首页 > 最新文献

2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)最新文献

英文 中文
A low-cost fuel selling machines using RFID and IoT technology 使用RFID和物联网技术的低成本燃料销售机器
Hamid Mohammed Almaden, A. F. Samaha Mansoor, Al-Hassan Al-Faith Al-Hassan, Gamer Al-TayebAhmad, A. K. Ali, Mysoon Siding Ali
Technological development is growing rapidly worldwide, so many machines, factories, and even homes use these technologies.The target of this paper is to avoid Cars congestion and long waiting in the queue of fuel pumps, excessive employment. The commission is not available financially. And lack of reliability in the sales system. The automatic implementation of the technological systems is very useful for the security and confidentiality of the mechanisms andfactories in particular with respect to access to devices and the user authorized to carry outspecific operations. In this work, an automatic fuel selling machine system is designed using the Radio Frequency Identification RFID device and The Internet of Things technology. The designed system is providing fast filling of fuel, ease in financial transactions, and more secure by checking the rights of access to the device using the RFID card read bythe reader. In addition, the system allows the possibility of monitoring the access to the fuel station and offer a special graphical user interface to the service provider.
世界范围内科技发展迅速,许多机器、工厂甚至家庭都在使用这些技术。本文的研究目标是避免汽车拥堵和长时间排队等油泵,过度就业。该委员会没有资金。销售系统缺乏可靠性。技术系统的自动执行对于机制和工厂的安全性和保密性非常有用,特别是在访问设备和授权执行特定操作的用户方面。本文采用射频识别技术和物联网技术,设计了一种自动售油机系统。设计的系统提供了快速加油,方便金融交易,并且通过使用读取器读取的RFID卡来检查设备的访问权限,从而提高了安全性。此外,该系统允许监控进入加油站的可能性,并为服务提供商提供一个特殊的图形用户界面。
{"title":"A low-cost fuel selling machines using RFID and IoT technology","authors":"Hamid Mohammed Almaden, A. F. Samaha Mansoor, Al-Hassan Al-Faith Al-Hassan, Gamer Al-TayebAhmad, A. K. Ali, Mysoon Siding Ali","doi":"10.1109/ICCCEEE.2018.8515783","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515783","url":null,"abstract":"Technological development is growing rapidly worldwide, so many machines, factories, and even homes use these technologies.The target of this paper is to avoid Cars congestion and long waiting in the queue of fuel pumps, excessive employment. The commission is not available financially. And lack of reliability in the sales system. The automatic implementation of the technological systems is very useful for the security and confidentiality of the mechanisms andfactories in particular with respect to access to devices and the user authorized to carry outspecific operations. In this work, an automatic fuel selling machine system is designed using the Radio Frequency Identification RFID device and The Internet of Things technology. The designed system is providing fast filling of fuel, ease in financial transactions, and more secure by checking the rights of access to the device using the RFID card read bythe reader. In addition, the system allows the possibility of monitoring the access to the fuel station and offer a special graphical user interface to the service provider.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"15 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73702779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Software Change Request: A Road Map for Implementation 软件变更请求:实现的路线图
A. Hamid
Most of software development time is consumed in software evolution and maintenance so as to respond to the growing business needs and to fix the newly discovered bugs. In this paper an approach for software change request implementation is examined. Then a road map is developed to accelerate planning, analysis and decision making process a matter that reduces the implementation effort in terms of time and quality.
