2024-03-29T13:40:23Z
https://iceeng.journals.ekb.eg/?_action=export&rf=summon&issue=5272
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Routing Messages Protocol in Wireless Sensor Network Grids
Ashraf
Hussein
Mostafa
Sami
Hisham
Dahshan
Wireless Sensor Network Grids (WSNG) is considered one of the main four categories of wireless grids based on the devices predominant in the grid and the relative mobility of the devices in the grid. One of the important challenges inWSNG is the routing of messages through the grid. This area is concerned with the reduction of power consumption but through efficient routing of messages. A second concern is the reduction of message latency. In this paper, we propose anapplicable routing messages protocol (RMP) which uses a multi-hop forwarding scheme to achieve long-range communication. Our RMP has three phases: firstly, the initialization phase where each sensor node determines the best first hop toward the Sink among its neighbors. Secondly, sending the best route phase where each node sends an accumulative routing message (ARM) to the sink includes the hops list. Thirdly, in the maintenance phase, the out of reach node sends a maintenance message (MARM) to create the alternative route to the Sink. The proposed RMPprovides a simple and applicable routing model for WSNG. It also makes the total energy consumed in data transmission more efficient in the sensor network and minimizes the node memory size and processing steps which reduces the totalnetwork cost.
Wireless sensor network Grids
Sink
Sensor node
2012
05
01
1
13
https://iceeng.journals.ekb.eg/article_30565_3ba3f33291a494ca3d34587763659f97.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
A COMPARATIVE STUDY BETWEEN SOME DESIGN ISSUES IN DISTRIBUTED SYSTEMS MIDDLEWARE BASED ON WEB SERVICES AND THEIR IMPACT IN FUTURE CHALLENGES
Ahmed
Matar
Khaled
Badran
Moatassem
Abdallah
In this paper, we focus on some design issues in distributed systems Middleware based on Web services,and their impact in future challenges. Middleware performance, Scalability, Management and Ubiquity are considered some of themost elite challenges facing the designers of future middleware systems. Middleware performance can degrade at some point, the scalability of the distributed application can be difficult to control, managing large heterogeneous applications arises many questions, and finally, mobility and dynamic reconfiguration of applications forms the ubiquity challenge. As a guide for middleware designers, we propose this comparative study between different well known middleware systems considering our proposed design features as points of comparison, besides analyzing their impact on the previouslymentioned challenges.
Database systems
Middleware systems
Web services
Naming
Binding
2012
05
01
1
14
https://iceeng.journals.ekb.eg/article_30567_fce2486de5ef578241d42b624216f0f7.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Construction Path analysis Model from DNA Microarray Data
A.
Al Senousy
B.
El-Deeb
C.
Badran
D.
Al-Khlil
A fundamental problem in human health is to predict the effect of genes that cause disease; this is an important step to diagnosis and treatment. Also prediction gene functions are still a challenge for biologists in the post-genomic era. DNA microarray simultaneously monitors expression levels thousands of genes; the massive gene expression data provide us with unique opportunities to analyze the functional and regulatory relationships among genes. In this paper, new approach to estimate the relationship among genes and the effects of each gene on diseases is proposed. This approach consists of four main steps: First, extract the subset of high informative genes. Second, constructing genes network; thus, we propose to predict a gene’s functions according to its context graph, which is defined as the gene interaction network composed of the genes interacting directly and indirectly based on focal gene. Third, path analysis model is used to estimate the effect of genes on the disease and among each other. Fourth, obtains the relation among genes and the target (disease) by applying logistic regression analysis for predict new samples. This approach evaluated by lung cancer Microarray dataset. The proposed path diagram fit the subset of top ranked genes expression dataset, the Goodness of Fit Index (GFI) was > 0.832. The value of this approach is that it not only tackles the measurement problem by pathanalysis but also provides a visualization of the relationship among genes. The proposed approach also is useful for feature reduction, due to evaluate all genes simultaneously vs. lung state.
Microarray gene expression data
Genes selection
Genes ranking
Cancer
Genes network
path analysis
Pearson Correlation
2012
05
01
1
15
https://iceeng.journals.ekb.eg/article_30569_5b91db0ab7c94b011b6e6d108a3809ce.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
A modified PSO technique for electrical engineering applications
Magdi
El-Saadawi
Ahmed
Hassan
Mohammed
Saeed
PSO is a promising optimization technique proved a high performability as an evolutionary algorithm. Sometimes the conversion of that algorithm is not faster enough because the PSO initial setting values of that algorithm are chosen randomly and varies as long as the domain of application is varied. By means of classic PSO does not care about the limits of those random initial values which impacts the computation time. This paper presents a proposed approach that could be used to modify PSO technique which adapts the PSO initial values and number of particles for any optimization problem. The proposed modification makes the PSO technique faster and more applicable for electrical online applications. In most electrical applications, time factor is very important especially for on line applications. Protective devices coordination problem is a tedious and a time consuming task. To tackle that point of research, one of two cases has to be taken. First case is to redesign the coordination system according to any system changes. The second one is to maintain the old coordination system unchanged up to a specific DG penetration level. The new approach is used to solve the protective devices coordination problem in presence of DG in the two cases. A comparison between the classic PSO and the proposed modified one shows that the new approach gives fast results and shortens the computation time.
Distributed generation
particle swarm optimization (PSO)
coordination
2012
05
01
1
12
https://iceeng.journals.ekb.eg/article_30570_dd6fef05789942ee01c15ea3aa3bdfe6.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Direct mapping of digital PID control algorithm to a custom FPGAbased MPSoC, the parallel digital PID (PDPID) controller
Mohamed
Moanes
Hassan
Youness
Mahmoud
Khaled
New applications of digital embedded control systems require more advanced techniques that can fulfill increasing control requirements and to meet control constraints, such as reaching RT deadlines, while trying to achieve additional tasks likeauto-tuning of the parameters of control algorithm, conducting diagnostic-based operations or executing a fault-tolerance algorithm. Hence, Multiprocessors System on Chip (MPSoC) has been proposed as a promising solution. The main purpose of this paper is to put a step towards enhancing the legacy digital PID control algorithm by exploiting its inherent parallelism. We propose a direct-mapping design of the sequential digital PID to a custom Quad-Core Master-Slave MPSoC design, built-up using an enhanced FPGA Soft-Core microcontroller.
MPSoC
Embedded Control Systems and FPGA
2012
05
01
1
10
https://iceeng.journals.ekb.eg/article_30572_7d3efc6c12f2fc08b64bd87a0be7bb6e.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
USING PRECISE POSITION CONTROL IN MEASURING SYSTEMS
Walaa Eldeen
Ghadiry
Mohamed
Sakr
Motion control system is a system that has a special controller for controlling position, velocity or acceleration. In this paper the position control is concerned. A special application is introduced in detail which is the “gonio-photometer” laboratory which is used to measure the following:a- Luminaire luminous intensity distribution.b- Lamp luminous flux.Position control of this application is concerned having a resolution angle (0.01 degree) with the aid of a dc servo motor system and PID controller in addition to the use of brakes for maintaining better results. Simulation and calculations of the system equations are held using Matlab program. An alternative method is introduced for the position control of the application under study, which is the use of stepper motors instead of dc servo motors.
