Pub Date : 2019-02-01DOI: 10.1109/ITCE.2019.8646450
Salem Alkhalaf
The artificial neural network (ANN) has been successfully applied to many systems’ models with the objective of improving their performance. This study presents the ANN application to the automated voltage regulator (AVR) model of the synchronous machine. The studied system consists of the single-machine infinite bus (SMIB) power system. Data was extracted over a diverse range of conditions. Different fault types were also considered for collecting a large number of data to avoid overfitting. The multilayer feedforward neural network (MLFFNN) approach was applied to design the paradigm and system equations were solved using the MATLAB Simulink software.
{"title":"Modeling the Automatic Voltage Regulator (AVR) Using Artificial Neural Network","authors":"Salem Alkhalaf","doi":"10.1109/ITCE.2019.8646450","DOIUrl":"https://doi.org/10.1109/ITCE.2019.8646450","url":null,"abstract":"The artificial neural network (ANN) has been successfully applied to many systems’ models with the objective of improving their performance. This study presents the ANN application to the automated voltage regulator (AVR) model of the synchronous machine. The studied system consists of the single-machine infinite bus (SMIB) power system. Data was extracted over a diverse range of conditions. Different fault types were also considered for collecting a large number of data to avoid overfitting. The multilayer feedforward neural network (MLFFNN) approach was applied to design the paradigm and system equations were solved using the MATLAB Simulink software.","PeriodicalId":391488,"journal":{"name":"2019 International Conference on Innovative Trends in Computer Engineering (ITCE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127412009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.1109/ITCE.2019.8646558
Mahmoud Abdelhafeez, K. Yousef, Mohamed Abdelraheem, E. Khaled
This paper presents a proposed design procedure of a Wireless Power Transfer (WPT) system based on high efficiency offset reflector antennas fed by conical horns. The system’s performance evaluation is also demonstrated. The antennas in the transmitter and receiver sides of the proposed WPT system are symmetric. The performance of the system is optimized by calibrating the feeding horns and the offset reflector’s dimensions to minimize the path and reflection losses of the proposed WPT system. The results show that correct line of sight alignment of the transmitter and receiver enhances the efficiency of the system. With an operating frequency of 6 GHz and 1 W of power transfer over a distance of 12 m between the transmitter and receiver, the system attains a total transfer efficiency of 62.9 %.
{"title":"Design of 6 GHz High Efficiency Long Range Wireless Power Transfer System Using Offset Reflectors fed by Conical Horns","authors":"Mahmoud Abdelhafeez, K. Yousef, Mohamed Abdelraheem, E. Khaled","doi":"10.1109/ITCE.2019.8646558","DOIUrl":"https://doi.org/10.1109/ITCE.2019.8646558","url":null,"abstract":"This paper presents a proposed design procedure of a Wireless Power Transfer (WPT) system based on high efficiency offset reflector antennas fed by conical horns. The system’s performance evaluation is also demonstrated. The antennas in the transmitter and receiver sides of the proposed WPT system are symmetric. The performance of the system is optimized by calibrating the feeding horns and the offset reflector’s dimensions to minimize the path and reflection losses of the proposed WPT system. The results show that correct line of sight alignment of the transmitter and receiver enhances the efficiency of the system. With an operating frequency of 6 GHz and 1 W of power transfer over a distance of 12 m between the transmitter and receiver, the system attains a total transfer efficiency of 62.9 %.","PeriodicalId":391488,"journal":{"name":"2019 International Conference on Innovative Trends in Computer Engineering (ITCE)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127493306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.1109/ITCE.2019.8646687
Anwaar M. Damerdash, M. Aly, E. Ahmed
Light fidelity (Li-Fi) is a visible light communications (VLC) system that employs the light emitting diodes (LED) lamps for wireless communications. The Li-Fi atto-cell driver systems use the lighting system fixtures to achieve two function; namely the illumination and communication functions. The Li-Fi systems are advantageous at using LEDs to transmit high speed communication signals without compromising their illumination at a good efficiency. The DC-DC converters represent the main core and the suitable choice of Li-Fi atto-cell drivers. The main challenges of Li-Fi atto-cell driver system is the implementation of complex communication modulation signals, such as quadrature amplitude modulation (QAM), in addition to the driver efficiency deteriorations due to the communication signal. In addition, achieving high bit rate is essential requirement for communication systems that make design of dc-dc converter is of a challenging task. This paper presents a comparative case study of single phase and multiphase buck DC-DC converters for driving Li-Fi systems. The comparison includes the converter design, the efficiency, and the maximum achievable bit rates of each topology.
