Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Routing Messages Protocol in Wireless Sensor Network Grids
1
13
EN
Ashraf
Hussein
Egyptian Armed Forces - Operation Research Center.
Mostafa
Sami
Computer science Department - Helwan University.
Hisham
Dahshan
Egyptian Armed Forces - Military Technical College.
10.21608/iceeng.2012.30565
Wireless Sensor Network Grids (WSNG) is considered one of the main four categories of wireless grids based on the devices predominant in the grid and the relative mobility of the devices in the grid. One of the important challenges in<br />WSNG is the routing of messages through the grid. This area is concerned with the reduction of power consumption but through efficient routing of messages. A second concern is the reduction of message latency. In this paper, we propose an<br />applicable routing messages protocol (RMP) which uses a multi-hop forwarding scheme to achieve long-range communication. Our RMP has three phases: firstly, the initialization phase where each sensor node determines the best first hop toward the Sink among its neighbors. Secondly, sending the best route phase where each node sends an accumulative routing message (ARM) to the sink includes the hops list. Thirdly, in the maintenance phase, the out of reach node sends a maintenance message (MARM) to create the alternative route to the Sink. The proposed RMP<br />provides a simple and applicable routing model for WSNG. It also makes the total energy consumed in data transmission more efficient in the sensor network and minimizes the node memory size and processing steps which reduces the total<br />network cost.
Wireless sensor network Grids,Sink,Sensor node
https://iceeng.journals.ekb.eg/article_30565.html
https://iceeng.journals.ekb.eg/article_30565_3ba3f33291a494ca3d34587763659f97.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
A COMPARATIVE STUDY BETWEEN SOME DESIGN ISSUES IN DISTRIBUTED SYSTEMS MIDDLEWARE BASED ON WEB SERVICES AND THEIR IMPACT IN FUTURE CHALLENGES
1
14
EN
Ahmed
M.
Matar
Department of Computers, M. T. C., Cairo, Egypt.
Khaled
M.
Badran
Department of Computers, M. T. C., Cairo, Egypt.
Moatassem
M.
Abdallah
Egyptian Armed Forces.
10.21608/iceeng.2012.30567
In this paper, we focus on some design issues in distributed systems Middleware based on Web services,and their impact in future challenges. Middleware performance, Scalability, Management and Ubiquity are considered some of the<br />most elite challenges facing the designers of future middleware systems. Middleware performance can degrade at some point, the scalability of the distributed application can be difficult to control, managing large heterogeneous applications arises many questions, and finally, mobility and dynamic reconfiguration of applications forms the ubiquity challenge. As a guide for middleware designers, we propose this comparative study between different well known middleware systems considering our proposed design features as points of comparison, besides analyzing their impact on the previously<br />mentioned challenges.
Database systems,Middleware systems,Web services,Naming,Binding
https://iceeng.journals.ekb.eg/article_30567.html
https://iceeng.journals.ekb.eg/article_30567_fce2486de5ef578241d42b624216f0f7.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Construction Path analysis Model from DNA Microarray Data
1
15
EN
A.
Mohmad Badr
Al Senousy
Prof. Dr. in Sadat Academy for Management Science (SAMS), Department of Computer
science.
B.
Hesham Mohamed
El-Deeb
Dr. in Modern University for Technology and Information (M.T.I), Department of Computer science.
C.
Khaled
Badran
Military Technical College (M.T.C), Department of Computer science.
D.
Ibrahim Ali
Al-Khlil
Military Technical Collage (M.T.C ), Department of Computer science.
10.21608/iceeng.2012.30569
A fundamental problem in human health is to predict the effect of genes that cause disease; this is an important step to diagnosis and treatment. Also prediction gene functions are still a challenge for biologists in the post-genomic era. DNA microarray simultaneously monitors expression levels thousands of genes; the massive gene expression data provide us with unique opportunities to analyze the functional and regulatory relationships among genes. In this paper, new approach to estimate the relationship among genes and the effects of each gene on diseases is proposed. This approach consists of four main steps: First, extract the subset of high informative genes. Second, constructing genes network; thus, we propose to predict a gene’s functions according to its context graph, which is defined as the gene interaction network composed of the genes interacting directly and indirectly based on focal gene. Third, path analysis model is used to estimate the effect of genes on the disease and among each other. Fourth, obtains the relation among genes and the target (disease) by applying logistic regression analysis for predict new samples. This approach evaluated by lung cancer Microarray dataset. The proposed path diagram fit the subset of top ranked genes expression dataset, the Goodness of Fit Index (GFI) was > 0.832. The value of this approach is that it not only tackles the measurement problem by path<br />analysis but also provides a visualization of the relationship among genes. The proposed approach also is useful for feature reduction, due to evaluate all genes simultaneously vs. lung state.
Microarray gene expression data,Genes selection,Genes ranking,Cancer,Genes network,path analysis,Pearson Correlation
https://iceeng.journals.ekb.eg/article_30569.html
https://iceeng.journals.ekb.eg/article_30569_5b91db0ab7c94b011b6e6d108a3809ce.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
A modified PSO technique for electrical engineering applications
1
12
EN
Magdi
El-Saadawi
Electrical Engineering Department, Faculty of Engineering, Mansoura
University, Mansoura, Egypt.
Ahmed
Hassan
Electrical Engineering Department, Faculty of Engineering, Mansoura
University, Mansoura, Egypt.
Mohammed
Saeed
Electrical Engineering Department, Faculty of Engineering, Mansoura
University, Mansoura, Egypt.
10.21608/iceeng.2012.30570
PSO is a promising optimization technique proved a high performability as an evolutionary algorithm. Sometimes the conversion of that algorithm is not faster enough because the PSO initial setting values of that algorithm are chosen randomly and varies as long as the domain of application is varied. By means of classic PSO does not care about the limits of those random initial values which impacts the computation time. This paper presents a proposed approach that could be used to modify PSO technique which adapts the PSO initial values and number of particles for any optimization problem. The proposed modification makes the PSO technique faster and more applicable for electrical online applications. In most electrical applications, time factor is very important especially for on line applications. Protective devices coordination problem is a tedious and a time consuming task. To tackle that point of research, one of two cases has to be taken. First case is to redesign the coordination system according to any system changes. The second one is to maintain the old coordination system unchanged up to a specific DG penetration level. The new approach is used to solve the protective devices coordination problem in presence of DG in the two cases. A comparison between the classic PSO and the proposed modified one shows that the new approach gives fast results and shortens the computation time.
Distributed generation,particle swarm optimization (PSO),coordination
https://iceeng.journals.ekb.eg/article_30570.html
https://iceeng.journals.ekb.eg/article_30570_dd6fef05789942ee01c15ea3aa3bdfe6.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Direct mapping of digital PID control algorithm to a custom FPGAbased MPSoC, the parallel digital PID (PDPID) controller
1
10
EN
Mohamed
Moanes
Faculty of Engineering, Minia University, Egypt.
Hassan
A.
Youness
Faculty of Engineering, Minia University, Egypt.
Mahmoud
Khaled
Faculty of Engineering, Minia University, Egypt.
10.21608/iceeng.2012.30572
New applications of digital embedded control systems require more advanced techniques that can fulfill increasing control requirements and to meet control constraints, such as reaching RT deadlines, while trying to achieve additional tasks like<br />auto-tuning of the parameters of control algorithm, conducting diagnostic-based operations or executing a fault-tolerance algorithm. Hence, Multiprocessors System on Chip (MPSoC) has been proposed as a promising solution. The main purpose of this paper is to put a step towards enhancing the legacy digital PID control algorithm by exploiting its inherent parallelism. We propose a direct-mapping design of the sequential digital PID to a custom Quad-Core Master-Slave MPSoC design, built-up using an enhanced FPGA Soft-Core microcontroller.
MPSoC,Embedded Control Systems and FPGA
https://iceeng.journals.ekb.eg/article_30572.html
https://iceeng.journals.ekb.eg/article_30572_7d3efc6c12f2fc08b64bd87a0be7bb6e.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
USING PRECISE POSITION CONTROL IN MEASURING SYSTEMS
1
21
EN
Walaa Eldeen
Ahmed
Ghadiry
Egyptian Armed Forces.
Mohamed
Mohamed
Sakr
PHD., Chef of electric power department, Cairo University, Giza, Egypt.
10.21608/iceeng.2012.30573
Motion control system is a system that has a special controller for controlling position, velocity or acceleration. In this paper the position control is concerned. A special application is introduced in detail which is the “gonio-photometer” laboratory which is used to measure the following:<br />a- Luminaire luminous intensity distribution.<br />b- Lamp luminous flux.<br />Position control of this application is concerned having a resolution angle (0.01 degree) with the aid of a dc servo motor system and PID controller in addition to the use of brakes for maintaining better results. Simulation and calculations of the system equations are held using Matlab program. An alternative method is introduced for the position control of the application under study, which is the use of stepper motors instead of dc servo motors.
Position Control,servo motors,goniophotometers,gear ratio,encoders,PID,brakes,stepper motors
https://iceeng.journals.ekb.eg/article_30573.html
https://iceeng.journals.ekb.eg/article_30573_22fd694f07fb6da9f062d0d9fdfba80c.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Control of Industrial Servo System in Presence of Motor-Load Inertia Mismatch using μ-synthesis
1
11
EN
Farid
A.
Tolbah
Professor of Automatic Control, Ain Shams University.
Magdy
M.
Abdelhameed
Professor of Mechatronics and Automatic Control, Ain Shams University.
Ahmed
Ramadan
Teaching Assistant, Ain Shams University.
10.21608/iceeng.2012.30576
There are a number of challenging factors that influence the performance of the industrial servo systems. One of these factors is the inertia mismatch between the motor and the load. Another problem is the variable-inertia load. This paper applies a robust control tool called μ-synthesis to design a controller which deals with the uncertainty of the inertia in the<br />load. Different practical experiments are presented to investigate the effect of some parameters in the synthesis process on the performance of the synthesized controller. Also simulations are included to introduce different values of inertia mismatch and study the effect of increasing inertia mismatch on the servo system performance. It has been found the robust controller can deal with variable parameter control problem with adequate weighting functions. Also the increased inertia mismatch has been found to slow the servo system down and demand higher control action.
Inertia mismatch,variable inertia,servo system,Robust Control,μ-synthesis,PMSM
https://iceeng.journals.ekb.eg/article_30576.html
https://iceeng.journals.ekb.eg/article_30576_1ffbb62485dbfa3262f1e795ecd65ea6.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Wind Energy: Past, Present and Future
1
28
EN
A.
A.
AbdElhafez
College of Engineering in Aldawadmi, Shaqra University, Aldawadmi, Kingdom
of Saudi Arabia.
J.
I.
AL-Sadey
Faculty of Engineering, Assiut University, Assiut, Egypt.
R.
M.
Al-Bouthigy
Faculty of Engineering, Assiut University, Assiut, Egypt.
10.21608/iceeng.2012.30642
The wind energy is a strong candidate for supplying the escalating world energy requirements. The wind energy enjoys: environmental compatibility, economical feasibility and sustainability. Although the commercial production of electricity from wind is commenced worldwide; however, the capability of Arabic nations to cope with the global move into replacing fossil fuels with the renewable energy sources is still under investigation. Therefore, this paper addresses the technical/ economical challenges of utilizing wind energy in Arabic world. Two study cases for Egypt and Yemen are considered for thoroughly investigation. These countries represent the major of the Arabic world in terms of shortage of fossil fuels and the increased demand on energy. The paper also presents a brief introduction into wind-based electricity. The main elements of wind-electrical power generation system are highlighted. A number of suggestions are proposed for increasing the share of wind energy in energy balance in Arabic world and in the countries under investigation.
Wind energy,Arabic World,Egypt,Yemen,Energy Share
https://iceeng.journals.ekb.eg/article_30642.html
https://iceeng.journals.ekb.eg/article_30642_fc6ea807aad2adff849352c93e8f3d86.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Evaluation of a Smart-Wire Approach for Congestion Management in Electrical Power Systems with Wind Generation
1
19
EN
A.
Elmitwally
Elect. Eng. Dept., Mansoura University, Mansoura 35516, Egypt.
10.21608/iceeng.2012.30643
This paper presents the distributed series reactor (DSR) as a low cost D-FACTS technology that can be easily clamped on working transmission lines at higher operational reliability and without the need of any communications or centralized<br />control. Smart wires are standard transmission lines that are augmented with a large number of DSRs. The paper addresses the potential of the emerging smart wire technology in improving the utilization and reliability of the existing transmission, sub transmission, and distribution networks. It proposes a smart-wire based strategy for planning power systems with increasing penetration level of wind generation. Moreover, the paper evaluates the potential of the smart-wire technology to reduce the required investment for congestion-free transmission system upgrading plan. The proposed approach is applied to the IEEE 39-bus and IEEE 57-bus test systems. Comparative analysis of results is provided for the classic and smart planning methods.
D-FACTS,smart-wire and transmission system upgrading
https://iceeng.journals.ekb.eg/article_30643.html
https://iceeng.journals.ekb.eg/article_30643_2aa8b1b9a945ddeee5ec64f0827332af.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Manufacturing a Yaw controlled Small Scale Wind Turbine in Egypt
1
8
EN
Ahmed
M.D.E.
Hassanein
Information and Systems Department, National Research Centre, Cairo, Egypt.
Karam
Maalawi
Mechanical Engineering Department, National Research Centre, Cairo, Egypt.
10.21608/iceeng.2012.30644
In this paper, we discuss the future plans of our research group at the National Research Center. One aim is put forward as our focus in this research work. We would like to make the manufacturing of small scale wind turbines possible in remote areas in Egypt using locally available parts and tools. Many internet sites and references are revised for the realization of this aim. A wide search for the know-how is underdone to understand how to build a similar prototype of a wind turbine to the ones found over the internet with the same properties or at least comparable to them. The different electrical components of a wind turbine and their functions are illustrated. The possibility of controlling the direction of the yaw of a wind turbine is explained and the effect of it on the overall performance of the wind turbine is shown.
Yaw Control,Wind turbine,Renewable Energy and Green Farms
https://iceeng.journals.ekb.eg/article_30644.html
https://iceeng.journals.ekb.eg/article_30644_093d0f5ffb5d77c6cb8d3b8b203cb454.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
New Encryption Method Based on Using The Kharaghani Array of Order 8
1
9
EN
Manal
A.
Shehab
Electrical Engineering Department, Faculty of Engineering, Alexandria University- Egypt.
Noha
O.
Korany
Electrical Engineering Department, Faculty of Engineering, Alexandria University- Egypt.
10.21608/iceeng.2012.30645
This paper suggests a new encryption method based on using the form and the properties of an orthogonal Hadamard array called the Kharaghani array of order 8. In this method; the used encryption key, the plaintext and the ciphertext values should be integers less than 256 to be presented in the form of the 8-bit binary representation. There are some constrains that restrict the chosen value for the encryption key, these constrains lead to have only 126 available values for the encryption key. The 126 encryption keys were checked on the available plaintext values and some concluded<br />notes and results were presented. The suggested encryption method has the advantage of being easy to implement because the construction of the Hadamard array is easy.
Encryption,Hadamard and Kharaghani array
https://iceeng.journals.ekb.eg/article_30645.html
https://iceeng.journals.ekb.eg/article_30645_8e4bd9cb7f6a645ece18e8d336c78406.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
New Steganographic Method for Data Hiding in the IP ID Field
1
14
EN
Manal
A.
Shehab
Electrical Engineering Department, Faculty of Engineering, Alexandria University- Egypt.
Noha
O.
Korany
Electrical Engineering Department, Faculty of Engineering, Alexandria University- Egypt.
10.21608/iceeng.2012.30646
Many covert channels could be generated by using different IP header fields to introduce data hiding schemes. This paper presents the scheme and the description of a new suggested steganographic method for data hiding in the IP ID field.<br />In the suggested method; an appropriate encryption algorithm and key could be used to encrypt the plaintext character so the ciphertext value could be presented in the form of the 8-bit binary representation and then could be embedded within the IP ID field using a new suggested embedding algorithm that uses pre-agreed key and direction. The method may be applied with either IPv4 or IPv6 packets. With IPv6; IP packet fragmentation is required by the packet source. In this method; the packet source should be the steganogram sender. The method has the advantages of being resistant to packet filtering and stateful inspection firewalls and it could be applied through different network scales and characteristics. To provide more confidentiality to the hidden data in the IP ID field; the paper suggests implementing the IPsec encryption in the tunnel mode between the steganogram sending and receiving gateways.
Steganographic,data hiding and IP ID field
https://iceeng.journals.ekb.eg/article_30646.html
https://iceeng.journals.ekb.eg/article_30646_f58b16e73e54b99b2394d5860b1f16ea.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
New Steganographic Method for Marking IP Stego Datagrams Based on the IP ID Field
1
8
EN
Manal
A.
Shehab
Electrical Engineering Department, Faculty of Engineering, Alexandria University - Egypt.
Noha
O.
Korany
Electrical Engineering Department, Faculty of Engineering, Alexandria University - Egypt.
10.21608/iceeng.2012.30647
Stego datagrams could be transmitted as a continuous traffic stream or they could be marked and mixed with normal datagrams, then transmitted from the steganogram sender to the steganogram receiver. The steganogram receiver would check for the mark to identify the stego datagrams and extract the hidden data from them. This paper suggests a new steganographic marking method with two scenarios to mark the IP stego datagrams using the IP ID field. This method could be used to mark the IP datagrams only and it requires from the packet source to be the steganogram sender. If<br />this method is used to mark the IPv6 packets, then the IP packet fragmentation is required by the packet source.
Stego,Steganographic,Data hiding,marking and IP ID field
https://iceeng.journals.ekb.eg/article_30647.html
https://iceeng.journals.ekb.eg/article_30647_214ec32369d9043ef462106e9e142090.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
New Steganographic Methods for Data Hiding in the Payloads of Marked IP Datagrams
1
21
EN
Manal
A.
Shehab
Electrical Engineering Department, Faculty of Engineering, Alexandria University - Egypt.
Noha
O.
Korany
Electrical Engineering Department, Faculty of Engineering, Alexandria University - Egypt.
10.21608/iceeng.2012.30648
The payload of a datagram carries the user data which is required to be transmitted from the source to the destination. So to hide sensitive data in a datagram payload; the data should be first encrypted or hashed then embedded in the payload. Furthermore; the datagram source needs to mark the stego datagrams and mix them with normal ones, and the datagram receiver needs to check for the mark to identify the stego datagrams and excludes them away from the received stream, and then decodes the hidden data. This paper suggests two steganographic methods for data hiding in the payloads of marked IP datagrams. The first suggested method uses an appropriate encryption algorithm and key to encrypt the plaintext blocks, then embeds the resulted ciphertext blocks in the payloads of marked IP packets. The second method hides data in the payloads of marked IP packets' fragments sets. In the second method; IP packet fragmentation is required as the fragment offset field of the fragment (except the first fragment) is used by an intelligent way to hash data blocks before embedding them in its corresponding fragment payload, encryption could be used as an option to encrypt the data before or after hashing it, the matter which provides different available scenarios for this method. The paper also briefly discusses the confidentiality effect of using the IPsec encryption with its different modes with each suggested steganographic method.
Steganographic,data hiding and mark
https://iceeng.journals.ekb.eg/article_30648.html
https://iceeng.journals.ekb.eg/article_30648_a19d7ebf1d482360af84ad3e85c215a6.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
A Performance Analysis Methodology of a Public Key Infrastructure
1
14
EN
Tarek
Abdel Mageed
Dr., E-Gov Security Consultant.
Asem
A
El- Ashqar
IT Consultant Engineer.
Ali
Ali
Fahmy
Prof., Cairo University, Faculty of Computer and Information.
10.21608/iceeng.2012.30649
Recent years have seen rapid growth in the number and scope of standards dealing with aspects of Public Key Infrastructures (PKIs). This has primarily been fuelled by the much increased interest in implementing PKIs, which is itself largely a result of the development of commercial and wider public use of the Internet, not least for ecommerce activities. With the growth in awareness of, and requirements for, PKIs, there has been a parallel increase in development effort devoted to standardizing all aspects of PKIs and PKI assessment measures helping the performance analysis of these PKIs. The potential benefits are clear, including the possibility of large scale interworking between PKIs, and lower costs through economies of scale and increased competition. This paper is devoted as a guide to present the assessment criteria of a PKI system providing the reader with different views of these assessment measures. The assessment measures applied to a PKI during this process have different perspectives. One of them is derived from The Information Security Committee (ISC) that published, in 2001, a draft of their PKI Assessment Guidelines (PAG) v0.30 for public comment which assumes that the set of policies, standards and procedures, as well as other PKI related documents, must be established before going onto the assessment procedures. The other perspective, relies on the ISO standard model published and have been used in the PKI assessment measures in many organization. The last perspective concentrates on the core of any PKI system, which is the security strength of this system and how to execute a security diagnosis to a PKI. In other words, can the organization trust it, through its continuous assessment procedures, as a secure system for its daily network communication transactions?. This paper organized so that it starts with a basic introductory part for the<br /> PKI system from different views, and continuing with explaining the components of a PKI system. Then exploring the different assessment visions to measure the performance analysis a PKI system such as PAG assessment guidelines, and the ISO 27001 standards, ending with an opinion to add some suggested security strength measures to the well known and published assessment measures for the performance analysis.
Performance analysis,public key infrastructure,and PKI
https://iceeng.journals.ekb.eg/article_30649.html
https://iceeng.journals.ekb.eg/article_30649_a60d04ecf43b3ff9ee5164f0ce45aa97.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Extracting High Quality Information From Under Sampled Images with Relative Motion Blur Using Non-blind Restoration Techniques: A Survey
1
21
EN
W.
M.
Hendawy
Technical Research Department.
G.
I.
Salama
Egyptian Armed Forces.
H.