软件开发的大部分时间都花费在软件的演进和维护上,以响应不断增长的业务需求和修复新发现的错误。本文研究了一种软件变更请求实现的方法。然后开发一个路线图,以加速计划、分析和决策过程,从而在时间和质量方面减少实施工作。
{"title":"Software Change Request: A Road Map for Implementation","authors":"A. Hamid","doi":"10.1109/iccceee.2018.8515787","DOIUrl":"https://doi.org/10.1109/iccceee.2018.8515787","url":null,"abstract":"Most of software development time is consumed in software evolution and maintenance so as to respond to the growing business needs and to fix the newly discovered bugs. In this paper an approach for software change request implementation is examined. Then a road map is developed to accelerate planning, analysis and decision making process a matter that reduces the implementation effort in terms of time and quality.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"76 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76443043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Power-law Degree Distribution Consistency in the AS-level Internet Topology as级Internet拓扑的幂律度分布一致性
Lubna Basheir
This paper reports the finding that power-law degree distributions are consistent in the AS-level Internet topology throughout its lifetime, mainly after Internet commercialization. This result is based on analyzing topology data collected by CAIDA from 2000 to 2017. Power-law degree distribution is an indicator of asymmetry between ASs in acquiring links. The continued presence of this asymmetry is graphically and quantitatively characterized using Lorenz curve and Gini coefficient. Results show that Gini coefficient has not changed significantly through Internet development, recording high values ranging between 0.80 and 0.84. The study concludes that degree distribution asymmetry is a persistent quality of the evolving AS-level Internet topology, making the Internet hierarchical structure inherent.
本文报告了在as级互联网拓扑的整个生命周期中幂律度分布是一致的,主要是在互联网商业化之后。该结果基于对CAIDA 2000年至2017年收集的拓扑数据的分析。幂律度分布是asa获取链接不对称的一个指标。使用洛伦兹曲线和基尼系数对这种不对称的持续存在进行了图形化和定量表征。结果表明,随着互联网的发展,基尼系数并没有发生显著变化,在0.80 ~ 0.84之间出现了较高的数值。研究认为,程度分布不对称是as级互联网拓扑结构演变的一个持续特征,使得互联网的层次结构成为固有的。
{"title":"Power-law Degree Distribution Consistency in the AS-level Internet Topology","authors":"Lubna Basheir","doi":"10.1109/ICCCEEE.2018.8515834","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515834","url":null,"abstract":"This paper reports the finding that power-law degree distributions are consistent in the AS-level Internet topology throughout its lifetime, mainly after Internet commercialization. This result is based on analyzing topology data collected by CAIDA from 2000 to 2017. Power-law degree distribution is an indicator of asymmetry between ASs in acquiring links. The continued presence of this asymmetry is graphically and quantitatively characterized using Lorenz curve and Gini coefficient. Results show that Gini coefficient has not changed significantly through Internet development, recording high values ranging between 0.80 and 0.84. The study concludes that degree distribution asymmetry is a persistent quality of the evolving AS-level Internet topology, making the Internet hierarchical structure inherent.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"42 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78165234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Whole-Body Bone Scan Image Enhancement Algorithms 全身骨扫描图像增强算法
S. M. S. Zobly, M. A. El-Fadel
The main problem in nuclear medicine imaging system is the resulting images degraded with large amounts of noise. In this work we want use four different enhancement methods to enhance whole-body bone scan image so as to reduce the noise from the image and improve the resolution to achieve a better image quality and maintain quality for accurate diagnosis. Different enhancement methods and two pair bone scan images used to perform this work. The enhancement algorithms are successfully demonstrated on real bone scan images.
