Pub Date : 2021-03-22DOI: 10.1109/ICTSA52017.2021.9406526
Abdullah Hamood Al-Quh, Khalid Al-Hussaini, F. Abdulrazzak
the cluster heads (CHs) are distributed randomly in the Low Energy Adaptive Clustering Hierarchy (LEACH) protocol. Some sensor nodes may be placed further away from the CHs and thus are not covered. This causes excessive route energy consumption of the isolated nodes. Because of randomly selecting the CHs, some nodes can die quickly due to extra workload. By used Spider Monkey Optimization (SMO), we can elect the CHs and design cluster-based routing algorithms. The SMO looks for the social behaviors of spider monkeys to choose the optimal route. The social behaviors are an example of the fission-fusion system. In this paper, we proposed the Selection Optimal of Cluster Head Based Spider Monkey Optimization (OCHSMO) algorithm. The proposed algorithm has used the mechanism of the SMO to solve the problems of cluster routing in the WSNs. It improves the LEACH protocol in terms of energy consumption, system lifetime, stability period, and system quality of the network. Experimental results show that the OCHSMO algorithm is better than the LEACH algorithm in all performance measures. We used the MATLAB to evaluate the performance.
{"title":"OCHSMO: Selection Optimal of Cluster Head Based Spider Monkey Optimization","authors":"Abdullah Hamood Al-Quh, Khalid Al-Hussaini, F. Abdulrazzak","doi":"10.1109/ICTSA52017.2021.9406526","DOIUrl":"https://doi.org/10.1109/ICTSA52017.2021.9406526","url":null,"abstract":"the cluster heads (CHs) are distributed randomly in the Low Energy Adaptive Clustering Hierarchy (LEACH) protocol. Some sensor nodes may be placed further away from the CHs and thus are not covered. This causes excessive route energy consumption of the isolated nodes. Because of randomly selecting the CHs, some nodes can die quickly due to extra workload. By used Spider Monkey Optimization (SMO), we can elect the CHs and design cluster-based routing algorithms. The SMO looks for the social behaviors of spider monkeys to choose the optimal route. The social behaviors are an example of the fission-fusion system. In this paper, we proposed the Selection Optimal of Cluster Head Based Spider Monkey Optimization (OCHSMO) algorithm. The proposed algorithm has used the mechanism of the SMO to solve the problems of cluster routing in the WSNs. It improves the LEACH protocol in terms of energy consumption, system lifetime, stability period, and system quality of the network. Experimental results show that the OCHSMO algorithm is better than the LEACH algorithm in all performance measures. We used the MATLAB to evaluate the performance.","PeriodicalId":334654,"journal":{"name":"2021 International Conference of Technology, Science and Administration (ICTSA)","volume":"889 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131420882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-03-22DOI: 10.1109/ICTSA52017.2021.9406532
A. Gaid, M. A. Ali, M. A. Mohammed, A. A. Saeed, Osama Y. A. Saeed, A. Sallam, Burkan Hawash
This paper presents a new design of a multiband antenna for multiband applications. To enhance the bandwidth and return loss characteristics, three Square split ring resonators (SSRRs) and two inverted U-slots on a partial ground were applied in this design. The antenna has a size of $40 times 41 times 1.6$ mm3, printed on FR-4 dielectric material with height (h) of 1.6 mm, loss tangent () of 0.02 and dielectric constant () of 4.4. Antenna parameters such as return loss (), gain, voltage standing wave ratio (VSWR), radiation pattern were simulated and analyzed. The antenna has two frequency bands. The first band (2.74GHz - 7.48GHz) in which the antenna resonates at frequencies, 3.37 GHz, 5.15 GHz, 6.64 GHz, 7.4 GHz and the second band (8.23 GHz - 9.8 GHz) with a center frequency at 9 GHz. Fractional bandwidths (< -10 dB) of 140%, 91.8%, 71.7% and 63.9% in the first band and 15.9% in the second band were achieved respectively. Furthermore, 3.3 dBi, 3.5 dBi, 3.244 dBi, 3.437 dBi and 3.937 dBi were provided at the resonant frequencies respectively. The simulation and numerical analysis were carried out using HFSS software.