A.
Hussein
Egyptian Armed Forces.
K.
I.
Hassanien
Technical Research Department.
10.21608/iceeng.2012.30650
Image degraded due motion blur is an ill-posed problem that still attracts many researchers to participate in solving such problem. The degraded image might suffer linear or nonlinear motion blur. It may also be due to the camera motion (spatial space invariant) or due to the motion of the target to be captured (spatially space variant). This paper focuses on images degraded due to linear motion blur due to the camera motion. A survey was done over several kernel estimation techniques such as Cepstral and Sinc function whom are classified under parameter estimation approach, and Fergus[1] and Krishnan[2] techniques who are classified under MAPh (Maximum A Posteriori over the kernel h) estimation approach. Experiments were applied over images samples suffering a synthetic blur and restored with several image restoration algorithms.
Image restoration,motion blur and kernel estimation
https://iceeng.journals.ekb.eg/article_30650.html
https://iceeng.journals.ekb.eg/article_30650_07f84fa1a2e2ef39f69064e289fa90d2.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Advanced image tracking techniques for target seeking
1
12
EN
Mohamed
Mamdouh
Egyptian Armed Forces.
Hussein
Saad
Egyptian Armed Forces.
Gouda
Ismail
Egyptian Armed Forces.
Tarek
Ahmed
Egyptian Armed Forces.
10.21608/iceeng.2012.30651
The primary goal of visual tracking is to provide a computerized system resembling the capabilities of the human eye. Motion detection is used in many applications and its integration as a facility within a vision system offers many potential benefits. We introduced an investigation of target tracking techniques; two different target tracking algorithms were implemented. The first is Covariance-based target tracking technique and the second is Hu Moments-based target tracking technique. The implemented tracking techniques were investigated and analyzed to determine which algorithm is<br />suitable. Both algorithms were enhanced by achieving segmentation process using the region growing technique and building an adaptive window size that surrounds the target to overcome the problem of scaling. The experimental results show that the enhancement was very efficient not only in target tracking but also in overcoming the occlusion problem.
Target tracking,Covariance matrix,Hu moments
https://iceeng.journals.ekb.eg/article_30651.html
https://iceeng.journals.ekb.eg/article_30651_18ef8b44c96d9a0c14a4272e0713d30b.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
QUALITY ASSESMENT OFWAVELET BASED IMAGE FUSION TECHNIQUES
1
17
EN
A.
M.
El Ejaily
Ph.D. student Libyan armed forces.
F.
El Tohamy
Ph.D. Egyptian armed forces.
M.
Y.
El Nahass
Prof. Alazhar University, Cairo, Egypt.
10.21608/iceeng.2012.30652
image fusion is a process of producing a single fused image from a set of input images. The fused image has enhanced information more than any of the input images In this paper a wavelet based image fusion experiments are carried out, and the impacts of changing various wavelet parameters on the quality of the fused image are investigated. The fusion of wavelet coefficients is done according to three algorithms. Fusion experiments are performed on QuickBird panchromatic (PAN) and multispectral (MS) images. In order to evaluate the quality of the fused images four quantitive measures of correlation coefficients, root mean square error, information entropy, and standard deviation are used. Fusion methods like IHS transform and brovey transform method are investigated, and their results are compared with that of our experiments based on the using of wavelet transform.
image fusion,Discrete Wavelet Transform,decomposition level,quality assessment
https://iceeng.journals.ekb.eg/article_30652.html
https://iceeng.journals.ekb.eg/article_30652_8c4a41af6ef80265f024de8b0fa6142f.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Power frequency electromagnetic field exposure assessment
1
13
EN
H.
S.
Seddeq
Housing & Building Research Center, Building Physics Department, Egypt.
G.
A.
Khawas
Housing & Building Research Center, Building Physics Department, Egypt.
10.21608/iceeng.2012.30653
Power frequency electromagnetic fields are receiving growing attention in recent years because of concerns that exposure to such fields might cause or contribute to adverse health effects. This paper reviewed the international limits for electromagnetic field exposure. Also this paper presented the problem with existing standards limits for electromagnetic field exposure and showed that these limits are not safety for public health risks. As a case study was investigated and evaluated to assess the power frequency electromagnetic fields exposure from electrical equipments, transmission lines and LED display in commercial building according to existing and the suggested healthy limits.
Power frequency electromagnetic fields,extremely low-frequency,Electromagnetic field exposure limits,Transmission lines
https://iceeng.journals.ekb.eg/article_30653.html
https://iceeng.journals.ekb.eg/article_30653_3d519a965af56def89507d83be368b8c.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
AN ANALYTICAL MODEL FOR REPULSIVE ELECTROSTATIC MICROACTUATOR USING A CONFORMAL MAPPING TECHNIQUE.
1
14
EN
Mazhar
B.
Tayel
Faculty of Engineering, Alexandria University, Egypt.
Ahmed
M.
El Masry
Faculty of Engineering, Alexandria University, Egypt.
10.21608/iceeng.2012.30654
electrostatic microactuators able to produce a repulsive force in the out-of-plane direction. The electrostatic microactuators use an asymmetric electric field surrounding the top and bottom surfaces of the moving fingers to produce a repulsive force. The displacement of moving finger is not limited by the “pull-in” effect. In addition, the usage of a repulsive force leads to the elimination of the sticking problem. In this paper, an analytical model for the repulsive-force, and the fringe capacitance of a microactuator is developed putting the moving plate thickness in consideration using conformal mapping techniques. With this technique, electric field lines are geometrically approximated to separately model the different capacitive components. These components are finally combined to obtain the equivalent fringe capacitance. The model reveals the maximum out-of-plane displacement. Rules are derived based on the analytical model for tuning and optimization of the microactuator performance. Simulations are conducted to verify the analytical model. In<br />addition, the mechanism for generating the repulsive force is explained.
https://iceeng.journals.ekb.eg/article_30654.html
https://iceeng.journals.ekb.eg/article_30654_7453ee933ce5305fe0557c0481b4481c.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Single and Combined Electromagnetic Wave Propagation Coverage of VOR Stations in Irregular Terrain Air ports
1
15
EN
M.
A.
Abdalla
Egyptian Armed Forces.
A.
M.
Mahrous
Egyptian Armed Forces.
A.
Helmy
Egyptian Armed Forces.
10.21608/iceeng.2012.30655
In this paper, the electromagnetic propagation coverage of different VOR stations over irregular terrain airport locations has been presented. Three different investigation studies for different airports in the heavy terrain red sea area are introduced. The calculation has been done applying Longley rice propagation model. The theoretical calculation concepts of the employed electromagnetic propagation model are discussed. The coverage areas for the two studied air ports were plotted using digital Two dimensional geographical maps with 90 meter resolution. The results are compared to standard line of sight model.
Electromagnetic waves,Propagation model,Coverage area,Longley Rice
https://iceeng.journals.ekb.eg/article_30655.html
https://iceeng.journals.ekb.eg/article_30655_bd9b70374bd07d4cf3a640ad1c41ca2d.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Optimization of Renewable Energy Power System for Small Scale Brackish Reverse Osmosis Desalination Unit and a Tourism Motel in Egypt
1
14
EN
F.
H.
Fahmy
Electronics Research Institute,
El-Tahrir St., El-Dokki, Giza, Egypt.
N.
M.
Ahmed
Electronics Research Institute,
El-Tahrir St., El-Dokki, Giza, Egypt.
H.
M.
Farghally
Electronics Research Institute,
El-Tahrir St., El-Dokki, Giza, Egypt.
10.21608/iceeng.2012.30656
The main objective of this work is to design an optimal – efficient economic power renewable energy system that feeds the required electric load of a small scale brackish reverse osmosis desalination unit and a tourism motel located in Hurghada, Egypt. Three renewable energy power systems are presented in this paper to select the most optimum one of them. Theses suggested renewable energy systems are stand-alone photovoltaic system, PV- wind-fuel cell hybrid system and PV- wind hybrid system. The sizing, optimization and economic estimation of the proposed systems were performed using HOMER software. HOMER solves the optimization problem to minimize the global cost and provides the optimum wind turbine, PV, battery and fuel cell ratings. In addition, a comparison between the three different suggested power<br />system configurations is illustrated in details. PV- wind hybrid system realized the lowest net present cost and leverized cost of energy. Also, this system was able to provide energy approximately all the day. The battery state of charge varies<br />between 77% to100% and it was found that, the PV- wind hybrid system is more suitable than the others for the selected site and the suggested electrical load.
PV,Wind turbine,Fuel cell,Hybrid System,Net present cost,HOMER
https://iceeng.journals.ekb.eg/article_30656.html
https://iceeng.journals.ekb.eg/article_30656_f05f33295f35f1fa4ddf0110180cd1ee.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Photovoltaic power system based on MPP tracking technique to feed radar stations
1
14
EN
Hassan.
H.
El-Tamaly
Professor of Electrical power engineering, Vice Dean for Community Service
and Environment Development, Faculty of Engineering, Minia University,
Minia, Egypt.
Hassan
Abd-El-Aliem
Brigadier retired engineer air defense, Egyptian Armed Forces, Teacher
Assistant, Higher Thebes Institute for Engineering, Thebes Academy, Cairo,
Egypt.
10.21608/iceeng.2012.30657
The photovoltaic power system, PVPS, converts the solar radiation directly to electricity without fuel , moving parts , noise and greenhouse gases emission then it’s a clean and environmentally friend power system . This paper introduces a complete design of PVPS based on energy balance condition , EB , and maximum power points , MPPs , tracking technique to feed the simulated load in an Egyptian remote site ,Marsa-Alam. This load consists of four radar stations , automatic command center , manual command center, communication center , charging center and lighting for the radar battalion . Also, the design parameters obtained by applying the EB have been compared with the design parameters obtained by using the MPPs tracking technique. A new computer Matlab Program has been designed and operated to determine the hourly MPP through the daily day time along the year.
Photovoltaic,power system,maximum power points tracking technique,energy balance condition,utility grid and solar cells module
https://iceeng.journals.ekb.eg/article_30657.html
https://iceeng.journals.ekb.eg/article_30657_0bf592115e4ed2612f424e95909bce9c.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Photovoltaic Power System Simulation for Micro – Grid Distribution Generation
1
37
EN
Adel
El Shahat
Faculty of Petroleum & Mining Engineering, Suez Canal University, Egypt.
10.21608/iceeng.2012.30658
This paper proposes modeling and simulation of PV Micro – Grid Distribution Generation System for Smart Grid Applications. Because, Distributed Generation (DG) offers great potential in meeting future global energy needs. PV module modeling and inverter technique reviews are presented in this paper. The mathematical PV module modeling depends on Schott ASE-300-DGF PV panel with the aid of MATLAB environment. DC / AC Inverter, Three – phase Inverters, Basic Operation of PWM Inverter, Square – wave operations of DC/AC inverter, Single – phase and Full – Bridge<br />Converters, Three – phase Converters and some MATLAB Inverters Results are introduced. Then, it proposes a PV module when coupled to a load through DC-DC Converter to supply this resistive load with the maximum power from the PV module. Some of DC-DC converters topologies are discussed in brief with concentration on Cúk and SEPIC Converters operations. After that, the mechanism of load matching is described to give the required converter duty cycle at maximum power point (MPP). Relations in 3D figures are introduced for the most probable situations for irradiance and temperature with the corresponding PV voltage and current. Also, 3D figures for the desired duty cycle, output voltage and current of DC-DC converter to gain the maximum power to the resistive load at various irradiance and temperature values.
Smart grid,Distributed generation,Maximum Power,Inverter,DC-DC converter,PV module,modeling,and MATLAB
https://iceeng.journals.ekb.eg/article_30658.html
https://iceeng.journals.ekb.eg/article_30658_9877c62a53aae6186482503159ec2879.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Empirical Mode Decomposition Complexity
1
9
EN
Sherif
Elgamel
Electronic Warfare Department, Military Technical College, Cairo, Egypt.
10.21608/iceeng.2012.30659
Empirical mode decomposition (EMD) was developed for analyzing non-linear and non-stationary data. EMD decomposition is based on the local characteristic time scale of data. EMD decomposes any data set into a finite and often small number of intrinsic mode functions (IMF). An IMF is defined as any function having the same numbers of zero crossings and extrema, and also having symmetric envelopes defined by the local maximal and minima, respectively. The IMF also admits well behaved Hilbert transform verified to be highly orthogonal. EMD is used in many applications such as signal enhancements and data analysis. In this paper, the EMD is presented using computer simulations. The complexity of classical EMD is calculated to determine the additive complexity to any system uses the EMD.
Empirical mode decomposition,Intrinsic Mode Functions,and systems complexity
https://iceeng.journals.ekb.eg/article_30659.html
https://iceeng.journals.ekb.eg/article_30659_c2956b8f9bfbb7f58003c4917d1a5c06.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
A Threshold Revocation Scheme For Mobile Ad Hoc Networks
1
7
EN
Fatma
Elsayed
Military Technical College.
Hisham
Dahshan
Military Technical College.
Alaa Eldin
Rohiem
Military Technical College.
Ali
Elmoghazy
Military Technical College.
10.21608/iceeng.2012.30660
Security is very important for the reliable operation of mobile Ad Hoc networks (MANETs). One of the critical security<br />issues in MANETs is the revocation of misbehaving nodes. In this paper, we introduce a Threshold Revocation Scheme for Mobile Ad Hoc Networks. In our proposed scheme, the master private key is split into n pieces according to a random polynomial. Meanwhile, the master private key could be recovered by combining any threshold t pieces based on Lagrange interpolation and hence this master private key is used to sign the revocation message. Because of the decentralized nature of our proposed scheme, it enables a group of legitimate nodes to perform fast revocation of a nearby misbehaving<br />node. Consequently, the proposed scheme improves the safety levels in MANETs. The advantages of the proposed scheme are justified through extensive simulations.
decentralized,revocation,MANET networks
https://iceeng.journals.ekb.eg/article_30660.html
https://iceeng.journals.ekb.eg/article_30660_15a9d821c39d6dc4097628612c2a11ae.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Performance Analysis of M-ary DPSK over VHF air-to-ground Communication Channel
1
13
EN
Amr
Aly
Nagy
Egyptian Armed Forces.
Gamal
Mabrouk
Abdel-Hamid
Egyptian Armed Forces.
Ahmed
E.
Abdalla
Egyptian Armed Forces.
10.21608/iceeng.2012.30661
This paper is concerned with evaluating the performance of M-ary differential phase shift keying (M-ary DPSK) modulation schemes over (very high frequency) VHF aeronautical channel (air-to-ground communication channel). The paper investigated the analytical bit error rate (BER) performance of binary differential phase shift keying (BDPSK) over aeronautical channel for flight scenarios: En -route, Arriving, Taxiing, and parking. By using the published measurement parameters, the analytical results are verified through modeling and computer simulation. The BER results show that multipath fading and Doppler shifts in the VHF aeronautical channel degrade the performance of M -ary DPSK<br />modulation schemes over the channel. In order to combat fading and improve the BER performance of this channel, the paper proposed computer simulation of the performance of differential space time block coding (DSTBC) using two antennas at the transmitter and one antenna at the receiver.
Air-to-ground communication channel,En -route,Arriving,Taxi,Parking,differential phase shift key (DPSK) and differential space time block coding (DSTBC)
https://iceeng.journals.ekb.eg/article_30661.html
https://iceeng.journals.ekb.eg/article_30661_bb7636481b9f34ac2ad3b331c6d0487f.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
HANK-1 ,A new Efficient and Secure Block Cipher Algorithm for Limited Resources Devices
1
12
EN
Hazem
Mostafa
Eldeeb
Egyptian Armed Forces.
Khaled
Ali
Shehata
Arab Academy for Science & Technology and Maritime Transport (AAST).
Nabil
Hamdy
Shaker
Misr International University (MIU).
Ahmed
Ali
Abdel Hafez
Egyptian Armed Forces.
10.21608/iceeng.2012.30662
In this paper we present a new block cipher algorithm that can be used for data security over devices with limited resources ,e.g. smart cards, wireless sensors etc .The algorithm is 128-bit balanced Feistel structure cipher algorithm working in cipher block chaining mode of operation. The building components of the algorithm have good cryptographic properties in comparison with other standard cipher algorithms and it has passed the NIST statistical test with very good results. The algorithm has been implemented on Microblaze microprocessor (as an emulator) to evaluate its efficiency and suitability to work on constrained devices.
Feistel Networks,Constrained environments,Block Cipher,Maximal distance separable codes,Substitution Box,Statistical Tests,Microblaze
https://iceeng.journals.ekb.eg/article_30662.html
https://iceeng.journals.ekb.eg/article_30662_c5acafd383d2174703d8472691d40b38.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
A Newly Proposed Routing Protocol for Wireless Mesh Networks (WMNs)
1
30
EN
Marw.
M.
Khashaba
College of Computers and Informatics, Zagazig, Egypt.
Fathy.
A.
Amer
Prof.Dr., College of Computers and Informatics, Cairo, Egypt.
Nabil.
A.
Lashin
Dr., College of Computers and Informatics, Zagazig, Egypt.
10.21608/iceeng.2012.30663
WMNs are undergoing rapid commercialization in many application scenarios such as providing internet access, extending the coverage of wireless local area networks (WLANs), community networking, building automation, high speed metropolitan area networks, and enterprise networking. WMNs are one of the few commonly implemented types of mobile ad-hoc networks (MANETs), so general MANET routing protocols can be used in WMNs. While general MANET routing protocols can be used in WMNs, it is expected that a protocol that takes the particularities of WMNs into account will outperform the general protocol. This paper surveys recent routing protocols for MANET routing protocols and discuss the new WMNs routing protocols recent used in market. A new routing protocol is proposed uses all WMNs consideration<br />into account. The proposed routing protocol is based on source routing mechanism, showing that by preferring stable routes, the backbone of stationary nodes presented in WMNs can be effectively used to improve the performance of routing protocol, so the proposed protocol will be called Source Route Routing Protocol (SRRP). The main goal of the proposed protocol is to improve throughput and to reduce average end-to-end delay and packet delivery loosing ratio in large networks. The mobility of the nodes will be maintained having a significant improvement in different network sizes than in MANET routing protocols.
Wireless Mesh Networks (WMNs),mobile ad-hoc networks (MANETs),Routing
https://iceeng.journals.ekb.eg/article_30663.html
https://iceeng.journals.ekb.eg/article_30663_ed184d9d868b6f3431dc8abc156b04da.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Hybrid Database Performance Evaluation Achieving Security
1
14
EN
Wasim
Khalil
Shalish
Syrian Armed Forces.
A.
Z.
Ghalwash
Helwan University.
H.
M.
El-Deeb
Modern University for Technology and Information (M.T.I).
K.
Badran
Egyptian Armed Forces.
10.21608/iceeng.2012.30664
The main goal of database security mechanisms is to protect the data stored in the database from unauthorized access or malicious actions in general. Typical database security attacks can be classified as: malicious actions executed by authorized or unauthorized users, and an inference attack occurs in multilevel secure database. The focus of this paper is to investigate the effect of malicious transactions detection and association rule mining implementation on database performance. This paper presents implementation of three mechanisms for detection of malicious transactions in the Oracle 10g DBMS and investigates the performance of the three mechanisms using a telephone database, and implementation of association rule mining using (Apriori) algorithm and investigates the performance using Congress Voting Data set. The experimental results showed that the average performance overhead caused by the activation of malicious transactions detection mechanisms is about 40%, and the hiding association rules performance parameters may be very high to ensure sensitive rules hiding.
DBMS,MTDM (Malicious Transactions Detection Mechanism),MST,MCT
https://iceeng.journals.ekb.eg/article_30664.html
https://iceeng.journals.ekb.eg/article_30664_92943e6f442c374ef38f39e81f5d3e49.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
INS Alignment Using Onboard Computer Software for Missile Trajectory
1
13
EN
Ibrahim
Ismail
Arafa
Dr., Guidance Department, Military Technical Collage (M.T.C.), Cairo, Egypt.
Ahmed
Mohsen
Dr., Guidance Department, Military Technical Collage (M.T.C.), Cairo, Egypt.
A.
Elboraee
Eng., Guidance Department, Military Technical Collage (M.T.C.), Cairo, Egypt.
10.21608/iceeng.2012.30665
In this paper, the onboard computer software program was developed to predict the full trajectory of the missile in order to improve the accuracy at impact. For system in which time is not critical, the alignment process can be performed prior to launch by utilizing navigation data from the launch platform and calibrating the missile’s INS to this reference. However, for systems that require rapid reaction time, significant pre-launch delays for alignment are not tolerable. In addition, due to low quality of the INS and its life cycle is short; hence every aborted mission will bring the INS closer to its mean time between failures (MTBF). These problems can be minimized by in-flight alignment (IFA). While IFA may seem to be less accurate and more complicated than alignment in the rest, it turns out that the ability of the carrier to maneuver during the IFA phase is a blessing in disguise since it enables the excitation of latent modes and thus, enhances their observability of the whole INS. The effects that maneuvers have on the estimability of the INS states during IFA were<br />investigated in the past. But until now, there are many questions such as: what is the degree of observability? What limits the estimability of the system? What are the minimal additional measurements needed to turn the system into a completely observable one? And what are the useful numbers of maneuvers in IFA? , were not completely addressed. These questions are answered through this paper. We introduce the error model, which appropriately describes the INS behavior during IFA. We then substantiate its adequacy for consideration as a piece-wise constant system (PWCS) and then the simpler stripped observability matrix (SOM) can be used in the system observability analysis.
https://iceeng.journals.ekb.eg/article_30665.html
https://iceeng.journals.ekb.eg/article_30665_c3e37b0c3268967218aa3dc2715bb88f.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Strap down INS Alignment Using Non-Linear Model for Large Azimuth Misalignment
1
14
EN
Ibrahim
Ismail
Arafa
Dr., Guidance Department, Military Technical Collage (M.T.C.), Cairo, Egypt.
