首页 > 最新文献

2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)最新文献

英文 中文
Clustering for Energy Efficient and Redundancy Optimization in WSN using Fuzzy Logic and Genetic Methodologies a Review 基于模糊逻辑和遗传方法的WSN节能冗余聚类研究进展
Razan S. M. Saadaldeen, Abdalla A. Osman, Y. E. Ahmed
a wireless sensor network is a distributed sensing node to monitor physical or environmental conditions. Each node consists of sensors, wireless communication, limited processing capabilities and amount of energy reserved. The energy dissipation is an important problem to deal with, because of its effect on the network lifetime and availability. Recently, several clustering-based methods have been used for optimizing the redundancy and energy consumption. The low energy adaptive clustering hierarchy divided the wireless sensor network into a cluster with a cluster head. But its problem is on which parameter cluster heads are elected. This paper aims to provide a guideline for researchers whose aim to optimize data redundancy and energy consumption in the wireless sensor networks using clustering hierarchical depending on different parameters including distance to base station, node degree and node centrality to be used for electing the cluster head in addition to data redundancy. The electing is being achieved by using two techniques the Fuzzy Logic and genetic algorithm. The paper compared the techniques to provide a classification of the significant parameters that affects the lifetime of the network. Genetic Algorithm achieved by mixing the good solutions using a crossover and mutation operators while Fuzzy Logic using if-then rules and probability between 0 and 1.
无线传感器网络是一种分布式的感知节点,用于监测物理或环境状况。每个节点由传感器、无线通信、有限的处理能力和储备的能量组成。由于能量耗散对网络寿命和可用性的影响,它是一个需要解决的重要问题。近年来,一些基于聚类的方法被用于优化冗余和能耗。低能量自适应聚类层次将无线传感器网络划分为具有簇头的簇。但它的问题是在哪个参数上选出簇头。本文旨在为研究人员在数据冗余的基础上,根据与基站的距离、节点度和节点中心性等不同参数,利用聚类分层优化无线传感器网络中的数据冗余和能耗提供指导。采用模糊逻辑和遗传算法两种技术实现了系统的选择。本文对这些技术进行了比较,对影响网络寿命的重要参数进行了分类。遗传算法采用交叉和变异算子混合好解,模糊逻辑采用if-then规则和0 ~ 1之间的概率。
{"title":"Clustering for Energy Efficient and Redundancy Optimization in WSN using Fuzzy Logic and Genetic Methodologies a Review","authors":"Razan S. M. Saadaldeen, Abdalla A. Osman, Y. E. Ahmed","doi":"10.1109/ICCCEEE.2018.8515880","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515880","url":null,"abstract":"a wireless sensor network is a distributed sensing node to monitor physical or environmental conditions. Each node consists of sensors, wireless communication, limited processing capabilities and amount of energy reserved. The energy dissipation is an important problem to deal with, because of its effect on the network lifetime and availability. Recently, several clustering-based methods have been used for optimizing the redundancy and energy consumption. The low energy adaptive clustering hierarchy divided the wireless sensor network into a cluster with a cluster head. But its problem is on which parameter cluster heads are elected. This paper aims to provide a guideline for researchers whose aim to optimize data redundancy and energy consumption in the wireless sensor networks using clustering hierarchical depending on different parameters including distance to base station, node degree and node centrality to be used for electing the cluster head in addition to data redundancy. The electing is being achieved by using two techniques the Fuzzy Logic and genetic algorithm. The paper compared the techniques to provide a classification of the significant parameters that affects the lifetime of the network. Genetic Algorithm achieved by mixing the good solutions using a crossover and mutation operators while Fuzzy Logic using if-then rules and probability between 0 and 1.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"27 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78954146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Monitoring and Protection System for Sensitive Instruments to Power Line Disturbances 电力线扰动敏感仪表监测与保护系统
Salwa Bakheet, O. Abdallah, S. Abdalla
In this paper, an intelligent system is designed to measure, record, examine the line voltage disturbance, and to protect sensitive equipment against power line disturbance and using data recorded to selecting a good power prevention policy. Arduino UNO board is used to implement the data acquisition circuit, which send them to a protection system in order to Error handling of power line disturbance. The circuit is acquiring the line voltage and frequency, and then interfaced to a personal computer via USB cable. LabView software program is used as user screen interface and to provide data recording. The data recorded connected with protection circuit to protect instruments lab from disturbances. Also the data recording property allows the user to document the result as selected in text format. The system is successfully tested, and the maximum percentage error obtained in voltage measurement was (0.383%) and in frequency was (0).