Position Control
servo motors
goniophotometers
gear ratio
encoders
PID
brakes
stepper motors
2012
05
01
1
21
https://iceeng.journals.ekb.eg/article_30573_22fd694f07fb6da9f062d0d9fdfba80c.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Control of Industrial Servo System in Presence of Motor-Load Inertia Mismatch using μ-synthesis
Farid
Tolbah
Magdy
Abdelhameed
Ahmed
Ramadan
There are a number of challenging factors that influence the performance of the industrial servo systems. One of these factors is the inertia mismatch between the motor and the load. Another problem is the variable-inertia load. This paper applies a robust control tool called μ-synthesis to design a controller which deals with the uncertainty of the inertia in theload. Different practical experiments are presented to investigate the effect of some parameters in the synthesis process on the performance of the synthesized controller. Also simulations are included to introduce different values of inertia mismatch and study the effect of increasing inertia mismatch on the servo system performance. It has been found the robust controller can deal with variable parameter control problem with adequate weighting functions. Also the increased inertia mismatch has been found to slow the servo system down and demand higher control action.
Inertia mismatch
variable inertia
servo system
Robust Control
μ-synthesis
PMSM
2012
05
01
1
11
https://iceeng.journals.ekb.eg/article_30576_1ffbb62485dbfa3262f1e795ecd65ea6.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Wind Energy: Past, Present and Future
A.
AbdElhafez
J.
AL-Sadey
R.
Al-Bouthigy
The wind energy is a strong candidate for supplying the escalating world energy requirements. The wind energy enjoys: environmental compatibility, economical feasibility and sustainability. Although the commercial production of electricity from wind is commenced worldwide; however, the capability of Arabic nations to cope with the global move into replacing fossil fuels with the renewable energy sources is still under investigation. Therefore, this paper addresses the technical/ economical challenges of utilizing wind energy in Arabic world. Two study cases for Egypt and Yemen are considered for thoroughly investigation. These countries represent the major of the Arabic world in terms of shortage of fossil fuels and the increased demand on energy. The paper also presents a brief introduction into wind-based electricity. The main elements of wind-electrical power generation system are highlighted. A number of suggestions are proposed for increasing the share of wind energy in energy balance in Arabic world and in the countries under investigation.
Wind energy
Arabic World
Egypt
Yemen
Energy Share
2012
05
01
1
28
https://iceeng.journals.ekb.eg/article_30642_fc6ea807aad2adff849352c93e8f3d86.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Evaluation of a Smart-Wire Approach for Congestion Management in Electrical Power Systems with Wind Generation
A.
Elmitwally
This paper presents the distributed series reactor (DSR) as a low cost D-FACTS technology that can be easily clamped on working transmission lines at higher operational reliability and without the need of any communications or centralizedcontrol. Smart wires are standard transmission lines that are augmented with a large number of DSRs. The paper addresses the potential of the emerging smart wire technology in improving the utilization and reliability of the existing transmission, sub transmission, and distribution networks. It proposes a smart-wire based strategy for planning power systems with increasing penetration level of wind generation. Moreover, the paper evaluates the potential of the smart-wire technology to reduce the required investment for congestion-free transmission system upgrading plan. The proposed approach is applied to the IEEE 39-bus and IEEE 57-bus test systems. Comparative analysis of results is provided for the classic and smart planning methods.
D-FACTS
smart-wire and transmission system upgrading
2012
05
01
1
19
https://iceeng.journals.ekb.eg/article_30643_2aa8b1b9a945ddeee5ec64f0827332af.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Manufacturing a Yaw controlled Small Scale Wind Turbine in Egypt
Ahmed
Hassanein
Karam
Maalawi
In this paper, we discuss the future plans of our research group at the National Research Center. One aim is put forward as our focus in this research work. We would like to make the manufacturing of small scale wind turbines possible in remote areas in Egypt using locally available parts and tools. Many internet sites and references are revised for the realization of this aim. A wide search for the know-how is underdone to understand how to build a similar prototype of a wind turbine to the ones found over the internet with the same properties or at least comparable to them. The different electrical components of a wind turbine and their functions are illustrated. The possibility of controlling the direction of the yaw of a wind turbine is explained and the effect of it on the overall performance of the wind turbine is shown.
Yaw Control
Wind turbine
Renewable Energy and Green Farms
2012
05
01
1
8
https://iceeng.journals.ekb.eg/article_30644_093d0f5ffb5d77c6cb8d3b8b203cb454.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
New Encryption Method Based on Using The Kharaghani Array of Order 8
Manal
Shehab
Noha
Korany
This paper suggests a new encryption method based on using the form and the properties of an orthogonal Hadamard array called the Kharaghani array of order 8. In this method; the used encryption key, the plaintext and the ciphertext values should be integers less than 256 to be presented in the form of the 8-bit binary representation. There are some constrains that restrict the chosen value for the encryption key, these constrains lead to have only 126 available values for the encryption key. The 126 encryption keys were checked on the available plaintext values and some concludednotes and results were presented. The suggested encryption method has the advantage of being easy to implement because the construction of the Hadamard array is easy.
Encryption
Hadamard and Kharaghani array
2012
05
01
1
9
https://iceeng.journals.ekb.eg/article_30645_8e4bd9cb7f6a645ece18e8d336c78406.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
New Steganographic Method for Data Hiding in the IP ID Field
Manal
Shehab
Noha
Korany
Many covert channels could be generated by using different IP header fields to introduce data hiding schemes. This paper presents the scheme and the description of a new suggested steganographic method for data hiding in the IP ID field.In the suggested method; an appropriate encryption algorithm and key could be used to encrypt the plaintext character so the ciphertext value could be presented in the form of the 8-bit binary representation and then could be embedded within the IP ID field using a new suggested embedding algorithm that uses pre-agreed key and direction. The method may be applied with either IPv4 or IPv6 packets. With IPv6; IP packet fragmentation is required by the packet source. In this method; the packet source should be the steganogram sender. The method has the advantages of being resistant to packet filtering and stateful inspection firewalls and it could be applied through different network scales and characteristics. To provide more confidentiality to the hidden data in the IP ID field; the paper suggests implementing the IPsec encryption in the tunnel mode between the steganogram sending and receiving gateways.
Steganographic
data hiding and IP ID field
2012
05
01
1
14
https://iceeng.journals.ekb.eg/article_30646_f58b16e73e54b99b2394d5860b1f16ea.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
New Steganographic Method for Marking IP Stego Datagrams Based on the IP ID Field
Manal
Shehab
Noha
Korany
Stego datagrams could be transmitted as a continuous traffic stream or they could be marked and mixed with normal datagrams, then transmitted from the steganogram sender to the steganogram receiver. The steganogram receiver would check for the mark to identify the stego datagrams and extract the hidden data from them. This paper suggests a new steganographic marking method with two scenarios to mark the IP stego datagrams using the IP ID field. This method could be used to mark the IP datagrams only and it requires from the packet source to be the steganogram sender. Ifthis method is used to mark the IPv6 packets, then the IP packet fragmentation is required by the packet source.
Stego
Steganographic
Data hiding
marking and IP ID field
2012
05
01
1
8
https://iceeng.journals.ekb.eg/article_30647_214ec32369d9043ef462106e9e142090.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
New Steganographic Methods for Data Hiding in the Payloads of Marked IP Datagrams
Manal
Shehab
Noha
Korany
The payload of a datagram carries the user data which is required to be transmitted from the source to the destination. So to hide sensitive data in a datagram payload; the data should be first encrypted or hashed then embedded in the payload. Furthermore; the datagram source needs to mark the stego datagrams and mix them with normal ones, and the datagram receiver needs to check for the mark to identify the stego datagrams and excludes them away from the received stream, and then decodes the hidden data. This paper suggests two steganographic methods for data hiding in the payloads of marked IP datagrams. The first suggested method uses an appropriate encryption algorithm and key to encrypt the plaintext blocks, then embeds the resulted ciphertext blocks in the payloads of marked IP packets. The second method hides data in the payloads of marked IP packets' fragments sets. In the second method; IP packet fragmentation is required as the fragment offset field of the fragment (except the first fragment) is used by an intelligent way to hash data blocks before embedding them in its corresponding fragment payload, encryption could be used as an option to encrypt the data before or after hashing it, the matter which provides different available scenarios for this method. The paper also briefly discusses the confidentiality effect of using the IPsec encryption with its different modes with each suggested steganographic method.
