Accepted papers

  • RC4-MAC: An RC4 based Message Authentication Code Algorithm
    Qian Yu and Chang N. Zhang, University of Regina, Canada
    ABSTRACT
    This paper proposes a new construction called RC4-MAC, for producing cryptographic message authentication code. It is an attempt to design a cryptographic message authentication code algorithm based on the RC4 stream cipher. Moreover, RC4-MAC is suitable for ultra-low power devices, such as sensor nodes, which are normally equipped with an 8-bit processor and most other message authentication code algorithms cannot be implemented efficiently or are not applicable. RC4-MAC can run much faster compared to the existing well-known message authentication code algorithms and is exceptionally fast on 8-bit processors.
  • An Adaptive Genetic Algorithm Applied to Single Machine Total Weighted Tardiness Problem
    Lamiche Chaabane,university of M’sila, Algeria
    ABSTRACT
    In this research work, we propose an adaptive genetic algorithm to minimize the sum of weighted tardiness on a single machine, which is a strong NP-hard problem. The algorithm uses the natural permutation representation of a chromosome, an hybrid technique between Multiple Small-Popsize Initialization Strategy (MSPIS) and EDD heuristic dispatching rule to create the initial population, an intelligent technique in crossover step and insertion strategy as a mutation operator to improve individuals of the population during generations. Some results are presented and discussed.
  • Features Extraction Methods for the Handwritten Words of the Algerian Departments
    Salim OUCHTATI1, Jean SEQUEIRA2, Mouldi BEDDA3,1University of August 20, 1955 Skikda, Algeria,2Aix Marseille University, France and 3El-Jouf University, Saudi Arabia
    ABSTRACT
    In the context of the handwriting recognition, we propose an off line system for the recognition of the Arabic handwritten words of the Algerian departments. The study is based mainly on the evaluation of neural network performances, trained with the gradient back propagation algorithm. The used parameters to form the input vector of the neural network are extracted on the binary images of the handwritten word by several methods: the Distribution parameters, the centered moments of the different projections of the different segments, the centered moments of the word image coding according to the directions of Freeman, and the Barr features applied on the whole binary image of the word and on its different segments. The classification is achieved by a multi layers perceptron. A detailed experiment is carried and satisfactory recognition results are reported.
  • Boolean Orthogonalizing Combination Methods
    Yavuz Can and Georg Fischery,Friedrich-Alexander University Erlangen-Nuremberg, Germany
    ABSTRACT
    In this paper a new logical operation method called \orthogonalizing di erence-building\ is presented. It is used to calculate the di erence, but also the complement of a function as well as the EXOR and EXNOR of two minterms respectively two ternary-vectors or two functions respectively two ternary-vector-lists is presented. On the basis of this new method a further logical operation method called \orthogonal OR-ing\ is going to be introduced. The advantages of both methods are their results, which are already available in an orthogonal form that has an essential advantage for continuing calculations. Since it applies, an orthogonal disjunctive normal form is equal to orthogonal antivalence normal form, subsequent Boolean di erential calculus will be simplifed.
  • Two-Layer Crystal Square for Transistors On A Single Chip
    Haissam El-Aawar,Lebanese International University,Lebanon
    ABSTRACT
    The number of transistors on a chip plays the main role in increasing the speed and performance of a microprocessor; more transistors, more speed. Increasing the number of transistors will be limited due to the design complexity and density of transistors. This article aims to introduce a new approach to increasing the number of transistors on a chip. The basic idea is to construct two-layer crystal square for transistors; this allows to increase the number of transistors two additional times (four times as many) if the number of transistors incorporated in a one layer of crystal square will approximately double every 24 months according to Moore’s Law without changing rapidly the design complexity and density in a crystal square and without changing the size of a chip (length and width), in this case the height of a chip must be changed for the two layers.
  • Testing Abstract Data Types
    Amal Awad Mirghani Yassin,University of Gezira,Sudan
    ABSTRACT
    Whereas software testing is known to be able to prove the presence of faults, but not their absence, it can also be used to build a statistical argument regarding the likelihood of failure free operation. In this paper, we elaborate on this argument to present a testing method that is part of an integrated software validation process, whereby testing and proving methods play complementary roles in advancing product quality.
  • Plagiarism: A Threat to Intellectual Property Rights
    Ruchi Tuli,Jubail University College,Saudi Arabia
    ABSTRACT
    Plagiarism, in general sense, is making one's original idea as your own. One can say that it is a form of cheating as it steals and implicitly attack one's intellectual property rights. Plagiarism is generally defined as “Academic Dishonesty “and can be considered as one of the electronic crimes. Thus it is important to develop effective approaches to detect plagiarism. This paper presents some common software tools for detecting the plagiarism. The tools are then compared qualitatively on various parameters. At the end, the pros and cons of the different tools are also described.
  • An Android Application for Volunteer Blood Donors
    Sultan Turhan,Galatasaray University,Turkey
    ABSTRACT
    There is an expectation that the blood will always be there when it is really needed. Blood donor volunteers constitute the main supply source in an effective blood supply chain management. They feed blood stocks through their donation. In an emergency situation, if the stocks are insufficient, the only source of blood supply will be the people who come to the health center and donate the blood on a voluntary basis. It is certain that time is a very important component in such situation. For this reason, the health care center should call the nearest available donor in order to ensure to get the service as quickly as possible. A smart phone application is developed to facilitate the identification of the nearest available blood donor volunteer and the communication with him/her in the emergency situations where the blood can’t be supplied through the blood banks’ stocks. In this paper this application will be presented. .
  • Dynamic Multi Threshold Priority Packet Scheduling Algorithms for Wireless Sensor Networks
    Sezer Uzungenç and Tamer Dağ, Kadir Has University,Turkey
    ABSTRACT
    In Wireless Sensor Networks, it is needed to schedule different types of packets such as real time and non-real time packets. It is important to reduce sensors’ energy consumptions and end-to-end data transmission delays. In this paper, we propose new packet scheduling algorithms and integrate with Wireless Sensor Networks to improve energy consumptions and end-to-end data transmission delays. Our proposed Dynamic Multi Threshold Priority packet scheduling algorithms ensure a decrease in delay time and loss ratio for the lower priority level data with acceptable fairness towards higher priority level data. Threshold algorithms are compared with the commonly used scheduling algorithms such as First-Come-First-Serve (FCFS) and fixed priority non-preemptive. Simulation results illustrate that the Dynamic Multi Threshold Priority packet scheduling algorithms can provide a better QoS for low priority packets while keeping the QoS levels for high priority packets at similar levels.
  • The Design and Implement Of Variable Radius Sphere Decoding Algorithm
    Wu Di,Li Dezhi and Wang Zhenyong,Harbin Institute of Technology,China
    ABSTRACT