{"title":"Design and Analysis of Multi-Phase Buck DC-DC Converters for Li-Fi Attocell Drivers","authors":"Anwaar M. Damerdash, M. Aly, E. Ahmed","doi":"10.1109/ITCE.2019.8646687","DOIUrl":"https://doi.org/10.1109/ITCE.2019.8646687","url":null,"abstract":"Light fidelity (Li-Fi) is a visible light communications (VLC) system that employs the light emitting diodes (LED) lamps for wireless communications. The Li-Fi atto-cell driver systems use the lighting system fixtures to achieve two function; namely the illumination and communication functions. The Li-Fi systems are advantageous at using LEDs to transmit high speed communication signals without compromising their illumination at a good efficiency. The DC-DC converters represent the main core and the suitable choice of Li-Fi atto-cell drivers. The main challenges of Li-Fi atto-cell driver system is the implementation of complex communication modulation signals, such as quadrature amplitude modulation (QAM), in addition to the driver efficiency deteriorations due to the communication signal. In addition, achieving high bit rate is essential requirement for communication systems that make design of dc-dc converter is of a challenging task. This paper presents a comparative case study of single phase and multiphase buck DC-DC converters for driving Li-Fi systems. The comparison includes the converter design, the efficiency, and the maximum achievable bit rates of each topology.","PeriodicalId":391488,"journal":{"name":"2019 International Conference on Innovative Trends in Computer Engineering (ITCE)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132652975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.1109/ITCE.2019.8646529
Samir A. Elsagheer Mohamed, M. T. Parvez
Tens of millions of people visit every year the Grand Mosque in Makkah for Hajj and Umrah. Making Tawaf (circumambulating the Ka’ba) is an essential rite in Hajj and Umrah. During peak hours, crowd density in Mataf (the area around the Ka’ba) becomes extremely intense. Even when the crowd density in Mataf is less, kissing the Black Stone (a part of the ritual of making the Tawaf) is a daunting task. This is due to the lack of proper queueing of pilgrims wishing to touch and kiss the Black Stone. In this work, we propose a Finite State Machine (FSM) based model for simulating the crowd movement during Tawaf. The model can be implemented in real time crowd monitoring in Mataf. Based on the models outputs, a system for auto-activated barriers is proposed to arrange the pilgrims in queue who want to touch and kiss the Black Stone.
{"title":"Crowd Modeling Based Auto Activated Barriers for Management of Pilgrims in Mataf","authors":"Samir A. Elsagheer Mohamed, M. T. Parvez","doi":"10.1109/ITCE.2019.8646529","DOIUrl":"https://doi.org/10.1109/ITCE.2019.8646529","url":null,"abstract":"Tens of millions of people visit every year the Grand Mosque in Makkah for Hajj and Umrah. Making Tawaf (circumambulating the Ka’ba) is an essential rite in Hajj and Umrah. During peak hours, crowd density in Mataf (the area around the Ka’ba) becomes extremely intense. Even when the crowd density in Mataf is less, kissing the Black Stone (a part of the ritual of making the Tawaf) is a daunting task. This is due to the lack of proper queueing of pilgrims wishing to touch and kiss the Black Stone. In this work, we propose a Finite State Machine (FSM) based model for simulating the crowd movement during Tawaf. The model can be implemented in real time crowd monitoring in Mataf. Based on the models outputs, a system for auto-activated barriers is proposed to arrange the pilgrims in queue who want to touch and kiss the Black Stone.","PeriodicalId":391488,"journal":{"name":"2019 International Conference on Innovative Trends in Computer Engineering (ITCE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130767132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.1109/ITCE.2019.8646677
Shimaa Abdzaher, M. Abdrabou, A. Al-Shami, I. Saroit
Cognitive radio is a smart technology which can enhance the wireless communications by using the opportunistic access of the spectrum. Cognitive Radio Ad Hoc Network is a promising wireless network which depends on this technology. In this paper, we evaluate the performance evaluation of two different medium Access control protocols scenarios; single radio-multi channels Cognitive medium Access Control Protocol and two radios-multi channels cognitive medium access control protocol using Network Simulator 2 (NS-2). This study investigates the impact of increasing the packet size on the performance metrics such as network throughput. Simulation results proves that single radio-multi channels cognitive medium access control protocol outperforms the two radios-multi channels cognitive medium access control protocol in all aspects of performance metrics with increasing the packet size.