{"title":"Slotted Tree-Shaped Microstrip Patch Antenna Using SSRR for Wide-band Applications","authors":"A. Gaid, M. A. Ali, M. A. Mohammed, A. A. Saeed, Osama Y. A. Saeed, A. Sallam, Burkan Hawash","doi":"10.1109/ICTSA52017.2021.9406532","DOIUrl":"https://doi.org/10.1109/ICTSA52017.2021.9406532","url":null,"abstract":"This paper presents a new design of a multiband antenna for multiband applications. To enhance the bandwidth and return loss characteristics, three Square split ring resonators (SSRRs) and two inverted U-slots on a partial ground were applied in this design. The antenna has a size of $40 times 41 times 1.6$ mm3, printed on FR-4 dielectric material with height (h) of 1.6 mm, loss tangent () of 0.02 and dielectric constant () of 4.4. Antenna parameters such as return loss (), gain, voltage standing wave ratio (VSWR), radiation pattern were simulated and analyzed. The antenna has two frequency bands. The first band (2.74GHz - 7.48GHz) in which the antenna resonates at frequencies, 3.37 GHz, 5.15 GHz, 6.64 GHz, 7.4 GHz and the second band (8.23 GHz - 9.8 GHz) with a center frequency at 9 GHz. Fractional bandwidths (< -10 dB) of 140%, 91.8%, 71.7% and 63.9% in the first band and 15.9% in the second band were achieved respectively. Furthermore, 3.3 dBi, 3.5 dBi, 3.244 dBi, 3.437 dBi and 3.937 dBi were provided at the resonant frequencies respectively. The simulation and numerical analysis were carried out using HFSS software.","PeriodicalId":334654,"journal":{"name":"2021 International Conference of Technology, Science and Administration (ICTSA)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121832268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-03-22DOI: 10.1109/ICTSA52017.2021.9406540
Abdulrahman Ahmed Ghaleb Amer, S. Z. Sapuan, N. Nasimuddin, Mohd Fahrul Hassan
A broadband electromagnetic metasurface (MS) absorber with a wide-angle coverage is designed and discussed for energy harvesting applications. The proposed MS absorber consists of two split-ring resonators (SRR) forming an X-shaped in the middle and layout is designed on FR4 dielectric substrate. An air gap layer is separated between the dielectric substrate and a ground plane. At normal incidence, the proposed MS structure achieves a higher absorption ratio (>90%) with a 10-dB impedance bandwidth of more than 4 GHz (2.14 GHz-6.4 GHz). For oblique incidence, greater than 85% absorptivity is observed from $0^{circ}, to 30^{circ}$ across the frequencies range from 2.14 GHz to 6.4 GHz. Two higher absorption peaks of more than 80% at 2.4 GHz and from 5 GHz to 6.5 GHz for TEM polarization are achieved respectively at 45° and 60°. Furthermore, the absorption mechanism is numerically demonstrated in detail.
{"title":"A Broadband Wide-Angle Metasurface Absorber for Energy Harvesting Applications","authors":"Abdulrahman Ahmed Ghaleb Amer, S. Z. Sapuan, N. Nasimuddin, Mohd Fahrul Hassan","doi":"10.1109/ICTSA52017.2021.9406540","DOIUrl":"https://doi.org/10.1109/ICTSA52017.2021.9406540","url":null,"abstract":"A broadband electromagnetic metasurface (MS) absorber with a wide-angle coverage is designed and discussed for energy harvesting applications. The proposed MS absorber consists of two split-ring resonators (SRR) forming an X-shaped in the middle and layout is designed on FR4 dielectric substrate. An air gap layer is separated between the dielectric substrate and a ground plane. At normal incidence, the proposed MS structure achieves a higher absorption ratio (>90%) with a 10-dB impedance bandwidth of more than 4 GHz (2.14 GHz-6.4 GHz). For oblique incidence, greater than 85% absorptivity is observed from $0^{circ}, to 30^{circ}$ across the frequencies range from 2.14 GHz to 6.4 GHz. Two higher absorption peaks of more than 80% at 2.4 GHz and from 5 GHz to 6.5 GHz for TEM polarization are achieved respectively at 45° and 60°. Furthermore, the absorption mechanism is numerically demonstrated in detail.","PeriodicalId":334654,"journal":{"name":"2021 International Conference of Technology, Science and Administration (ICTSA)","volume":"183 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125940405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-03-22DOI: 10.1109/ICTSA52017.2021.9406534
Ghazi Alnowaini, Azmi Alttal, Aisha Alabsi
Self-service terminal equipment generally, compose of group of integrated systems, which operate together to offer services to human in the economic aspect. The conception of the self-service store terminal equipment facilitates person's life, greatly. The self- service terminal equipment that exist in Yemen are rarely found, because of their extremely expensive cost. Additionally, that material can't deal with all denominations of Yemeni paper currency; just two denominations can be treated. The proposed system is a Mechatronics' system which typifies a prototype of SST equipment which is able to arrangement with all denominations of Yemeni paper currency. The principal function of the proposed scheme is building up an SST prototype with simple social system which is able to recognize and detect four denominations of Yemeni paper currency (1000, 500, 200 and 100 Yr), then store them in the specified box for each denomination. The proposed scheme is composed of four integrated systems as work together concurrently. The entered paper currency is fed into the detection place to be determined whether it is fake or genuine, then if it is genuine, it will be recognized to identify its denomination, finally it is stored in the specified box according to the currency denomination. The identification scheme has been designed to distinguish the dominant colour in each denomination using color sensor, while the detection scheme is designed using the UV - light detector. The developed system has been tested using 10 samples of each denomination for checking the accuracy and speed of operation. The prototype has achieved a high accuracy with short time of processing.
