首页 > 最新文献

2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)最新文献

英文 中文
2D Cubic Spline Transformation With 3D Binary Image for a New Watermarking Algorithm 基于三维二值图像的二维三次样条变换水印新算法
Heba Abdul-Jaleel Al-Asady, sama Qasim Jumah Al-Thahab, Saad Saffa Hreshee
Watermarking is a new technique proposed to protect digital content from intellectual infringement in recent years. It modifies the original text and adds signature extracts as proof of ownership if needed. This paper uses a two-dimensional cubic spline function with the binary image as the third dimension. The cover image breaks down into three hues, red, and converts into three-dimensional binary information. The locations of pixels in the binary image third dimension (z-plain) are determined using 2D-cubic spline interpolation. To hide the watermarking information in the defined regions, we use direct correlations. The results of simulations utilizing PSNR and BER using this technique show excellent fidelity (92.238 dB) and a low bit error rate (0.0003). Watermark detection accomplishes without the use of the source image. Even when subjected to spatial problems, the simulation results suggest obtaining great realism and robustness.
水印技术是近年来提出的一种保护数字内容不受知识产权侵害的新技术。如果需要的话,它会修改原始文本并添加签名摘录作为所有权的证明。本文采用以二值图像为第三维的二维三次样条函数。封面图像分解成三种色调,红色,并转换成三维二进制信息。利用二维三次样条插值确定二值图像三维(z平面)中像素的位置。为了在定义的区域中隐藏水印信息,我们使用直接关联。仿真结果表明,该技术具有良好的保真度(92.238 dB)和较低的误码率(0.0003)。水印检测无需使用源图像即可完成。即使在空间问题中,仿真结果也表明该方法具有较好的真实感和鲁棒性。
{"title":"2D Cubic Spline Transformation With 3D Binary Image for a New Watermarking Algorithm","authors":"Heba Abdul-Jaleel Al-Asady, sama Qasim Jumah Al-Thahab, Saad Saffa Hreshee","doi":"10.1109/ICCITM53167.2021.9677689","DOIUrl":"https://doi.org/10.1109/ICCITM53167.2021.9677689","url":null,"abstract":"Watermarking is a new technique proposed to protect digital content from intellectual infringement in recent years. It modifies the original text and adds signature extracts as proof of ownership if needed. This paper uses a two-dimensional cubic spline function with the binary image as the third dimension. The cover image breaks down into three hues, red, and converts into three-dimensional binary information. The locations of pixels in the binary image third dimension (z-plain) are determined using 2D-cubic spline interpolation. To hide the watermarking information in the defined regions, we use direct correlations. The results of simulations utilizing PSNR and BER using this technique show excellent fidelity (92.238 dB) and a low bit error rate (0.0003). Watermark detection accomplishes without the use of the source image. Even when subjected to spatial problems, the simulation results suggest obtaining great realism and robustness.","PeriodicalId":406104,"journal":{"name":"2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116589756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On The Performance of Multi-User Massive MIMO over mm wave Channels 毫米波信道上多用户大规模MIMO的性能研究
S.A. Ahmed, S. Ayoob, A. A. Al Janaby
Massive multiple-input multiple-output (MIMO) and Millimeter-wave (mmWave) techniques are the main factors that support modern wireless communications. Use of mmWave technology is a major factor in solving the problem of throttling congestion in the current bandwidth, as the use of mmWave leads to a significant increase in data rate, throughput and capacity. In this paper, we investigated and studied performance of 5G multi-user (MU) massive MIMO mmWave communication and obtained output results (Spectral Efficiency), using three beamforming methods: conjugate beamforming (CB), minimum mean squared error (MMSE), and zero-forcing (ZF) through mm-Wave Channel by using multiple frequencies (28GHz and 38 GHz) and we explained which one of them is better in terms of spectrum efficiency.