{"title":"Performance Evaluation of Medium Access Control Protocols for Cognitive Radio Ad Hoc Networks","authors":"Shimaa Abdzaher, M. Abdrabou, A. Al-Shami, I. Saroit","doi":"10.1109/ITCE.2019.8646677","DOIUrl":"https://doi.org/10.1109/ITCE.2019.8646677","url":null,"abstract":"Cognitive radio is a smart technology which can enhance the wireless communications by using the opportunistic access of the spectrum. Cognitive Radio Ad Hoc Network is a promising wireless network which depends on this technology. In this paper, we evaluate the performance evaluation of two different medium Access control protocols scenarios; single radio-multi channels Cognitive medium Access Control Protocol and two radios-multi channels cognitive medium access control protocol using Network Simulator 2 (NS-2). This study investigates the impact of increasing the packet size on the performance metrics such as network throughput. Simulation results proves that single radio-multi channels cognitive medium access control protocol outperforms the two radios-multi channels cognitive medium access control protocol in all aspects of performance metrics with increasing the packet size.","PeriodicalId":391488,"journal":{"name":"2019 International Conference on Innovative Trends in Computer Engineering (ITCE)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134296978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.1109/ITCE.2019.8646473
Ashraf Ramadan, Mohamed Ebeed, S. Kamel
This paper presents the influences of integrating Distributed Static Compensators (DSTATCOMs) and Photo voltaic (PV) units in the real distribution network (Tala City) at Menoufia_Egypt. The investigation is carried out with and without DSTATCOMs at different penetration levels of PV which include 60%, 70%, 80%, and 90%. The optimal ratings and locations of the DSTATCOMs and the PV units were determined using the improved sine cosine algorism (ISCA). The ISCA is based on Levy flight distribution with adaptive operators to enhance the searching performance of the original SCA. The considered objective function includes the power losses minimization, voltage deviations minimization and voltage stability improvement. The obtained results can be concluded that inclusion of PV units can reduce the power losses and improve both of the voltage profile and stability of the system considerably with increasing the penetration levels. In addition, the performance of the studied system is significantly improved when it is connecting with both PV penetration and DSTATCOM compared with the case of PV penetration only. Moreover, the obtained results verified the effectiveness of the proposed optimization technique for assigning the allocations of the DSTATCOMs and PV units in terms of the objective function.
{"title":"Performance Assessment of a Realistic Egyptian Distribution Network Including PV Penetration with DSTATCOM","authors":"Ashraf Ramadan, Mohamed Ebeed, S. Kamel","doi":"10.1109/ITCE.2019.8646473","DOIUrl":"https://doi.org/10.1109/ITCE.2019.8646473","url":null,"abstract":"This paper presents the influences of integrating Distributed Static Compensators (DSTATCOMs) and Photo voltaic (PV) units in the real distribution network (Tala City) at Menoufia_Egypt. The investigation is carried out with and without DSTATCOMs at different penetration levels of PV which include 60%, 70%, 80%, and 90%. The optimal ratings and locations of the DSTATCOMs and the PV units were determined using the improved sine cosine algorism (ISCA). The ISCA is based on Levy flight distribution with adaptive operators to enhance the searching performance of the original SCA. The considered objective function includes the power losses minimization, voltage deviations minimization and voltage stability improvement. The obtained results can be concluded that inclusion of PV units can reduce the power losses and improve both of the voltage profile and stability of the system considerably with increasing the penetration levels. In addition, the performance of the studied system is significantly improved when it is connecting with both PV penetration and DSTATCOM compared with the case of PV penetration only. Moreover, the obtained results verified the effectiveness of the proposed optimization technique for assigning the allocations of the DSTATCOMs and PV units in terms of the objective function.","PeriodicalId":391488,"journal":{"name":"2019 International Conference on Innovative Trends in Computer Engineering (ITCE)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131602373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.1109/ITCE.2019.8646320
E. Maher, A. El-Mahdy
The Device-to-Device (D2D) communication underlaying cellular networks generates interference due to reusing the same resources of the conventional cellular network. Therefore, efficient interference management techniques are required to control the interference. In this paper, we address the problem of interference management for underlay D2D users in a two-tier heterogeneous macro-small cell network assuming imperfect Channel State Information (CSI). The optimal power of D2D users that maximize the Signal to Interference and Noise (SINR) ratio is obtained in presence of imperfect CSI. The effect of channel estimation error on the performance of both D2D and cellular users is measured in terms of the achievable rate and the cumulative distribution function (CDF) of the SINR.