Steganographic
data hiding and mark
2012
05
01
1
21
https://iceeng.journals.ekb.eg/article_30648_a19d7ebf1d482360af84ad3e85c215a6.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
A Performance Analysis Methodology of a Public Key Infrastructure
Tarek
Abdel Mageed
Asem
El- Ashqar
Ali
Fahmy
Recent years have seen rapid growth in the number and scope of standards dealing with aspects of Public Key Infrastructures (PKIs). This has primarily been fuelled by the much increased interest in implementing PKIs, which is itself largely a result of the development of commercial and wider public use of the Internet, not least for ecommerce activities. With the growth in awareness of, and requirements for, PKIs, there has been a parallel increase in development effort devoted to standardizing all aspects of PKIs and PKI assessment measures helping the performance analysis of these PKIs. The potential benefits are clear, including the possibility of large scale interworking between PKIs, and lower costs through economies of scale and increased competition. This paper is devoted as a guide to present the assessment criteria of a PKI system providing the reader with different views of these assessment measures. The assessment measures applied to a PKI during this process have different perspectives. One of them is derived from The Information Security Committee (ISC) that published, in 2001, a draft of their PKI Assessment Guidelines (PAG) v0.30 for public comment which assumes that the set of policies, standards and procedures, as well as other PKI related documents, must be established before going onto the assessment procedures. The other perspective, relies on the ISO standard model published and have been used in the PKI assessment measures in many organization. The last perspective concentrates on the core of any PKI system, which is the security strength of this system and how to execute a security diagnosis to a PKI. In other words, can the organization trust it, through its continuous assessment procedures, as a secure system for its daily network communication transactions?. This paper organized so that it starts with a basic introductory part for the PKI system from different views, and continuing with explaining the components of a PKI system. Then exploring the different assessment visions to measure the performance analysis a PKI system such as PAG assessment guidelines, and the ISO 27001 standards, ending with an opinion to add some suggested security strength measures to the well known and published assessment measures for the performance analysis.
Performance analysis
public key infrastructure
and PKI
2012
05
01
1
14
https://iceeng.journals.ekb.eg/article_30649_a60d04ecf43b3ff9ee5164f0ce45aa97.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Extracting High Quality Information From Under Sampled Images with Relative Motion Blur Using Non-blind Restoration Techniques: A Survey
W.
Hendawy
G.
Salama
H.
Hussein
K.
Hassanien
Image degraded due motion blur is an ill-posed problem that still attracts many researchers to participate in solving such problem. The degraded image might suffer linear or nonlinear motion blur. It may also be due to the camera motion (spatial space invariant) or due to the motion of the target to be captured (spatially space variant). This paper focuses on images degraded due to linear motion blur due to the camera motion. A survey was done over several kernel estimation techniques such as Cepstral and Sinc function whom are classified under parameter estimation approach, and Fergus[1] and Krishnan[2] techniques who are classified under MAPh (Maximum A Posteriori over the kernel h) estimation approach. Experiments were applied over images samples suffering a synthetic blur and restored with several image restoration algorithms.
Image restoration
motion blur and kernel estimation
2012
05
01
1
21
https://iceeng.journals.ekb.eg/article_30650_07f84fa1a2e2ef39f69064e289fa90d2.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Advanced image tracking techniques for target seeking
Mohamed
Mamdouh
Hussein
Saad
Gouda
Ismail
Tarek
Ahmed
The primary goal of visual tracking is to provide a computerized system resembling the capabilities of the human eye. Motion detection is used in many applications and its integration as a facility within a vision system offers many potential benefits. We introduced an investigation of target tracking techniques; two different target tracking algorithms were implemented. The first is Covariance-based target tracking technique and the second is Hu Moments-based target tracking technique. The implemented tracking techniques were investigated and analyzed to determine which algorithm issuitable. Both algorithms were enhanced by achieving segmentation process using the region growing technique and building an adaptive window size that surrounds the target to overcome the problem of scaling. The experimental results show that the enhancement was very efficient not only in target tracking but also in overcoming the occlusion problem.
Target tracking
Covariance matrix
Hu moments
2012
05
01
1
12
https://iceeng.journals.ekb.eg/article_30651_18ef8b44c96d9a0c14a4272e0713d30b.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
QUALITY ASSESMENT OFWAVELET BASED IMAGE FUSION TECHNIQUES
A.
El Ejaily
F.
El Tohamy
M.
El Nahass
image fusion is a process of producing a single fused image from a set of input images. The fused image has enhanced information more than any of the input images In this paper a wavelet based image fusion experiments are carried out, and the impacts of changing various wavelet parameters on the quality of the fused image are investigated. The fusion of wavelet coefficients is done according to three algorithms. Fusion experiments are performed on QuickBird panchromatic (PAN) and multispectral (MS) images. In order to evaluate the quality of the fused images four quantitive measures of correlation coefficients, root mean square error, information entropy, and standard deviation are used. Fusion methods like IHS transform and brovey transform method are investigated, and their results are compared with that of our experiments based on the using of wavelet transform.
image fusion
Discrete Wavelet Transform
decomposition level
quality assessment
2012
05
01
1
17
https://iceeng.journals.ekb.eg/article_30652_8c4a41af6ef80265f024de8b0fa6142f.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Power frequency electromagnetic field exposure assessment
H.
Seddeq
G.
Khawas
Power frequency electromagnetic fields are receiving growing attention in recent years because of concerns that exposure to such fields might cause or contribute to adverse health effects. This paper reviewed the international limits for electromagnetic field exposure. Also this paper presented the problem with existing standards limits for electromagnetic field exposure and showed that these limits are not safety for public health risks. As a case study was investigated and evaluated to assess the power frequency electromagnetic fields exposure from electrical equipments, transmission lines and LED display in commercial building according to existing and the suggested healthy limits.
Power frequency electromagnetic fields
extremely low-frequency
Electromagnetic field exposure limits
Transmission lines
2012
05
01
1
13
https://iceeng.journals.ekb.eg/article_30653_3d519a965af56def89507d83be368b8c.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
AN ANALYTICAL MODEL FOR REPULSIVE ELECTROSTATIC MICROACTUATOR USING A CONFORMAL MAPPING TECHNIQUE.
Mazhar
Tayel
Ahmed
El Masry
electrostatic microactuators able to produce a repulsive force in the out-of-plane direction. The electrostatic microactuators use an asymmetric electric field surrounding the top and bottom surfaces of the moving fingers to produce a repulsive force. The displacement of moving finger is not limited by the “pull-in” effect. In addition, the usage of a repulsive force leads to the elimination of the sticking problem. In this paper, an analytical model for the repulsive-force, and the fringe capacitance of a microactuator is developed putting the moving plate thickness in consideration using conformal mapping techniques. With this technique, electric field lines are geometrically approximated to separately model the different capacitive components. These components are finally combined to obtain the equivalent fringe capacitance. The model reveals the maximum out-of-plane displacement. Rules are derived based on the analytical model for tuning and optimization of the microactuator performance. Simulations are conducted to verify the analytical model. Inaddition, the mechanism for generating the repulsive force is explained.