大规模多输入多输出(MIMO)和毫米波(mmWave)技术是支持现代无线通信的主要因素。使用毫米波技术是解决当前带宽限制拥塞问题的一个主要因素,因为使用毫米波可以显著提高数据速率、吞吐量和容量。本文对5G多用户(MU)大规模MIMO毫米波通信的性能进行了调查研究,得到了三种波束形成方法(共轭波束形成(CB)、最小均方误差(MMSE)和零强迫(ZF))通过毫米波信道在多个频率(28GHz和38ghz)下的输出结果(频谱效率),并解释了哪一种波束形成方法在频谱效率方面更好。
{"title":"On The Performance of Multi-User Massive MIMO over mm wave Channels","authors":"S.A. Ahmed, S. Ayoob, A. A. Al Janaby","doi":"10.1109/ICCITM53167.2021.9677730","DOIUrl":"https://doi.org/10.1109/ICCITM53167.2021.9677730","url":null,"abstract":"Massive multiple-input multiple-output (MIMO) and Millimeter-wave (mmWave) techniques are the main factors that support modern wireless communications. Use of mmWave technology is a major factor in solving the problem of throttling congestion in the current bandwidth, as the use of mmWave leads to a significant increase in data rate, throughput and capacity. In this paper, we investigated and studied performance of 5G multi-user (MU) massive MIMO mmWave communication and obtained output results (Spectral Efficiency), using three beamforming methods: conjugate beamforming (CB), minimum mean squared error (MMSE), and zero-forcing (ZF) through mm-Wave Channel by using multiple frequencies (28GHz and 38 GHz) and we explained which one of them is better in terms of spectrum efficiency.","PeriodicalId":406104,"journal":{"name":"2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134024863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design and Implementation of High Performance 2D Mesh NoC Based On New Proposed Router Using FPGA 基于新型路由器的高性能二维网格NoC的FPGA设计与实现
N. D. Majeed, S. Q. Mahdi, M. Kadhim
The classic interconnection among Intellectual Property (IP) cores in a System on Chip (SoC) became ineffective due to the increase the numbers of processors on single chip. These factors lead to the emergence of Network on Chip (NoC) technology. In this paper, 2D Mesh network for 16 node were implemented with a new proposed router to solve packets conflict problem. This network has low resources, where the network utilization ratio of slices is about 24% from the available resources and the maximum frequency 102.093MHz. The total consumption power is about 150 mW for the network, where the consumption static power is 32 mW only. The router in this network has a schedule with a fixed priority, which leads to data flowing without any conflict among packets. Moreover, the crossbar in this router consists of one multiplexer, counter and without additional inputs buffers unlike traditional crossbar, which consists of five multiplexer with multiple input buffers. This router is implemented and tested on the FPGA Spartan 3A (XC3S700A) kit.
由于单片上处理器数量的增加,传统的单片系统(SoC)中知识产权(IP)内核之间的互连变得无效。这些因素导致了片上网络(NoC)技术的出现。本文采用一种新的路由器实现了16节点的二维Mesh网络,解决了报文冲突问题。该网络资源较少,可用资源中分片的网络利用率约为24%,最大频率为102.093MHz。网络总消耗功率约150mw,其中静态消耗功率仅为32mw。该网络中的路由器具有固定优先级的调度,使得数据在不冲突的情况下流动。此外,该路由器中的交叉条由一个多路复用器和计数器组成,不像传统的交叉条由五个多路复用器和多个输入缓冲区组成。该路由器在FPGA Spartan 3A (XC3S700A)套件上实现和测试。
{"title":"Design and Implementation of High Performance 2D Mesh NoC Based On New Proposed Router Using FPGA","authors":"N. D. Majeed, S. Q. Mahdi, M. Kadhim","doi":"10.1109/ICCITM53167.2021.9677773","DOIUrl":"https://doi.org/10.1109/ICCITM53167.2021.9677773","url":null,"abstract":"The classic interconnection among Intellectual Property (IP) cores in a System on Chip (SoC) became ineffective due to the increase the numbers of processors on single chip. These factors lead to the emergence of Network on Chip (NoC) technology. In this paper, 2D Mesh network for 16 node were implemented with a new proposed router to solve packets conflict problem. This network has low resources, where the network utilization ratio of slices is about 24% from the available resources and the maximum frequency 102.093MHz. The total consumption power is about 150 mW for the network, where the consumption static power is 32 mW only. The router in this network has a schedule with a fixed priority, which leads to data flowing without any conflict among packets. Moreover, the crossbar in this router consists of one multiplexer, counter and without additional inputs buffers unlike traditional crossbar, which consists of five multiplexer with multiple input buffers. This router is implemented and tested on the FPGA Spartan 3A (XC3S700A) kit.","PeriodicalId":406104,"journal":{"name":"2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133027662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancement of Daytime Crescent Image Using Wiener Filter Based De-Blurring Technique 基于维纳滤波去模糊技术的日间月牙图像增强