{"title":"A QoS-based Power Optimization for D2D underlaying Macro-Small Cellular Networks with Imperfect Channel Estimation","authors":"E. Maher, A. El-Mahdy","doi":"10.1109/ITCE.2019.8646320","DOIUrl":"https://doi.org/10.1109/ITCE.2019.8646320","url":null,"abstract":"The Device-to-Device (D2D) communication underlaying cellular networks generates interference due to reusing the same resources of the conventional cellular network. Therefore, efficient interference management techniques are required to control the interference. In this paper, we address the problem of interference management for underlay D2D users in a two-tier heterogeneous macro-small cell network assuming imperfect Channel State Information (CSI). The optimal power of D2D users that maximize the Signal to Interference and Noise (SINR) ratio is obtained in presence of imperfect CSI. The effect of channel estimation error on the performance of both D2D and cellular users is measured in terms of the achievable rate and the cumulative distribution function (CDF) of the SINR.","PeriodicalId":391488,"journal":{"name":"2019 International Conference on Innovative Trends in Computer Engineering (ITCE)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128548185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.1109/ITCE.2019.8646388
H. M. Ahmed, N. Salem, A. Seddik, M. El-Adawy
Shear wave speed is a metric for the tissue elastic properties and its pathologic changes. This is due to the implicit relationship between the speed of the propagating shear wave within tissue and both its elastic properties and pathologic changes. Wave propagation is a result of a force applied transiently to the tissue model. In this paper, the relationship between lateral TTP displacement curves and stiffness of different Young’s moduli phantoms is investigated. Five different elastic moduli Finite Element Models (FEMs) are used; 5.2KPa, 9.8KPa, 23.9KPa, 44.2KPa and 67.3KPa. Agar-gelatin model is used as a general model for mimicking soft tissue. Displacements are tracked with respect to the simulation time to create the displacement magnitude profile for the central node for each phantom. Results have shown that the second highest peak happens after 0.05 seconds in case of low elastic moduli FEMs. This time stamp can be used as a yardstick to differentiate between low and high elastic moduli without considering estimating the shear wave speed for many lateral nodes.
{"title":"Investigating Relationship Between Lateral Time-To-Peak (TTP) Displacement Curves and Stiffness of Viscoelastic Agar-Gelatin Phantoms","authors":"H. M. Ahmed, N. Salem, A. Seddik, M. El-Adawy","doi":"10.1109/ITCE.2019.8646388","DOIUrl":"https://doi.org/10.1109/ITCE.2019.8646388","url":null,"abstract":"Shear wave speed is a metric for the tissue elastic properties and its pathologic changes. This is due to the implicit relationship between the speed of the propagating shear wave within tissue and both its elastic properties and pathologic changes. Wave propagation is a result of a force applied transiently to the tissue model. In this paper, the relationship between lateral TTP displacement curves and stiffness of different Young’s moduli phantoms is investigated. Five different elastic moduli Finite Element Models (FEMs) are used; 5.2KPa, 9.8KPa, 23.9KPa, 44.2KPa and 67.3KPa. Agar-gelatin model is used as a general model for mimicking soft tissue. Displacements are tracked with respect to the simulation time to create the displacement magnitude profile for the central node for each phantom. Results have shown that the second highest peak happens after 0.05 seconds in case of low elastic moduli FEMs. This time stamp can be used as a yardstick to differentiate between low and high elastic moduli without considering estimating the shear wave speed for many lateral nodes.","PeriodicalId":391488,"journal":{"name":"2019 International Conference on Innovative Trends in Computer Engineering (ITCE)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125754383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.1109/ITCE.2019.8646491
Salma M. Maher, Ziad M. Ali, H. Mahmoud, S. Abdellatif, M. Abdellatif
The development of Underwater communications networks has become a hot topic in the research over the past few years. Many technologies are promising, however, they suffer from considerable latency, and larger attenuation with distance which degrades the overall network performance. This paper implements a low cost underwater communication network (UWCN) in order to investigate the effect of the operating frequency on the network performance during data transmission. The transmission of data is studied in three scenarios; Air-to-Air, Air-to-Water, and Water-to-Water scenarios. Furthermore, the performance of the network with two operating frequencies is examined in terms of the end-to-end delay, throughput, and packet loss.