2012
05
01
1
14
https://iceeng.journals.ekb.eg/article_30654_7453ee933ce5305fe0557c0481b4481c.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Single and Combined Electromagnetic Wave Propagation Coverage of VOR Stations in Irregular Terrain Air ports
M.
Abdalla
A.
Mahrous
A.
Helmy
In this paper, the electromagnetic propagation coverage of different VOR stations over irregular terrain airport locations has been presented. Three different investigation studies for different airports in the heavy terrain red sea area are introduced. The calculation has been done applying Longley rice propagation model. The theoretical calculation concepts of the employed electromagnetic propagation model are discussed. The coverage areas for the two studied air ports were plotted using digital Two dimensional geographical maps with 90 meter resolution. The results are compared to standard line of sight model.
Electromagnetic waves
Propagation model
Coverage area
Longley Rice
2012
05
01
1
15
https://iceeng.journals.ekb.eg/article_30655_bd9b70374bd07d4cf3a640ad1c41ca2d.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Optimization of Renewable Energy Power System for Small Scale Brackish Reverse Osmosis Desalination Unit and a Tourism Motel in Egypt
F.
Fahmy
N.
Ahmed
H.
Farghally
The main objective of this work is to design an optimal – efficient economic power renewable energy system that feeds the required electric load of a small scale brackish reverse osmosis desalination unit and a tourism motel located in Hurghada, Egypt. Three renewable energy power systems are presented in this paper to select the most optimum one of them. Theses suggested renewable energy systems are stand-alone photovoltaic system, PV- wind-fuel cell hybrid system and PV- wind hybrid system. The sizing, optimization and economic estimation of the proposed systems were performed using HOMER software. HOMER solves the optimization problem to minimize the global cost and provides the optimum wind turbine, PV, battery and fuel cell ratings. In addition, a comparison between the three different suggested powersystem configurations is illustrated in details. PV- wind hybrid system realized the lowest net present cost and leverized cost of energy. Also, this system was able to provide energy approximately all the day. The battery state of charge variesbetween 77% to100% and it was found that, the PV- wind hybrid system is more suitable than the others for the selected site and the suggested electrical load.
PV
Wind turbine
Fuel cell
Hybrid System
Net present cost
HOMER
2012
05
01
1
14
https://iceeng.journals.ekb.eg/article_30656_f05f33295f35f1fa4ddf0110180cd1ee.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Photovoltaic power system based on MPP tracking technique to feed radar stations
Hassan.
El-Tamaly
Hassan
Abd-El-Aliem
The photovoltaic power system, PVPS, converts the solar radiation directly to electricity without fuel , moving parts , noise and greenhouse gases emission then it’s a clean and environmentally friend power system . This paper introduces a complete design of PVPS based on energy balance condition , EB , and maximum power points , MPPs , tracking technique to feed the simulated load in an Egyptian remote site ,Marsa-Alam. This load consists of four radar stations , automatic command center , manual command center, communication center , charging center and lighting for the radar battalion . Also, the design parameters obtained by applying the EB have been compared with the design parameters obtained by using the MPPs tracking technique. A new computer Matlab Program has been designed and operated to determine the hourly MPP through the daily day time along the year.
Photovoltaic
power system
maximum power points tracking technique
energy balance condition
utility grid and solar cells module
2012
05
01
1
14
https://iceeng.journals.ekb.eg/article_30657_0bf592115e4ed2612f424e95909bce9c.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Photovoltaic Power System Simulation for Micro – Grid Distribution Generation
Adel
El Shahat
This paper proposes modeling and simulation of PV Micro – Grid Distribution Generation System for Smart Grid Applications. Because, Distributed Generation (DG) offers great potential in meeting future global energy needs. PV module modeling and inverter technique reviews are presented in this paper. The mathematical PV module modeling depends on Schott ASE-300-DGF PV panel with the aid of MATLAB environment. DC / AC Inverter, Three – phase Inverters, Basic Operation of PWM Inverter, Square – wave operations of DC/AC inverter, Single – phase and Full – BridgeConverters, Three – phase Converters and some MATLAB Inverters Results are introduced. Then, it proposes a PV module when coupled to a load through DC-DC Converter to supply this resistive load with the maximum power from the PV module. Some of DC-DC converters topologies are discussed in brief with concentration on Cúk and SEPIC Converters operations. After that, the mechanism of load matching is described to give the required converter duty cycle at maximum power point (MPP). Relations in 3D figures are introduced for the most probable situations for irradiance and temperature with the corresponding PV voltage and current. Also, 3D figures for the desired duty cycle, output voltage and current of DC-DC converter to gain the maximum power to the resistive load at various irradiance and temperature values.
Smart grid
Distributed generation
Maximum Power
Inverter
DC-DC converter
PV module
modeling
and MATLAB
2012
05
01
1
37
https://iceeng.journals.ekb.eg/article_30658_9877c62a53aae6186482503159ec2879.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Empirical Mode Decomposition Complexity
Sherif
Elgamel
Empirical mode decomposition (EMD) was developed for analyzing non-linear and non-stationary data. EMD decomposition is based on the local characteristic time scale of data. EMD decomposes any data set into a finite and often small number of intrinsic mode functions (IMF). An IMF is defined as any function having the same numbers of zero crossings and extrema, and also having symmetric envelopes defined by the local maximal and minima, respectively. The IMF also admits well behaved Hilbert transform verified to be highly orthogonal. EMD is used in many applications such as signal enhancements and data analysis. In this paper, the EMD is presented using computer simulations. The complexity of classical EMD is calculated to determine the additive complexity to any system uses the EMD.
Empirical mode decomposition
Intrinsic Mode Functions
and systems complexity
2012
05
01
1
9
https://iceeng.journals.ekb.eg/article_30659_c2956b8f9bfbb7f58003c4917d1a5c06.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
A Threshold Revocation Scheme For Mobile Ad Hoc Networks
Fatma
Elsayed
Hisham
Dahshan
Alaa Eldin
Rohiem
Ali
Elmoghazy
Security is very important for the reliable operation of mobile Ad Hoc networks (MANETs). One of the critical securityissues in MANETs is the revocation of misbehaving nodes. In this paper, we introduce a Threshold Revocation Scheme for Mobile Ad Hoc Networks. In our proposed scheme, the master private key is split into n pieces according to a random polynomial. Meanwhile, the master private key could be recovered by combining any threshold t pieces based on Lagrange interpolation and hence this master private key is used to sign the revocation message. Because of the decentralized nature of our proposed scheme, it enables a group of legitimate nodes to perform fast revocation of a nearby misbehavingnode. Consequently, the proposed scheme improves the safety levels in MANETs. The advantages of the proposed scheme are justified through extensive simulations.
decentralized
revocation
MANET networks
2012
05
01
1
7
https://iceeng.journals.ekb.eg/article_30660_15a9d821c39d6dc4097628612c2a11ae.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Performance Analysis of M-ary DPSK over VHF air-to-ground Communication Channel
Amr
Nagy
Gamal
Abdel-Hamid
Ahmed
Abdalla
This paper is concerned with evaluating the performance of M-ary differential phase shift keying (M-ary DPSK) modulation schemes over (very high frequency) VHF aeronautical channel (air-to-ground communication channel). The paper investigated the analytical bit error rate (BER) performance of binary differential phase shift keying (BDPSK) over aeronautical channel for flight scenarios: En -route, Arriving, Taxiing, and parking. By using the published measurement parameters, the analytical results are verified through modeling and computer simulation. The BER results show that multipath fading and Doppler shifts in the VHF aeronautical channel degrade the performance of M -ary DPSKmodulation schemes over the channel. In order to combat fading and improve the BER performance of this channel, the paper proposed computer simulation of the performance of differential space time block coding (DSTBC) using two antennas at the transmitter and one antenna at the receiver.