本文设计了一个智能系统来测量、记录、检测线路电压干扰,保护敏感设备免受线路干扰,并利用记录的数据选择良好的电源预防策略。利用Arduino UNO板实现数据采集电路,并将数据发送到保护系统,以便对电力线干扰进行错误处理。该电路获取线路电压和频率,然后通过USB数据线连接到个人电脑。LabView软件程序作为用户屏幕界面,并提供数据记录。记录的数据与保护电路相连接,以保护实验室仪器不受干扰。此外,数据记录属性允许用户以文本格式记录选择的结果。系统测试成功,测电压最大百分比误差为0.383%,测频率最大百分比误差为0。
{"title":"Monitoring and Protection System for Sensitive Instruments to Power Line Disturbances","authors":"Salwa Bakheet, O. Abdallah, S. Abdalla","doi":"10.1109/ICCCEEE.2018.8515897","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515897","url":null,"abstract":"In this paper, an intelligent system is designed to measure, record, examine the line voltage disturbance, and to protect sensitive equipment against power line disturbance and using data recorded to selecting a good power prevention policy. Arduino UNO board is used to implement the data acquisition circuit, which send them to a protection system in order to Error handling of power line disturbance. The circuit is acquiring the line voltage and frequency, and then interfaced to a personal computer via USB cable. LabView software program is used as user screen interface and to provide data recording. The data recorded connected with protection circuit to protect instruments lab from disturbances. Also the data recording property allows the user to document the result as selected in text format. The system is successfully tested, and the maximum percentage error obtained in voltage measurement was (0.383%) and in frequency was (0).","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"7 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85324464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detection of Man-in-the-Middle Attacks by Using the TCP Retransmission Timeout : Key Compromise Impersonation Attack as Study Case 利用TCP重传超时检测中间人攻击——以密钥泄露冒充攻击为例
Ayman Mohammed Muzzamail Albashear, H. Ali, Abeer M. Ali
A Retransmission Timeout or RTO plays an important role in TCP protocol, mainly to achieve reliable transmission. In TCP, if the sender sent a segment and no acknowledgement has been received and the RTO timer expired then the sender will assume that this segment has been lost. This paper proposed another use of the RTO concept in order to secure the TLS session. It calculates a Secure Session RTO or SSRTO which is based on RTO equation between the sender and receiver in a TLS protocol. It is assumed that the man in the middle is in need of the time factor in order to trigger a KCI attack. at the server side, by calculating the time needed to start a TLS Handshake Protocol, until TLS Record Protocol, and if it is found that it took an appreciable time we may assume that there is an attacker. The action in this case, is to cut off the session between the sender and the receiver.
RTO (Retransmission Timeout)在TCP协议中起着重要的作用,主要是为了实现可靠的传输。在TCP中,如果发送方发送了一个段,但没有收到确认,并且RTO定时器已经过期,那么发送方将认为该段已经丢失。本文提出了RTO概念的另一种用法,以确保TLS会话的安全。它根据TLS协议中发送方和接收方之间的RTO方程,计算安全会话RTO或SSRTO。假设中间的人需要时间因素来触发KCI攻击。在服务器端,通过计算启动TLS握手协议所需的时间,直到TLS记录协议,如果发现它花费了可观的时间,我们可以假设有攻击者。在这种情况下,操作是切断发送方和接收方之间的会话。
{"title":"Detection of Man-in-the-Middle Attacks by Using the TCP Retransmission Timeout : Key Compromise Impersonation Attack as Study Case","authors":"Ayman Mohammed Muzzamail Albashear, H. Ali, Abeer M. Ali","doi":"10.1109/ICCCEEE.2018.8515845","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515845","url":null,"abstract":"A Retransmission Timeout or RTO plays an important role in TCP protocol, mainly to achieve reliable transmission. In TCP, if the sender sent a segment and no acknowledgement has been received and the RTO timer expired then the sender will assume that this segment has been lost. This paper proposed another use of the RTO concept in order to secure the TLS session. It calculates a Secure Session RTO or SSRTO which is based on RTO equation between the sender and receiver in a TLS protocol. It is assumed that the man in the middle is in need of the time factor in order to trigger a KCI attack. at the server side, by calculating the time needed to start a TLS Handshake Protocol, until TLS Record Protocol, and if it is found that it took an appreciable time we may assume that there is an attacker. The action in this case, is to cut off the session between the sender and the receiver.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"8 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88611073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Brain Tumor Detection by using Artificial Neural Network 基于人工神经网络的脑肿瘤检测
Hussna Elnoor Mohammed Abdalla, M. Esmail