{"title":"Design and development SST Prototype for Yemeni paper currency","authors":"Ghazi Alnowaini, Azmi Alttal, Aisha Alabsi","doi":"10.1109/ICTSA52017.2021.9406534","DOIUrl":"https://doi.org/10.1109/ICTSA52017.2021.9406534","url":null,"abstract":"Self-service terminal equipment generally, compose of group of integrated systems, which operate together to offer services to human in the economic aspect. The conception of the self-service store terminal equipment facilitates person's life, greatly. The self- service terminal equipment that exist in Yemen are rarely found, because of their extremely expensive cost. Additionally, that material can't deal with all denominations of Yemeni paper currency; just two denominations can be treated. The proposed system is a Mechatronics' system which typifies a prototype of SST equipment which is able to arrangement with all denominations of Yemeni paper currency. The principal function of the proposed scheme is building up an SST prototype with simple social system which is able to recognize and detect four denominations of Yemeni paper currency (1000, 500, 200 and 100 Yr), then store them in the specified box for each denomination. The proposed scheme is composed of four integrated systems as work together concurrently. The entered paper currency is fed into the detection place to be determined whether it is fake or genuine, then if it is genuine, it will be recognized to identify its denomination, finally it is stored in the specified box according to the currency denomination. The identification scheme has been designed to distinguish the dominant colour in each denomination using color sensor, while the detection scheme is designed using the UV - light detector. The developed system has been tested using 10 samples of each denomination for checking the accuracy and speed of operation. The prototype has achieved a high accuracy with short time of processing.","PeriodicalId":334654,"journal":{"name":"2021 International Conference of Technology, Science and Administration (ICTSA)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132122538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-03-22DOI: 10.1109/ICTSA52017.2021.9406527
Burkan Hawash, U. A. Mokhtar, Z. M. Yusof, Muaadh Mukred, A. Gaid
The Internet of Things (IoT) is defined as a potentially effective means of integrating multiple technologies to support the oil and gas (O&G) sector as a network of physical objects connected to the Internet. In Yemen, O&G organizations can embedded vehicles, equipment, buildings, fire siren and wells with electronics, software, sensors, and network connectivity that is now evolving. It is assumed that in one way or another, everything should be connected to one network to ease processes of business. To make IoT a reality, and not only remain academic, O&G sector must be able to engage in and pick up this technology in its day-to-day activities. Several studies have explored IoT’s potential for numerous organizations. However, IoT remains inadequately applied by organizations, including O&G sectors in developing countries. This article attempts to identify the factors that influence users to adopt IoT in the O&G sector in Yemen. Based on a study of prior tests, drivers were identified. Furthermore, a framework is proposed based on information system adoption theory which is the technology-organization-environment (TOE). Partial least squares structural equation modeling (PLS-SEM) has become a popular tool for analyzing such relationships is applied to a survey of 390 IoT users, with results indicating that the factors selected in this study significantly affected the IoT adoption in the Yemeni O&G sector. This study is enabling O&G organizations to understand the factors of IoT adoption, to improve their framework of business and investment in IoT and to inspire researchers to continue research into other IoT adoption or implementation factors.