Air-to-ground communication channel
En -route
Arriving
Taxi
Parking
differential phase shift key (DPSK) and differential space time block coding (DSTBC)
2012
05
01
1
13
https://iceeng.journals.ekb.eg/article_30661_bb7636481b9f34ac2ad3b331c6d0487f.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
HANK-1 ,A new Efficient and Secure Block Cipher Algorithm for Limited Resources Devices
Hazem
Eldeeb
Khaled
Shehata
Nabil
Shaker
Ahmed
Abdel Hafez
In this paper we present a new block cipher algorithm that can be used for data security over devices with limited resources ,e.g. smart cards, wireless sensors etc .The algorithm is 128-bit balanced Feistel structure cipher algorithm working in cipher block chaining mode of operation. The building components of the algorithm have good cryptographic properties in comparison with other standard cipher algorithms and it has passed the NIST statistical test with very good results. The algorithm has been implemented on Microblaze microprocessor (as an emulator) to evaluate its efficiency and suitability to work on constrained devices.
Feistel Networks
Constrained environments
Block Cipher
Maximal distance separable codes
Substitution Box
Statistical Tests
Microblaze
2012
05
01
1
12
https://iceeng.journals.ekb.eg/article_30662_c5acafd383d2174703d8472691d40b38.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
A Newly Proposed Routing Protocol for Wireless Mesh Networks (WMNs)
Marw.
Khashaba
Fathy.
Amer
Nabil.
Lashin
WMNs are undergoing rapid commercialization in many application scenarios such as providing internet access, extending the coverage of wireless local area networks (WLANs), community networking, building automation, high speed metropolitan area networks, and enterprise networking. WMNs are one of the few commonly implemented types of mobile ad-hoc networks (MANETs), so general MANET routing protocols can be used in WMNs. While general MANET routing protocols can be used in WMNs, it is expected that a protocol that takes the particularities of WMNs into account will outperform the general protocol. This paper surveys recent routing protocols for MANET routing protocols and discuss the new WMNs routing protocols recent used in market. A new routing protocol is proposed uses all WMNs considerationinto account. The proposed routing protocol is based on source routing mechanism, showing that by preferring stable routes, the backbone of stationary nodes presented in WMNs can be effectively used to improve the performance of routing protocol, so the proposed protocol will be called Source Route Routing Protocol (SRRP). The main goal of the proposed protocol is to improve throughput and to reduce average end-to-end delay and packet delivery loosing ratio in large networks. The mobility of the nodes will be maintained having a significant improvement in different network sizes than in MANET routing protocols.
Wireless Mesh Networks (WMNs)
mobile ad-hoc networks (MANETs)
Routing
2012
05
01
1
30
https://iceeng.journals.ekb.eg/article_30663_ed184d9d868b6f3431dc8abc156b04da.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Hybrid Database Performance Evaluation Achieving Security
Wasim
Shalish
A.
Ghalwash
H.
El-Deeb
K.
Badran
The main goal of database security mechanisms is to protect the data stored in the database from unauthorized access or malicious actions in general. Typical database security attacks can be classified as: malicious actions executed by authorized or unauthorized users, and an inference attack occurs in multilevel secure database. The focus of this paper is to investigate the effect of malicious transactions detection and association rule mining implementation on database performance. This paper presents implementation of three mechanisms for detection of malicious transactions in the Oracle 10g DBMS and investigates the performance of the three mechanisms using a telephone database, and implementation of association rule mining using (Apriori) algorithm and investigates the performance using Congress Voting Data set. The experimental results showed that the average performance overhead caused by the activation of malicious transactions detection mechanisms is about 40%, and the hiding association rules performance parameters may be very high to ensure sensitive rules hiding.
DBMS
MTDM (Malicious Transactions Detection Mechanism)
MST
MCT
2012
05
01
1
14
https://iceeng.journals.ekb.eg/article_30664_92943e6f442c374ef38f39e81f5d3e49.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
INS Alignment Using Onboard Computer Software for Missile Trajectory
Ibrahim
Arafa
Ahmed
Mohsen
A.
Elboraee
In this paper, the onboard computer software program was developed to predict the full trajectory of the missile in order to improve the accuracy at impact. For system in which time is not critical, the alignment process can be performed prior to launch by utilizing navigation data from the launch platform and calibrating the missile’s INS to this reference. However, for systems that require rapid reaction time, significant pre-launch delays for alignment are not tolerable. In addition, due to low quality of the INS and its life cycle is short; hence every aborted mission will bring the INS closer to its mean time between failures (MTBF). These problems can be minimized by in-flight alignment (IFA). While IFA may seem to be less accurate and more complicated than alignment in the rest, it turns out that the ability of the carrier to maneuver during the IFA phase is a blessing in disguise since it enables the excitation of latent modes and thus, enhances their observability of the whole INS. The effects that maneuvers have on the estimability of the INS states during IFA wereinvestigated in the past. But until now, there are many questions such as: what is the degree of observability? What limits the estimability of the system? What are the minimal additional measurements needed to turn the system into a completely observable one? And what are the useful numbers of maneuvers in IFA? , were not completely addressed. These questions are answered through this paper. We introduce the error model, which appropriately describes the INS behavior during IFA. We then substantiate its adequacy for consideration as a piece-wise constant system (PWCS) and then the simpler stripped observability matrix (SOM) can be used in the system observability analysis.
2012
05
01
1
13
https://iceeng.journals.ekb.eg/article_30665_c3e37b0c3268967218aa3dc2715bb88f.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Strap down INS Alignment Using Non-Linear Model for Large Azimuth Misalignment
Ibrahim
Arafa
Ahmed
Mohsen
In this paper, a general non-linear psi-angle approach is presented that does not require coarse alignment. In the psi-angle model, The SINS error models (position, velocity and attitude angles) with large misalignment angles are derived. This error model uses Euler angles to describe the misalignment of platform frame to navigation frame, but the derived error models are only valid under condition that the heading uncertainty is large and the two leveling misalignment anglesare small the three misalignment angles are assumed all large. We simulate SINS large azimuth misalignment angle on the stationary base (fixed position and multi-position) alignment also on the movable base (In-flight) alignment in two cases (straight level flight and turn level maneuver) based on the trajectory generator data. All these simulations are done using different Kalman filter techniques (nonlinear discrete equations, Standard extended Kalman filter EKF, and iterative filtering IKF) to solve the non-linear system problems.