Brain tumor is one of the most dangerous diseases which require early and accurately detection methods, now most detection and diagnosis methods depend on decision of neurospecialists, and radiologist for image evaluation which possible to human errors and time consuming. This study reviews and describe the processes and techniques used in detection brain tumor based on magnetic resonance imaging (MRI) and artificial neural networks (ANN) techniques, Which executed in the different steps of Computer Aided Detection System (CAD) after collected the image data (MRI); first stage is pre-processing and post-processing of MRI images to enhancement it and make it more suitable to analysis then used threshold to segment the MRI images by applied mean gray level method. In the second stage was used the statistical feature analysis to extract features from images; the features computed from equations of Haralick’s features based on the spatial gray level dependency matrix (SGLD) of images. Then selected the suitable and best features to detect the tumor localization. In the third stage the artificial neural networks were designed; the feedforward back propagation neural network with supervised learning were apply as automatic method to classify the images under investigation into tumor or none tumor. the network performances was evaluated successfully tested and achieved the best results with accuracy of 99%, and sensitivity 97.9%.
脑肿瘤是最危险的疾病之一,需要早期和准确的检测方法,目前大多数检测和诊断方法依赖于神经专家的决策,以及放射科医生的图像评估,这可能会造成人为错误和耗时。本文综述和描述了基于磁共振成像(MRI)和人工神经网络(ANN)技术的脑肿瘤检测过程和技术,这些过程和技术在收集图像数据(MRI)后在计算机辅助检测系统(CAD)的不同步骤中执行;首先对MRI图像进行预处理和后处理,增强图像,使其更适合分析,然后应用均值灰度法对MRI图像进行阈值分割。第二阶段采用统计特征分析对图像进行特征提取;基于图像的空间灰度依赖矩阵(SGLD),由Haralick特征方程计算特征。然后选择最合适的特征进行肿瘤定位检测。第三阶段设计了人工神经网络;采用带监督学习的前馈反传播神经网络作为自动分类方法,对研究图像进行肿瘤和非肿瘤分类。测试结果表明,该网络的准确率为99%,灵敏度为97.9%。
{"title":"Brain Tumor Detection by using Artificial Neural Network","authors":"Hussna Elnoor Mohammed Abdalla, M. Esmail","doi":"10.1109/ICCCEEE.2018.8515763","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515763","url":null,"abstract":"Brain tumor is one of the most dangerous diseases which require early and accurately detection methods, now most detection and diagnosis methods depend on decision of neurospecialists, and radiologist for image evaluation which possible to human errors and time consuming. This study reviews and describe the processes and techniques used in detection brain tumor based on magnetic resonance imaging (MRI) and artificial neural networks (ANN) techniques, Which executed in the different steps of Computer Aided Detection System (CAD) after collected the image data (MRI); first stage is pre-processing and post-processing of MRI images to enhancement it and make it more suitable to analysis then used threshold to segment the MRI images by applied mean gray level method. In the second stage was used the statistical feature analysis to extract features from images; the features computed from equations of Haralick’s features based on the spatial gray level dependency matrix (SGLD) of images. Then selected the suitable and best features to detect the tumor localization. In the third stage the artificial neural networks were designed; the feedforward back propagation neural network with supervised learning were apply as automatic method to classify the images under investigation into tumor or none tumor. the network performances was evaluated successfully tested and achieved the best results with accuracy of 99%, and sensitivity 97.9%.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"34 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78762521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Geothermal Mainstream Adoption through Risk Mitigation in Sudan 在苏丹通过减轻风险采用地热主流
Ashraf M. A Khadam, K. Ramadan, E. Hamouda
The purpose of this paper is to assess the main schemes to be utilized in East African countries based on evidence obtained in many countries to directly address geothermal resource risk, and to show the major incentives to be applied in this sector to mobilize and attract the necessary investment for geothermal development. Some successful experiences in East African region will be discussed and analyzed. Also this paper introduces the geothermal potential in Sudan and set a road map towards much engagement of geothermal polices adoption. This paper points out the potential contribution of oil operating companies to support geothermal development. An example of data collected from oil well in a certain location in Sudan has been analyzed by using statistical software called Minitab. The findings of this analysis gave useful results to be mainstreamed to different locations.