Ahmed
Mohsen
Dr., Guidance Department, Military Technical Collage (M.T.C.), Cairo, Egypt.
10.21608/iceeng.2012.30666
In this paper, a general non-linear psi-angle approach is presented that does not require coarse alignment. In the psi-angle model, The SINS error models (position, velocity and attitude angles) with large misalignment angles are derived. This error model uses Euler angles to describe the misalignment of platform frame to navigation frame, but the derived error models are only valid under condition that the heading uncertainty is large and the two leveling misalignment angles<br />are small the three misalignment angles are assumed all large. We simulate SINS large azimuth misalignment angle on the stationary base (fixed position and multi-position) alignment also on the movable base (In-flight) alignment in two cases (straight level flight and turn level maneuver) based on the trajectory generator data. All these simulations are done using different Kalman filter techniques (nonlinear discrete equations, Standard extended Kalman filter EKF, and iterative filtering IKF) to solve the non-linear system problems.
https://iceeng.journals.ekb.eg/article_30666.html
https://iceeng.journals.ekb.eg/article_30666_0497b3a8fe7efec9c23d51db348ab9df.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Toward high-speed level-crossing ADCs
1
8
EN
Mohamed
Abbas
Elect. Eng. Dept. Faculty of Engineering, Assiut University, Assiut 71518,
Egypt.
10.21608/iceeng.2012.30667
The accuracy of measuring the crossing moment of a given signal to a specific reference voltage plays a crucial role in determining the bandwidth of the signal that could be converted by a level-crossing ADC. This timing accuracy is mainly determined by delay dispersion of the comparator and the time0to-digital converter (TDC) comprising the level-crossing ADC. With the pico-second resolution TDC, the delay dispersion of the comparator became the bottle nick of the design of a high speed level-crossing ADC. This paper presents a comparator with low delay dispersion for level-crossing analog-todigital conversion applications. The comparator comprises a technique to compensate the delay dispersion caused by variable input overdrive. The whole circuit is composed of three main blocks, namely, conventional comparator, fixed delay block and variable delay block. The variable delay block is controlled such that it implements the inverse overdrive-delay characteristics of the conventional comparator. Therefore, the overall delay dispersion of the circuit is effectively reduced. Using the proposed technique in a level-crossing ADC would enable the sampling of a signal with 4X higher frequency<br />than the case of using a conventional comparator keeping the same SNR.
Comparator Delay Dispersion,Level-Crossing ADCs
https://iceeng.journals.ekb.eg/article_30667.html
https://iceeng.journals.ekb.eg/article_30667_001a186db5ecec8fd61e07eaedcf61b6.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
The effects of harmonic distortions on transformers
1
7
EN
Hafez
Elsalmawy
Executive Director at Egyptian Electric Utility and Consumer Protection.
Kamelia
Youssef
Consultant at Egyptian Electric Utility and Consumer Protection.
Shereen
Abdulla
Electrical Engineer at Egyptian Electric Utility and Consumer Protection.
Iman
Ahmed
Electrical Engineer at Egyptian Electric Utility and Consumer Protection.
10.21608/iceeng.2012.30668
The use of electric power is a natural part of life. It is used everywhere for living, work and traveling, at any residence, commercial building , industry and so on , to supply the loads. The new technique devices , as loads , are used to achieve better performance , to be able to control and to transfer more power over the power system and to reduce the<br />power consumption of the loads . These new techniques consist of non-linear components that are used to control the load current. Non-linear components in power system distort the current waveform and can affect the voltage waveform. These distortions can create a variety of power quality problems. The voltage and the current distortion cause additional losses in power system components and in linear loads. Transformers are major components in power systems. Increase in harmonic distortion component of the transformer will result in additional heating losses, shorter insulation lifetime, higher temperature and insulation stress, reduced power factor, lower productivity, efficiency, capacity and lack of system<br />performance of the plant. The paper overviews and assessments the effects of real measured harmonic distortions on different low voltage level transformers supplying different types of nonlinear loads.
https://iceeng.journals.ekb.eg/article_30668.html
https://iceeng.journals.ekb.eg/article_30668_aa02f33171665bcbbb17bff52cc2f1b6.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Low voltage low power programmable logic gate based on SE-MOSFET
1
7
EN
Soha
Ahmed
Electrical Engineering Depart., Faculty of Engineering
Minia University, El-Minia, Egypt.
Hesham
F. A.
Hamed
Electrical Engineering Depart., Faculty of Engineering
Minia University, El-Minia, Egypt.
E.
A. M.
Hasaneen
Electrical Engineering Depart., Faculty of Engineering
Minia University, El-Minia, Egypt.
10.21608/iceeng.2012.30669
Single electron transistor (SET) is one of the most promising devices for nanoscale circuit design. In this paper, new low voltage low power programmable logic gate circuits using SE-MOSFET are presented. Devices that combine singleelectron<br />and metal–oxide–semiconductor (MOS) transistors allows compact realization of basic logic function that exhibit periodic transfer characteristics. The proposed SE-MOSFET logic gates are useful for implementing binary logic circuits. The proposed programmable logic gate is verified by simulating the circuit using PSPICE. The results show that the operation of proposed circuit is in accordance with the theories.
SE-MOSFTT Hybrid Circuits,Low Power Circuits,Logic Gate
https://iceeng.journals.ekb.eg/article_30669.html
https://iceeng.journals.ekb.eg/article_30669_c7c02f59082bd98e26a2b7f6f4c5cbab.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Adaptive distance protection of a double circuit transmission line
1
15
EN
D.
A.
Zaki
Electrical Power and Machines Department, Faculty of Engineering, Ain
Shams University, Cairo, Egypt.
N.
H.
El-Amary
Department of Electrical and Computer Control, Arab Academy for Science
and Technology (AAST), Cairo, Egypt.
A.
Y.
Abdelaziz
Electrical Power and Machines Department, Faculty of Engineering, Ain
Shams University, Cairo, Egypt.
M.
M.
Mansour
Electrical Power and Machines Department, Faculty of Engineering, Ain
Shams University, Cairo, Egypt.
10.21608/iceeng.2012.30671
The change in power systems can affect the performance of distance relays protection. In case of distance protection especially the state of double circuit operation depending on the power system state, a distance relay can cover from less than 50% up to far more than100% of the total line length. The mutual magnetic coupling is one of the phenomenon affecting the precision of the distance relay. An adaptive distance protection scheme of a double circuit transmission line<br />considering the mutual magnetic coupling effect is presented in this paper. The single line to ground fault (SLG) and the line to line to ground fault (LLG) in a double circuit transmission line are studied. An adaptive correction factor in case of SLG and LLG faults for the compensation of the mutual coupling effect is suggested and calculated. It's achieved using the<br />simulation results of ATP-EMTP program without and with considering the mutual coupling effect. The proposed adaptive protection is applied to a double circuit transmission line model and the results are reasonable.
Adaptive distance protection,double circuit transmission line,mutual coupling,correction factor
https://iceeng.journals.ekb.eg/article_30671.html
https://iceeng.journals.ekb.eg/article_30671_273fc9c27a8de7442552bdac75338c19.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Experimental testing of the neural network based protection of synchronous generators
1
10
EN
A.
Helal, H.
El Dessouki
Dept. of Elec. Engineering and Control, Arab Academy for Science and
Technology, Alex. Egypt.
M.
El-Saadawi
Faculty of Engineering, Mansoura University, Mansoura, Egypt.
M.
Tantawy
Faculty of Engineering, Mansoura University, Mansoura, Egypt.
A.
Hatata
Faculty of Engineering, Mansoura University, Mansoura, Egypt.
10.21608/iceeng.2012.30672
An internal fault detector and classifier for synchronous generator stator windings based on ANN have been implemented and its behavior is investigated on physical power system model. The hardware system is designed and built to acquire the three phase currents at both ends of synchronous generator terminals. A software program is developed to read currents, which used to train a proposed Neural Network structure using MATLAB. The trained network is placed in a LabVIEWTM based program formula node that monitors the currents online and display the fault types. Details of implementation and the experimental studies are given and analyzed in the paper. Lab work proves that the proposed approach is able to detect and classify the type of internal faults rapidly and correctly. It is suitable to realize a fast and accurate internal fault protection scheme of the synchronous generator.
Internal fault detector and classifier,Synchronous generator and Neural Network
https://iceeng.journals.ekb.eg/article_30672.html
https://iceeng.journals.ekb.eg/article_30672_76ff71e0b144603dfc764f598a484190.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Analysis of false tripping for power transformers in Egypt
1
10
EN
M.
Abdelfatah
Electrical testing and transformers section, EETC. Ministry of Electricity, Cairo,
Egypt.
M.
EL-Shimy
Electrical Power and Machines Department. Faculty of Engineering, Ain Shams
University, Cairo, Egypt. P.O. Box (11517).+
H.
M.
Ismail
Electrical Power and Machines Department. Faculty of Engineering, Ain Shams
University, Cairo, Egypt. P.O. Box (11517).
10.21608/iceeng.2012.30673
Frequent forced outages of power transformers can significantly affect the performance of industrial and commercial power systems and the processes they control. This paper presents the results of an extensive survey on false tripping of protection devices and systems for power transformers in Egypt. The outcomes of this work are beneficial in improving the design and maintenance of these protection systems to increase the reliability and availability of power systems. The data are obtained from the Egyptian Electricity Transmission Company (EETC). The collected data are in the form of transformer outage reports for eight years, from 2002 to 2009, where the average number of transformers is 1922 in voltage populations ranging from 33 kV to 500 kV and MVA rating from 5 MVA to 500 MVA. Results show that the fire-fighting systems are responsible for the highest number of false trips in all voltage sub-populations except the 220 kV sub-population where the dominant cause of false trips is the bus bar protection.
Power transformers,protection systems,false tripping
https://iceeng.journals.ekb.eg/article_30673.html
https://iceeng.journals.ekb.eg/article_30673_78bec068264baed8aefa4464db44dc71.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
An efficient power differential scheme for power transformer protection
1
11
EN
Eman
S.
Ahmed
College of Engineering, Kafrelsheikh University, Kafrelsheikh, Egypt.
Ragab
A.
El-Sehiemy
College of Engineering, Kafrelsheikh University, Kafrelsheikh, Egypt.
10.21608/iceeng.2012.30674
This paper proposes and develops a Power-based Differential Scheme (PDS) for power transformer protection. The proposed PDS for power transformer is based on computing the active and reactive power loci during normal operation, switching, normal power swing, and internal and external faults. The proposed PDS concept based on monitoring and comparing the transformers primary and secondary active and reactive powers. The dynamic response of the proposed PDS is tested and modeled using Matlab/Simulink software a step up transformer fed from single alternator system from one end versus the utility busbar at the other end. The test results confirm the superiority of the proposed scheme to distinguish internal and external faults as well as magnetizing inrush currents with good selectivity, high speed, sensitivity, stability limits and high accuracy response of the power differential scheme.
Power differential Scheme,Transformer differential protection,Inrush current,Fault current,Criterion function,High impedance fault
https://iceeng.journals.ekb.eg/article_30674.html
https://iceeng.journals.ekb.eg/article_30674_be12f31ac0ac6bc1f53d1afc6f25df63.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
A Novel S-box Substitution Technique for AES Algorithm
1
15
EN
Faiz
Yousif
Mohamed
M.
E.
Gadallah
Alaa Eldin
Rohiem
Ashraf
Diaa
Elbayoumy
10.21608/iceeng.2012.30675
In AES, the S-box substitution of each byte is depends on the input byte value only. In this paper, a novel method for substituting each byte is introduced. In this method, the substitution of each byte is depending not only on its value but also depend on the input key and the derived subkeys. The keys are used to generate two parameters that are<br />used for mapping the substituted value horizontally and vertically to a random location in the S-box. The first parameter, subkey plus the input value, are used to rotate the row horizontally to the new location. The second parameter, subkey plus substituted value result from first parameter, are used to rotate the column vertically to new location which<br />is final substitution value. The required modifications are made for the inverse substitution saving the non-linearity relationship between the Sbox and its inverse. In this technique, we can get up to 256! Substitutions values instead of 256 values as in normal AES algorithm which increase the encryption complexity and complicate the cryptanalysis process. The results show that this is achieved with negligible extra delay. The increase of the substitution domain achieved from this Technique doesn't require to construct a new S-box, or inverse S-box as it does in the dynamic Sbox<br />approaches in which the need for re-evaluation and proved against cryptanalysis after every new S-box construction is compulsory.
AES,Avalanche effect,Cryptography,Key dependent Sbox,NISTSts,SAC
https://iceeng.journals.ekb.eg/article_30675.html
https://iceeng.journals.ekb.eg/article_30675_acfec40c08bb3d11377c757e479a31d0.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
An Efficient Location based Hybrid and Dynamic Key Management Scheme for SurvSec Security Architecture
1
20
EN
Mohamed
Helmy
Megahed
Egyptian Armed Forces.
Dimitrios
Makrakis
Prof., School of Information Technology and Engineering, University of Ottawa,
Ottawa, Canada.
10.21608/iceeng.2012.30676
Wireless Sensor Networks usually consists of a large number of tiny sensors with limited computation capability, memory space, power resource and communications capabilities. WSN’s are extremely vulnerable to numerous attacks; due to several factors such as unattended deployment and lack of tamper resistant packages. Secure communications in wireless sensor networks is critical. Key management is the fundamental security mechanism in WSN. The objective of key management is to establish and maintain secure channels among communicating nodes. Location based key management protocols are very efficient methods in terms of key connectivity, storage overhead, improving the security and scalability and localizing attacks. Also, dynamic key management assumes long lived networks with more frequent addition of new nodes thus requiring network rekeying for sustained security and survivability. In this paper, we proposed a new location based hybrid and dynamic key management scheme that establishes secret keys between sensor nodes. The hybrid scheme reduces the high cost public key operations at the sensor side and replaces them with efficient symmetric key based operations. The proposed system can efficiently resist cloning attack and sybil attack where the attacker can copy the certificate of a node, public key, private key and the node ID to launch these attacks.
Dynamic,Hybrid,Key Management,Cloning attack,Sybil attack,ECC,Location based,Certificate Authority,Symmetric Key,and Public Key
https://iceeng.journals.ekb.eg/article_30676.html
https://iceeng.journals.ekb.eg/article_30676_29d1c196d275b760923ba5bdaa3a493c.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
An Efficient Overlapped Groups based Compromised Nodes Detection at First Stage for WSN
1
14
EN
Mohamed
Helmy
Megahed
Egyptian Armed Forces.
Dimitrios
Makrakis
Prof., School of Information Technology and Engineering, University of Ottawa,
Ottawa, Canada.
10.21608/iceeng.2012.30677
Surveillance WSNs are deployed in hostile environments such as perimeter, border locations and battlefields to detect unauthorized intrusions. Therefore, Surveillance WSNs are highly vulnerable to collaborative work of attackers to compromise many legitimate nodes. Securing surveillance WSNs is challenging because of low-cost, limited capabilities, resource-constrained sensor nodes. Several protocols have been proposed for detecting compromised nodes. However, some protocols rely on an implicit assumption that compromised node will change its location or its signal strength will alter after it is compromised; other protocols use alert messages or reputation based trust models which require the nodes misbehavior to discover the compromised nodes. Node compromise attack is a multi-stage attack which consists of three stages: physically capturing and compromising sensor nodes; redeploying the compromised nodes back to network and compromised sensor nodes rejoining the network. Our work studies how to achieve high resiliency against an increasing number of compromised nodes in large surveillance WSN in hostile environment by collaborative work of attackers at the first stage. Specifically, after sensor nodes are deployed they first build overlapped groups in ad hoc pattern where a group is composed of four nodes. Then, the nodes within the overlapped groups can monitor each other to detect any node compromise attempt. We describe the building blocks that can be used to build the protocol for the detection process. Our protocol is designed to be resistant against large number of compromised nodes by collaborative work of attackers. Extensive simulation results are given to demonstrate the high detection rate of the proposed scheme.
Overlapped groups,Wireless Sensor Network,Node Compromise Attack,surveillance
https://iceeng.journals.ekb.eg/article_30677.html
https://iceeng.journals.ekb.eg/article_30677_d25203b17404692eee0fabc963a20090.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Key Partitioning Cryptanalysis of Reduced Rounds AES Algorithm Variant
1
11
EN
Amr
M.
Ashry
Egyptian Armed Forces.
AlaaEl-Din
R.
Shehata
Egyptian Armed Forces.
Ashraf
D.
El-Bayoumy
Egyptian Armed Forces.
10.21608/iceeng.2012.30678
The majority of the published attacks on reduced-round variants of block ciphers seeks to maximize the number of rounds to be broken, using less data than the entire codebook and less time than exhaustive key search. In this paper, a novel key partitioningchosen plaintext attack against reduced-rounds AES variants up to 3 rounds that uses only 33 chosen plaintext-ciphertext pairs, a workload of 219(for three round variant) and 217bytes of memory is introduced. The attack depends upon the internal structure of the AES round function, the differential characteristics of the AES S-BOX and thekey partitioning in which each key byte will be processed individually independent to the other key bytes. To clarify the idea of the attack we will follow a round by round cryptanalysis till the third round of the AES. The results gives that a bit-level permutation is more efficient than byte-level permutation used in the AES round function.We also introduce a counter measure for this attack by using a bit-level permutation on the AES round function instead a byte level permutation.
AES,Cryptanalysis,bit level permutation,byte level permutation,Differential,key partitioning,reduced rounds
https://iceeng.journals.ekb.eg/article_30678.html
https://iceeng.journals.ekb.eg/article_30678_8e409d75cc4696c3ba769b967d3fe3d3.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
A Modified Kerberos Authentication Scheme Using Public Key Cryptography
1
10
EN
Khaled
Mohamed
Khairy
Egyptian Armed Forces.
Ahmed
Abd Elhafez
Egyptian Armed Forces.
Essam
Abd El Wanees
Egyptian Armed Forces MTC.
10.21608/iceeng.2012.30679
Abstract:<br />Kerberos is a widely used authentication scheme based on symmetric key cryptography,<br />although Kerberos is a part of MIT’s Project Athena it has been adopted by many other<br />organizations for their own purposes. And is being discussed as a possible standard.<br />Despite Kerberos’s many strengths, a number of limitations and some weaknesses have<br />appeared due to MIT’s environment that needs only user-to-server authentication and<br />others due to deficiencies in the protocol design. In this paper an improved scheme<br />using the Public Key cryptography will be proposed to enhance its security strength to<br />overcome these limitations and weaknesses.
authentication,Kerberos,security analysis,Public Key cryptography
https://iceeng.journals.ekb.eg/article_30679.html
https://iceeng.journals.ekb.eg/article_30679_90a5335925ca38dd7a01c3d1a2ab18b8.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Selection of optimal filtration and prediction block in the single target tracking system with one imaging sensor under changeable daylight
1
13
EN
Mikluc
Davorin
University of Defence, Military Academy, Belgrade, Serbia.
Antonijević
Goran
University of Defence, Military Academy, Belgrade, Serbia.
Andrić
Milenko
University of Defence, Military Academy, Belgrade, Serbia.
Bondžulić
Boban
University of Defence, Military Academy, Belgrade, Serbia.
10.21608/iceeng.2012.30791
The paper presents a system with one imaging sensor. Serial communication interface enables azimuth and elevation control, zoom setting, and changing the mode into infrared. Single target tracking in plane in multiple scenarios has been analysed in detail. By comparative analysis of CA models, Singer model and IMM algorithm with two models, and on the basis of root mean square error of position estimation, optimal filtration and prediction block has been selected. The first scenario shows linear target tracking at variable velocity. In the second scenario, the sensor tracks a maneuvering target. The third and fourth scenario present target tracking with infrared sensor with the cinematic characteristics identical to the first two scenarios. These are followed by scenarios in which the imaging and infrared sensors are controlled in target tracking, and the influence of different filtration and prediction blocks on the tracking is analysed. The last scenario shows target tracking under changeable conditions with automatic sensor control. All the scenario analyses are based on root mean square error of position.
Image restoration,remote sensing and image blur models
https://iceeng.journals.ekb.eg/article_30791.html
https://iceeng.journals.ekb.eg/article_30791_0690ba3c385f31eb6265abb54c63e607.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Non-linear motion deblurring in single images using genetic algorithms
1
13
EN
Salsabil
El-Regaily
Faculty of Computer and Information Sciences, Ain Shams University, Cairo,
Egypt.
H.
El-Messiry
Faculty of Computer and Information Sciences, Ain Shams University, Cairo,
Egypt.
M.
Abd El-Aziz
Faculty of Computer and Information Sciences, Ain Shams University, Cairo,
Egypt.
M.
I.
Roushdy
Faculty of Computer and Information Sciences, Ain Shams University, Cairo,
Egypt.
10.21608/iceeng.2012.30792
One of the key problems of restoring a degraded image from motion blur is the estimation of the unknown non-linear blur filter from a single input blurred image. Many blind deconvolution methods typically assume frequency-domain constraints on images, simplified parametric forms for the motion path during camera shake or use multiple input images with specific characteristics. This paper proposes an algorithm for removing non-linear motion blur from a single input blurred image using Genetic Algorithms (GAs), by finding the proper parameters and goal function. Also recent research in natural image statistics is exploited, which shows that photographs of natural scenes typically obey heavy-tailed distribution. The Point Spread Function entries are used as the parameters of the GA. Experiments on a wide data set of standard images<br />degraded with different kernels of different sizes demonstrate the efficiency of the proposed approach especially in small blur lengths compared to other algorithms with reasonable running times for a GA.