核医学成像系统存在的主要问题是产生的图像存在大量的噪声。在这项工作中,我们希望使用四种不同的增强方法来增强全身骨扫描图像,以减少图像中的噪声,提高分辨率,以获得更好的图像质量,并保持准确诊断的质量。使用不同的增强方法和两对骨扫描图像来完成这项工作。该增强算法在真实骨扫描图像上得到了成功的验证。
{"title":"Whole-Body Bone Scan Image Enhancement Algorithms","authors":"S. M. S. Zobly, M. A. El-Fadel","doi":"10.1109/ICCCEEE.2018.8515836","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515836","url":null,"abstract":"The main problem in nuclear medicine imaging system is the resulting images degraded with large amounts of noise. In this work we want use four different enhancement methods to enhance whole-body bone scan image so as to reduce the noise from the image and improve the resolution to achieve a better image quality and maintain quality for accurate diagnosis. Different enhancement methods and two pair bone scan images used to perform this work. The enhancement algorithms are successfully demonstrated on real bone scan images.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"107 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77626689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Application of Six Sigma Methodology in Software Development 六西格玛方法论在软件开发中的应用
A. Hamid
Six Sigma is a problem solving methodology supported by set of techniques intended to improve business processes by reducing the probability of defect occurrence. The name Six Sigma is originated from the statistical term standard deviation (Greek letter sigma); this statistical term measures the variations in data. The first use of Six Sigma methodology targeted driving the processes toward six standard deviations between the mean and the nearest specification limit; this was the root for the name Six. This paper studies the application of Six Sigma methodology in software development since this methodology is proven in manufacturing as a method of eliminating defects in final products and reducing their variations.
六西格玛是一种解决问题的方法,由一组旨在通过减少缺陷发生的概率来改进业务流程的技术所支持。六西格玛这个名字来源于统计术语标准差(希腊字母Sigma);这个统计术语用来衡量数据的变化。第一次使用六西格玛方法的目标是将过程推向平均值和最接近的规格限制之间的六个标准差;这是Six这个名字的词根。本文研究了六西格玛方法在软件开发中的应用,因为这种方法在制造中被证明是一种消除最终产品缺陷并减少其变化的方法。
{"title":"Application of Six Sigma Methodology in Software Development","authors":"A. Hamid","doi":"10.1109/ICCCEEE.2018.8515773","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515773","url":null,"abstract":"Six Sigma is a problem solving methodology supported by set of techniques intended to improve business processes by reducing the probability of defect occurrence. The name Six Sigma is originated from the statistical term standard deviation (Greek letter sigma); this statistical term measures the variations in data. The first use of Six Sigma methodology targeted driving the processes toward six standard deviations between the mean and the nearest specification limit; this was the root for the name Six. This paper studies the application of Six Sigma methodology in software development since this methodology is proven in manufacturing as a method of eliminating defects in final products and reducing their variations.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"26 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81739430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Effect of the Initial Retransmission Timeout upon the Dictionary Attack Delay 初始重传超时对字典攻击延迟的影响
Ayman Mohammed Muzzamail Albashear, H. Ali
this paper focuses on the effects of the TCP Initial Retransmission Timeout (RTO) and Round Trip Time (RTT) on one hand and the dictionary attack on the other hand. A dictionary attack model of two servers has been programmed and applied using TCL language. The delay time to find the correct password in the dictionary has been assigned to NS2 simulation network. The value of the initial RTO has been set to 0.5, 1, 3, 5, 10 seconds, with Round Trip Times (RTT) of 1, 5, 10, 20, and 50 milliseconds in the simulated network to study different situations. The results obtained were found to be consistent with previous findings associated to initial RTO values between 0.5s to Is for network performance. The additional values introduced here are for network security purposes as they represent the best values for which the attacker finds difficulty to accomplish dictionary attack.