{"title":"Performance of RF underwater communications operating at 433 MHz and 2.4 GHz","authors":"Salma M. Maher, Ziad M. Ali, H. Mahmoud, S. Abdellatif, M. Abdellatif","doi":"10.1109/ITCE.2019.8646491","DOIUrl":"https://doi.org/10.1109/ITCE.2019.8646491","url":null,"abstract":"The development of Underwater communications networks has become a hot topic in the research over the past few years. Many technologies are promising, however, they suffer from considerable latency, and larger attenuation with distance which degrades the overall network performance. This paper implements a low cost underwater communication network (UWCN) in order to investigate the effect of the operating frequency on the network performance during data transmission. The transmission of data is studied in three scenarios; Air-to-Air, Air-to-Water, and Water-to-Water scenarios. Furthermore, the performance of the network with two operating frequencies is examined in terms of the end-to-end delay, throughput, and packet loss.","PeriodicalId":391488,"journal":{"name":"2019 International Conference on Innovative Trends in Computer Engineering (ITCE)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126668393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.1109/ITCE.2019.8646601
Hussein M. Elshafie, Tarek M. Mahmoud, Abdelmgeid A. Ali
Network intrusion detection system (NIDS) monitors network traffic to detect an unauthorized activity in computer networks. The NIDS is classified according to detection technique into signature and anomaly based. Each of them has its own advantage and disadvantage. The signature-based is more effective in detecting known attacks but it is unable to detect new attacks. The anomaly-based is better in detecting new attacks but it may produce many false alarms. NIDS which use both of them try to exploit the strengths of them. In this paper we propose an improvement of the well known Snort NIDS using clonal selection algorithm (CSA). The proposed approach is evaluated using the 1999 DARPA Intrusion Detection Evaluation Data Sets of MIT (Massachusetts Institute of Technology) as a testbed. The conducted experiments compare the recall, precision, and F-score of Snort NIDS on its own, Snort NIDS improved by negative selection algorithm (NSA), and the proposed approach. The obtained results show that the proposed approach is more powerful than the others.
{"title":"Improving the Performance of the Snort Intrusion Detection Using Clonal Selection","authors":"Hussein M. Elshafie, Tarek M. Mahmoud, Abdelmgeid A. Ali","doi":"10.1109/ITCE.2019.8646601","DOIUrl":"https://doi.org/10.1109/ITCE.2019.8646601","url":null,"abstract":"Network intrusion detection system (NIDS) monitors network traffic to detect an unauthorized activity in computer networks. The NIDS is classified according to detection technique into signature and anomaly based. Each of them has its own advantage and disadvantage. The signature-based is more effective in detecting known attacks but it is unable to detect new attacks. The anomaly-based is better in detecting new attacks but it may produce many false alarms. NIDS which use both of them try to exploit the strengths of them. In this paper we propose an improvement of the well known Snort NIDS using clonal selection algorithm (CSA). The proposed approach is evaluated using the 1999 DARPA Intrusion Detection Evaluation Data Sets of MIT (Massachusetts Institute of Technology) as a testbed. The conducted experiments compare the recall, precision, and F-score of Snort NIDS on its own, Snort NIDS improved by negative selection algorithm (NSA), and the proposed approach. The obtained results show that the proposed approach is more powerful than the others.","PeriodicalId":391488,"journal":{"name":"2019 International Conference on Innovative Trends in Computer Engineering (ITCE)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126269809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}