Camera Shake,Blind Image Deconvolution,Genetic Algorithm,Non-Linear Motion Blur
https://iceeng.journals.ekb.eg/article_30792.html
https://iceeng.journals.ekb.eg/article_30792_ba7dd6573db2a0f39f72c29bc7b7e870.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Urban expansion and its impacts on agricultural areas in Al-ZAHRA region, Libya using high resolution images
1
10
EN
Ashour
Soliman
Ph.D. student, In Libyan Armed Forces.
Fawzy
El tohamy
Ph.D., Egyptian armed forces.
10.21608/iceeng.2012.30793
Image change detection is an important application of remote sensing technology. It is a process ascertaining the changes of specific features within a certain time interval. This paper presents an object-oriented image change detection methodology to detect the changes and analyze aerial remote sensing data of AL-ZAHRA sub-area. Furthermore, the urban expansion areas on behalf the agricultural areas in the study area is monitored and analyzed. A rule based classification technique is applied by using fuzzy functions, aiming to extract information of the urban spatial structure. Finally the classification accuracy of the used images was assessed with parameters of overall accuracy, and kappa statistic. The increase in spatial resolution from Landsat MSS (80m) to Landsat TM (30m), then to SPOT XS (20m) and SPOT Pan (10m); and recently very high resolutions images acquired by SPOT-5 (2.5m), IKONOS (1m) and Quikbird<br />(0.61m) has made it possible to monitor the urban expansion and development at micro level and with a very high accuracy.
Remote Sensing,Object classification,Object change detection
https://iceeng.journals.ekb.eg/article_30793.html
https://iceeng.journals.ekb.eg/article_30793_494b18c058df1225888eb99f7d2c5229.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Investigating the impact of smart grids’ contributions in developing countries
1
12
EN
Walid
El-Khattam
Electrical Power and Machines Department, Faculty of Engineering, Ain Shams
University, Cairo, Egypt.
Marwa
Mostafa
The Egyptian Electric Utility and Consumer Protection Regulatory Agency
(EgyptERA), Cairo, Egypt.
10.21608/iceeng.2012.30794
Abstract:<br />The ability to improve safety and efficiency of the electric networks, making better use<br />of existing assets, enhancing reliability and power quality, reducing dependence on<br />imported energy, and minimizing costly environmental impacts are the main forces that<br />have substantial economic value on the electricity industry. Most of the time,<br />investment in generation, transmission, and distribution networks to achieve such<br />benefits places a burden on developing countries’ economies, which can be relieved by<br />Smart Grid (SG) concepts implementation. SG will intelligently integrate the actions of<br />all users connected to it; generators, grids, and consumers in order to efficiently deliver<br />sustainable, economic, secure electricity supplies, provide self-healing, and take the full<br />advantage of new technologies. This paper aims to assess the SG applications on the<br />generation, transmission, distribution levels, and up to consumer sides in developed as<br />well as developing countries. The main SG features are evaluated based on the available<br />technologies and their span. The SG benefits that would reflect on utilities particularly<br />aiming at integrating large amounts of Renewable Energy Sources (RES) into their grids<br />and implementing distribution management, and consumers are presented. Moreover, a<br />roadmap needed to achieve the mentioned SG application is proposed and discussed.<br />Finally, the proposed recommendation and conclusions for the impact of SG on<br />developing countries are illustrated.
Demand side management,smart grids,and renewable energy sources
https://iceeng.journals.ekb.eg/article_30794.html
https://iceeng.journals.ekb.eg/article_30794_b65a711be0bdc72ebe9970854c01e105.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Design and operation of PV / FC smart electrical power system using neural networks
1
13
EN
Hassan.
H.
EL-Tamaly
Prof. of Electrical Power Engineering, Vice Dean for Community Servic and
Environment Development, Faculty of Engineering, Minia University, Elminia,
Egypt.
Ayman
Yousef
Nassef
Middle Egypt Electricity Distribution Co., Egypt.
10.21608/iceeng.2012.30795
This paper introduces a study of design and performance of Photovoltaic / Fuel Cells Smart Electrical Power System, PV/FC SEPS, to supply a load in a remote area has the same latitude of Elminia city. Since the output of PV system depends on solar radiation then the FC starts automatically by using Artificial Neural Network, ANN, when solar radiation is insufficient to feed the load demand. By using this operation strategy the FC works as a back- up power supply. The performance of the system for a step change in the electrical load and solar radiation are presented. Analysis of the system’s response and its limitations are discussed.
solar energy,Hydrogen,Fuel cell,Electrolysis,Polymer Electrolyte Membrane,Photovoltaic,artificial neural network,environment
https://iceeng.journals.ekb.eg/article_30795.html
https://iceeng.journals.ekb.eg/article_30795_dccd7836b398350c4448c5d12903f62d.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Phasor measurement units for out of step detection
1
19
EN
Almoataz
Y.
Abdelaziz
Department of Electrical Power & Machines, Faculty of Engineering, Ain Shams
University, Cairo, Egypt.
Amr
M.
Ibrahim
Department of Electrical Power & Machines, Faculty of Engineering, Ain Shams
University, Cairo, Egypt.
Zeinab
G.
Hasan
Department of Electrical Power & Machines, Faculty of Engineering, Ain Shams
University, Cairo, Egypt.
10.21608/iceeng.2012.30796
Synchronized phasor measurements have become an important technology with several international manufacturers offering commercial phasor measurement units (PMUs) which meet the prevailing industry standard for synchrophasors. With the occurrence of major blackouts in many power systems around the world, the value of data provided by PMUs has been recognized, and installation of PMUs on power transmission networks of most major power systems has become an important current activity. This paper presents a transmission line protection scheme based on synchronized phasor measurement units to detect (predict) out of step condition using equal-area criterion which is consistent with transient energy function method for single machine-infinite bus system or two machines system. This scheme uses the measured values of voltages and currents, as complex values, at the generator bus and at the infinite bus. These values of voltage and current are measured in time domain and transformed into phasor domain by using Discrete Fourier Transform to calculate the required areas. The proposed scheme can be used for the detection of out of step condition using equal area criterion with different types of faults at different locations and different models of transmission lines.
Phasor measurement unit (PMU),Global Positioning System (GPS),Transmission line protection,Power system transient stability,Discrete Fourier Transform (DFT),Equal-area criterion,Out of step detection
https://iceeng.journals.ekb.eg/article_30796.html
https://iceeng.journals.ekb.eg/article_30796_a4c5bc46b62297bc2c9bc2afb2d3c9d5.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Novel real-time stability assessment algorithm based on synchro-phasors measurement and parallel algorithms for multi-machine networks
1
14
EN
Mohamed
A.
Ali
Lecturer assistant, faculty of engineering shoubra, Benha university.
Wael
R.
Anis
Assisstant professor, faculty of engineering, Zagazig university.
Wagdy
M.
Mansour
Professor, faculty of engineering shoubra, Benha university.
Fahmy
M.
Bendary
Professor, faculty of engineering shoubra, Benha university.
10.21608/iceeng.2012.30797
The paper presents an approach to design power system transient stability assessment using direct methods for a multi-machine network based on multiple synchronized phasors, measured from Phasor Measurement Units (PMUs) and generator parameters. The generator rotor angle was derived from phasor measurements of voltage and current, and generator parameters using direct real-time algorithm. The multi-machine system was reduced to groups denoted Single Machine to Equivalent Bus (SMEB) models and another groups denoted Load Equivalent Bus (LEB) using Parallel Algorithms (PAs). The use of these PAs eliminates the SPMUs at each bus in the system, and it is required number of SPMUs only equals the number of generator buses. So that, the Equal Area Criterion in both rotor angle domain and time domain can be applicable for the SMEBs groups to assess the system stability in real-time. A three phase fault was simulated at test system comprises 2-machine, 8-bus network for validating the novel algorithm.
Stability Assessment,Multi-machine,parallel algorithms,Real-time,Synchro-Phasors Measurement Units
https://iceeng.journals.ekb.eg/article_30797.html
https://iceeng.journals.ekb.eg/article_30797_f08748295ce9749b1e6c9eaa6309d699.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Modeling of Asynchronous machines for stability analysis
1
17
EN
M.
G. S.
Zaghloul
Faculty of Engineering, Ain Shams University, Egypt.
M.
I.
Marei
Faculty of Engineering, Ain Shams University, Egypt.
W.
El-Khattam
Faculty of Engineering, Ain Shams University, Egypt.
M.
A. L.
Badr
Faculty of Engineering, Ain Shams University, Egypt.
H.
S. K.
El-Goharey
Faculty of Engineering, Ain Shams University, Egypt.
10.21608/iceeng.2012.30798
This paper presents the results obtained when using three different models of the asynchronous machine. The first order model is used to determine the steady-state performance when the rotor of the machine is fed with different direct- and quadrature-axis components of control voltages. The third and fifth order models are simulated and implemented into PSCAD/EMTDC software. These models are used to determine the dynamic behavior of the asynchronous machine when it is connected to an infinite bus and operating with normal conditions. Also, they are used to determine the performance when the induction machine is subjected to three-phase symmetrical faults.
Induction machine,modeling,Steady-state performance,Dynamic behavior,Doubly fed induction machine
https://iceeng.journals.ekb.eg/article_30798.html
https://iceeng.journals.ekb.eg/article_30798_cd13c2bf648334b84c6b217803a89599.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Optimal PID Controller for AVR System Using Particle Swarm Optimization
1
18
EN
H.
F.
Abu-Seada
Ministry of Electricity, Cairo, Egypt.
W.
M.
Mansor
Faculty of Engineering "Shoubra" Benha University, Cairo, Egypt.
F.
M.
Bendary
Faculty of Engineering "Shoubra" Benha University, Cairo, Egypt.
A.
A.
Emery
National Energy Control Center, Cairo, Egypt.
M.
A. Moustafa
Hassan
Elec. Power Dept., Cairo University, Giza Egypt.
10.21608/iceeng.2012.30799
This paper presents a method to get the optimal tuning of Proportional Integral Derivative (PID) controller parameters for an AVR system of a synchronous generator using Particle Swarm Optimization (PSO) algorithm. The AVR is not initially robust to variations of the power system parameters. Therefore, it was necessary to use PID controller to increase the stability margin and to improve performance of the system. Tuning of optimum (PID) controller parameter yield high<br />quality solution. A new criterion for time domain performance evaluation was defined. Simulation for comparison between the proposed method and Ziegler-Nichols method is done. The proposed method was indeed more efficient also. The<br />terminal voltage step response for AVR model will be discussed in different cases and the effect of adding rate feed back stabilizer to the model on the terminal voltage response. Then the rate feedback will be compared with the proposed PID controller based on use of (PSO) method to find its coefficients. Different simulation results are presented and discussed.
https://iceeng.journals.ekb.eg/article_30799.html
https://iceeng.journals.ekb.eg/article_30799_4e0904e25d8fa75a4c25f0a498f5ec21.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Hybrid FrFT and FFT based Multimode Transmission OFDM System Based
1
12
EN
Ahmed
A A
Solyman
Electronic Warfare Department, Military Technical College, Cairo, Egypt.
Sherif
Elgamel
CeSIP, University of Strathclyde, Glasgow, UK.
Stephan
Weiss
Electronic Warfare Department, Military Technical College, Cairo, Egypt.
John
J
Soraghan
Electronic Warfare Department, Military Technical College, Cairo, Egypt.
10.21608/iceeng.2012.30800
The popularity of multicarrier systems such as orthogonal frequency division multiplexing (OFDM) is based on the ability to cancel inter-symbol-interference (ISI) and channel distortion using a single tap equalizer in the case of a stationary channel. In doubly selective fading channels OFDM transceivers are unable to diagonalize the channel matrix and consequently inter carrier interference (ICI) appears. The discrete fractional Fourier transform (FrFT) has been suggested to enhance performance over traditional OFDM systems when transmitting over doubly-dispersive channels. In this paper a novel hybrid multicarrier system based on the Fractional Fourier transform and Fourier transform is presented. Taking advantage of these properties, we propose an adaptive transmission in those channels using multimode transmission of FrFT-OFDM and FT-OFDM, and evaluate its performances through computer simulations.
Discrete Fourier transform,discrete fractional Fourier transform,Mobile Digital video,Digital Video Broadcasting,Orthogonal frequency-division multiplexing,Time-varying frequency-selective channels
https://iceeng.journals.ekb.eg/article_30800.html
https://iceeng.journals.ekb.eg/article_30800_8edbb29a5b485d837bb1933138883c31.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Modified PTS for PAPR Reduction in MIMIO-OFDM Wireless Systems
1
13
EN
Gamal
Mabrouk
Abdel–Hamid
Assoc. prof. Dr . M.T.C.
10.21608/iceeng.2012.30801
Multicarrier modulation is an attractive technique for fourth generation wireless communication. Orthogonal Frequency Division Multiplexing (OFDM) is multi-carrier transmission scheme. Its high PAPR (Peak-to-Average Power Ratio) of the transmitted signal is a major drawback. We propose to reduce PAPR by probabilistic method of modified Partial Transmits Sequence (PTS), using forward error-correcting codes (FECs) such as Golay codes are employed by finding the optimum phase weighting factors and the sub block partition schemes that can achieve the lowest PAPR and computational complexity of MIMO-OFDM wireless systems. Simulation results show that the modified PTS technique achieves better PAPR reduction with reduced computational complexity of PTS scheme in the MIMO-OFDM systems.
Orthogonal frequency division multiplexing (OFDM),Peak–to-Average Power Ratio (PAPR),modified Partial Transmit sequence (MPTS),Multi- Input-Multi Output Antenna (MIMO)
https://iceeng.journals.ekb.eg/article_30801.html
https://iceeng.journals.ekb.eg/article_30801_a21aaefa76387548de5f877ba4c602b1.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Constant Envelope Single-carrier Frequency Division Multiple Access (SC-FDMA)
1
14
EN
Hossam Eldin
A.
Hassan
Egyptian Armed Forces.
Farouk
A. K.
Al-fuhaidy
Yemani Armed Forces.
Khairy
El-barbary
Egyptian Armed Forces.
10.21608/iceeng.2012.30802
Single-carrier frequency division multiple access (SC-FDMA) has been adopted as a possible air interface for future wireless networks. It combines most of the advantages of orthogonal frequency division multiple access (OFDMA) and the low peak-toaverage-power ratio (PAPR) of single-carrier transmission. In this paper, a new transceiver scheme of Discrete Cosine Transform (DCT) SC-FDMA system is suggested. The suggested system called CE DCT SC-FDMA which refers to constant envelope discrete cosine transform SC-FDMA is based on phase modulation (PM). The output from PM component has the advantage of constant envelope (i.e. 0 dB PAPR) which allows the power amplifier (PA) to operate near the saturation region, thus maximizing the power efficiency and the coverage area. The proposed system is implemented with frequency domain equalization (FDE) to obtain high diversity gains over the frequency multipath channel. The effect of modulation index is evaluated via simulation thus the optimum value can be selected.
SC-FDMA,PAPR,PM,DFT,DCT,M-PAM and FDE
https://iceeng.journals.ekb.eg/article_30802.html
https://iceeng.journals.ekb.eg/article_30802_cc950cc0b277099749a32acc2bc6e7cd.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
A New Single Carrier Frequency Division Multiple Access Based on Discrete Cosine Transform Spread OFDMA.
1
15
EN
Hossam Eldin
A.
Hassan
Yemani Armed Forces.
Farouk
A. K.
Al-fuhaidy
Egyptian Armed Forces.
Khairy
El-barbary
Yemani Armed Forces.
10.21608/iceeng.2012.30803
A single carrier frequency division multiple access (SC-FDMA), is a technique that has a similar performance and essentially the same overall complexity as those of orthogonal frequency division multiple access (OFDMA).In this paper, a strong "energy compaction" property of discrete cosine transform (DCT) is exploiting to enhance the performance of SC-FDMA system. A new SC-FDMA system for uplink wireless transmissions is proposed. The proposed system is based on DCT prior to the OFDMA modulation at the transmitter and reverse operation performed at the receiver. The proposed discrete cosine fourier transform (DCFT) SC-FDMA signal is compared with that of the DFT SC-FDMA and OFDMA signals in terms of bit error rate (BER) and peak-to average power ratio (PAPR). Moreover, the proposed system is compared to a<br />recently introduced DCT SC-FDMA system. Simulation results show that the proposed DCFT SC-FDMA provides a significant improvement in BER performance than the DFT SC-FDMA, OFDMA and DCT SC-FDMA. There is a BER improvement of a gain up to 7 dB compared to OFDMA, 5 dB when compared to DFT SC-FDMA and 3 dB when compared to DCT SC-FDMA. In addition, it is found that the PAPR of the DCFT SC-FDMA signals is lower than that of OFDMA signals. Moreover, the proposed system complexity is comparable with the traditional DCT SC-FDMA.
SC-FDMA,OFDMA,PAPR,DCT and DFT
https://iceeng.journals.ekb.eg/article_30803.html
https://iceeng.journals.ekb.eg/article_30803_0cd59626ab0f62efd5975354d00f13fe.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Optimizing QoS for Voice and Video using DiffServ-MPLS
1
13
EN
N.
H.
Almofary
Faculty of Engineering, Mansoura University, Mansoura, Egypt.
F.
W.
Zaki
Faculty of Engineering, Mansoura University, Mansoura, Egypt.
10.21608/iceeng.2012.30804
All the new emerging QoS architectures are motivated by the desire to improve the overall performance of an IP network. Differentiated Services (Diffserv) define a model for implementing scalable differentiation of QoS in the Internet. Multiprotocol Label Switching (MPLS) is a fast label-based switching technique that offers new QoS capabilities for large scale IP networks. When an MPLS network supports DiffServ, traffic flows can receive class-based network treatment that provides bases for QoS guarantees.The objective of this work is to study the influence of the QoS mechanism via DiffServ-MPLS on network parameters such as jitter, delay and throughput . The comprehensive study showed general improvement in the throughput, jitter and delay particularly of voice and video transmission when using DiffServ-aware<br />MPLS network as compared to pure IP only or MPLS only.
VOIP,MPLS,Diffserv QoS,OPNET
https://iceeng.journals.ekb.eg/article_30804.html
https://iceeng.journals.ekb.eg/article_30804_6f5fe2ad92b8386dd2bfe115cd969bd8.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Appraisal of Different Particle Filter Resampling Schemes Effect in Robot Localization
1
9
EN
Imbaby
I.
Mahmoud
Nuclear Research Center, Atomic Energy Authority.
Asmaa
Abd El Tawab
Nuclear Research Center, Atomic Energy Authority.
May
Salama
Benha University, Faculty of Eng., Shoubra , Eletronic and Comm. Dept.
Howida
A.
Abd El-Halym
Nuclear Research Center, Atomic Energy Authority
10.21608/iceeng.2012.30805
This paper considers the effect of the Resampling schemes in the behavior of Particle Filter (PF) based robot localizer. The investigated schemes are Multinomial Resampling, Residual Resampling, Residual Systematic Resampling, Stratified Resampling and Systematic Resampling. An algorithm is built in Matlab environment to host these schemes. The performances are evaluated in terms of computational complexity and error from ground truth and the results are reported. The results showed that the localization plan which adopts the Systematic or Stratified Resampling scheme achieves higher accuracy localization while decreasing consumed computational time. However, the difference is not significant. Moreover, a particle excitation strategy is proposed. This strategy achieved significant improvement in the behavior of PF based robot localization.
Particle Filter,Robot Localization,Resampling
https://iceeng.journals.ekb.eg/article_30805.html
https://iceeng.journals.ekb.eg/article_30805_16efca1a8694eb5956a01005c479a349.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Modeling and Measurements of Laser Spot Position Determination Circuit with a Quad Detector
1
17
EN
Mohamed
F.
Heweage
Egyptian Armed Forces.
Samy
A.
Ghoniemy
Egyptian Armed Forces.
Ayman
M.
Mokhtar
Egyptian Armed Forces.
Mekheimer
A.
Soliman
Egyptian Armed Forces.
Ahmed
Eldamarawy
Egyptian Armed Forces.
10.21608/iceeng.2012.30806
In this paper we are interested in modeling, simulation, and measurement of laser spot position determination circuit (LSPDC) with a quadrant detector (QD). Photodiode is modeled using its differential equations then implemented using ORCAD –pspise. Starting with the output of the detector, the circuit modeling and simulation for the preamplifier, post amplifier, ADC and microcontroller card were performed. PCB card implementation was performed and integrated with the QD and the necessary optical system components. The implementation of the full LSPDC with the detector is performed. General system for testing the spot LSPDC was performed with a laser source simulating the incident radiation and a mechanical system to enable adjusting different angles. Good agreement was achieved between the measured data and the adjusted angles with a small error attributed to the error in the adjusted mechanical system and the stability of the used laser source.
Photodiode modeling,Quad detector,spot position measurements
https://iceeng.journals.ekb.eg/article_30806.html
https://iceeng.journals.ekb.eg/article_30806_857ebcfe613b9a679abddda8bad5811a.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
A Comparison Study between Inferred State-Space and Neural Network Based System Identifications Using Adaptive Genetic Algorithm for Unmanned Helicopter Model
1
21
EN
Ahmed
M.
Hosny
Egyptian Armed Forces.
10.21608/iceeng.2012.30807
In this paper, system identifications of an unmanned aerial vehicle (UAV) based on inferred state space and multiple neural networks were presented. In this work an optimization approach was used to conclude an inferred state space and the multiple neural networks system identifications based on the genetic algorithms separately. The UAV is a multi-input multi-output (MIMO) nonlinear system. Models for such MIMO system are expected to be adaptive to dynamic behavior and robust to environmental variations. This task of accurate modeling has been achieved with multi-neural network<br />architecture in the most recent years. The presented work is focusing on an inferred state space based system identification which is a new approach seldom used, but it is also easier and more stable compared with the multi-network based system identification during the modeling of dynamic behavior of nonlinear systems. In other words the number of inputs used in the genetic algorithm to obtain an inferred state space is almost one third of the number of inputs needed to develop the multi-layer recurrent neural network architecture to simulate the required dynamic behavior of a real model. The neural network models are based on the autoregressive technique with linear and nonlinear networks. The simulation results presented in this paper show the superiority of the inferred state space model compared with the autoregressive technique based multi-neural network.