本文重点研究了TCP初始重传超时(RTO)和往返时间(RTT)以及字典攻击的影响。利用TCL语言编写并实现了两台服务器的字典攻击模型。在字典中查找正确密码的延迟时间已分配给NS2仿真网络。初始RTO设置为0.5、1、3、5、10秒,模拟网络中的RTT (Round Trip Times)设置为1、5、10、20、50毫秒,以研究不同的情况。我们发现得到的结果与之前关于网络性能的初始RTO值在0.5s到Is之间的发现一致。这里介绍的附加值是出于网络安全的目的,因为它们代表了攻击者难以完成字典攻击的最佳值。
{"title":"The Effect of the Initial Retransmission Timeout upon the Dictionary Attack Delay","authors":"Ayman Mohammed Muzzamail Albashear, H. Ali","doi":"10.1109/ICCCEEE.2018.8515765","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515765","url":null,"abstract":"this paper focuses on the effects of the TCP Initial Retransmission Timeout (RTO) and Round Trip Time (RTT) on one hand and the dictionary attack on the other hand. A dictionary attack model of two servers has been programmed and applied using TCL language. The delay time to find the correct password in the dictionary has been assigned to NS2 simulation network. The value of the initial RTO has been set to 0.5, 1, 3, 5, 10 seconds, with Round Trip Times (RTT) of 1, 5, 10, 20, and 50 milliseconds in the simulated network to study different situations. The results obtained were found to be consistent with previous findings associated to initial RTO values between 0.5s to Is for network performance. The additional values introduced here are for network security purposes as they represent the best values for which the attacker finds difficulty to accomplish dictionary attack.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"86 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82071552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Satellite Orbit Determination and Tracking Model Using Two-Line Elements Set 基于双线元集的卫星定轨与跟踪模型
Ahmed Abdelkarim Yassin Abdelkarim, Mahmoud Esawi Babikir Osman, S. Babiker
Satellites play great role in our life; they are used to perform many tasks that couldn’t be achieved without them. When the satellite launch to its orbit and in order to achieve its mission, the satellite needs to communicate with the ground station to receive the commands and instructions and also send its information to the ground station, but the ground station can’t communicate with the satellite directly before precisely determine its location. Hence, the objective of this research is to design and implement satellite tracking model to determine and track precisely the position of the satellite in its orbit in order to allow the ground station to communicate directly with it using the Two Line Elements Set which are unique for each satellite and need to be accurately specified. This tracking model was designed and developed in three phases: inputs phase, prediction phase and outputs phase. It include graphical user interface that shows illustration of satellite position in its orbit and also shows the value of all necessary data that are required to track the satellite and to predict its motion track.
卫星在我们的生活中扮演着重要的角色;它们被用来完成许多没有它们就无法完成的任务。当卫星发射到轨道上,为了完成任务,卫星需要与地面站通信,接收命令和指令,并将其信息发送给地面站,但地面站在精确确定其位置之前无法与卫星直接通信。因此,本研究的目的是设计并实现卫星跟踪模型,以精确确定和跟踪卫星在其轨道上的位置,以便地面站使用每颗卫星唯一且需要精确指定的Two Line Elements Set与卫星直接通信。该跟踪模型分为三个阶段:输入阶段、预测阶段和输出阶段。它包括图形用户界面,显示卫星在轨道上的位置说明,并显示跟踪卫星和预测其运动轨迹所需的所有必要数据的值。
{"title":"Satellite Orbit Determination and Tracking Model Using Two-Line Elements Set","authors":"Ahmed Abdelkarim Yassin Abdelkarim, Mahmoud Esawi Babikir Osman, S. Babiker","doi":"10.1109/ICCCEEE.2018.8515784","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515784","url":null,"abstract":"Satellites play great role in our life; they are used to perform many tasks that couldn’t be achieved without them. When the satellite launch to its orbit and in order to achieve its mission, the satellite needs to communicate with the ground station to receive the commands and instructions and also send its information to the ground station, but the ground station can’t communicate with the satellite directly before precisely determine its location. Hence, the objective of this research is to design and implement satellite tracking model to determine and track precisely the position of the satellite in its orbit in order to allow the ground station to communicate directly with it using the Two Line Elements Set which are unique for each satellite and need to be accurately specified. This tracking model was designed and developed in three phases: inputs phase, prediction phase and outputs phase. It include graphical user interface that shows illustration of satellite position in its orbit and also shows the value of all necessary data that are required to track the satellite and to predict its motion track.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"116 2 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76862624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Design of an Automated Fertigation System Using IoT 基于物联网的自动化施肥系统设计
Omer Mohamed Elhassan Ahmed, Abdalla A. Osman, Sally Dafaalla Awadalkarim
In Sudan, unfortunately, farmers still use traditional methods of farming management leading to inputs wastages and low production due inaccurate types and amount of fertilizers applied to the field which depends upon soil analysis and plant yield. And the process of determining the type of fertilizers according to the soil analysis results takes a long time. The main objective of this paper is to overcome the above-mentioned problems by designing an automated fertigation system based on the internet of things (IoT). Water use efficiency (WUE) is achieved and controlled by using moisture sensor when the soil moisture drops below 30% is opened and closes when it reaches 70% (preset data according to plant needs). The fertilization control is the process of adjusting the potential of Hydrogen (pH) and soil electrical conductivity (EC) as in preset database and thereby acidity and alkalinity. In addition to that, the plant root zone is controlled as required. When the system is applied, it improves water and fertilizer use efficiencies and thus saves effort, money, time, energy, increases production, and productivity.