{"title":"Factors Affecting Internet of Things (IoT) Adoption in the Yemeni Oil and Gas Sector","authors":"Burkan Hawash, U. A. Mokhtar, Z. M. Yusof, Muaadh Mukred, A. Gaid","doi":"10.1109/ICTSA52017.2021.9406527","DOIUrl":"https://doi.org/10.1109/ICTSA52017.2021.9406527","url":null,"abstract":"The Internet of Things (IoT) is defined as a potentially effective means of integrating multiple technologies to support the oil and gas (O&G) sector as a network of physical objects connected to the Internet. In Yemen, O&G organizations can embedded vehicles, equipment, buildings, fire siren and wells with electronics, software, sensors, and network connectivity that is now evolving. It is assumed that in one way or another, everything should be connected to one network to ease processes of business. To make IoT a reality, and not only remain academic, O&G sector must be able to engage in and pick up this technology in its day-to-day activities. Several studies have explored IoT’s potential for numerous organizations. However, IoT remains inadequately applied by organizations, including O&G sectors in developing countries. This article attempts to identify the factors that influence users to adopt IoT in the O&G sector in Yemen. Based on a study of prior tests, drivers were identified. Furthermore, a framework is proposed based on information system adoption theory which is the technology-organization-environment (TOE). Partial least squares structural equation modeling (PLS-SEM) has become a popular tool for analyzing such relationships is applied to a survey of 390 IoT users, with results indicating that the factors selected in this study significantly affected the IoT adoption in the Yemeni O&G sector. This study is enabling O&G organizations to understand the factors of IoT adoption, to improve their framework of business and investment in IoT and to inspire researchers to continue research into other IoT adoption or implementation factors.","PeriodicalId":334654,"journal":{"name":"2021 International Conference of Technology, Science and Administration (ICTSA)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134555415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-03-22DOI: 10.1109/ICTSA52017.2021.9406524
Yousef Fazea, Zainab S. Attarbash, Fathey Mohammed, I. Abdullahi
Peer-to-Peer (P2P) network is a distributed computing architecture that allows network devices to share, access files, and folders with everyone or with selected users without requiring separate server computer or server software. This paper reviews different structures of P2P overlay network applications and presents their strengths and weaknesses. It also reviews different data replacement techniques as the scalability characteristic of such networks having a big impact on the memory resources and capacities and may lead to degrading the efficiency.
{"title":"Review on Unstructured Peer-to-Peer Overlay Network Applications","authors":"Yousef Fazea, Zainab S. Attarbash, Fathey Mohammed, I. Abdullahi","doi":"10.1109/ICTSA52017.2021.9406524","DOIUrl":"https://doi.org/10.1109/ICTSA52017.2021.9406524","url":null,"abstract":"Peer-to-Peer (P2P) network is a distributed computing architecture that allows network devices to share, access files, and folders with everyone or with selected users without requiring separate server computer or server software. This paper reviews different structures of P2P overlay network applications and presents their strengths and weaknesses. It also reviews different data replacement techniques as the scalability characteristic of such networks having a big impact on the memory resources and capacities and may lead to degrading the efficiency.","PeriodicalId":334654,"journal":{"name":"2021 International Conference of Technology, Science and Administration (ICTSA)","volume":"523 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115353937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-03-22DOI: 10.1109/ICTSA52017.2021.9406518
Abdulfattah E. Ba Alawi, Elham H. S. Anaam, Basmah A. M. N. Al-sohbani
Traffic signs are a vital tool of the transport system because they serve to keep pedestrians and drivers readily informed that they can be alerted and notified. Thus, different traffic sign recognition systems were found in the last few years. It is implied that their identification and recognition is a confined issue that signs may be special, distinctive functions, or fragile shapes and solid shapes. Some recent and effective approaches of traffic sign detection and classification showed the success of using deep neural networks in this field. In terms of this domain, the development of an accurate real-time traffic signs recognition system is still a challenging task. This paper discusses the recognition system of traffic signs using four dense CNN-based models, DenseNet121, DenseNet161, DenseNet169, and DenseNet201. However, the present study aims mainly at evaluating the performance of the proposed system using deep dense neural networks on recognizing traffic signs. Results show the feasibility of using DenseNet pre-trained models to perform this task. In terms of testing accuracy, DenseNet201 achieved the best performance with 99.7%.