Rand Hussam Ali, A. Khidhir
The aim of this research is to enhance the astronomical image, specifically the crescent image. Millions of Muslims care of monitoring the new crescent to determine the beginning of the fasting month (Ramadan), Eid Al-Fitr(Islamic Eid), and the beginning of the Hijri calendar. These timings are based on the appearance of the crescent in the sky. Because it is very difficult to detect the new crescent during day time, it is important to develop a technique to help detecting it. In the proposed method, the image restoration technique has been used to extract the crescent image from the telescope. The captured image is very noisy due to blurring and weather factors. This noise reduces the quality of the image. In this study, some of crescent images have been captured during the day time, where the crescent age was less than 50 hours before or after the new moon by using a portable digital camera installed on the telescope. Both, the deconvolution and De-Blurring technique with Hanning filter have been used to enhance the crescent's image. This indicates that the Wiener filter is a versatile and powerful technique for de-blurring and noise removal which can be successfully used in taking the crescent's images. In fact, our algorithm's performance was compared with that of the Wiener filter, Blind deconvolution, and Lucy Richardson algorithm. The resulted enhanced images show the crescent's image as can be seen visibly and can be recognized by the human eye. We discovered that and that Wiener filter deconvolution method is better than Lucy Richardson algorithm.
这项研究的目的是增强天文图像,特别是新月图像。数以百万计的穆斯林关心监测新的新月,以确定斋月(斋月),开斋节(伊斯兰开斋节)的开始,以及回历的开始。这些时间是根据天空中新月的出现而定的。因为在白天很难发现新月,所以开发一种技术来帮助发现它是很重要的。在该方法中,采用图像恢复技术提取望远镜月牙图像。由于模糊和天气因素,捕获的图像非常嘈杂。这种噪声降低了图像的质量。在这项研究中,使用安装在望远镜上的便携式数码相机,在新月前后不到50小时的白天拍摄了一些新月图像。利用汉宁滤波器的反卷积和去模糊技术增强了新月图像。这表明,维纳滤波器是一种多功能和强大的去模糊和去噪技术,可以成功地用于拍摄新月的图像。实际上,我们的算法的性能与Wiener滤波,盲反卷积和Lucy Richardson算法进行了比较。增强后的图像显示,新月的图像可以被肉眼看到,也可以被人眼识别。我们发现,维纳滤波反卷积方法优于Lucy Richardson算法。
{"title":"Enhancement of Daytime Crescent Image Using Wiener Filter Based De-Blurring Technique","authors":"Rand Hussam Ali, A. Khidhir","doi":"10.1109/ICCITM53167.2021.9677768","DOIUrl":"https://doi.org/10.1109/ICCITM53167.2021.9677768","url":null,"abstract":"The aim of this research is to enhance the astronomical image, specifically the crescent image. Millions of Muslims care of monitoring the new crescent to determine the beginning of the fasting month (Ramadan), Eid Al-Fitr(Islamic Eid), and the beginning of the Hijri calendar. These timings are based on the appearance of the crescent in the sky. Because it is very difficult to detect the new crescent during day time, it is important to develop a technique to help detecting it. In the proposed method, the image restoration technique has been used to extract the crescent image from the telescope. The captured image is very noisy due to blurring and weather factors. This noise reduces the quality of the image. In this study, some of crescent images have been captured during the day time, where the crescent age was less than 50 hours before or after the new moon by using a portable digital camera installed on the telescope. Both, the deconvolution and De-Blurring technique with Hanning filter have been used to enhance the crescent's image. This indicates that the Wiener filter is a versatile and powerful technique for de-blurring and noise removal which can be successfully used in taking the crescent's images. In fact, our algorithm's performance was compared with that of the Wiener filter, Blind deconvolution, and Lucy Richardson algorithm. The resulted enhanced images show the crescent's image as can be seen visibly and can be recognized by the human eye. We discovered that and that Wiener filter deconvolution method is better than Lucy Richardson algorithm.","PeriodicalId":406104,"journal":{"name":"2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129480487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Review on Image Processing Based Neonatal Jaundice Detection Techniques 基于图像处理的新生儿黄疸检测技术综述