本文的目的是根据在许多国家获得的直接处理地热资源风险的证据,评估东非国家将采用的主要方案,并说明将在该部门采用的主要激励措施,以调动和吸引地热开发的必要投资。本文将讨论和分析东非地区的一些成功经验。本文还介绍了苏丹的地热潜力,并为地热政策的采用制定了路线图。本文指出了石油运营公司在支持地热开发方面的潜在贡献。用Minitab统计软件分析了从苏丹某地油井收集的数据。这一分析的结果提供了有用的结果,以便将其纳入不同地点的主流。
{"title":"Geothermal Mainstream Adoption through Risk Mitigation in Sudan","authors":"Ashraf M. A Khadam, K. Ramadan, E. Hamouda","doi":"10.1109/ICCCEEE.2018.8515898","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515898","url":null,"abstract":"The purpose of this paper is to assess the main schemes to be utilized in East African countries based on evidence obtained in many countries to directly address geothermal resource risk, and to show the major incentives to be applied in this sector to mobilize and attract the necessary investment for geothermal development. Some successful experiences in East African region will be discussed and analyzed. Also this paper introduces the geothermal potential in Sudan and set a road map towards much engagement of geothermal polices adoption. This paper points out the potential contribution of oil operating companies to support geothermal development. An example of data collected from oil well in a certain location in Sudan has been analyzed by using statistical software called Minitab. The findings of this analysis gave useful results to be mainstreamed to different locations.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"17 1","pages":"1-11"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78900370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Optimizing Convolutional Neural Networks for Brain Tumor Segmentation in MRI Images 优化卷积神经网络对MRI图像中脑肿瘤的分割
Mohamed Ali, R. Hamad, Mohanned Ahmed
Gliomas comprise about 80% of all malignant brain tumors and have the lowest survival rate of all brain tumors. Segmentation of tumors is an important step in evaluating the tumor, preparing the treatment plan and estimating the patient survival period. Tumor tissues have a distinguishable appearance in MRI images so they are widely used for brain tumor segmentation. Many solutions were proposed to automate brain tumor segmentation but convolutional neural networks (CNNs) have the most promising results. Tens of neural networks were proposed for tumor segmentation but they still did not achieve good enough accuracies to be deployed in real-world applications. In this paper, we focused on optimizing patch-wise classifier CNN and the results obtained are discussed to show the effect of some design decision taken. We evaluated the segmentation results using the Dice Similarity Coefficient (DSC). The results of this paper can be used to improve existing models or as a guideline for developing new CNN models. Finally, we point out possible future directions for research.