UAV Unmanned Aerial Vehicle,RC Remote Control,PI Performance Index,RNN Recurrent Neural Network,GA Genetic Algorithm,ISS Inferred State Space
https://iceeng.journals.ekb.eg/article_30807.html
https://iceeng.journals.ekb.eg/article_30807_6a729682f8a9b8612a31af4c3bf3fdbf.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Design and Implementation of Digital Delay Line Integrator (DDLI) using FPGA and DSP
1
9
EN
Saad
M.
El gayar
Fathy
M.
Ahmed
Nabil
G.
Mikhail
10.21608/iceeng.2012.30808
In the present work, the design and implementation of digital delay line integrator (DDLI) which is a common radar signal processing technique is proposed. The design and implementation is achieved using two of the new developed digital hardware platforms: Digital Signal Processors (DSP) and Field Programmable Gate Arrays (FPGAs). Comparison between these developed digital hardware platforms based on the implemented DDLI is introduced. This is done to find out the aspects of choosing which platform is the best for implementing certain radar signal processing technique.
https://iceeng.journals.ekb.eg/article_30808.html
https://iceeng.journals.ekb.eg/article_30808_165f7e398b94152c9467e8d978b68358.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Design for Testability Technique for Microcontroller
1
18
EN
Sherif
I.
Morsy
Egyptian Armed Forces.
Mohamed
H.
El-Mahlawy
Egyptian Armed Forces.
Gouda
I.
Mohamed
Egyptian Armed Forces.
10.21608/iceeng.2012.30809
Testing of embedded system including microcontroller is difficult task with external Automatic Test Equipment (ATE). Therefore, empowering the microcontroller to test itself as software-based self-testing (SBST) looks the suitable solution like the microprocessor testing. Practically, the SBST is not suitable for microcontroller testing. It utilizes large space area in the program memory inside the microcontroller that has limited space area in the available memory. Also, it cannot test all microcontroller internal modules and when it test internal modules it cannot make sure that the General Purpose Input Output (GPIO) of the microcontroller work probably without using external ATE. So the Design for Testability (DFT)<br />methodology that uses Instruction Set Architecture (ISA) of the microcontroller family to generate test subroutines and for the Test Pattern Generator (TPG) and part of the Built-In Self-Test (BIST) control unit and uses the external ATE for the other part of the BIST control unit and for the test response compaction (TRC) and evaluation. This paper introduces a hybrid testing methodology that combines both SBST and hardware-based self-test (HBST) for microcontroller testing as an efficient DFT methodology. It introduces for either in the field or as part of a production test of a microcontroller as an example of the system of chip (SoC). This DFT methodology is based on divide and conquer algorithm and requires knowledge of the ISA of the microcontroller to test not only the embedded processor found in microcontroller but also test other peripherals found in it using brute force technique. The comparison between the SBST and the presented hybrid methodology is based on memory utilization, number of clock cycles that was taken to complete each test and the number of modules that can be tested using each of them. Experimental results indicate that the presented methodology is superior in memory utilization, test time and can test all microcontroller modules for both 18F4X2 and 16F87X families.
Design-for-Tetability (DFT),Built-In Self-Test (BIST)
https://iceeng.journals.ekb.eg/article_30809.html
https://iceeng.journals.ekb.eg/article_30809_1a2a4357123742dc676a44944378e73c.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Fusion of Low-Cost MEMS IMU/GPS Integrated Navigation System
1
23
EN
A.
D.
Abosekeen
Master Student,M.T.C, Egyptian Air Forces.
A.
E.
Abdalla
Assoc. Prof, Dean of M.T.C,M.T.C, Egyptian Air Forces.
10.21608/iceeng.2012.30810
In this paper, the multi-sensor data fusion technique based on fuzzy clustering is used to fuse the data from low cost MEMS IMUs to build an INS model. Using this model, the inertial navigation data PVA is extracted. The navigation data PVA is integrated with the GPS data using Kalman filters to build an accurate navigation system of an UAV. Simulation results show that the method can achieve higher accuracy solutions with low cost IMU sensors and improve the performance of<br />integrated navigation system.
Data fusion,fuzzy,data clustering,Inertial Navigation system (INS),Global Navigation system(GPS),Kalman Filter(KF),andINS/GPS Integration
https://iceeng.journals.ekb.eg/article_30810.html
https://iceeng.journals.ekb.eg/article_30810_3101bbd16c3b44f85fc92f377a5123aa.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
The generation of Bessel beams using nanoscale planar slit arrays
1
10
EN
Ismail
M.
Nassar
Faculty of Engineering, Ain Shams University, Abbassia, Cairo, Egypt.
Aladin
H.
Kamel
Advanced Industrial, Technical and Engineering Center, Cairo, Egypt.
Diaa
Khalil
Faculty of Engineering, Ain Shams University, Abbassia, Cairo, Egypt.
Omar
A.
Omar
Faculty of Engineering, Ain Shams University, Abbassia, Cairo, Egypt.
10.21608/iceeng.2012.30811
In this paper we propose a nanoscale planar lens structure for generating Bessel beam like fields to achieve large focal lengths and depth of fields. The structure consists of sub wavelength slits of different widths constructed on a thin metallic slab that is surrounded by air on both sides. The proposed structure is simulated using a modal technique that represents the structure as a waveguide and solves for the modes of the waveguide. Although diffraction affects the behavior of the generated beam from that of conventional Bessel beams, the simulation results show that the proposed structure is very promising for obtaining a very compact Bessel beam generator.
Planar lens,Bessel beam,Modal technique
https://iceeng.journals.ekb.eg/article_30811.html
https://iceeng.journals.ekb.eg/article_30811_2f850bdd79a06de038414fab38c925b7.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Effect of Mutual Coupling on MIMO capacity of a Microstrip Antenna Array
1
12
EN
M.
M.
Aldemerdash
College of Engineering, Mansoura University, Mansoura, Egypt.
A.
M.
Abdin
Yanbu Industrial College, Yanbu, Saudi Arabia.
A.
A.
Mitkees
MTC, Cairo, Egypt.
H.
A.
Elmikati
College of Engineering, Mansoura University, Mansoura, Egypt.
10.21608/iceeng.2012.30812
The effect of mutual coupling on the capacity of Multiple-Input-Multiple Output (MIMO) antenna systems is demonstrated by considering a linear array of a four element line fed microstrip patch array. This array is designed at ISM band with<br />frequency of 2.45 GHz on FR4 Epoxy substrate with relative permittivity (er) of 4.4. The simulation results obtained with this array are compared with the results of a similar array having 2 columns and 4 rows spiral Electromagnetic Band Gap (EBG) structure. The spacing between array elements is variable at the transmitting end and fixed at the receiving end with 0.5l. Array impedance matrices are obtained from simulation results generated by the Ansoft designer software and then used in the calculation of the required coupling matrix. The one-ring channel model is used to compute the correlation between paths and mean capacity of the MIMO system for equal power (EP) and waterfilling (WF) schemes at SNR of 20 dB. A maximum mutual coupling reduction of 17 dB is achieved as a result of using spiral EBG structure. For element spacing in the range (0.48l - 0.6l), which is suitable for the design of antenna arrays, the mutual coupling reduces the correlation level from the ideal case by about 0.15 and the mean capacity by (0.1 – 0.42) b/s/Hz. The reduction of the mutual coupling by spiral EBG structure improves the correlation and the mean capacity that their values are reaching the ideal.
MIMO systems,Antenna Arrays,mutual coupling,EBG structure,Channel Capacity,onering model,SCM model,Kroncker model
https://iceeng.journals.ekb.eg/article_30812.html
https://iceeng.journals.ekb.eg/article_30812_f3c3d5dcc7d9f1808fb7a91e95825efd.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
A multi-objective fuzzy-based procedure for maximal preventive reactive power dispatch problem
1
18
EN
Adel
A.
Abou El-Ela
College of Engineering, Minoufiya University, Shebin El Kom, Egypt.
Ragab
A.
El-Sehiemy
College of Engineering, Kafrelsheikh University, Kafrelsheikh, Egypt.
Abdul Allah
M.
Shaheen
South Delta Electricity Distribution Company, Egypt.
10.21608/iceeng.2012.30813
This paper presents a proposed procedure depends on the multi-objective fuzzy linear programming (MFLP) technique to obtain the optimal reactive power reserve for generators and static switchable VAr sources, as a preventive control action to overcome any emergency condition. The proposed procedure is very significant to eliminate violation constraints and give an optimal reactive power reserve for multioperating conditions. The proposed multi-objective functions are: minimizing the real transmission losses, maximizing the reactive power reserve at certain generator, maximizing the reactive power reserve at all generation system and/or switchable VAr devices. The proposed MFLP is applied to a 5-bus test system and the West Delta region system as a part of the Egyptian Unified network. The numerical results show<br />that the proposed MFLP technique achieves a feasible real power loss with maximal reactive reserve for power systems.
fuzzy linear programming,optimal reactive power dispatch,preventive actions
https://iceeng.journals.ekb.eg/article_30813.html
https://iceeng.journals.ekb.eg/article_30813_9152bef654375898c099fe376c54e704.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Power cables inspection using Matlab graphical user interface aided by thermal camera
1
11
EN
F.
fereig
Selim
Department of Electrical Engineering, Kafrelshiekh University, Egypt.
A.
Azmy
Department of Electrical Engineering, Tanta University, Egypt.
I.
Bedir
Department of Electrical Engineering, Taif University, Saudia Arabia.
H.
El desuoki
Department of Electrical Engineering, Arab Academy for Science and Technology, Egypt.
10.21608/iceeng.2012.30815
This paper proposes an efficient method to predict and solve abnormal conditions in all types of electrical cables using Matlab Graphic User Interface “GUI” with thermal imaging infrared “IR” camera. Traditional techniques can not easily predict faults and cannot give a complete diagnose about them. Using any type of thermal cameras enables detecting abnormal conditions of cables by the technical operator (thermographer) depending on their thermal state. Then, thermal images can be sent to the advanced program (GUI) according to the proposed technique. Based on cables database, the<br />proposed interface program and the projected technique are able to: 1) obtain the thermal profile of the system; 2) process and analyze collected thermal data, and 3) apply a simulated artificial technique to define the particular condition or fault corresponding to the thermal signature. The final performed report can contain: 1) problems that are found in the components and the system itself, 2) suggest remedy and any necessary corrective action with time schedule, and 3) give the priority of solving these problems with respect to repair maintenance time, 4) proper selections of cables types and size.
Matlab Graphic User Interface,thermal imaging infrared
https://iceeng.journals.ekb.eg/article_30815.html
https://iceeng.journals.ekb.eg/article_30815_80f28d33b7e893c0d3f56c369953446b.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
IMPACT OF OPERATING DISPERSED GENERATORS ON THE OPERATION OF ELECTRICAL UTILITY WITH APPLICATION IN EGYPT
1
10
EN
S.
M.
Allam
Department of Electrical Engineering
Faculty of Engineering, Menoufia University
Shebin El-Kom, Egypt.
A.
A.
EL-Zeftawy
Department of Electrical Engineering
Faculty of Engineering, Menoufia University
Shebin El-Kom, Egypt.
N.
K.
Shehata
Department of Electrical Engineering
Faculty of Engineering, Menoufia University
Shebin El-Kom, Egypt.
10.21608/iceeng.2012.30816
This work aims to assess the impact of dispersed wind generators (DWG) on the operation of distribution systems and determine the optimal location and penetration level (PL) of these generators with multi-system constrains to achieve a single and multi-objectives function. Genetic algorithm (GA) and SWARM are used as a modern optimization techniques, also the conventional linear programming (LP) technique also been employed to confirm the optimization results obtained by both GA and SWARM techniques, when they applied to assess the impact of DWG on an Egyptian utility operation. These impacts included active and reactive power losses and voltage profiles.
https://iceeng.journals.ekb.eg/article_30816.html
https://iceeng.journals.ekb.eg/article_30816_3c99c1e40f0dfa6004ee8737a62ae002.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Design of the Power Control Module of TD-SCDMA in Fast Fading Channels
1
9
EN
Hatem
Mohamed
Zakaria
Benha Faculty of Engineering, Benha University, Egypt.
Alaa
Hamdie
El-Shafie
Telecom Egypt Company, Egypt.
A.
M.
Al-Bassiouni
Business Development Director, TeleTech Company, Egypt.
10.21608/iceeng.2012.30817
Power Control is essential for CDMA based Mobile Communication Systems. Power Control treats the near far problem, enhances the coverage and the capacity and overcomes fading. Adaptive Power Control improves the system performance in case of severe fading conditions. This paper considers the design of the Power Control module of TD-SCDMA system in fast fading condition. A closed loop adaptive step size power control algorithm is suggested. The proposed power control module can be easily implemented within the TD-SCDMA chipset.
CDMA,fast fading,TD-SCDMA and power control
https://iceeng.journals.ekb.eg/article_30817.html
https://iceeng.journals.ekb.eg/article_30817_a6a95d97f0213be9a51d11008dfeacea.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Curvelet transform for water bodies extraction from high resolution satellite images
1
19
EN
Mohamed
Elhabiby
Ain Shams University, Cairo.
A.
S.
Elsharkawy
Egyptian Armed Forces.
N.
El-Sheimy
Dept. of Geomatics Engineering, University of Calgary, Calgary, Alberta.
10.21608/iceeng.2012.30818
In this research paper, a new implementation on the second generation curvelet transform in the edge detection of coastline is presented and applied on WorldView-2 imagery, together with a comparison with the classical edge detection methods such as Canny operator and the traditional wavelet transforms. This implementation is aiming to compare this new approach to the traditional edge detection techniques. It is found that the curvelet proposed implementation performs better in detecting larger and elongated structures compared to the Canny and the wavelet transforms. However, Although this method is promising and efficient for edge detection, the quality of the edge detection is still a function of the pre-processing steps (the classification step in this research paper) , as any edge detector will suffer from the heterogeneity of the images especially when using very high resolution imagery.
Curvelet transform,Wavelet Transform,edge detection,high resolution satellite imagery
https://iceeng.journals.ekb.eg/article_30818.html
https://iceeng.journals.ekb.eg/article_30818_1501ec7c24120427fbf9984c0ab2eff0.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Optimal Orbit Parameters for Power Subsystem of LEO Satellites
1
25
EN
M.
El-Heddeiny
M.
Ashry
M.
A.
Bader
A.
M.
ATALLAH
10.21608/iceeng.2012.30819
The main objective of this paper is to design a Low-Earth-Orbit (LEO) Satellite Power Subsystem based on the variations in orbit parameters. Additionally, finding out the optimal orbit, altitude, and inclination angle; considering both solar array components and energy storage devices. There are two main challenges in this work. The first challenge is to provide the Electrical Power Subsystem (EPS) with an additional power to compensate for the solar cell’s degradation until End-of-Life (EOL) due to the presence of a rarefied atmosphere in LEO. The second challenge arises as a result of eclipses experienced by LEO more frequently and thus more charging/discharging cycles than satellites in Geosynchronous Earth orbit (GEO) leading to more stresses on the LEO batteries, which means higher degradation and lower performance. Accordingly, the aforementioned challenges were tackled by the simulation and analysis based on the<br />variations of the orbit parameters using Satellite Tool Kit software (STK8.1.1) to result in the optimal orbit, altitude, and inclination angle which provide maximum value for the total generated energy by the solar array during the mission. More importantly, we arrived at the minimum mass and area for solar array simultaneously with minimum values for the batteries’: mass, volume, capacity, and total number of cycles, leading to a reduction in the charge/discharge cycles, i.e. lower degradation and higher performance.
altitude,Beta angle,Inclination angle,LEO Satellite,Orbit parameters
https://iceeng.journals.ekb.eg/article_30819.html
https://iceeng.journals.ekb.eg/article_30819_f80485fadf73c4cdfaa9650e83f14ca0.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Tradeoffs for Selecting Orbital Parameters of an Earth Observation Satellite
1
12
EN
E.
Sh.
Sanad
M.SC., Student, M.T.C, Egyptian armed forces.
A.
Y
EL Raffie
Ph.D., Researcher in National Authority of Remote Sensing and Space Sciences.
F.
Altohamy
Dr., Ph.D., M.T.C, Egyptian armed forces.
M.
A.
Zayan
Dr., Ph.D., Satellite Control Station Manager in Egyptian Satellites Company, Nilesat.
10.21608/iceeng.2012.30820
Selection of orbital parameters for earth observation satellites is the most reflective factor upon fulfillment of the space mission requirements. Practically, straight forward approach for selection of these parameters does not exist. Therefore, it is necessary to follow a complex process that requires tradeoffs among the different parameters and the corresponding<br />orbit-related requirements. Multiple mission requirements often drive the orbit to different or even opposite trends. For Earth observation satellites, the most important orbit-related requirements are the Earth coverage, payload performance characteristics, ground communication, environment and survivability, orbit life time, availability of launch vehicle<br />and legal and political constraints. In this work, analyses of how each orbital parameter would affect these requirements are introduced. Then the tradeoffs for compromising among contradictions are presented. To demonstrate with numerical example, a mathematical modeling for the correlations among altitude, revisit time, ground resolution and a single<br />satellite slewing maneuver angle is developed. To implement for large scope of the mentioned parameters, a corresponding Matlab computer program is also developed. As an output, four parametric charts representing the correlations among altitudes, satellite slewing maneuver angle, ground resolution and the revisit time are obtained. The revisit time works as a parameter in these charts. Finally, a demonstrative tradeoff is introduced via those charts.
[Orbital parameters,Earth observation,Earth coverage,satellite orbit design,satellite tracking,orbital altitude,and orbital revisit time]
https://iceeng.journals.ekb.eg/article_30820.html
https://iceeng.journals.ekb.eg/article_30820_29f80c12c5fef42db2416ea733f33c40.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Automatic control education using FlightGear and MATLAB based virtual lab
1
15
EN
M.
Moness
Faculty of Engineering, Minia University, Minia, Egypt.
A.
M.
Mostafa
Faculty of Engineering, Minia University, Minia, Egypt.
M.
A.
Abdel-Fadeel
Faculty of Engineering, Minia University, Minia, Egypt.
A.
I.
Aly
Faculty of Engineering, Minia University, Minia, Egypt.
A.
Al-Shamandy
Faculty of Engineering, Minia University, Minia, Egypt.
10.21608/iceeng.2012.31372
In this paper, a virtual lab based on MATLAB and FlightGear flight simulator is discussed and developed. The virtual lab consists of number of experiments that enhances the understanding of fundamental concepts of classical control for<br />undergraduate students. The objective of the virtual lab is to design a stability augmentation system for C310 aircraft model according to known flying qualities then implement a hold autopilot for the aircraft. This objective is achieved through a series of experiments, animation and simulation to illustrate main concepts of classical control like modeling, time domain analysis, frequency domain Analysis, non-minimum phase systems, root locus, feedback design and PID compensation. These concepts are demonstrated in four experiments through the analysis and design of a flight control<br />system for Cessna 310 aircraft on FlightGear flight simulator. The developed virtual lab can be used easily by students to study and visualize classical control principles using FlightGear and MATLAB GUI with an attractive case study of a flight control system.
virtual lab,automatic control education,flight simulator and FlightGear
https://iceeng.journals.ekb.eg/article_31372.html
https://iceeng.journals.ekb.eg/article_31372_babaedab4f2e1a8bbdd2e60d718c6eab.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Comparison between Kalman Filter and PHD Filter in Multi-target Tracking
1
14
EN
M.
Nabil
M.Sc. student, Military Technical College, Cairo, Egypt.
H.
Kamal
Department of Radar staff (Ph.D.), Military Technical College, Cairo, Egypt.
M.
Hassan
Department of Radar staff (Ph.D.), Military Technical College, Cairo, Egypt.
10.21608/iceeng.2012.31375
Tracking a maneuvering target weakens the performance of predictive-model-based Bayesian state estimators (Kalman Filter). Therefore, the Probability Hypothesis Density (PHD) filter was proposed to overcome this problem. In this paper, the performance of Kalman filter, modified Kalman filter, and PHD filter in tracking a highly maneuverable target is shown. All three algorithms to track a maneuverable target are applied. Monte Carlo simulation showed that the PHD filter provides promising performance compared to Kalman filter. In particular, the algorithm is capable of tracking multiple crossing maneuvering targets.
Multi-target Tracking,Kalman filter,Probability Hypothesis Density (PHD Filter)
https://iceeng.journals.ekb.eg/article_31375.html
https://iceeng.journals.ekb.eg/article_31375_1c02a2231628eb73a8566ab310416ef2.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Design and Implementation of Digital Missile Trajectory Controller
1
10
EN
A.
F.
Sobh
M.Sc. student, Dpt. Of Guidance, Military Technical College, Cairo, Egypt.
A.
M.
Eldamarawy
Ph.D. Defense Systems Studies Center, Cairo, Egypt.
Y.
Z.
Elhalwagy
Associated Prof., Guidance Dep., Military Technical College, Cairo, Egypt.
R.
A.
Elbardeny
Ph.D., Lecturer, Guidance Dep., Military Technical College, Cairo, Egypt.