Warqaa Hashim, Makram Alkhaled, A. Al-Naji, I. Al-Rayahi
Jaundice or Hyperbilirubinemia is a very common condition that affects newborns in their first few weeks of life. The main cause of jaundice is the high level of bilirubin substance in the blood. As bilirubin is toxic to the brain cells, acute bilirubin encephalopathy can occur in cases of extreme jaundice. This condition can result in brain trauma and lead to Kernicterus. Thus, a timely diagnosis and treatment can help in preventing long-term damage. Many jaundice diagnosis techniques that are based on computer vision and image processing were proposed in literature. In this paper we present a thorough review on most of these techniques, highlight their pros and cons, and compare between them in terms of the method used, advantages, limitations, and the region of interest selected for processing.
黄疸或高胆红素血症是影响新生儿生命最初几周的一种非常常见的疾病。黄疸的主要原因是血液中胆红素物质的高水平。由于胆红素对脑细胞有毒,急性胆红素脑病可发生在极端黄疸的情况下。这种情况会导致脑外伤并导致核黄疸。因此,及时诊断和治疗有助于预防长期损害。文献中提出了许多基于计算机视觉和图像处理的黄疸诊断技术。在本文中,我们对大多数这些技术进行了全面的回顾,突出了它们的优点和缺点,并在使用的方法、优点、局限性和选择处理的兴趣区域方面对它们进行了比较。
{"title":"A Review on Image Processing Based Neonatal Jaundice Detection Techniques","authors":"Warqaa Hashim, Makram Alkhaled, A. Al-Naji, I. Al-Rayahi","doi":"10.1109/ICCITM53167.2021.9677654","DOIUrl":"https://doi.org/10.1109/ICCITM53167.2021.9677654","url":null,"abstract":"Jaundice or Hyperbilirubinemia is a very common condition that affects newborns in their first few weeks of life. The main cause of jaundice is the high level of bilirubin substance in the blood. As bilirubin is toxic to the brain cells, acute bilirubin encephalopathy can occur in cases of extreme jaundice. This condition can result in brain trauma and lead to Kernicterus. Thus, a timely diagnosis and treatment can help in preventing long-term damage. Many jaundice diagnosis techniques that are based on computer vision and image processing were proposed in literature. In this paper we present a thorough review on most of these techniques, highlight their pros and cons, and compare between them in terms of the method used, advantages, limitations, and the region of interest selected for processing.","PeriodicalId":406104,"journal":{"name":"2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133780654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Object Recognition System for Autonomous Vehicles Based on PCA and 1D-CNN 基于PCA和1D-CNN的自动驾驶汽车目标识别系统
M. G. Alfahdawi, K. Alheeti, S. S. Al-Rawi
Object recognition system is an automobile safety system designed for the safety of the autonomous vehicle and other traffic participants and reduces collision risk. Road accidents have long been a significant issue involving loss of life and property. So recent years have seen rapid developments in autonomous and semi-autonomous vehicles. Autonomous vehicles are a comprehensive solution built for safety and comfort on the roads. This solution has many challenges. One of these challenges is to spot and recognize obstacles while navigating. As humans do, the only way to discover and recognize these obstacles is to see them. Therefore, vision systems are an essential part of this type of vehicle. This paper proposed a vision-based system for autonomous vehicles to recognize objects and traffic lights on the road. The proposed system contains three phases: image pre-processing, feature extraction, and classification. In the first phase, some image pre-processing techniques are applied to prepare and improve the input images, consisting of three stages: convert color images to grayscale, histogram equalization, and image resize. In the second phase, extraction of the features from images using Principal Component Analysis (PCA). In the third phase, the extracted features are fed as input to the proposed One-dimensional Convolutional Neural Network (1D-CNN) model for object classification and recognition. The results show that the proposed CNN model achieved a high recognition rate where the classification precision rate reached 100%, and the error rate is 0%. The low number of false alarms and the high precision rate proves that the proposed system performs very well in recognizing the objects.