胶质瘤约占所有恶性脑肿瘤的80%,是所有脑肿瘤中存活率最低的。肿瘤的分割是评估肿瘤、制定治疗方案和估计患者生存期的重要步骤。肿瘤组织在MRI图像中具有可区分的外观,因此被广泛用于脑肿瘤的分割。人们提出了许多自动化脑肿瘤分割的解决方案,但卷积神经网络(cnn)的结果最有希望。人们提出了数十种神经网络用于肿瘤分割,但它们仍然没有达到足够好的精度,无法在实际应用中部署。在本文中,我们专注于优化贴片分类器CNN,并讨论了所获得的结果,以显示所采取的一些设计决策的影响。我们使用Dice Similarity Coefficient (DSC)来评估分割结果。本文的结果可以用来改进现有的模型,也可以作为开发新的CNN模型的指导。最后,我们指出了未来可能的研究方向。
{"title":"Optimizing Convolutional Neural Networks for Brain Tumor Segmentation in MRI Images","authors":"Mohamed Ali, R. Hamad, Mohanned Ahmed","doi":"10.1109/ICCCEEE.2018.8515826","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515826","url":null,"abstract":"Gliomas comprise about 80% of all malignant brain tumors and have the lowest survival rate of all brain tumors. Segmentation of tumors is an important step in evaluating the tumor, preparing the treatment plan and estimating the patient survival period. Tumor tissues have a distinguishable appearance in MRI images so they are widely used for brain tumor segmentation. Many solutions were proposed to automate brain tumor segmentation but convolutional neural networks (CNNs) have the most promising results. Tens of neural networks were proposed for tumor segmentation but they still did not achieve good enough accuracies to be deployed in real-world applications. In this paper, we focused on optimizing patch-wise classifier CNN and the results obtained are discussed to show the effect of some design decision taken. We evaluated the segmentation results using the Dice Similarity Coefficient (DSC). The results of this paper can be used to improve existing models or as a guideline for developing new CNN models. Finally, we point out possible future directions for research.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"12 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76675046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Late Acceptance Selection Hyper-heuristic for Wind Farm Layout Optimisation Problem 风电场布局优化问题的后期验收选择超启发式算法
Hiba Abdulaziz, A. Elnahas, Alaa Daffalla, Yossra Noureldien, A. Kheiri, E. Özcan
Wind is a promising source of renewable energy which can be harvested using wind turbines placed on farms. An efficient wind farm layout achieving various engineering and financial objectives is crucial to ensure the sustainability and continuity of energy production. In this study, a high-level search technique, namely late acceptance selection hyper-heuristic is applied to optimise the layout of wind farms. This approach aims to find the best placement of turbines at a given site, maximising the energy output while minimising the cost at the same time. The computational experiments indicate that the late acceptance selection hyper-heuristic improves upon the performance of a previously proposed genetic algorithm across all scenarios and an iterated local search over the majority of scenarios considering the best solutions obtained by each algorithm over the runs.
风能是一种很有前途的可再生能源,可以通过放置在农场上的风力涡轮机来获得。实现各种工程和财务目标的高效风电场布局对于确保能源生产的可持续性和连续性至关重要。在本研究中,采用一种高层次的搜索技术,即后期接受选择超启发式来优化风电场布局。这种方法的目的是在给定的地点找到涡轮机的最佳位置,最大限度地提高能量输出,同时最小化成本。计算实验表明,延迟接受选择超启发式算法改进了先前提出的遗传算法在所有场景中的性能,并在大多数场景中迭代局部搜索,考虑每个算法在运行过程中获得的最佳解。
{"title":"Late Acceptance Selection Hyper-heuristic for Wind Farm Layout Optimisation Problem","authors":"Hiba Abdulaziz, A. Elnahas, Alaa Daffalla, Yossra Noureldien, A. Kheiri, E. Özcan","doi":"10.1109/ICCCEEE.2018.8515808","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515808","url":null,"abstract":"Wind is a promising source of renewable energy which can be harvested using wind turbines placed on farms. An efficient wind farm layout achieving various engineering and financial objectives is crucial to ensure the sustainability and continuity of energy production. In this study, a high-level search technique, namely late acceptance selection hyper-heuristic is applied to optimise the layout of wind farms. This approach aims to find the best placement of turbines at a given site, maximising the energy output while minimising the cost at the same time. The computational experiments indicate that the late acceptance selection hyper-heuristic improves upon the performance of a previously proposed genetic algorithm across all scenarios and an iterated local search over the majority of scenarios considering the best solutions obtained by each algorithm over the runs.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"235 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77343428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Energy Efficient Mobility Management Mechanism in Software Defined Networking (SDN) 软件定义网络(SDN)中节能的移动性管理机制
N. S. Shahrun, A. F. Y. Mohammed, Rudy Ramlie, S. Newaz, A. T. Wan
Software Delined Networking (SDN) has paved the way for cost effective, energy efficient, and flexible and dynamic network structure. In SDN, a controller sets routing path for the data plane consisting of several switches. If an incoming packet is not known to a switch, the switch needs to invoke the controller, in turn the controller facilitates forwarding path for that packet. In case when a station is mobile (e.g., mobile phone or laptop), the controller needs to update the SDN forwarding path whenever the Mobile Terminal (MT) gets attached with a new switch. This will result in increasing location update overhead at not only the controller but also all the intermediate switches between the main controller and Leaf Switch (LS). Some of the existing research efforts consider both SDN forwarding path update and Layer 3 location update whenever a MT attaches with a new LS. In our study, we have realized that if mobile IP over SDN is managed, a network operator will end up imposing additional location update cost. In this paper, a novel overlay SDN topology is proposed in order to manage location update of MTs. In this contribution, a MT maintains its location update with a Root Switch (RS), which is in charge of tracking location of MTs within a cluster of cells, as long as the MT stays within the cluster (regional area). However, if the MT moves out of the regional area, in our proposal, there will be a location update at the main controller. Results obtained through numerical analysis reveal that proposed overlay topology based location update mechanism in SDN can lead to reduced location update cost noticeably.