2012
05
01
1
14
https://iceeng.journals.ekb.eg/article_30666_0497b3a8fe7efec9c23d51db348ab9df.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Toward high-speed level-crossing ADCs
Mohamed
Abbas
The accuracy of measuring the crossing moment of a given signal to a specific reference voltage plays a crucial role in determining the bandwidth of the signal that could be converted by a level-crossing ADC. This timing accuracy is mainly determined by delay dispersion of the comparator and the time0to-digital converter (TDC) comprising the level-crossing ADC. With the pico-second resolution TDC, the delay dispersion of the comparator became the bottle nick of the design of a high speed level-crossing ADC. This paper presents a comparator with low delay dispersion for level-crossing analog-todigital conversion applications. The comparator comprises a technique to compensate the delay dispersion caused by variable input overdrive. The whole circuit is composed of three main blocks, namely, conventional comparator, fixed delay block and variable delay block. The variable delay block is controlled such that it implements the inverse overdrive-delay characteristics of the conventional comparator. Therefore, the overall delay dispersion of the circuit is effectively reduced. Using the proposed technique in a level-crossing ADC would enable the sampling of a signal with 4X higher frequencythan the case of using a conventional comparator keeping the same SNR.
Comparator Delay Dispersion
Level-Crossing ADCs
2012
05
01
1
8
https://iceeng.journals.ekb.eg/article_30667_001a186db5ecec8fd61e07eaedcf61b6.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
The effects of harmonic distortions on transformers
Hafez
Elsalmawy
Kamelia
Youssef
Shereen
Abdulla
Iman
Ahmed
The use of electric power is a natural part of life. It is used everywhere for living, work and traveling, at any residence, commercial building , industry and so on , to supply the loads. The new technique devices , as loads , are used to achieve better performance , to be able to control and to transfer more power over the power system and to reduce thepower consumption of the loads . These new techniques consist of non-linear components that are used to control the load current. Non-linear components in power system distort the current waveform and can affect the voltage waveform. These distortions can create a variety of power quality problems. The voltage and the current distortion cause additional losses in power system components and in linear loads. Transformers are major components in power systems. Increase in harmonic distortion component of the transformer will result in additional heating losses, shorter insulation lifetime, higher temperature and insulation stress, reduced power factor, lower productivity, efficiency, capacity and lack of systemperformance of the plant. The paper overviews and assessments the effects of real measured harmonic distortions on different low voltage level transformers supplying different types of nonlinear loads.
2012
05
01
1
7
https://iceeng.journals.ekb.eg/article_30668_aa02f33171665bcbbb17bff52cc2f1b6.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Low voltage low power programmable logic gate based on SE-MOSFET
Soha
Ahmed
Hesham
Hamed
E.
Hasaneen
Single electron transistor (SET) is one of the most promising devices for nanoscale circuit design. In this paper, new low voltage low power programmable logic gate circuits using SE-MOSFET are presented. Devices that combine singleelectronand metal–oxide–semiconductor (MOS) transistors allows compact realization of basic logic function that exhibit periodic transfer characteristics. The proposed SE-MOSFET logic gates are useful for implementing binary logic circuits. The proposed programmable logic gate is verified by simulating the circuit using PSPICE. The results show that the operation of proposed circuit is in accordance with the theories.
SE-MOSFTT Hybrid Circuits
Low Power Circuits
Logic Gate
2012
05
01
1
7
https://iceeng.journals.ekb.eg/article_30669_c7c02f59082bd98e26a2b7f6f4c5cbab.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Adaptive distance protection of a double circuit transmission line
D.
Zaki
N.
El-Amary
A.
Abdelaziz
M.
Mansour
The change in power systems can affect the performance of distance relays protection. In case of distance protection especially the state of double circuit operation depending on the power system state, a distance relay can cover from less than 50% up to far more than100% of the total line length. The mutual magnetic coupling is one of the phenomenon affecting the precision of the distance relay. An adaptive distance protection scheme of a double circuit transmission lineconsidering the mutual magnetic coupling effect is presented in this paper. The single line to ground fault (SLG) and the line to line to ground fault (LLG) in a double circuit transmission line are studied. An adaptive correction factor in case of SLG and LLG faults for the compensation of the mutual coupling effect is suggested and calculated. It's achieved using thesimulation results of ATP-EMTP program without and with considering the mutual coupling effect. The proposed adaptive protection is applied to a double circuit transmission line model and the results are reasonable.
Adaptive distance protection
double circuit transmission line
mutual coupling
correction factor
2012
05
01
1
15
https://iceeng.journals.ekb.eg/article_30671_273fc9c27a8de7442552bdac75338c19.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Experimental testing of the neural network based protection of synchronous generators
A.
El Dessouki
M.
El-Saadawi
M.
Tantawy
A.
Hatata
An internal fault detector and classifier for synchronous generator stator windings based on ANN have been implemented and its behavior is investigated on physical power system model. The hardware system is designed and built to acquire the three phase currents at both ends of synchronous generator terminals. A software program is developed to read currents, which used to train a proposed Neural Network structure using MATLAB. The trained network is placed in a LabVIEWTM based program formula node that monitors the currents online and display the fault types. Details of implementation and the experimental studies are given and analyzed in the paper. Lab work proves that the proposed approach is able to detect and classify the type of internal faults rapidly and correctly. It is suitable to realize a fast and accurate internal fault protection scheme of the synchronous generator.
Internal fault detector and classifier
Synchronous generator and Neural Network
2012
05
01
1
10
https://iceeng.journals.ekb.eg/article_30672_76ff71e0b144603dfc764f598a484190.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Analysis of false tripping for power transformers in Egypt
M.
Abdelfatah
M.
EL-Shimy
H.
Ismail
Frequent forced outages of power transformers can significantly affect the performance of industrial and commercial power systems and the processes they control. This paper presents the results of an extensive survey on false tripping of protection devices and systems for power transformers in Egypt. The outcomes of this work are beneficial in improving the design and maintenance of these protection systems to increase the reliability and availability of power systems. The data are obtained from the Egyptian Electricity Transmission Company (EETC). The collected data are in the form of transformer outage reports for eight years, from 2002 to 2009, where the average number of transformers is 1922 in voltage populations ranging from 33 kV to 500 kV and MVA rating from 5 MVA to 500 MVA. Results show that the fire-fighting systems are responsible for the highest number of false trips in all voltage sub-populations except the 220 kV sub-population where the dominant cause of false trips is the bus bar protection.
Power transformers
protection systems
false tripping
2012
05
01
1
10
https://iceeng.journals.ekb.eg/article_30673_78bec068264baed8aefa4464db44dc71.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
An efficient power differential scheme for power transformer protection
Eman
Ahmed
Ragab
El-Sehiemy
This paper proposes and develops a Power-based Differential Scheme (PDS) for power transformer protection. The proposed PDS for power transformer is based on computing the active and reactive power loci during normal operation, switching, normal power swing, and internal and external faults. The proposed PDS concept based on monitoring and comparing the transformers primary and secondary active and reactive powers. The dynamic response of the proposed PDS is tested and modeled using Matlab/Simulink software a step up transformer fed from single alternator system from one end versus the utility busbar at the other end. The test results confirm the superiority of the proposed scheme to distinguish internal and external faults as well as magnetizing inrush currents with good selectivity, high speed, sensitivity, stability limits and high accuracy response of the power differential scheme.
Power differential Scheme
Transformer differential protection
Inrush current
Fault current
Criterion function
High impedance fault
2012
05
01
1
11
https://iceeng.journals.ekb.eg/article_30674_be12f31ac0ac6bc1f53d1afc6f25df63.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
A Novel S-box Substitution Technique for AES Algorithm
Faiz
Mohamed
M.