不幸的是,在苏丹,农民仍然使用传统的农业管理方法,由于田间施用的肥料种类和数量不准确,这取决于土壤分析和植物产量,导致投入物浪费和产量低。根据土壤分析结果确定肥料种类的过程耗时较长。本文的主要目的是通过设计一种基于物联网(IoT)的自动化施肥系统来克服上述问题。水分利用效率(WUE)是在土壤水分低于30%时使用水分传感器实现和控制的,当土壤水分达到70%时开启,当土壤水分达到70%时关闭(根据植物需要预设数据)。施肥控制是调节预设数据库中土壤的氢电位(pH)和土壤电导率(EC),从而调节土壤的酸碱度的过程。除此之外,根据需要对植物根区进行控制。当应用该系统时,它提高了水和肥料的使用效率,从而节省了精力、金钱、时间和能源,提高了产量和生产率。
{"title":"A Design of an Automated Fertigation System Using IoT","authors":"Omer Mohamed Elhassan Ahmed, Abdalla A. Osman, Sally Dafaalla Awadalkarim","doi":"10.1109/ICCCEEE.2018.8515772","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515772","url":null,"abstract":"In Sudan, unfortunately, farmers still use traditional methods of farming management leading to inputs wastages and low production due inaccurate types and amount of fertilizers applied to the field which depends upon soil analysis and plant yield. And the process of determining the type of fertilizers according to the soil analysis results takes a long time. The main objective of this paper is to overcome the above-mentioned problems by designing an automated fertigation system based on the internet of things (IoT). Water use efficiency (WUE) is achieved and controlled by using moisture sensor when the soil moisture drops below 30% is opened and closes when it reaches 70% (preset data according to plant needs). The fertilization control is the process of adjusting the potential of Hydrogen (pH) and soil electrical conductivity (EC) as in preset database and thereby acidity and alkalinity. In addition to that, the plant root zone is controlled as required. When the system is applied, it improves water and fertilizer use efficiencies and thus saves effort, money, time, energy, increases production, and productivity.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"76 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77187701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
An Enhancement of Data Encryption Standards Algorithm (DES) 数据加密标准算法(DES)的改进
Nadia Mustafa Mohammed Alhag, Y. Mohamed
The Data Encryption Standard (DES) algorithm has been considered as the most popular symmetric key, blocks ciphering cryptographic. Even though the DES algorithm had still been used in some applications, it was considered unsafe because of the short key length (64 Bits), besides, the Brute force attack has shown that the DES practically can be attacked. In January 1999, the DES key was cracked in only (22 hours) and (15 minutes). The aim of this research is to improve the DES algorithm by increasing the key length (1024 bits) that is to be divided into 16 keys (64 bits each), each key is independently generated for the different algorithm cycles. The results of the proposed algorithm were much better than the old algorithm for detecting the encryption key or the total number of keys that could be generated by following Blind search method (try all possible keys), Increasing the key length (degree of complexity) makes it difficult to search in a vast space of numbers and attempts.
