how it ensures privacy-preserving in NoSQL databases.","PeriodicalId":326002,"journal":{"name":"2022 10th International Japan-Africa Conference on Electronics, Communications, and Computations (JAC-ECC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127450040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 10th International Japan-Africa Conference on Electronics, Communications, and Computations (JAC-ECC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1