物体识别系统是为了保证自动驾驶车辆和其他交通参与者的安全,降低碰撞风险而设计的一种汽车安全系统。道路交通事故长期以来一直是一个涉及生命和财产损失的重大问题。因此,近年来,自动驾驶和半自动驾驶汽车发展迅速。自动驾驶汽车是为了道路安全和舒适而构建的综合解决方案。这个解决方案有很多挑战。其中一个挑战是在导航时发现和识别障碍。就像人类一样,发现和认识这些障碍的唯一方法就是看到它们。因此,视觉系统是这类车辆的重要组成部分。本文提出了一种基于视觉的自动驾驶车辆识别道路上物体和交通灯的系统。该系统包括三个阶段:图像预处理、特征提取和分类。在第一阶段,应用一些图像预处理技术来准备和改进输入图像,包括三个阶段:将彩色图像转换为灰度,直方图均衡化和图像大小调整。在第二阶段,使用主成分分析(PCA)从图像中提取特征。在第三阶段,将提取的特征作为输入输入到所提出的一维卷积神经网络(1D-CNN)模型中,用于对象分类和识别。结果表明,本文提出的CNN模型具有较高的识别率,分类准确率达到100%,错误率为0%。低误报率和高准确率证明了该系统在识别目标方面具有良好的性能。
{"title":"Object Recognition System for Autonomous Vehicles Based on PCA and 1D-CNN","authors":"M. G. Alfahdawi, K. Alheeti, S. S. Al-Rawi","doi":"10.1109/ICCITM53167.2021.9677676","DOIUrl":"https://doi.org/10.1109/ICCITM53167.2021.9677676","url":null,"abstract":"Object recognition system is an automobile safety system designed for the safety of the autonomous vehicle and other traffic participants and reduces collision risk. Road accidents have long been a significant issue involving loss of life and property. So recent years have seen rapid developments in autonomous and semi-autonomous vehicles. Autonomous vehicles are a comprehensive solution built for safety and comfort on the roads. This solution has many challenges. One of these challenges is to spot and recognize obstacles while navigating. As humans do, the only way to discover and recognize these obstacles is to see them. Therefore, vision systems are an essential part of this type of vehicle. This paper proposed a vision-based system for autonomous vehicles to recognize objects and traffic lights on the road. The proposed system contains three phases: image pre-processing, feature extraction, and classification. In the first phase, some image pre-processing techniques are applied to prepare and improve the input images, consisting of three stages: convert color images to grayscale, histogram equalization, and image resize. In the second phase, extraction of the features from images using Principal Component Analysis (PCA). In the third phase, the extracted features are fed as input to the proposed One-dimensional Convolutional Neural Network (1D-CNN) model for object classification and recognition. The results show that the proposed CNN model achieved a high recognition rate where the classification precision rate reached 100%, and the error rate is 0%. The low number of false alarms and the high precision rate proves that the proposed system performs very well in recognizing the objects.","PeriodicalId":406104,"journal":{"name":"2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133829876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Classification for SANET Based on Convolutional Neural Networks 基于卷积神经网络的SANET分类
M. I. H. Al-Janabi, K. Alheeti, A. Alaloosy
Attack detection is important for wireless networks and communications generally. Ship ad hoc networks (SANET) are a subset of wireless networks that are vulnerable to denial of service attacks. These attacks are one of the main challenges facing maritime networks, especially dedicated networks because of their weak infrastructure, which makes it easier for these networks to be exposed to this type of attacks. To maintain a secure connection and increase the durability of that connection, an accurate attack detection system must be built. In this paper, we used deep learning algorithm to classify data as either attack or safe. we generated the dataset by building a scenario for the SANET in the network simulator (ns-2). AODV was used as the routing protocol in this simulation, AODV reduces the burden on the network compared with the other protocols (reduces messages flooding in the network). The Convolutional Neural Network (CNN) model were applied to the dataset. The results show that the Convolutional Neural Network have the ability to detect attacks with higher performance. The experimental results showed that the data set that was generated with CNN model as the base classifier produced the best performance in terms of classification precision by 99%.