软件分层网络(SDN)为低成本、高能效、灵活动态的网络结构铺平了道路。在SDN中,控制器为由多个交换机组成的数据平面设置路由路径。如果交换机不知道传入的数据包,则交换机需要调用控制器,反过来控制器为该数据包提供转发路径。如果站是移动的(例如,移动电话或笔记本电脑),每当移动终端(MT)连接到新的交换机时,控制器需要更新SDN转发路径。这不仅会增加控制器的位置更新开销,还会增加主控制器和叶子开关(LS)之间的所有中间开关的位置更新开销。一些现有的研究工作考虑了SDN转发路径更新和第3层位置更新,每当MT附加一个新的LS。在我们的研究中,我们已经意识到,如果通过SDN管理移动IP,网络运营商将最终强加额外的位置更新成本。本文提出了一种新的覆盖SDN拓扑来管理MT的位置更新。在该贡献中,MT通过根交换机(RS)维护其位置更新,根交换机负责跟踪集群中MT的位置,只要MT处于集群(区域区域)内。但是,如果MT移出区域区域,在我们的建议中,将在主控制器上进行位置更新。数值分析结果表明,提出的基于覆盖拓扑的SDN位置更新机制可以显著降低位置更新成本。
{"title":"An Energy Efficient Mobility Management Mechanism in Software Defined Networking (SDN)","authors":"N. S. Shahrun, A. F. Y. Mohammed, Rudy Ramlie, S. Newaz, A. T. Wan","doi":"10.1109/ICCCEEE.2018.8515818","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515818","url":null,"abstract":"Software Delined Networking (SDN) has paved the way for cost effective, energy efficient, and flexible and dynamic network structure. In SDN, a controller sets routing path for the data plane consisting of several switches. If an incoming packet is not known to a switch, the switch needs to invoke the controller, in turn the controller facilitates forwarding path for that packet. In case when a station is mobile (e.g., mobile phone or laptop), the controller needs to update the SDN forwarding path whenever the Mobile Terminal (MT) gets attached with a new switch. This will result in increasing location update overhead at not only the controller but also all the intermediate switches between the main controller and Leaf Switch (LS). Some of the existing research efforts consider both SDN forwarding path update and Layer 3 location update whenever a MT attaches with a new LS. In our study, we have realized that if mobile IP over SDN is managed, a network operator will end up imposing additional location update cost. In this paper, a novel overlay SDN topology is proposed in order to manage location update of MTs. In this contribution, a MT maintains its location update with a Root Switch (RS), which is in charge of tracking location of MTs within a cluster of cells, as long as the MT stays within the cluster (regional area). However, if the MT moves out of the regional area, in our proposal, there will be a location update at the main controller. Results obtained through numerical analysis reveal that proposed overlay topology based location update mechanism in SDN can lead to reduced location update cost noticeably.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"80 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85835740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of Efficient Cyclic Redundancy Check-32 using FPGA 基于FPGA的高效循环冗余校验32设计
Mohamed Abdulnabi, Hisham Ahmed
In Data Integrity, Cyclic Redundancy Check (CRC) is error detection technique. CRC treat a group of binary bits of a message by dividing it by a fixed binary number, the resulted remainder is the checksum that will be attached to the message. On the receiver side the same division could be performed and the receiver can compare the remainder with the transmitted checksum. This paper explains the design of CRC32 that used in Ethernet using Field Programmable Gate Array (FPGA) Virtex-7. The design built based on lookup tables and slicing-by-16 algorithm that performed the calculations of the CRC32 in parallel. Xilinx ISE used as IDE and I-Sim used for the simulation. The resulted processing time is equal to 1.250 ns with low power consumption and low device utilization.