数据加密标准(DES)算法一直被认为是目前最流行的对称密钥算法,用于分组加密。尽管DES算法仍然在一些应用中使用,但由于密钥长度短(64位),它被认为是不安全的,而且暴力破解攻击表明DES实际上是可以被攻击的。1999年1月,DES密钥仅在(22小时)和(15分钟)内被破解。本研究的目的是通过增加密钥长度(1024位)来改进DES算法,将密钥长度分成16个密钥(每个密钥64位),每个密钥是针对不同的算法周期独立生成的。在检测加密密钥或采用盲搜索法(尝试所有可能的密钥)可以生成的密钥总数时,本文算法的结果比旧算法好得多,增加了密钥长度(复杂度),使得在大量的数字和尝试空间中搜索变得困难。
{"title":"An Enhancement of Data Encryption Standards Algorithm (DES)","authors":"Nadia Mustafa Mohammed Alhag, Y. Mohamed","doi":"10.1109/ICCCEEE.2018.8515843","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515843","url":null,"abstract":"The Data Encryption Standard (DES) algorithm has been considered as the most popular symmetric key, blocks ciphering cryptographic. Even though the DES algorithm had still been used in some applications, it was considered unsafe because of the short key length (64 Bits), besides, the Brute force attack has shown that the DES practically can be attacked. In January 1999, the DES key was cracked in only (22 hours) and (15 minutes). The aim of this research is to improve the DES algorithm by increasing the key length (1024 bits) that is to be divided into 16 keys (64 bits each), each key is independently generated for the different algorithm cycles. The results of the proposed algorithm were much better than the old algorithm for detecting the encryption key or the total number of keys that could be generated by following Blind search method (try all possible keys), Increasing the key length (degree of complexity) makes it difficult to search in a vast space of numbers and attempts.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"23 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78454767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Enhancing The Accuracy of GPS Point Positioning by Modeling the Ionospheric Propagation Delay 利用电离层传播延迟模型提高GPS点定位精度
Abubakr Albashir, Kamal Abdellatif Sami, Mohammed Ahmedeltigani
The ionospheric propagation delay is one of the major error sources in GPS positioning. This effect is as a result of the fact that the GPS signals are affected by the ionized layer of the ionosphere. Subsequently, the signal reception time will be delayed, which causes an increase in the measured pseudo-ranges and phase measurements of GPS observables.In this paper the linear combination observables technique was used to estimate the ionospheric propagation delay effect on the measured pseudo-ranges and GPS point positioning. The use of the free linear combination technique was found to reduce the ionospheric propagation effects significantly.
电离层传播延迟是GPS定位的主要误差源之一。这种效应是由于GPS信号受到电离层电离层的影响。随后,信号接收时间会延迟,导致GPS观测值的伪距离和相位测量值增加。本文利用线性组合观测值技术估计电离层传播延迟对测量伪距离和GPS点定位的影响。使用自由线性组合技术可以显著降低电离层传播效应。
{"title":"Enhancing The Accuracy of GPS Point Positioning by Modeling the Ionospheric Propagation Delay","authors":"Abubakr Albashir, Kamal Abdellatif Sami, Mohammed Ahmedeltigani","doi":"10.1109/ICCCEEE.2018.8515792","DOIUrl":"https://doi.org/10.1109/ICCCEEE.2018.8515792","url":null,"abstract":"The ionospheric propagation delay is one of the major error sources in GPS positioning. This effect is as a result of the fact that the GPS signals are affected by the ionized layer of the ionosphere. Subsequently, the signal reception time will be delayed, which causes an increase in the measured pseudo-ranges and phase measurements of GPS observables.In this paper the linear combination observables technique was used to estimate the ionospheric propagation delay effect on the measured pseudo-ranges and GPS point positioning. The use of the free linear combination technique was found to reduce the ionospheric propagation effects significantly.","PeriodicalId":6567,"journal":{"name":"2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)","volume":"340 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77664891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1