10.21608/iceeng.2012.31378
The missile mission success depends on robust guidance techniques in which the missile is to be guided to fulfill a correct trajectory up to hit point. This paper is devoted to discuss the design, implementation and verification of a digital trajectory generator (DTG) and its application for guided vehicles. The DTG is fed with target position and environmental parameters. The suitable trajectory missile attitude angles are generated as a function of time and are transmitted from the launcher to the missile via the four standard control wire dispended from the missile during flight. For the simulation<br />purposes, an adaptation is developed to interface the DTG with the software based missile simulator through the standard USB port. A synchronizer is embedded in the DTG hardware design to synchronize and simulate the missile leave launch event. The design is verified by comparing the results of the basic stand alone flight simulator and those with the DTG hardware in the loop simulations in various operating points. Promising results showed potential for an on-going research and development for the system of concern. Developed DTG is a must step on upgrading the guided vehicles via using a goniometer in the launcher or via integrated onboard with homing head.
Robust guidance,Digital trajectory generator (DTG),Embedded Systems,Programmer electronic controller (PEC),semi-automatic command to line of sight (SACLOS)
https://iceeng.journals.ekb.eg/article_31378.html
https://iceeng.journals.ekb.eg/article_31378_b60da785955a86d19f957c6d0fa90eea.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
AUTOMATIC ADAPTIVE WINDOW TRACKING BASED ON COLOR PROBABILITY DISTRIBUTION
1
9
EN
Wael
Mohamed
Yousf
Osama
Mohamed
Elmowafy
Ibrahim
Ali
Abdl-Dayem
Alaa Eldin
Mohamed
Fahmy
10.21608/iceeng.2012.31379
This paper introduces a proposed modified approach of an end-to-end technique for moving targets tracking. The tracking technique is processed on a real-time video stream. The proposed approach is a prolongation of the Continuously Adaptive Mean Shift (CAMShift) algorithm applications. Sever variations in target shape, size and luminosity can be dealt better using this algorithm. Edge detection technique is used to deal with the change in target shape and size. An estimator is used to deal with luminosity changes. A proper size of tracking window is built with minor extra computational overhead. Experimental results show the effectiveness of the proposed algorithm.
Tracking,CAMShift,edge detection
https://iceeng.journals.ekb.eg/article_31379.html
https://iceeng.journals.ekb.eg/article_31379_41b3c241ed023585661a9dd41af6f8ef.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Automatic detection of sleep apnea using a hidden Markov model and nonlinear analysis of nocturial oximetry
1
13
EN
Fatma
Z.
Abdel- Mageed
Department of Electronics and Communications Engineering, Mansoura
University, Egypt.
F.
E. Z.
Abou Chadi
Department of Electronics and Communications Engineering, Mansoura
University, Egypt.
Hosam
M.
Salah
Department of Electronics and Communications Engineering, Mansoura
University, Egypt.
Shahira
F.
Loza
Cairo Center For Sleep Disorder, Cairo, Egypt.
10.21608/iceeng.2012.32689
The aim of this work is to develop an automatic system that can be used as an assistant tool for the detection and diagnosis of different kinds of sleep Apnea (Obstructive, Hypopnea and Central Apnea, respectively). Three nonlinear techniques were used for feature extraction: Central tendency measures (CTM), Lempel-Ziv complexity (LZC) and Approximate Entropy (ApEn) for oxygen saturation signals (SaO2). A statistical Comparison using (t – test) was performed for comparing the population mean of normal group with each of the Sleep Apnea groups for the nonlinear parameters. Three Hidden Markov Models (HMMs), based on Baum–Welch algorithm were proposed to estimate the optimal number of the parameters. The results have showed that the use of HMM and the nonlinear features gave promising results used for classifying Sleep Apnea diseases.
https://iceeng.journals.ekb.eg/article_32689.html
https://iceeng.journals.ekb.eg/article_32689_014b3984ab0c183826c618a2f17f4374.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Analysis and classification of sleep EEG
1
8
EN
Noha
E.
El-Kafrawy
Egyptian Armed Forces.
F.
E. Z.
Abou-Chadi
Benha High Technology Institute, Benha, Egypt.
S.
I.
Rihan
College of Engineering, Cairo University, Cairo, Egypt.
10.21608/iceeng.2012.32692
In the present paper, a comparative study of performance for three techniques of feature extraction is presented in order to classify the sleep stages using EEG signals. A multilayer feed forward neural network was used for classification. Six sleep EEG records for each of ten patients were selected from Cairo Center of Sleep Disorder. Three methodologies of analysis were utilized for feature extraction. These include: autoregressive modeling (AR), bispectral analysis, and discrete wavelet transform (DWT), where principle component analysis (PCA) was used to reduce feature dimensionality. The features derived from the three methodologies of signal analysis were used as input feature vectors to the classifier. Information fusion is very important task in pattern recognition as it is difficult to develop classifiers with a high<br />identification performance rate. The multilayer feed forward neural network gives higher classification rate using the data fusion at the feature extraction level. It reaches 83.4%.
Autorgressive modeling,Bispectral Analysis,Discrete Wavelet Transform,principle componenet analysis,multilayer feed forward neural network
https://iceeng.journals.ekb.eg/article_32692.html
https://iceeng.journals.ekb.eg/article_32692_7a5a8ed0ef48b58dc562b3916a291eb2.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Protein function Motif extraction based on single function category sequence alignment in yeast
1
9
EN
Khaled
Sayed
Ahmed
College of Engineering, Modern University for Technology and Information,
Cairo, Egypt.
10.21608/iceeng.2012.32694
Protein function prediction is one of the most vital problems in the field of proteomics since it leads to determining cell functions and identifying the diseases and their effect. Since proteome is divided into clusters, each cluster (group of proteins) should have common characteristics. One of these characteristics is to have the same functions. In this study we try to extract motifs for each sub-function category of yeast proteins. The technique is based on applying multiple sequence alignment (MSA) to all yeast protein function categories. The protein sequences are collected from different data sources as DIP, PIR, and SWISS PROT and CLC program is used to apply the sequence alignment. The technique is applied to proteins having single function only that because multi function proteins can be affected by the functions correlation. Threshold is determined for every protein function category to indicate the most common frequent amino acids to be a feature for this category. After implementing the algorithm, sequence is verified with some proteins have the correct functions and the gained results are good. The technique is considered as verification method for protein function prediction. And reference database table is constructed based on the extracted motifs.
sequence alignment,Motif extraction,consensus,Function category
https://iceeng.journals.ekb.eg/article_32694.html
https://iceeng.journals.ekb.eg/article_32694_d55d3c3e6507f98352e48f93ae27ea60.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Extraction of Human Iris Patterns for Biometric keys Generation
1
13
EN
Khaled
Hassanain
Technical Research Department, Egypt.
Eman
Hesham
Faculty of computers and Information, Helwan University, Egypt.
10.21608/iceeng.2012.32695
With the increasing reliance on electronic information, which needs to be exchanged across the internet or stored on open networks, cryptography is becoming an increasingly important feature of computer security. A biometric key dependent<br />cryptosystem is proposed, to ensure the security of the whole system by using iris pattern as a key in a cryptosystem, like, Key-dependent Advanced Encryption Standard (KAES). KAES is used to ensure that no trapdoor is present in cipher and to expand the key-space to slow down attacks. The proposed system gave significant results under various tests for the key uniqueness and the system randomness.
AES,SHA-1AES,KAES,MD5,RNG,PRNG,SHA-1
https://iceeng.journals.ekb.eg/article_32695.html
https://iceeng.journals.ekb.eg/article_32695_c8f326f07c09dc1bb1fb305483624985.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
GENERATION OF SOLAR COMBINED CYCLE POWER PLANTS WITH APPLICATION IN EGYPT
1
16
EN
A.
A.
El.Zeftawy
Professor of electrical power, Faculty of Engineering, Menoufiya University,
Shebin El-Kom, EGYPT.
S.
M.
Allam
Associated Professor, Faculty of Engineering, Menoufiya University, Shebin
El-Kom, EGYPT.
H.
H.
Diab
B.Sc.Elec.Engineering, Faculty of Engineering, Menoufiya University,
Shebin El-Kom, EGYPT.
10.21608/iceeng.2012.32697
Renewable energy sources (RESs) are used with the bulk power supply in many of the world countries and Egypt. Also, solar technology is available option of these RESs for Egypt, because the sunrise from 3000 to 4000 hours per year with average solar radiation of 2000 to 2400 kWh/m2/year in many regions of Egypt. Solar thermal power plants (STPPs) are the most economic form of solar technology for electricity generation. These STPPs are consisted of four elements. These are solar collector, receiver, transport-storage and energy conversion. Also, this power plant may be integrated with gas or/and steam turbine of a conventional power plant (CPP).The generation of a STPP depends on the efficiency of its elements, the meteorological data at the installation site, and the integrated combined cycle with CPPs. So, this paper aims to model the efficiency of the STPP elements and the generation of this power plant with an integrated solar combined cycle (ISCC) power plant. This model is applied numerically to compute the generation of the first STPP integrated with a gas power plant at El-Kuraymat, considering the design of this power plant and meteorological data at the aforementioned site in Egypt.
solar energy,Solar Thermal Power Plant,Integrated Solar Combined Cycle,modeling,Generation,Egypt
https://iceeng.journals.ekb.eg/article_32697.html
https://iceeng.journals.ekb.eg/article_32697_93827222ee3a12adb707d43cdfcbefbb.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Effective of hall current on unsteady Couette flow with heat transfer in the presence of a heat source and uniform suction and injection
1
13
EN
Hazem
Ali
Attia
Faculty of Engineering, Fayoum University, Fayoum, Egypt.
Karem
Mahmoud
Ewis
Faculty of Engineering, Fayoum University, Fayoum, Egypt.
Ibrahim
Hamdy
Abd Elmaksoud
Faculty of Engineering, Fayoum University, Fayoum, Egypt.
10.21608/iceeng.2012.32699
The unsteady magnetohydrodynamic (MHD) Couette flow with heat transfer of an electrically conducting, viscous, incompressible fluid bounded by two parallel insulating porous plates is studied in the presence of uniform suction and injection and a heat source considering the Hall effect. An externally applied uniform magnetic field as well as a uniform suction and injection are applied in the direction perpendicular to the plates. A uniform and constant pressure gradient is imposed in the axial direction. The two plates are kept at different but constant temperatures while the Joule and viscous<br />dissipations are included in the energy equation. The effect of the Hall current and the uniform suction and injection on both the velocity and temperature distributions is investigated and interesting results are presented for different values of the parameters of the problem.
Couette flow,Hydromagnetic,heat transfer,Hall current,numerical solution
https://iceeng.journals.ekb.eg/article_32699.html
https://iceeng.journals.ekb.eg/article_32699_a60e76e6d4047fec9e5bbf0f35b1fd0e.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Circular pipe flow of a dusty Casson fluid considering the hall effect
1
13
EN
Hazem
Ali
Attia
Faculty of Engineering, Fayoum University, Fayoum, Egypt.
Karem
Mahmoud
Ewis
Faculty of Engineering, Fayoum University, Fayoum, Egypt.
Ibrahim
Hamdy
Abd Elmaksoud
Faculty of Engineering, Fayoum University, Fayoum, Egypt.
10.21608/iceeng.2012.32700
Abstract:<br />In the present paper, the time varying flow of a dusty viscous incompressible<br />conducting non-Newtonian Casson fluid through a circular pipe is studied considering<br />the Hall effect. A constant pressure gradient in the axial direction and a external<br />uniform magnetic field perpendicular to the flow direction are applied. A numerical<br />solution is obtained for the governing nonlinear equations using finite differences and<br />the effect of the different physical parameters on the velocity distributions of fluid and<br />dust particles are reported.
Magneto-fluid mechanics,computational methods,flow in channels,circular pipe flow,non-Newtonian fluid,Casson fluid,Hall current
https://iceeng.journals.ekb.eg/article_32700.html
https://iceeng.journals.ekb.eg/article_32700_e41bfe8b6db75e0ec8ac471e3e5c71ba.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Narrowband Interference Cancellation in DS-CDMA System Using a Suppression Filter
1
15
EN
A.
Hanafy
Egyptian Armed Forces.
Khairy
El-Barbary
Suez Canal University.
Hossam
Abou Bakr
Egyptian Armed Forces.
Ashraf
M.
Samy
Egyptian Armed Forces.
10.21608/iceeng.2012.32702
In this paper the performance of the DS-CDMA system employing a suppression filter for rejection of narrow band interference (NBI) is provided. Two types of NBI, namely the binary phase shift keying (BPSK) and the single tone interferences, are considered. The behavior of the DS-CDMA system with and without a suppression filter over a<br />Raleigh fading channel and under the effect of the two types of NBI is analyzed. The effects of suppression filter coefficients, DS-CDMA system parameters, and the NBI parameters on the performance of the system are evaluated analytically. It is shown that the suppression filter is more effective against the single tone NBI than in the case of<br />the BPSK NBI. Moreover, it is proved that using a suppression filter with total three taps is sufficient to mitigate the effect of either the BPSK or single tone NBI.
CDMA,narrowband interference,suppression filter
https://iceeng.journals.ekb.eg/article_32702.html
https://iceeng.journals.ekb.eg/article_32702_709d055c8200f5cd3b66af0fb678433d.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Collision Problem Avoidance in Packet Acquisition for Frequency Hopped Random Multiple Access
1
11
EN
M.
Sakr
P.H.D student, Dpt. of Communication, MTC, Cairo, Egypt.
A.
Al-Moghazy
Associate professor, Dpt. of Communication, Higher Technical Institute in 10th of
Ramadan, Cairo, Egypt.
H.
Abou-Bakr
Associate professor, Dpt. of Electronic warfare, MTC, Cairo, Egypt.
M.
Fikri
Professor, Dpt. of Communication, Cairo University, Giza, Egypt.
10.21608/iceeng.2012.32705
Random multiple access (RMA) comprises a large class of multiple access protocols, such as ALOHA. A common characteristic of all RMA protocols is that when a user transmits a data packet other users waiting until the transmission finished, so RMA can achieve very low latency and limit the network performance. In this paper a new technique that uses time and frequency hopping is proposed to solve the collision problem in packet acquisition of frequency hopped systems operating in random multiple access (RMA) environments. Moreover, the proposed scheme also improves the system performance due to the idea of dividing the time and frequency between all users in the system. Each user has a PN code pattern for any transmitted sync pulse that is responsible for selecting the frequency channel that carry the pulse and<br />selects the time slot that the pulse uses it. We have presented an analytical approach for the proposed scheme to determine the packet acquisition performance in a RMA environment. To illustrate the accuracy of the analytical results, simulations are performed over a wide range of parameters such as the pulse length, pulse duty cycle, number of synchronization pulses and the number of users in the system.
Frequency Hopping,Packet Acquisition,Multiple Access Interference
https://iceeng.journals.ekb.eg/article_32705.html
https://iceeng.journals.ekb.eg/article_32705_e5905d4868c92e03f20f5e936f4bac13.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Multi-user Detection with Different Linear Equalizers for the Downlink MIMO MC-CDMA Systems over Frequency Selective Fading Channel
1
21
EN
Belal
A.
Al-fuhaidi
Yemeni Armed Forces.
Hossam Eldin.
A.
Hassan
Egyptian Armed Forces.
Moataz
M.
Salah
Egyptian Armed Forces.
Salah
S.
Alagooz
Egyptian Armed Forces.
10.21608/iceeng.2012.32706
Modern wireless communications require an efficient spectrum usage and high channel capacity and throughput. Multiple input and multiple output (MIMO), Linear equalizers, multi-user detection (MUD) and multicarrier code-division multiple access (MCCDMA) are possible solutions to achieve spectral efficiency, high channel capacity, eliminate MAI , eliminate ISI and robustness against frequency selective fading. In this paper, we combine all these techniques and investigate BER performance. We propose a low complexity receiver structure for Single-input Multiple-output (SIMO) downlink<br />MC-CDMA systems. It employs an interference cancellation scheme to suppress the interference caused by the multipath fading channel. Also, the proposed scheme is developed for Multiple-input Multiple-output (MIMO) MC-CDMA system. The<br />performance analysis of Downlink MIMO MC-CDMA systems with V-BLAST over frequency selective fading channel is investigated under various number of transmit and receive antennas. The simulation results show that MIMO MC-CDMA with V-BLAST multi-user detection provides high data rate and the BER significant improvement when MIMO-MC CDMA with multi user detection and different linear equalizers is applied.
MC-CDMA,SIMO,MIMO,MMSE,RZF,PIC,ISI,MAI and rake receiver
https://iceeng.journals.ekb.eg/article_32706.html
https://iceeng.journals.ekb.eg/article_32706_63f9d3ead352471ef06880e2fd127cd6.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
On The Study of Signal Bandwidth Limitations for Wideband DOA Estimation
1
12
EN
Mohamed.
S.
Alsholle
Libyan Armed Forces.
Mahmoud.
A.
Abdalla
MTC.
Hesham.
A.
Elregaily
MTC.
Abd-El-Aziz.
A.
Mitkeess
MTC.
10.21608/iceeng.2012.32709
The paper presents the study of limitations of different techniques used for direction of arrival (DOA) estimation of uncorrelated and correlated wideband signals. The study was restricting the inter-sensor spacing of the array antenna to minimal wavelength of the applied wideband signal to avoid spatial ambiguity. The effect of the bandwidth on the estimation accuracy of wideband DOA is described for the case of two incident signals. First we analyzed two uncorrelated signals using MUSIC method. Second we suppose that the two signals are coherent using ML method. The study demonstrated that tradeoff between the signal bandwidth and DOA resolution of wideband signal. The paper suggests suggests reducing the array antenna elements as a solution for this tradeoff.
Multiple Signal Calcification (MUSIC),Direction of Arrival estimation (DOA),Maximum likelihood (ML),Fast Fourier Transform (FFT)
https://iceeng.journals.ekb.eg/article_32709.html
https://iceeng.journals.ekb.eg/article_32709_190683b146924dde51337a4a0a4d54dd.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
A survey of resource discovery in computational grids
1
30
EN
Hesham
A.
Ali
Computer Engineering Department, Mansoura University, Egypt.
Alaa E.
Abdel-Hakim
Electrical Engineering Department, Assuit University, Egypt.
Mohammed
A.
Ahmed
Electrical Engineering Department, Assuit University, Egypt.
10.21608/iceeng.2012.32712
Abstract:<br />Grid computing is a wide spread technology in recent years. It offers an effective way to<br />build high-performance or high-throughput computing systems, allowing users to<br />efficiently access and integrate geographically distributed computers, data, and<br />applications. Searching and locating the resource which match the user's requirements in<br />an efficient and timely manner is the important phase in grid computing which called<br />resource discovery. Discovering resources in grid environment is complex due to the<br />heterogeneous nature, dynamic availability of resources, resources are owned by<br />different individuals and organizations and each having their own resource management<br />policies i.e. different access and cost models. There are many different approaches in<br />literature for solving this problem (e.g. Centralized-based, Hierarchical-based, Agentbased<br />and P2P-based). This paper provides a survey and analysis on ongoing researches<br />as well as evaluation summery of those approaches on this specific area. We believe that<br />this survey would be useful for academic and industry based researchers who are<br />engaged in the design of scalable computational Grid.
grid computing,resource discovery,hierarchical,p2p,Agents
https://iceeng.journals.ekb.eg/article_32712.html
https://iceeng.journals.ekb.eg/article_32712_c6d38f7ccab4729b1a5d4d4e09f886db.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Non-blocking minimum processes coordinated checkpointing for hierarchical computational grid
1
13
EN
Gamal
A.
El-Sayed
Electrical Engineering Department, Assiut University, Egypt.
Aref
M.
Abdullah
Electrical Engineering Department, Assiut University, Egypt.
10.21608/iceeng.2012.32714
Fault tolerance is an important property in grid computing as the dependability of individual grid resources may not be able to be guaranteed. Common fault tolerance techniques in distributed systems are normally achieved with checkpoint recovery, message logging with checkpointing, or through task replication on alternative resources in cases of a system outage. In this paper, we present a mailbox-based non-blocking minimum processes coordinated checkpoint protocol for hierarchical grid. In our grid model, processes on different processors communicate indirectly by sending messages over the network through mailbox-based technique at a shared node. The mailbox of each process can be exploited as an events logger since it logs the messages sent to the process in strict FIFO order. The main advantages of our approach are achieving more parallelism and suiting the highly dynamic environment where processes frequently migrate from one<br />node to anotherز
Coordinated checkpointing,Fault tolerant,non-blocking,message logging
https://iceeng.journals.ekb.eg/article_32714.html
https://iceeng.journals.ekb.eg/article_32714_61b589cb9bff62dc22bbcd1e39d467b3.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Fault-tolerant scalable hierarchical scheduling in grid computing
1
27
EN
Gamal
A.
El-Sayed
Electrical Engineering Department, Assiut University, Egypt.
Aref
M.
Abdullah
Electrical Engineering Department, Assiut University, Egypt.
10.21608/iceeng.2012.32716
Computational grids have the potential for solving large-scale scientific applications using heterogeneous, distributed and possibly non-dedicated resources. Grid environment is dynamic in nature, hence scalable and fault-tolerant scheduling is a<br />much needed to schedule parallel applications with inter-process communication. In this paper, we propose a hierarchical and fault-tolerant scheduling approach, in which the application’s processes communicate indirectly by sending messages over the network through mailbox-based communication technique at a shared node. In grid, process often migrates from one node to another, so this technique ensures the reliable delivery of messages; prevents messages sent to the migrating process form losing. A nonevolutionary mapping heuristic based on Max-Min approach is also proposed for<br />mapping such applications on grid resources. Finally, MPICH-V1 protocol is integrated into our scheduling framework that exploits the mailbox-based technique instead of channel memories. The simulation experimental results demonstrate that, the proposed approach as a whole effectively schedules the grid applications in scalable and fault tolerant way thereby ensures the application to be executed within its deadline making the grid environment trust worthy.
Grid scheduling,fault-tolerance,MPICH-V1,rescheduling,checkpointing
https://iceeng.journals.ekb.eg/article_32716.html
https://iceeng.journals.ekb.eg/article_32716_d0fc3762d1f26d273a001f41dcc497f6.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Key performance indices for EDCs in Egypt
1
10
EN
Hafez
Elsalmawy
Egyptian Electric Utility and Consumer Protection Regulatory Agency, License
and Tariff Sector.