    Sphere Decoding (SD) algorithm is an implement decoding algorithm based on Zero Forcing (ZF) algorithm in the real number field. The classical SD algorithm is famous for its outstanding Bit Error Rate (BER) performance and decoding strategy. The algorithm gets its maximum likelihood solution by recursive shrinking the searching radius gradually. However, it is too complicated to use the method of shrinking the searching radius in ground communication system. This paper proposed a Variable Radius Sphere Decoding (VR-SD) algorithm based on ZF algorithm in order to simplify the complex searching steps. Prove the advantages of VR-SD algorithm by analyzing from the derivation of mathematical formulas and the simulation of the BER performance between SD and VR-SD algorithm.

  • RCS Analysis on Different Targets and Bistatic Angles Using LTE Frequency
    Noor Hafizah A.A.1, Haziq Hazwan M.Y.1and Nur Emileen1 ,Raja Syamsul Azmir R.A.2, Asem S.2,1Universiti Teknologi MARA,Malayasia and2Universiti Putra Malaysia,Malayasia.
    ABSTRACT
    Moving target detection and location are a function of dependent bistatic Radar Cross Section (RCS) and radar design parameters which in our experimental study used long-term evolution (LTE) signal as a source for passive bistatic radar (PBR). Moving target also can be classified in positions of different bistatic radar angles using conventional processing approaches which we performed a simulation using Computer Simulation Technology (CST) Microwave studio. The target bistatic radar cross-section, σb will give a realistic calculation on PBR performance with the requirement of complete treatment. The targets used are Toyota Rush (SUV) and Proton Exora (compact MPV) as a moving target had been designed based on the actual size to observe the performance of RCS due to the changing of bistatic angle between transmitter and receiver. The frequency transmit signal from LTE based station is 2.6 GHz, far-field conditions and the material used for the moving target is perfect electrical conductor. Simulation used different bistatic angles which are 590 and 900 of plane wave propagation. The simulation results show that largest area of moving target had better outcome that reliable with Babinet’s principle, which declares a target of physical cross-sectional area is proportionate to RCS. The variation of RCS also depends on the shape of moving target, size of moving target and angles of plane wave. This might improve the sensitivity elevation targets with an adjustment of receiver angle to the target and transmitter for a better RCS performance.

  • Power Control Schemes for Device-ToDevice Communications in 5G Mobile Network
    Grigor Mihaylov , Teodor Iliev , Elena Ivanova , Ivaylo Stoyanov and Lyuben Iliev,University of Ruse Angel Kanchev, Bulgaria
    ABSTRACT

    Device-to-device (D2D) communications integrated into cellular networks is a means to take advantage of the proximity of devices and thereby to increase the user bitrates and system capacity. D2D communications has recently been proposed for the 3GPP Long Term Evolution (LTE) system as a method to increase the spectrum- and energy-efficiency. Device-to-device (D2D) communication has the potential of increasing the system capacity, energy efficiency and achievable peak rates while reducing the end-to-end latency. To realize these gains, are proposed resource allocation (RA) and power control (PC) approaches that show near optimal performance in terms of spectral or energy efficiency