攻击检测对于无线网络和通信来说非常重要。船舶自组织网络(SANET)是无线网络的一个子集,容易受到拒绝服务攻击。这些攻击是海事网络面临的主要挑战之一,特别是专用网络,因为它们的基础设施薄弱,这使得这些网络更容易受到这类攻击。为了保持安全连接并增加连接的持久性,必须建立一个精确的攻击检测系统。在本文中,我们使用深度学习算法对数据进行攻击或安全分类。我们通过在网络模拟器(ns-2)中构建SANET的场景来生成数据集。本次仿真采用AODV作为路由协议,与其他协议相比,AODV减轻了网络负担(减少了网络中的消息泛滥)。将卷积神经网络(CNN)模型应用于数据集。结果表明,卷积神经网络具有较高的检测性能。实验结果表明,以CNN模型为基分类器生成的数据集在分类精度方面达到了99%的最佳性能。
{"title":"Classification for SANET Based on Convolutional Neural Networks","authors":"M. I. H. Al-Janabi, K. Alheeti, A. Alaloosy","doi":"10.1109/ICCITM53167.2021.9677691","DOIUrl":"https://doi.org/10.1109/ICCITM53167.2021.9677691","url":null,"abstract":"Attack detection is important for wireless networks and communications generally. Ship ad hoc networks (SANET) are a subset of wireless networks that are vulnerable to denial of service attacks. These attacks are one of the main challenges facing maritime networks, especially dedicated networks because of their weak infrastructure, which makes it easier for these networks to be exposed to this type of attacks. To maintain a secure connection and increase the durability of that connection, an accurate attack detection system must be built. In this paper, we used deep learning algorithm to classify data as either attack or safe. we generated the dataset by building a scenario for the SANET in the network simulator (ns-2). AODV was used as the routing protocol in this simulation, AODV reduces the burden on the network compared with the other protocols (reduces messages flooding in the network). The Convolutional Neural Network (CNN) model were applied to the dataset. The results show that the Convolutional Neural Network have the ability to detect attacks with higher performance. The experimental results showed that the data set that was generated with CNN model as the base classifier produced the best performance in terms of classification precision by 99%.","PeriodicalId":406104,"journal":{"name":"2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)","volume":"25 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129493562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Protection of LAN Using Semantic Firewalls 语义防火墙对局域网的保护
Baraa H. Kareem, W. Bhaya
The amount and diversity of malware keeps growing while the same basic attack techniques are being used. A firewall is a network security key component that filters inbound and outbound network packets as per predefined security rules. Even though firewalls are an effective defense against some attacks, they have security flaws that can be leveraged in other circumstances. In the present work, it is claimed that an ontology-based semantic firewall and machine learning algorithms can effectively enhance the firewall and protect the LAN. This paper proposes an ontology-based model for the semantic firewall as an effort to explore its effectiveness. The method used in this paper is based on Description Logic (DL) Reasoners, Ontology APIs, and Semantic Web Languages (OWL and SWRL). The proposed semantic firewall takes its decisions of anomalies detection based on a set of protection rules of the ontology-based model. As a result, the proposed approach achieves a detection accuracy of 93%. The conclusion is drawn that the presented ontology classifier gives an understandable model of a semantic firewall (SWF) that offers candid and human-interpretable decision rules, as with other machine learning models.