Kamelia
Youssef
Egyptian Electric Utility and Consumer Protection Regulatory Agency, License
and Tariff Sector.
Shereen
Abdulla
Egyptian Electric Utility and Consumer Protection Regulatory Agency, License
and Tariff Sector.
Iman
Ahmed
Egyptian Electric Utility and Consumer Protection Regulatory Agency, License
and Tariff Sector.
10.21608/iceeng.2012.32719
Continuity of supply is characterized by the number and duration of interruptions. Several indicators are used to evaluate the continuity of supply in transmission and distribution networks. The most widely used reliability indices are SAIFI, SAIDI, CAIDI, ENS and CENS (IEEE std. 1366-2000 and CIGRE study committee (C2). Regulation can aim to compensate customers for long supply interruptions, keep restoration time under control, and create incentives to reduce the total number and duration of interruptions. The paper presents and assessments the key performance indices for electric distribution system in Egypt, monitored, calculated and analysed by EGYPTERA to concentrate on the guideline values for distribution system, and to provide an optimal level of customer service.
power distribution,key Performance indices,performance evaluation,Availability,energy not supplied
https://iceeng.journals.ekb.eg/article_32719.html
https://iceeng.journals.ekb.eg/article_32719_843aa135eed579bb016508f218d08565.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Reliability and maintainability analysis of medium voltage transformers in Egypt
1
17
EN
M.
Abdelfatah
Electrical testing and transformers section, EETC. Ministry of Electricity, Cairo,
Egypt.
M.
EL-Shimy
Electrical Power and Machines Department. Faculty of Engineering, Ain Shams
University, Cairo, Egypt. P.O. Box (11517).+
H.
M.
Ismail
Electrical Power and Machines Department. Faculty of Engineering, Ain Shams
University, Cairo, Egypt. P.O. Box (11517).
10.21608/iceeng.2012.32720
In this paper, outage data analysis of 66 kV and 33 kV power transformers is considered. Outage-data is obtained from the Egyptian Electricity Transmission Company. Outage-data analysis over eight years from 2002 to 2009 of 1557 transformers with MVA rating ranging from 10 MVA to 40 MVA is presented. Several indices are determined for evaluating the reliability of power transformers. The knowledge of these indices is essential for proper system planning and operation. Forced outages due to correct and false action of transformer’s protection systems are carefully considered. The trend of the determined hazard function indicated that a significant number of the transformers is probably being operated in the wear-out phase; however, detailed ageing analysis is required to determine the reliability state of each transformer. The determined values for the maintainability and availability shows significant variations with time. The results are compared with the IEEE 1979 survey.
Power transformers,transformer failure,outage data,forced outage,customer interruption
https://iceeng.journals.ekb.eg/article_32720.html
https://iceeng.journals.ekb.eg/article_32720_653930fceff567204a843bbf87ea9dff.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Dynamic Economic Load Dispatch of Thermal Power System Using Particle Swarm Optimization Technique
1
16
EN
W.
M.
MANSOUR
Professor of Electrical Power Systems, Department of Electrical Engineering, Faculty of Engineering (Shoubra),
Benha University, Cairo, Egypt.
M.
M.
SALAMA
Professor of Electrical Power Systems, Department of Electrical Engineering, Faculty of Engineering (Shoubra),
Benha University, Cairo, Egypt.
S.
M.
ABDELMAKSOUD
Assistant Professor of Electrical Engineering, Department of Electrical Engineering, Faculty of Engineering (Shoubra),
Benha University, Cairo, Egypt.
H.
A.
HENRY
Demonstrator of Electrical Engineering, Department of Electrical Engineering, Faculty of Engineering (Shoubra),
Benha University, Cairo, Egypt.
10.21608/iceeng.2012.32722
Economic load dispatch (ELD) problem is one of the most important problems to be solved in the operation and planning of a power system. The main objective of the ELD problem is to determine the optimal schedule of output powers of all<br />generating units so as to meet the required load demand at minimum operating cost while satisfying system equality and inequality constraints. This paper presents a new approach using Particle Swarm Optimization (PSO) for solving the<br />ELD problem with considering the generator constraints, ramp rate limits and transmission line losses. The proposed approach has been evaluated on 26-bus, 6- unit system. The obtained results of the proposed method are compared with those obtained from the conventional lambda iteration method. The results show that the proposed approach is feasible and efficient.
economic load dispatch,Particle Swarm Optimization,Ramp rate limits. and system equality and inequality constraints [1]
https://iceeng.journals.ekb.eg/article_32722.html
https://iceeng.journals.ekb.eg/article_32722_dda13495764c6cdfe5ff3aeb8494eac0.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Novel Unit Protective Relaying Concept for EHV Interconnected Networks
1
12
EN
Dina
Mourad
Faculty of Engineering, Al-Azhar University, Egypt.
E.
H.
Shehab_Eldin
Faculty of Engineering, Helwan University, Helwan, Egypt.
A.
M.
Abd-Elaziz
Faculty of Engineering, Al-Azhar University, Egypt.
10.21608/iceeng.2012.32725
In interconnected network, the fault at any section may appear as a forward or a backward at more than one relaying station. This may deceive any protection system using the current signal only. This paper presents a novel principle solution for such problem. The proposed protection is based on extracting the transient components, initiated by faults, using the fourth sequential overlapping derivative, (SOD), concept. SOD is applied to the current and the voltage signals at both protected line terminals. The multiplier of the produced transient components is used as a novel relaying signal. The polarity of the initial change of this relaying signal is depending on the fault direction. Exchanging data between relaying stations using a suitable communication channel enable us to discriminate between internal and external faults and send a tripping signal to the prober circuit breakers. Simulation tests are carried out by ATP program while the relaying concept is established by using MATLAB program. Extensive number of simulation cases, including fault type, fault resistance, fault inception time and load switching effects are presented. Results showed a high sensitivity for internal faults, and high security and stability for external faults. Moreover, no need for samples synchronization and current transformer saturation compensation.
EHV interconnected transmission network,SOD,unit protection,relaying system
https://iceeng.journals.ekb.eg/article_32725.html
https://iceeng.journals.ekb.eg/article_32725_7ca391a1314698d8555453f23aa562fc.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Detection and location of distribution systems faults using Wavelet packet transform based overcurrent relay
1
15
EN
Doaa
khalil
Ibrahim
Faculty of Engineering, Cairo University, Egypt.
Mohamed
Mamdouh
Abdel Aziz
Faculty of Engineering, Cairo University, Egypt.
Nabil
Mohamed
Abdel Fattah
Atomic Energy Authority (Nuclear Research Center), Egypt.
Ahmed
Ramadan
Adly
Atomic Energy Authority (Nuclear Research Center), Egypt.
10.21608/iceeng.2012.32759
This paper presents a scheme to increase the sensitivity of overcurrent protection. The proposed scheme applies wavelet packet transform, since it can preserve both time and frequency information with high resolution. The proposed scheme demonstrates its feasible performance in detecting short circuit faults, calculating fault location with moderate accuracy and detecting nonlinear high impedance faults. In addition, the proposed scheme examines the load current continuously and has the ability of changing the relay pick up value adaptively. The examined tested cases include different internal<br />short circuit fault conditions, different nonlinear high impedance faults, and non fault situations such as normal load changing. The obtained results indicate that the developed scheme is fast, robust, reliable and suitable for power distribution systems.
Digital Overcurrent Relay,fault location,High Impedance Faults,Wavelet Packet Transform
https://iceeng.journals.ekb.eg/article_32759.html
https://iceeng.journals.ekb.eg/article_32759_9cc27a3d9f5d32a0a53ba27b60db7080.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Two approaches for directional overcurrent relays coordination in interconnected power systems with distributed generation
1
17
EN
Saadoun
Abd ElAziz
Mostafa
Arab Contractor Company, Egypt.
Doaa
khalil
Ibrahim
Faculty of Engineering, Cairo University, Egypt.
Essam El-Din
Abo El-Zahab
Faculty of Engineering, Cairo University, Egypt.
10.21608/iceeng.2012.32761
Abstract:<br />Connection of distributed generation (DGs) powered by renewable energy resources in<br />power systems has numerous benefits. However the presence of these (DGs) increase<br />the fault current levels in different points, and disturb the protection coordination of the<br />existing relays. Two approaches are proposed for coordination of directional overcurrent<br />relays (DOCRs) in power systems with (DGs), depending on the types of system relays<br />either adaptive or non adaptive.<br />For adaptive protection system, the first proposed approach is based on linear<br />programming technique which used to calculate the relay settings in case of DGs<br />existing or not. For non-adaptive protection system, the second proposed approach is<br />introduced, in which minimum impedance of fault current limiter is calculated to restore<br />the coordination of relays without altering the original relay settings. The two proposed<br />approaches are implemented and tested on IEEE-39 bus test system.
Distributed generation,Fault Current Limiter,Relay Setting,Relays Coordination
https://iceeng.journals.ekb.eg/article_32761.html
https://iceeng.journals.ekb.eg/article_32761_427430b57adb8a521cfd8313b2c0ede1.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
A Novel TSA Array for Automotive Radars at 79 GHz
1
9
EN
Ahmed
Nafe
5thyear -Student GUC, Dipl. Eng. Micheal Frei, Ulm University, Member IEEE.
10.21608/iceeng.2012.32763
Abstract:<br />The shift of the frequency band assigned for automotive radars from 24 GHz to 79 GHz led to<br />an increased research in the area of design of radars that operate at the new band from 76 to<br />81 GHz. The antenna plays a key role in the operation of a radar sensor. Designing an<br />antenna that provides high directivity and low side lobe level and at the same time to be small<br />in size and of low manufacturing cost in mass production is a challenging task for researchers.<br />In this work, investigations on Tapered Slot Antenna (TSA) arrays operating at 79 GHz<br />suitable to meet automotive radars demands were carried out. A Fermi-Dirac based TSA was<br />studied parametrically and optimized with the aid of CST microwave studio. The optimized<br />design was fabricated along with its attached feeding structures and shielded housing to<br />suppress unwanted feed radiation. The measurement of reflection coefficient indicated<br />wideband behavior (< -10dB) extending nearly over the whole E-band. Despite its small size<br />(3.75 by 7.5 mm) the antenna showed fairly high gain (≈10 dB). A 4 -element E-plane array<br />was built and a parallel feeding network was optimized to feed the array elements with equal<br />amplitudes and phases. The array was fabricated and measured showing a gain of 13.8 dB and<br />a side lobe level of 14 dB indicating that it is attractive candidate for employment in<br />automotive radar sensors, especially when the number of the array elements is increased.
https://iceeng.journals.ekb.eg/article_32763.html
https://iceeng.journals.ekb.eg/article_32763_ed78500494b5957a9597d12dc91bcc36.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
WiMAX structured combat network – performance analysis
1
17
EN
Jovan
B.
Bajčetić
University of Defence, Military Academy, Belgrade, Serbia.
Boban
Z.
Pavlović
University of Defence, Military Academy, Belgrade, Serbia.
Davorin
L.
Mikluc
University of Defence, Military Academy, Belgrade, Serbia.
10.21608/iceeng.2012.32766
Abstract:<br />The elements of a battlefield nowadays are the unexhausted source of information.<br />Modern battle environment requires extremely mobile armed systems what leads to<br />the fact that network infrastructure needs to be more agile. The information exchange<br />in these conditions is done mostly using the radio. The node mobility is imperative<br />and is the beginning of all the beginnings when the network analysis is ought to be<br />performed. Movement of the nodes is rarely measured below 60 km/h and required<br />bit rate is mostly always above 1 Mb/s. To achieve this, the migration to new<br />technologies, like the one described by IEEE 802.16e standard is required.<br />The paper gives the battle operation information exchange analysis which takes place<br />into the flat, intercepted urban area. The information exchange is done using the cell<br />structured network consisted of WiMAX base stations. The transceiver system<br />described by ETSI TS 102 177 V1.5.1 (2010-05) is analyzed in detail thanks to<br />MATLAB program package. The real battle situation simulation, coverage and<br />interference analysis is achieved using ATDI HTZ software.<br />At the end, the basic assumptions review of the simulation is given. The behavior of<br />the transmitted signal modulated using various modulation schemes in jamming<br />environment is analyzed considering different Signal to Noise Ratios (SNR). The<br />performance of the WiMAX base station transceiver network system doing fast<br />handover of a given subscriber is observed. The simulated network gives the<br />emergent data on which basis the final conclusion about network performances in<br />rough electromagnetic environment is given.
WiMAX tranceiver,Modulation,Fading,handover,ATDI HTZ software
https://iceeng.journals.ekb.eg/article_32766.html
https://iceeng.journals.ekb.eg/article_32766_76d89f2a6659b5bda888b5c8a70a0afb.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Enhancement of WiMAX Mutual Authentication Protocol
1
6
EN
Ahmed
Mohamed
El-Amin
Military Technical Research center.
Alaa El -Din
Rohiem
Military Technical College.
Essam
Abd-Elwanees
Military Technical College.
10.21608/iceeng.2012.32772
The mutual authentication mechanism in the IEEE802.16e can avoid the man-in-middle attack, and can protect the multi-hop WiMax security in efficiency.An enhanced mutual authentication flow was proposed in this paper, which enhances the security and working efficiency of the mutual authentication in mobileWiMax system. The proposed scheme heightens the security and practicability of WiMax system, which has better referenced value to the improvement of IEEE 802.16e standards.
https://iceeng.journals.ekb.eg/article_32772.html
https://iceeng.journals.ekb.eg/article_32772_a1d6f1f67e1d2a292d0a9d7d80fda639.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
WiMAX 802.16 Networks: Threats, attacks, and Solutions
1
15
EN
Ahmed
Mohamed
El-Amin
Military Technical Research center.
Alaa El -Din
Rohiem
Military Technical College.
Essam
Abd-Elwanees
Military Technical College.
10.21608/iceeng.2012.32775
Worldwide Interoperability for Microwave Access (WiMAX) is going to be an emerging wireless technology for the future. With the increasing popularity of Broadband internet, wireless networking market is thriving. Wireless network is not fully secure due to rapid release of new technologies, market competition and lack of physical infrastructure. In the IEEE 802.11 technology, security was added later. In IEEE 802.16, security has been considered as the main issue during the design of the protocol. However, security mechanism of the IEEE 802.16 (WiMAX) still remains a question. WiMAX is relatively anew technology; not deployed widely to justify the evidence of threats, risk and vulnerability in real situations. This paper will address the security aspects of the IEEE 802.16 Standard and point out the security vulnerabilities, threats and risks associated with this standard and their countermeasures.
https://iceeng.journals.ekb.eg/article_32775.html
https://iceeng.journals.ekb.eg/article_32775_c7c79cf3071bf68c59c9cb658c0cc00b.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
PILEUP RECOVERY ALGORITHMS FOR DIGITAL GAMMA RAY SPECTROSCOPY
1
17
EN
Imbaby
I.
Mahmoud
Engineering Department, NRC, Atomic Energy Authority, Inshas, Cairo, Egypt.
Mohamed
S.
El_Tokhy
Engineering Department, NRC, Atomic Energy Authority, Inshas, Cairo, Egypt.
Hussein
A.
Konber
Electrical Engineering Department, Al Azhar University, Nasr City, Cairo.
10.21608/iceeng.2012.32777
This paper presents algorithms for overcoming a common problem of gamma ray spectroscopy, namely the peak pileup recovery problem. Three different approaches are studied and evaluated within a spectroscopy system. The algorithms are evaluated by the means of parameters error and fitting error calculations. The first approach is a direct search based on Nelder-Mead technique without any derivatives in order to find the local minimum points. A Gaussian shape in conjunction with the peak height and its position of each pulse are used to construct the pulse. So, the main pulse parameters such as<br />peak amplitude, position and width can be determined. The second algorithm is based on the nonlinear least square method. This approach has accuracy of recovering the original pulses with mean square error of 4.7306x10-12. In this paper another technique is tried. This technique which is proposed as third algorithm is based on a maximum peak search method combined with the first derivative method to determine peak position of each pulse. Comparison among these approaches is conducted in terms of parameters errors. The pulse parameters have been calculated and compared with the actual one. The second approach shows the best accuracy, for determining peak height and position, but the width<br />parameter scored the highest error.
Peak Pileup,Tail Pileup,Least-Square Fitting,Nelder-Mead Modified Simplex
https://iceeng.journals.ekb.eg/article_32777.html
https://iceeng.journals.ekb.eg/article_32777_c14dd1a431cad7c33d7640cc980d92c2.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Experimental Comparison among Pileup Recovery Algorithms for Digital Gamma-Ray Spectroscopy
1
20
EN
Imbaby
I.
Mahmoud
Engineering Department, NRC, Atomic Energy Authority, Inshas, Cairo, Egypt.
Mohamed
S.
El_Tokhy
Engineering Department, NRC, Atomic Energy Authority, Inshas, Cairo, Egypt.
Hussein
A.
Konber
Electrical Engineering Department, Al Azhar University, Nasr City, Cairo, Egypt.
10.21608/iceeng.2012.32783
This paper presents algorithms for overcoming a common problem of gamma-ray spectroscopy, namely the peak pileup recovery problem. Three different approaches are studied and evaluated within a spectroscopy system. The first approach is a direct search based on Nelder-Mead technique without any derivatives in order to find the local minimum points. A Gaussian shape in conjunction with the peak height and its position of each pulse are used to construct the pulse. Hence, the main pulse parameters such as peak amplitude, position and width can be determined. The second algorithm is<br />based on the nonlinear least square method. In this paper another technique is tried. This technique which is proposed as third algorithm is based on a maximum peak search method combined with the first derivative method to determine peak position of each pulse. Comparison among these approaches is conducted in terms of parameters errors and execution time. This comparison based on a reference signal from 137Cs point source acquired by data acquisition system. The third approach shows the best accuracy, for determining accurate energy spectrum. Therefore, it provides better isotope identification than other algorithms.
Peak Pileup,Tail Pileup,Least-Square Fitting,Nelder-Mead Modified Simplex
https://iceeng.journals.ekb.eg/article_32783.html
https://iceeng.journals.ekb.eg/article_32783_9d79a00fc92d797b0798f11fa5e94003.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
A Low cost FPGA implementation of real time video cryptography system using AES (Rijndael) algorithm.
1
12
EN
I.
Kamal.
Ismail
Master Student, R&D Center, Egyptian Air Forces.
Ehab.
A.
Elsehely
PhD, R&D Center, Egyptian Air Forces.
A.
E.
Abdulla
Assoc. Prof, Dean of M.T.C,M.T.C, Egyptian Air Forces.
10.21608/iceeng.2012.32786
The demand for efficient, real time video cryptography systems has become more prominent in our life, especially for military and sensitive-civilian applications. FPGA implementation of video cryptography systems is suitable for both video and cryptography processes due to video data rate, flexibility to design modifications, and cryptography algorithm agility. In this paper, a bulk video cryptography system using AES (Advanced Encryption Standard) is designed and implemented on low cost FPGA Xilinx Spartan-III™. Bulk encryption is used to encrypt both video data and video synch to increase the cryptanalysis complexity for intruders. The design is implemented on different stages; camera interface, video frame grabber, VGA monitor interface, SDRAM controller, crypto processor, and communication channel interface. The design has been tested first using a generated video pattern, and using external composite PAL/NTSC video camera source. The design is implemented for XC3S1000 and the results were significant for speed and area, it reached 77.6 Mbytes/sec. data throughput that fulfills the minimum requirements of colorful, 30 FPS video data rate of 27 Mbytes/sec., and the design<br />occupies 3,738 slices (48 % of chip size).
[AES,FPGA,Cryptography,low cost video encryption,real time video encryption]
https://iceeng.journals.ekb.eg/article_32786.html
https://iceeng.journals.ekb.eg/article_32786_c6e907207f4fa3da9e9699d66d45acf6.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Torsional Torques Reduction in Starting of Three-Phase Induction Motor
1
10
EN
Ahmed
A. A.
Hafez
College of Engineering in Aldawadmi, Shaqra Uinversity.
M.
A.
Algassab
College of Engineering in Aldawadmi, Shaqra Uinversity.
10.21608/iceeng.2012.32788
This paper proposes a simple starting method for three-phase induction motor. The technique has the advantages of alleviating torsional toques in sub/super synchronous range. The feasibility of the proposed method was validated by a rigorous simulation work.
Torsional torques,natural frequency,Large three-phase induction motors
https://iceeng.journals.ekb.eg/article_32788.html
https://iceeng.journals.ekb.eg/article_32788_86fd5fcc2c45767d59c3d13ee10136fa.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
OPTIMUM TUNING OF PID CONTROLLER FOR A PERMANENT MAGNET BRUSHLESS MOTOR
1
12
EN
F.
Hassan
Helwan University,cairo.
A.
S.
EL-Wakeel
Military Technical College,cairo.
A.
Kamel
High Institute of
Engineering, El Shorouk, Cairo, Egypt.
A.
Abdel-hamed
High Institute of
Engineering, El Shorouk, Cairo, Egypt.
10.21608/iceeng.2012.32791
The proportional-integral-derivative (PID) controllers were the most popular controllers of this century because of their remarkable effectiveness, simplicity of implementation and broad applicability. However, PID controllers are poorly tuned in practice with most of the tuning done manually which is difficult and time consuming. The computational intelligence has purposed genetic algorithms (GA) and particle swarm optimization (PSO) as opened paths to a new generation of advanced process control. The main objective of these techniques is to design an industrial control system able to achieve optimal performance when facing variable types of disturbances which are unknown in most practical applications. This paper presents a comparison study of using two algorithms for the tuning of PID-controllers for speed control of a Permanent Magnet Brushless DC (BLDC) Motor. The PSO has superior features, including easy implementation, stable convergence characteristic and good computational efficiency. The BLDC Motor is modelled using system identification toolbox. Comparing GA with PSO method proves that the PSO was more efficient in improving the step response characteristics. Experimental results have been investigated to show their agreement with simulation one.