Gadallah
Alaa Eldin
Rohiem
Ashraf
Elbayoumy
In AES, the S-box substitution of each byte is depends on the input byte value only. In this paper, a novel method for substituting each byte is introduced. In this method, the substitution of each byte is depending not only on its value but also depend on the input key and the derived subkeys. The keys are used to generate two parameters that areused for mapping the substituted value horizontally and vertically to a random location in the S-box. The first parameter, subkey plus the input value, are used to rotate the row horizontally to the new location. The second parameter, subkey plus substituted value result from first parameter, are used to rotate the column vertically to new location whichis final substitution value. The required modifications are made for the inverse substitution saving the non-linearity relationship between the Sbox and its inverse. In this technique, we can get up to 256! Substitutions values instead of 256 values as in normal AES algorithm which increase the encryption complexity and complicate the cryptanalysis process. The results show that this is achieved with negligible extra delay. The increase of the substitution domain achieved from this Technique doesn't require to construct a new S-box, or inverse S-box as it does in the dynamic Sboxapproaches in which the need for re-evaluation and proved against cryptanalysis after every new S-box construction is compulsory.
AES
Avalanche effect
Cryptography
Key dependent Sbox
NISTSts
SAC
2012
05
01
1
15
https://iceeng.journals.ekb.eg/article_30675_acfec40c08bb3d11377c757e479a31d0.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
An Efficient Location based Hybrid and Dynamic Key Management Scheme for SurvSec Security Architecture
Mohamed
Megahed
Dimitrios
Makrakis
Wireless Sensor Networks usually consists of a large number of tiny sensors with limited computation capability, memory space, power resource and communications capabilities. WSN’s are extremely vulnerable to numerous attacks; due to several factors such as unattended deployment and lack of tamper resistant packages. Secure communications in wireless sensor networks is critical. Key management is the fundamental security mechanism in WSN. The objective of key management is to establish and maintain secure channels among communicating nodes. Location based key management protocols are very efficient methods in terms of key connectivity, storage overhead, improving the security and scalability and localizing attacks. Also, dynamic key management assumes long lived networks with more frequent addition of new nodes thus requiring network rekeying for sustained security and survivability. In this paper, we proposed a new location based hybrid and dynamic key management scheme that establishes secret keys between sensor nodes. The hybrid scheme reduces the high cost public key operations at the sensor side and replaces them with efficient symmetric key based operations. The proposed system can efficiently resist cloning attack and sybil attack where the attacker can copy the certificate of a node, public key, private key and the node ID to launch these attacks.
Dynamic
Hybrid
Key Management
Cloning attack
Sybil attack
ECC
Location based
Certificate Authority
Symmetric Key
and Public Key
2012
05
01
1
20
https://iceeng.journals.ekb.eg/article_30676_29d1c196d275b760923ba5bdaa3a493c.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
An Efficient Overlapped Groups based Compromised Nodes Detection at First Stage for WSN
Mohamed
Megahed
Dimitrios
Makrakis
Surveillance WSNs are deployed in hostile environments such as perimeter, border locations and battlefields to detect unauthorized intrusions. Therefore, Surveillance WSNs are highly vulnerable to collaborative work of attackers to compromise many legitimate nodes. Securing surveillance WSNs is challenging because of low-cost, limited capabilities, resource-constrained sensor nodes. Several protocols have been proposed for detecting compromised nodes. However, some protocols rely on an implicit assumption that compromised node will change its location or its signal strength will alter after it is compromised; other protocols use alert messages or reputation based trust models which require the nodes misbehavior to discover the compromised nodes. Node compromise attack is a multi-stage attack which consists of three stages: physically capturing and compromising sensor nodes; redeploying the compromised nodes back to network and compromised sensor nodes rejoining the network. Our work studies how to achieve high resiliency against an increasing number of compromised nodes in large surveillance WSN in hostile environment by collaborative work of attackers at the first stage. Specifically, after sensor nodes are deployed they first build overlapped groups in ad hoc pattern where a group is composed of four nodes. Then, the nodes within the overlapped groups can monitor each other to detect any node compromise attempt. We describe the building blocks that can be used to build the protocol for the detection process. Our protocol is designed to be resistant against large number of compromised nodes by collaborative work of attackers. Extensive simulation results are given to demonstrate the high detection rate of the proposed scheme.
Overlapped groups
Wireless Sensor Network
Node Compromise Attack
surveillance
2012
05
01
1
14
https://iceeng.journals.ekb.eg/article_30677_d25203b17404692eee0fabc963a20090.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Key Partitioning Cryptanalysis of Reduced Rounds AES Algorithm Variant
Amr
Ashry
AlaaEl-Din
Shehata
Ashraf
El-Bayoumy
The majority of the published attacks on reduced-round variants of block ciphers seeks to maximize the number of rounds to be broken, using less data than the entire codebook and less time than exhaustive key search. In this paper, a novel key partitioningchosen plaintext attack against reduced-rounds AES variants up to 3 rounds that uses only 33 chosen plaintext-ciphertext pairs, a workload of 219(for three round variant) and 217bytes of memory is introduced. The attack depends upon the internal structure of the AES round function, the differential characteristics of the AES S-BOX and thekey partitioning in which each key byte will be processed individually independent to the other key bytes. To clarify the idea of the attack we will follow a round by round cryptanalysis till the third round of the AES. The results gives that a bit-level permutation is more efficient than byte-level permutation used in the AES round function.We also introduce a counter measure for this attack by using a bit-level permutation on the AES round function instead a byte level permutation.
AES
Cryptanalysis
bit level permutation
byte level permutation
Differential
key partitioning
reduced rounds
2012
05
01
1
11
https://iceeng.journals.ekb.eg/article_30678_8e409d75cc4696c3ba769b967d3fe3d3.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
A Modified Kerberos Authentication Scheme Using Public Key Cryptography
Khaled
Khairy
Ahmed
Abd Elhafez
Essam
Abd El Wanees
Abstract:Kerberos is a widely used authentication scheme based on symmetric key cryptography,although Kerberos is a part of MIT’s Project Athena it has been adopted by many otherorganizations for their own purposes. And is being discussed as a possible standard.Despite Kerberos’s many strengths, a number of limitations and some weaknesses haveappeared due to MIT’s environment that needs only user-to-server authentication andothers due to deficiencies in the protocol design. In this paper an improved schemeusing the Public Key cryptography will be proposed to enhance its security strength toovercome these limitations and weaknesses.
authentication
Kerberos
security analysis
Public Key cryptography
2012
05
01
1
10
https://iceeng.journals.ekb.eg/article_30679_90a5335925ca38dd7a01c3d1a2ab18b8.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Selection of optimal filtration and prediction block in the single target tracking system with one imaging sensor under changeable daylight
Mikluc
Davorin
Antonijević
Goran
Andrić
Milenko
Bondžulić
Boban
The paper presents a system with one imaging sensor. Serial communication interface enables azimuth and elevation control, zoom setting, and changing the mode into infrared. Single target tracking in plane in multiple scenarios has been analysed in detail. By comparative analysis of CA models, Singer model and IMM algorithm with two models, and on the basis of root mean square error of position estimation, optimal filtration and prediction block has been selected. The first scenario shows linear target tracking at variable velocity. In the second scenario, the sensor tracks a maneuvering target. The third and fourth scenario present target tracking with infrared sensor with the cinematic characteristics identical to the first two scenarios. These are followed by scenarios in which the imaging and infrared sensors are controlled in target tracking, and the influence of different filtration and prediction blocks on the tracking is analysed. The last scenario shows target tracking under changeable conditions with automatic sensor control. All the scenario analyses are based on root mean square error of position.