恶意软件的数量和多样性不断增长,而使用相同的基本攻击技术。防火墙是网络安全的关键组件,它根据预定义的安全规则过滤入站和出站网络数据包。尽管防火墙可以有效防御某些攻击,但它们也存在安全缺陷,可以在其他情况下加以利用。本文提出了一种基于本体的语义防火墙和机器学习算法,可以有效地增强防火墙,保护局域网。本文提出了一种基于本体的语义防火墙模型,以验证其有效性。本文使用的方法基于描述逻辑推理器、本体api和语义Web语言(OWL和SWRL)。本文提出的语义防火墙基于一套基于本体模型的保护规则进行异常检测决策。结果表明,该方法的检测准确率达到93%。得出的结论是,所提出的本体分类器提供了一个可理解的语义防火墙(SWF)模型,该模型提供了坦诚和人类可解释的决策规则,与其他机器学习模型一样。
{"title":"The Protection of LAN Using Semantic Firewalls","authors":"Baraa H. Kareem, W. Bhaya","doi":"10.1109/ICCITM53167.2021.9677725","DOIUrl":"https://doi.org/10.1109/ICCITM53167.2021.9677725","url":null,"abstract":"The amount and diversity of malware keeps growing while the same basic attack techniques are being used. A firewall is a network security key component that filters inbound and outbound network packets as per predefined security rules. Even though firewalls are an effective defense against some attacks, they have security flaws that can be leveraged in other circumstances. In the present work, it is claimed that an ontology-based semantic firewall and machine learning algorithms can effectively enhance the firewall and protect the LAN. This paper proposes an ontology-based model for the semantic firewall as an effort to explore its effectiveness. The method used in this paper is based on Description Logic (DL) Reasoners, Ontology APIs, and Semantic Web Languages (OWL and SWRL). The proposed semantic firewall takes its decisions of anomalies detection based on a set of protection rules of the ontology-based model. As a result, the proposed approach achieves a detection accuracy of 93%. The conclusion is drawn that the presented ontology classifier gives an understandable model of a semantic firewall (SWF) that offers candid and human-interpretable decision rules, as with other machine learning models.","PeriodicalId":406104,"journal":{"name":"2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121643910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analytical Treatment to Find Stability of the System of Partial Equations Arising from Heat Transfer on A porous Plate 多孔板传热偏方程系统稳定性的解析处理
A. M. Jumaa
This paper presents the analytical solution for a mathematical model of heat transfer by free convection which arises from the flowing of fluid on a porous plate. The plate is laid on a horizontal position with temperature source at the surface of the plate that is different from the surrounding atmosphere temperature. The governing mathematical equations, which have been established, consist of partial differential equations with some boundary conditions. The model has been converted into a boundary value problem, and in this case, an analytical solution was adopted by using a perturbation of the functions which are playing the important role in the solution of the system like temperature, velocity. These functions help to find the necessary factor that controls the stability of the problem. The outcome results showed that the wave number has the significant effect in the stability.