在数据完整性中,循环冗余校验(CRC)是一种错误检测技术。CRC通过将消息的一组二进制位除以一个固定的二进制数来处理它,结果的余数是附加到消息上的校验和。在接收端可以执行相同的除法,并且接收端可以将余数与传输的校验和进行比较。本文介绍了用现场可编程门阵列Virtex-7设计用于以太网的CRC32。该设计基于查找表和按16切片算法,并行执行CRC32的计算。采用Xilinx ISE作为IDE,采用I-Sim进行仿真。处理时间为1.250 ns,功耗低,器件利用率低。
{"title":"Design of Efficient Cyclic Redundancy Check-32 using FPGA","authors":"Mohamed Abdulnabi, Hisham Ahmed","doi":"10.1109/ICCCEEE.2018.8515877","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515877","url":null,"abstract":"In Data Integrity, Cyclic Redundancy Check (CRC) is error detection technique. CRC treat a group of binary bits of a message by dividing it by a fixed binary number, the resulted remainder is the checksum that will be attached to the message. On the receiver side the same division could be performed and the receiver can compare the remainder with the transmitted checksum. This paper explains the design of CRC32 that used in Ethernet using Field Programmable Gate Array (FPGA) Virtex-7. The design built based on lookup tables and slicing-by-16 algorithm that performed the calculations of the CRC32 in parallel. Xilinx ISE used as IDE and I-Sim used for the simulation. The resulted processing time is equal to 1.250 ns with low power consumption and low device utilization.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"22 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87403735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design of Vehicle Tracking System 车辆跟踪系统的设计
E. O. Elamin, Wadah.M. Alawad, Elwasila Yahya, Abdallah Abdeen, Y. M. Alkasim
in this paper, a vehicle tracking system has been person is drunk, after identify them the sensor will stop the car proposed utilizing the Global Position System ’GPS” takes the information work in regular basis via satellite, and the Global System for Mobile communication ’GSM” to send and receive data between the user and the system. The interaction between the user and the car is designed to be via Short Message System “SMS”. As well as in case of theft or scope of work departure, the user has the capability of turning car engine off remotely. Although, alcohol sensor is used to switch off the car in case of drunk driver. To keep save distance in front of the car, ultra-sonic sensor is used. The system has been design using computer software then hardware implemented, results have been obtained which showed accuracy in positioning and fast response to user commands.
本文设计了一种车辆跟踪系统,当有人醉酒后,传感器将自动停车,提出利用全球定位系统(GPS)通过卫星进行定期的信息采集工作,并利用全球移动通信系统(GSM)在用户和系统之间收发数据。用户和汽车之间的交互被设计为通过短信系统“SMS”。此外,在发生盗窃或工作范围偏离时,用户还可以远程关闭汽车发动机。虽然,酒精传感器是用来关闭汽车,以防醉酒司机。为了保持与汽车前方的距离,使用了超声波传感器。该系统采用计算机软件设计和硬件实现,取得了定位准确、对用户指令响应快的效果。
{"title":"Design of Vehicle Tracking System","authors":"E. O. Elamin, Wadah.M. Alawad, Elwasila Yahya, Abdallah Abdeen, Y. M. Alkasim","doi":"10.1109/ICCCEEE.2018.8515767","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515767","url":null,"abstract":"in this paper, a vehicle tracking system has been person is drunk, after identify them the sensor will stop the car proposed utilizing the Global Position System ’GPS” takes the information work in regular basis via satellite, and the Global System for Mobile communication ’GSM” to send and receive data between the user and the system. The interaction between the user and the car is designed to be via Short Message System “SMS”. As well as in case of theft or scope of work departure, the user has the capability of turning car engine off remotely. Although, alcohol sensor is used to switch off the car in case of drunk driver. To keep save distance in front of the car, ultra-sonic sensor is used. The system has been design using computer software then hardware implemented, results have been obtained which showed accuracy in positioning and fast response to user commands.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"135 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84028263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1