{"title":"Performance Analysis of Deep Dense Neural Networks on Traffic Signs Recognition","authors":"Abdulfattah E. Ba Alawi, Elham H. S. Anaam, Basmah A. M. N. Al-sohbani","doi":"10.1109/ICTSA52017.2021.9406518","DOIUrl":"https://doi.org/10.1109/ICTSA52017.2021.9406518","url":null,"abstract":"Traffic signs are a vital tool of the transport system because they serve to keep pedestrians and drivers readily informed that they can be alerted and notified. Thus, different traffic sign recognition systems were found in the last few years. It is implied that their identification and recognition is a confined issue that signs may be special, distinctive functions, or fragile shapes and solid shapes. Some recent and effective approaches of traffic sign detection and classification showed the success of using deep neural networks in this field. In terms of this domain, the development of an accurate real-time traffic signs recognition system is still a challenging task. This paper discusses the recognition system of traffic signs using four dense CNN-based models, DenseNet121, DenseNet161, DenseNet169, and DenseNet201. However, the present study aims mainly at evaluating the performance of the proposed system using deep dense neural networks on recognizing traffic signs. Results show the feasibility of using DenseNet pre-trained models to perform this task. In terms of testing accuracy, DenseNet201 achieved the best performance with 99.7%.","PeriodicalId":334654,"journal":{"name":"2021 International Conference of Technology, Science and Administration (ICTSA)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115372459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-03-22DOI: 10.1109/ICTSA52017.2021.9406554
Mamoon M. Saeed, R. Saeed, E. Saeid
Protection of the user is the one of primary points within the coming of 5G portable communications. Area protection has recently been broadly tended to within the writing as crucial tricky issues for the client security. The area protection has moreover been tended to in realeases in versatile eras guidelines. In LTE release 13, the proposal is to utilize pseudonyms such as Cell Radio Network Temporary Identifiers (C-RNTI) rather than permanent identity for protecting area security. The point of this paper is to assess the 3GPP security design and propose a protection capability for protecting area security of the 5G design. The proposed strategy is based on presenting modern variable nom de plumes that can supplant the settled Cell- Radio Network Temporary Identifier (C-RNTI) and in cruel times keep up the compatibility with the standard. The proposed arrangement employments an Identity-Division Multiplexing (IDM) strategy to guarantee the unlinkability and untraceability of the client and to avoid aggressors from following or distinguish clients through C-RNTI personalities. The plot gives secure and viable area administration regarding the security of client security in 5G. The conspire is formally confirmed of satisfactory ensure of user’s area security assurance by utilizing ProVerif.
{"title":"Identity Division Multiplexing Based Location Preserve in 5G","authors":"Mamoon M. Saeed, R. Saeed, E. Saeid","doi":"10.1109/ICTSA52017.2021.9406554","DOIUrl":"https://doi.org/10.1109/ICTSA52017.2021.9406554","url":null,"abstract":"Protection of the user is the one of primary points within the coming of 5G portable communications. Area protection has recently been broadly tended to within the writing as crucial tricky issues for the client security. The area protection has moreover been tended to in realeases in versatile eras guidelines. In LTE release 13, the proposal is to utilize pseudonyms such as Cell Radio Network Temporary Identifiers (C-RNTI) rather than permanent identity for protecting area security. The point of this paper is to assess the 3GPP security design and propose a protection capability for protecting area security of the 5G design. The proposed strategy is based on presenting modern variable nom de plumes that can supplant the settled Cell- Radio Network Temporary Identifier (C-RNTI) and in cruel times keep up the compatibility with the standard. The proposed arrangement employments an Identity-Division Multiplexing (IDM) strategy to guarantee the unlinkability and untraceability of the client and to avoid aggressors from following or distinguish clients through C-RNTI personalities. The plot gives secure and viable area administration regarding the security of client security in 5G. The conspire is formally confirmed of satisfactory ensure of user’s area security assurance by utilizing ProVerif.","PeriodicalId":334654,"journal":{"name":"2021 International Conference of Technology, Science and Administration (ICTSA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122287805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ictsa52017.2021.9406536
{"title":"[ICTSA 2021 Front cover]","authors":"","doi":"10.1109/ictsa52017.2021.9406536","DOIUrl":"https://doi.org/10.1109/ictsa52017.2021.9406536","url":null,"abstract":"","PeriodicalId":334654,"journal":{"name":"2021 International Conference of Technology, Science and Administration (ICTSA)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133290510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}