本文给出了流体在多孔板上流动时的自由对流换热数学模型的解析解。板在水平位置上铺设,在板的表面有不同于周围大气温度的温度源。所建立的控制数学方程由带有若干边界条件的偏微分方程组成。该模型已转化为边值问题,在这种情况下,通过对温度、速度等在系统解中起重要作用的函数的摄动,采用解析解。这些函数有助于找到控制问题稳定性的必要因素。结果表明,波数对稳定性有显著影响。
{"title":"Analytical Treatment to Find Stability of the System of Partial Equations Arising from Heat Transfer on A porous Plate","authors":"A. M. Jumaa","doi":"10.1109/ICCITM53167.2021.9677684","DOIUrl":"https://doi.org/10.1109/ICCITM53167.2021.9677684","url":null,"abstract":"This paper presents the analytical solution for a mathematical model of heat transfer by free convection which arises from the flowing of fluid on a porous plate. The plate is laid on a horizontal position with temperature source at the surface of the plate that is different from the surrounding atmosphere temperature. The governing mathematical equations, which have been established, consist of partial differential equations with some boundary conditions. The model has been converted into a boundary value problem, and in this case, an analytical solution was adopted by using a perturbation of the functions which are playing the important role in the solution of the system like temperature, velocity. These functions help to find the necessary factor that controls the stability of the problem. The outcome results showed that the wave number has the significant effect in the stability.","PeriodicalId":406104,"journal":{"name":"2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131601748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Extended Range Evaluation of a BLE Mesh Network for Control Application 用于控制应用的BLE Mesh网络的扩展范围评估
Z. Farej, Azhar W. Talab
with the rise of the Internet of Things (IoT)., wireless mesh networks have gained prominence, and there are already some successful technologies that use low-cost, low-power wireless devices to construct such network topologies. Bluetooth low energy (BLE) has become a recent topic of research in both the Internet and the wireless industry. ABLE wireless mesh network protocol utilizes the broadcasting capability of such wireless transmissions. In this paper, a sample of the BLE mesh network is proposed for smart lighting control and evaluation of the Bluetooth extended range communication. Three nodes for the ESP-32 evaluation board and NRF mesh application for android are used in this sample to provision and configure the BLE mesh nodes. These boards are programmed with the BLE mesh program and the Bluetooth range can be extended by a factor of three according to the node's deployment method. As well as network flexibility and coverage area are increased with more optional lighting control processes.
随着物联网(IoT)的兴起在美国,无线网状网络已经获得了突出的地位,并且已经有一些成功的技术使用低成本、低功耗的无线设备来构建这种网络拓扑结构。低功耗蓝牙(BLE)已成为互联网和无线行业的最新研究课题。ABLE无线网状网络协议利用这种无线传输的广播能力。本文提出了一个用于智能照明控制的BLE mesh网络示例,并对蓝牙扩展范围通信进行了评估。本示例使用ESP-32评估板的三个节点和android的NRF mesh应用程序来提供和配置BLE mesh节点。这些电路板采用BLE mesh程序编程,根据节点的部署方法,蓝牙范围可以扩展到三倍。此外,通过更多可选的照明控制过程,增加了网络的灵活性和覆盖范围。
{"title":"Extended Range Evaluation of a BLE Mesh Network for Control Application","authors":"Z. Farej, Azhar W. Talab","doi":"10.1109/ICCITM53167.2021.9677727","DOIUrl":"https://doi.org/10.1109/ICCITM53167.2021.9677727","url":null,"abstract":"with the rise of the Internet of Things (IoT)., wireless mesh networks have gained prominence, and there are already some successful technologies that use low-cost, low-power wireless devices to construct such network topologies. Bluetooth low energy (BLE) has become a recent topic of research in both the Internet and the wireless industry. ABLE wireless mesh network protocol utilizes the broadcasting capability of such wireless transmissions. In this paper, a sample of the BLE mesh network is proposed for smart lighting control and evaluation of the Bluetooth extended range communication. Three nodes for the ESP-32 evaluation board and NRF mesh application for android are used in this sample to provision and configure the BLE mesh nodes. These boards are programmed with the BLE mesh program and the Bluetooth range can be extended by a factor of three according to the node's deployment method. As well as network flexibility and coverage area are increased with more optional lighting control processes.","PeriodicalId":406104,"journal":{"name":"2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121673182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1