Permanent Magnet Brushless DC (BLDC) Motor,particle swarm optimization (PSO),Genetic algorithm (GA),PID controller,and optimal control
https://iceeng.journals.ekb.eg/article_32791.html
https://iceeng.journals.ekb.eg/article_32791_5d7b822799754786173d473033a15d94.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Implementing Type 2 Coordination to Improve the Performance of the Motor Control Center (MCC)
1
11
EN
Walid
Helmy
Abdel-Hameed
Faculty of Engineering, Ain Shams University, Cairo, Egypt.
Mostafa
Mohamed
Ebid
Faculty of Engineering, Ain Shams University, Cairo, Egypt.
10.21608/iceeng.2012.32793
This paper explains the criteria of selection and coordination between the motor control centers (MCCs) components to meet the need of motor service continuity in the most of industrial processes. The aim behind this study is to obtain high level of coordination between the MCC components which is denoted by Type 2 coordination. The requirements of Type 2 coordination are illustrated in this research; this is according to IEC 947-4-1, where illustrates different methods of meeting these requirements. Also, this research proposed an algorithm to compare between implementing either fuses or circuit breakers (CBs) as short circuit protection device (SCPDs) in the MCC.
Three phase induction motors, Motor starters and protection, Coordination of motor circuits,Motor control centers (MCCs)
https://iceeng.journals.ekb.eg/article_32793.html
https://iceeng.journals.ekb.eg/article_32793_88c8cd2002cf62ef52a9082efe16663a.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Optimal allocation of SVC to enhance voltage stability of power systems
1
9
EN
Hosam
Kamal
Youssef
Faculty of Engineering, Cairo University, Cairo, Egypt.
Doaa
khalil
Ibrahim
Faculty of Engineering, Cairo University, Cairo, Egypt.
Amr
Magdy
Abd El Fattah
Faculty of Engineering, Cairo University, Cairo, Egypt.
10.21608/iceeng.2012.32795
With the continuous increase of power demand, FACTS provide a suitable solution by maximizing the usage of existing utilities rather than increasing power generation and building new lines. Due to high cost of such devices their optimal allocation must be ascertained. Particle swarm optimization (PSO) is used in this paper to determine the best location and size of Static VAR Compensator (SVC) where the objective function is to achieve the accepted voltage profile taking into consideration the SVC cost. Simulations are performed on IEEE-14 test system. Results prove the effectiveness of PSO in solving such allocation problem.
allocation,Flexible AC Transmission Systems (FACTS),Optimization,particle swarm optimization (PSO),Static Var Compensator (SVC)
https://iceeng.journals.ekb.eg/article_32795.html
https://iceeng.journals.ekb.eg/article_32795_e4fe1e7e56a973291ba2f87351887f43.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Load shedding as a corrective action against voltage collapse
1
19
EN
A.
Y.
Abdelaziz
Electrical Power and Machines Department, Faculty of Engineering, Ain
Shams University, Cairo, Egypt.
A.
T. M.
Taha
Electrical Power and Machines Department, Faculty of Engineering, Ain
Shams University, Cairo, Egypt.
M.
A.
Mostafa
Electrical Power and Machines Department, Faculty of Engineering, Ain
Shams University, Cairo, Egypt.
A.
M.
Hassan
Electrical Power and Machines Department, Faculty of Engineering, Ain
Shams University, Cairo, Egypt.
10.21608/iceeng.2012.32797
The phenomenon of voltage collapse eclipses a potential hazard for the transmission and distribution systems. The load shedding for avoiding the existence of voltage instability in power systems is taken as a remedial action during emergency states. Te load shedding strategy for power systems with location and quantity of load to be shed is presented in this paper. Two methods are used for this purpose. The first method is based on a mathematical calculation of an indicator of risk of voltage instability. The second method is based on a fuzzy load shedding based algorithm that uses a voltage stability indicator for averting voltage collapse. Applications to the standard IEEE 14- bus system are presented to validate the applicability of the two proposed methods.
Load shedding,Voltage Instability,L-indicator,Fuzzy Logic
https://iceeng.journals.ekb.eg/article_32797.html
https://iceeng.journals.ekb.eg/article_32797_23cebe7cc5db6867db6eeca4dace4ebe.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
A simple novel method for considering static voltage stability indicator in a power system
1
10
EN
W.
M.
Mansour
Professor of Electrical Power Systems, Dpt. of Electrical Engineering, Faculty of
Engineering, Shoubra, Benha University, Cairo, Egypt.
M.
M.
Salama
Professor of Electrical Power Systems, Dpt. of Electrical Engineering, Faculty of
Engineering, Shoubra, Benha University, Cairo, Egypt.
N.
Sh.
Abd-El-Hakeem
Graduate student, Dpt. of Electrical Engineering, Faculty of Engineering,
Shoubra, Benha University, Cairo, Egypt.
10.21608/iceeng.2012.32799
The voltage stability is the ability of the power system to provide adequate reactive power under all operating conditions and to maintain stable load voltage magnitude within specified operating limits. The voltage instability leading to collapse appears to be due to the inability of networks to meet a demand for reactive power at certain critical or weak buses. It can be recognized by noting excessive fall in voltage for small increase in load and increasing difficulty in controlling system voltage. Therefore voltage collapse prediction must take in consideration in power system planning and operation. In this paper a novel indicator from a parallel algorithm will be presented to predict the voltage instability or the proximity of a collapse. The indicator uses the obtained data of a normal load flow to identify the weak buses in the power system.<br />This method has carried out over changing the load power factor. Obtained results for the IEEE 5 bus system considering the effects of STATCOM on voltage stability are presented and discussed.
Voltage stability,Voltage Instability,Voltage collapse,Voltage collapse prediction,Voltage Collapse Indicator,FACTS devices and Parallel algorithm
https://iceeng.journals.ekb.eg/article_32799.html
https://iceeng.journals.ekb.eg/article_32799_a20cd827001486b511b54426d378baf3.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
A Moderate Weight EAP Authentication Method (EAP-MEAP) for Wireless Local Area Network
1
23
EN
AHMED
EL- NAGAR
Egyptian Armed Forces.
AHMED
ABD EL-HAFEZ
Military Technical College Staff, Cairo, Egypt.
ADEL
EL-HNAWY
College of Engineering Staff, Ain Shams University, Cairo, Egypt.
10.21608/iceeng.2012.32800
IEEE 802.11standard for Wireless Local Area Networks (WLANs) is facing more and more problems linked to security threats, which expose legitimate users to increased risk. Therefore, the security is always a major concern for WLAN development and one of the major challenges in WLAN security issue is authentication. Extensible Authentication Protocol (EAP) has been widely used for that important aspect. EAP is a framework of authentication process that uses several methods to perform that process. In this paper, the flows of the existing EAP methods will be analyzed and illustrated.<br />Then, a new EAP method Extensible Authentication Protocol -Moderate Weight Extensible Authentication Protocol “EAP-MEAP” will be proposed. This method combines between the simplicity of deployment and management of password methods and the robustness of certificated ones. EAP-MEAP can be used widely in IEEE802.11 for WLANs (Wi- Fi and its application domains) as solution to the presented flaws. A security assessment to the proposed protocol will be presented.<br />Finally, the checked and verified results of the EAP- MEAP security properties using the specialized model checker AVISPA, which provides formal proofs of the security protocols.
Wireless network,Security protocol,Access control,EAP,HLPSL
https://iceeng.journals.ekb.eg/article_32800.html
https://iceeng.journals.ekb.eg/article_32800_552d66b47c10283edb87b1a70b6b6fe6.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Moderate EAP-TLS Protocol - A New Approche
1
12
EN
Ahmed
ELNagar
Egyptian Armed Forces.
Ahmed
Abd-EL-Hafez
Military Technical College staff, Cairo, Egypt.
Adel
ELHnawy
College of Engineering Staff, Ain Shams University, Cairo, Egypt.
10.21608/iceeng.2012.32803
Security has always been a major concern in the development of Wireless Local Area Networks (WLAN) as they are based on wireless technology, i.e. no physical connections exist. One of the major problems in WLAN security is authentication.<br />EAP (Extensible Authentication Protocol) is an authentication framework that uses several authentication techniques such as TLS, TTLS, PEAP and LEAP. EAP-TLS (EAP- Transport Layer Security Protocol) is widely used in WLAN (Wi- Fi /802.11 and Wi-MAX/802.16) as a solution to the authentication problem. This paper presents EAP-TLS security in details, explores its weaknesses and provides detailed EAP-TLS assessment. As a solution to the presented flaws, we present in details the proposed Moderate EAP- TLS for overcoming such shortages. Finally, we present a security assessment to our proposed protocol compared to EAP-TLS.
WLAN,Authentication protocols,EAP-TLS,LEAP
https://iceeng.journals.ekb.eg/article_32803.html
https://iceeng.journals.ekb.eg/article_32803_f025c7cadcf278d8b3747f37cdba2e64.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
The effect of Radio Resource Management in the performance of Heterogeneous Cellular Networks
1
15
EN
Tarek
M.
Attia
National Telecom Regulatory Authority (NTRA), Egypt.
10.21608/iceeng.2012.32804
Comparing market estimates for wireless personal communication and considering recent wide band multimedia services with the existing spectrum allocations for these types of systems show that spectrum resource management remains a very important topic. The coexistence of different cellular networks in the same geographical area requires joint radio resource management (JRRM) for efficient radio resource utilization and enhancement of quality of service (QoS) provisioning, maintain the planned coverage area and provide high capacity. This paper intends to provide an overview of the RRM problem and envisaged solutions in a Beyond 3G framework. Different scenarios of call admission control in<br />heterogeneous cellular networks are analyzed and compared. Further, we focus on joint call admission control (JCAC) algorithms in heterogeneous cellular networks and present a JCAC model and assumptions for evaluating and discussing the performance of the JCAC algorithm through simulation results.
radio resource management,cellular networks
https://iceeng.journals.ekb.eg/article_32804.html
https://iceeng.journals.ekb.eg/article_32804_283b5c11556cdf5f04e76b9fc24216e2.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Narrowband Interference Mitigation in IR-UWB Communication Systems Using Code Sequence Selection
1
13
EN
Ehab
M.
Shaheen
Egyptian Armed Forces.
10.21608/iceeng.2012.32806
In this paper we will show that the impact of narrowband interference signal on the performance of direct sequence ultra wide band communication system in a Log-normal flat fading channel can be easily mitigated. The idea of the proposed mitigation technique is based on adapting the ultra wideband transmitted spectrum with the suitable selection of the direct sequence pseudo random code sequence in order to counteract narrowband interference and at the same time to guarantee low spectral emissions over existing narrowband communication systems.
Ultra-wideband, Narrow band interference, Log-normal fading channel,code adaptation
https://iceeng.journals.ekb.eg/article_32806.html
https://iceeng.journals.ekb.eg/article_32806_87dbe000bdd305eba6b97c7db814b8d4.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
A New Approach for LFMCWRadar using Wigner-Ville Distribution
1
9
EN
Sameh
G.
Salem
Radar Department, MTC, Cairo, Egypt.
Fathy
M.
Ahmed
Radar Department, MTC, Cairo, Egypt.
Mamdouh
H.
Ibrahim
Radar Department, MTC, Cairo, Egypt.
Abdel Rahman
H.
Elbardawiny
Radar Department, MTC, Cairo, Egypt.
10.21608/iceeng.2012.32808
This paper introduces the application of Wigner- Ville Distribution (WVD) in LFMCW radar systems to perform the range-Doppler processing of targets instead of FFT processing. The proposed approach enhances the detection capability of the LFMCW radar based on the fact that the side lobe levels (SLLs) in WVD spectrum are very small in magnitude, this fact facilities the realization of LFMCW radar by WVD without the need of additional weighting to reduce SLL in FFT-based approach. Computer simulation via Monte Carlo trials is provided to evaluate the performance of the proposed WVD-based LFMCW radar compared to that of the FFT-based one. The Receiver Operating Characteristics (ROC) is used as the performance measure. Simulation results validate the superiority of the proposed approach.
LFMCW radar,WVD,and FFT
https://iceeng.journals.ekb.eg/article_32808.html
https://iceeng.journals.ekb.eg/article_32808_47eacd9d3aa33d1afe424daa205b7af6.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Biometrics: The Next Era of the Authentication Technology
1
1
EN
Ali
Ismail
Awad
Kyushu University, Japan.
10.21608/iceeng.2012.32809
Unlike the traditional authentication systems, biometrics technology is based on something we are such as fingerprint, face, voice, and iris patterns. Biometrics technology is immutable for forgery, duplication, guessing, and hacking, therefore, it overcomes most of the traditional techniques problems. Due to its high reliability and security confidence, biometrics authentication can be deployed in many sensitive domains including physical access to restricted areas, e-commerce, and electronic banking. Moreover, the implementations of biometrics authentication can be extended further to cover the network security and the client-server based authentication scheme. Biometrics authentication is keep growing day by day, but similar to any security system; it has many challenges with respect to the processing time, the authentication accuracy, and the overall system’s reliability. Many research themes have been developed to tackle different biometrics problems and the output of these researches contributes very well for closing different biometrics authentication wholes.
https://iceeng.journals.ekb.eg/article_32809.html
https://iceeng.journals.ekb.eg/article_32809_f72555ab374c79597f2a9fb7db5031fa.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
RF-based Traffic Detection and Identification
1
1
EN
Amal
Al-Husseiny
Egypt- Japan University of Science and Technology, Egypt.
Moustafa
Youssef
Egypt- Japan University of Science and Technology, Egypt.
10.21608/iceeng.2012.32811
Road traffic congestion estimation is a critical function that affects both developed and developing countries alike. We present Monitor as a novel RF-based traffic detection system that is capable of detecting the existence of objects, i.e. vehicles or humans within an area of interest. Compared to the current approaches for traffic estimation, Monitor is low-cost, does not disrupt traffic during installation, works for non-laned traffic, and does not require active user participation. Our approach is based on the fact that the presence of an object in an RF environment affects the signal strength, and hence can be used for detecting objects. We present the Monitor system architecture and how it uses statistical techniques, based on the mean and variance of the received RF signal strength, to detect the presence of objects. Implementation of Monitor on standard RF equipment shows its capability of detecting the presence of objects with high accuracy highlighting its promise for different vehicle-related applications and a wider range of domains including surveillance applications, border protection, and intrusion detection.
https://iceeng.journals.ekb.eg/article_32811.html
https://iceeng.journals.ekb.eg/article_32811_2b5d6fe6533e7d314f5c5949cf6c86cd.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Investigation Techniques in Ground Water
1
1
EN
Ashraf
E. M.
Mohamed
The Western Coast University
American International University
USA.
10.21608/iceeng.2012.32813
In this paper, I discuss and show the investigation techniques in ground water and the purpose of this research is to share with industry investigation techniques. In particular, the methodology, the findings and lessons learned. These techniques have applications at several sites, These investigations include the groundwater monitoring system, the radiological source term assessment and the atomospheric deposition modeling that include processes assessments, video inspections, and assessment of tritium migration through concrete, hydrostatic tracer tests, tritium/helium-3 residence times and tritium in soil.
https://iceeng.journals.ekb.eg/article_32813.html
https://iceeng.journals.ekb.eg/article_32813_949b346e9620d6cbe5d36037a32a1e45.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Renewable Energy and Energy Saving
1
1
EN
A.
A.
Heggo
Visitor Professor in Egyptian and Arabic Universities
Egypt.
10.21608/iceeng.2012.32814
In the next century, modern and developing countries will need more electrical power to satisfy future demand. Therefore, the rate of electricity consumption will increase year by year. Most countries install and establish large electrical project to satisfy their needs for electrical energy. There is no doubt that any progress in developing plans will depend upon the existing electricity resources. Consequently the world, today and in the future will need to produce more than its needs of electrical energy. So, energy is considered as the back bone of satisfaction of developed programs. Renewable energy resources are considered as extended supply not only for power feeding but also to keep environment nature. The option of improving and saving electrical energy has become one of the important and serious options. This option is used today instead of the installation a new stations for electrical energy generation. In this work we shall present some methods of power generation such a Solar, Hydroelectric, and Wind power station. The environmental problems are an important issue in the world.
https://iceeng.journals.ekb.eg/article_32814.html
https://iceeng.journals.ekb.eg/article_32814_263b6279b703fa4f3c75bf92ab2d651a.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
The Subsurface Nano Indentation Effects on Stainless Steel
1
1
EN
A.
Hebatalrahman
Dr. Eng. Consultant in Materials Sciences and Materials Applications
Egypt.
10.21608/iceeng.2012.32816
Abstract:<br />Stainless steel 316L has a lot of applications in buildings and architectures such as<br />envelopes and clad fixations. Some alloying elements were added to improve pitting<br />corrosion of stainless steel 316L In order to study of the effect of UV laser irradiation<br />on Stainless steel 316L, it was irradiated by 308 nm Excimer laser at different number<br />of pulses in the range from 2000 pulses to 50000 pulses. The nanoindentation<br />measurements were performed on the surface of both untreated AISI 316L stainless<br />steel and on laser irradiated samples in order to determine their hardness, stiffness and<br />elastic properties, the effect of alloying elements on the irradiation process of Austenitic<br />stainless steel was evaluated. The research emphasis that laser irradiation is a promising<br />technique for surface hardening of materials can not be heat treated by conventional<br />methods.
https://iceeng.journals.ekb.eg/article_32816.html
https://iceeng.journals.ekb.eg/article_32816_0aa7ca9966dd9b2a4e4ddba686640b4d.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Printed Electronics
1
1
EN
Khaled
Shehata
Arab Academy for Science and Technology and Maritime Transport (AAST)
Egypt.
10.21608/iceeng.2012.32817
Low cost printed electronics have gained a great deal of interest over the past 5 years because of their promise to greatly reduce the cost of many electronic applications. In particular these applications include radio frequency identification (RFID) tags, displays, printed circuit boards (PCB)/keypads, chemical sensors, etc. The talk will<br />include:<br />O Motivations for Printed Electronics<br />O Printing Technologies<br />O Printing Materials<br />O Challenges<br />O Applications
https://iceeng.journals.ekb.eg/article_32817.html
https://iceeng.journals.ekb.eg/article_32817_4ef24aeef0845c495f8b4b469cbc3842.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Mind Control Weapons
1
1
EN
Samir
M.
Waly
Visitor Professorand Consultant Engineer in Egyptian and Arabic Universities
Egypt.
10.21608/iceeng.2012.32819
Mind control weapons started in Japan during Second World War as antipersonnel weapons, the aim was programmed assassinations without any error or hesitation by persons who will never recognize what they done .The Japanese did experiments on homeless, homosexual and war prisoners. In these experiments they injected their "patients" by different kinds of narcotic drugs such as opium and berbotric acid. Due to these experiments three thousand persons were killed. In the same time similar experiments were done in NAZI concentration camps especially in oshvits concentration camp at Poland, they forced their war prisoners to get "sodium panthonat" which is known as "TRUTH DRUG" since anyone who takes that drug will tell the truth. As soon as the Second World War finished, USA got all that secret researches and<br />starts to arrange it and to develop and update it. They started tens of secret projects in this field. Started by two letters namely MK which stands for mind control. These projects were "Mk-ultra" then "Mk-artichoke" then "Mk delta". One of these projects was to cancel the memory completely. After that a new step was done by prof "Alan Fray", he uses electromagnetic wave to remotely make his patients to sleep. Later prof "Josef sharp" was able to transfer spoken words through microwave pulses; this project was very useful to deaf persons to speak without using mouth or ears. In 1974 prof "G.F. Skapitz "starts new science called "Sociological electronics" by which you can see spoken words. Prof. "Delgado" declared in 1966 that "actions and all human sensations and emotions could be completely controlled through electromagnetic waves".
https://iceeng.journals.ekb.eg/article_32819.html
https://iceeng.journals.ekb.eg/article_32819_4fcaaffa186e64c296438421020f5e2f.pdf
Military Technical College
The International Conference on Electrical Engineering
2636-4433
2636-4441
8
8th International Conference on Electrical Engineering ICEENG 2012
2012
05
01
Modern Wind Turbines
1
1
EN
Amged
S.
El-Wakeel
Egyptian Armed Forces
Egypt.
Usama
R.
AbouZayed
Egyptian Armed Forces
Egypt.
Reda
Yousef
Egyptian Armed Forces
Egypt.
W.
Sabry
Egyptian Armed Forces
Egypt.
10.21608/iceeng.2012.32821
The main goal of this work is to present a design and implementation of a modern wind turbine. It can be installed on the rooftop of residential and commercial buildings and generate electric power from low speed wind energy. By this way, it becomes suitable for urban and isolated areas and those areas in which traditional large wind turbines are not practical. The main principal of it is to amplify; nearly duplicate, the ambient wind speed using wind tunnel effect. Theoretically, doubling the wind speed with tunnel effect increases the generated electric energy by a factor of eight. It can operate at ambient wind speeds of as low as four meters per second. In this work, the wind turbine is equipped with a 10 kVA Permanent Magnet DC (PMDC) Generator and all the necessary equipment for conditioning the output power. It can be used as off-grid power source; which is suitable for isolated places. The whole system is implemented and tested at one of the commercial buildings in Shark El-Ewinat (Far Egyptian South-East deserts). The design and implementation results will be demonstrated. Future work will be presented in the last section.
https://iceeng.journals.ekb.eg/article_32821.html
https://iceeng.journals.ekb.eg/article_32821_1fb635347a7fabc986dc6d145cdf69f9.pdf