Image restoration
remote sensing and image blur models
2012
05
01
1
13
https://iceeng.journals.ekb.eg/article_30791_0690ba3c385f31eb6265abb54c63e607.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Non-linear motion deblurring in single images using genetic algorithms
Salsabil
El-Regaily
H.
El-Messiry
M.
Abd El-Aziz
M.
Roushdy
One of the key problems of restoring a degraded image from motion blur is the estimation of the unknown non-linear blur filter from a single input blurred image. Many blind deconvolution methods typically assume frequency-domain constraints on images, simplified parametric forms for the motion path during camera shake or use multiple input images with specific characteristics. This paper proposes an algorithm for removing non-linear motion blur from a single input blurred image using Genetic Algorithms (GAs), by finding the proper parameters and goal function. Also recent research in natural image statistics is exploited, which shows that photographs of natural scenes typically obey heavy-tailed distribution. The Point Spread Function entries are used as the parameters of the GA. Experiments on a wide data set of standard imagesdegraded with different kernels of different sizes demonstrate the efficiency of the proposed approach especially in small blur lengths compared to other algorithms with reasonable running times for a GA.
Camera Shake
Blind Image Deconvolution
Genetic Algorithm
Non-Linear Motion Blur
2012
05
01
1
13
https://iceeng.journals.ekb.eg/article_30792_ba7dd6573db2a0f39f72c29bc7b7e870.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Urban expansion and its impacts on agricultural areas in Al-ZAHRA region, Libya using high resolution images
Ashour
Soliman
Fawzy
El tohamy
Image change detection is an important application of remote sensing technology. It is a process ascertaining the changes of specific features within a certain time interval. This paper presents an object-oriented image change detection methodology to detect the changes and analyze aerial remote sensing data of AL-ZAHRA sub-area. Furthermore, the urban expansion areas on behalf the agricultural areas in the study area is monitored and analyzed. A rule based classification technique is applied by using fuzzy functions, aiming to extract information of the urban spatial structure. Finally the classification accuracy of the used images was assessed with parameters of overall accuracy, and kappa statistic. The increase in spatial resolution from Landsat MSS (80m) to Landsat TM (30m), then to SPOT XS (20m) and SPOT Pan (10m); and recently very high resolutions images acquired by SPOT-5 (2.5m), IKONOS (1m) and Quikbird(0.61m) has made it possible to monitor the urban expansion and development at micro level and with a very high accuracy.
Remote Sensing
Object classification
Object change detection
2012
05
01
1
10
https://iceeng.journals.ekb.eg/article_30793_494b18c058df1225888eb99f7d2c5229.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Investigating the impact of smart grids’ contributions in developing countries
Walid
El-Khattam
Marwa
Mostafa
Abstract:The ability to improve safety and efficiency of the electric networks, making better useof existing assets, enhancing reliability and power quality, reducing dependence onimported energy, and minimizing costly environmental impacts are the main forces thathave substantial economic value on the electricity industry. Most of the time,investment in generation, transmission, and distribution networks to achieve suchbenefits places a burden on developing countries’ economies, which can be relieved bySmart Grid (SG) concepts implementation. SG will intelligently integrate the actions ofall users connected to it; generators, grids, and consumers in order to efficiently deliversustainable, economic, secure electricity supplies, provide self-healing, and take the fulladvantage of new technologies. This paper aims to assess the SG applications on thegeneration, transmission, distribution levels, and up to consumer sides in developed aswell as developing countries. The main SG features are evaluated based on the availabletechnologies and their span. The SG benefits that would reflect on utilities particularlyaiming at integrating large amounts of Renewable Energy Sources (RES) into their gridsand implementing distribution management, and consumers are presented. Moreover, aroadmap needed to achieve the mentioned SG application is proposed and discussed.Finally, the proposed recommendation and conclusions for the impact of SG ondeveloping countries are illustrated.
Demand side management
smart grids
and renewable energy sources
2012
05
01
1
12
https://iceeng.journals.ekb.eg/article_30794_b65a711be0bdc72ebe9970854c01e105.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Design and operation of PV / FC smart electrical power system using neural networks
Hassan.
EL-Tamaly
Ayman
Nassef
This paper introduces a study of design and performance of Photovoltaic / Fuel Cells Smart Electrical Power System, PV/FC SEPS, to supply a load in a remote area has the same latitude of Elminia city. Since the output of PV system depends on solar radiation then the FC starts automatically by using Artificial Neural Network, ANN, when solar radiation is insufficient to feed the load demand. By using this operation strategy the FC works as a back- up power supply. The performance of the system for a step change in the electrical load and solar radiation are presented. Analysis of the system’s response and its limitations are discussed.
solar energy
Hydrogen
Fuel cell
Electrolysis
Polymer Electrolyte Membrane
Photovoltaic
artificial neural network
environment
2012
05
01
1
13
https://iceeng.journals.ekb.eg/article_30795_dccd7836b398350c4448c5d12903f62d.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Phasor measurement units for out of step detection
Almoataz
Abdelaziz
Amr
Ibrahim
Zeinab
Hasan
Synchronized phasor measurements have become an important technology with several international manufacturers offering commercial phasor measurement units (PMUs) which meet the prevailing industry standard for synchrophasors. With the occurrence of major blackouts in many power systems around the world, the value of data provided by PMUs has been recognized, and installation of PMUs on power transmission networks of most major power systems has become an important current activity. This paper presents a transmission line protection scheme based on synchronized phasor measurement units to detect (predict) out of step condition using equal-area criterion which is consistent with transient energy function method for single machine-infinite bus system or two machines system. This scheme uses the measured values of voltages and currents, as complex values, at the generator bus and at the infinite bus. These values of voltage and current are measured in time domain and transformed into phasor domain by using Discrete Fourier Transform to calculate the required areas. The proposed scheme can be used for the detection of out of step condition using equal area criterion with different types of faults at different locations and different models of transmission lines.
Phasor measurement unit (PMU)
Global Positioning System (GPS)
Transmission line protection
Power system transient stability
Discrete Fourier Transform (DFT)
Equal-area criterion
Out of step detection
2012
05
01
1
19
https://iceeng.journals.ekb.eg/article_30796_a4c5bc46b62297bc2c9bc2afb2d3c9d5.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Novel real-time stability assessment algorithm based on synchro-phasors measurement and parallel algorithms for multi-machine networks
Mohamed
Ali
Wael
Anis
Wagdy
Mansour
Fahmy
Bendary
The paper presents an approach to design power system transient stability assessment using direct methods for a multi-machine network based on multiple synchronized phasors, measured from Phasor Measurement Units (PMUs) and generator parameters. The generator rotor angle was derived from phasor measurements of voltage and current, and generator parameters using direct real-time algorithm. The multi-machine system was reduced to groups denoted Single Machine to Equivalent Bus (SMEB) models and another groups denoted Load Equivalent Bus (LEB) using Parallel Algorithms (PAs). The use of these PAs eliminates the SPMUs at each bus in the system, and it is required number of SPMUs only equals the number of generator buses. So that, the Equal Area Criterion in both rotor angle domain and time domain can be applicable for the SMEBs groups to assess the system stability in real-time. A three phase fault was simulated at test system comprises 2-machine, 8-bus network for validating the novel algorithm.
Stability Assessment
Multi-machine
parallel algorithms
Real-time
Synchro-Phasors Measurement Units
2012
05
01
1
14
https://iceeng.journals.ekb.eg/article_30797_f08748295ce9749b1e6c9eaa6309d699.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Modeling of Asynchronous machines for stability analysis
M.
Zaghloul
M.
Marei
W.
El-Khattam
M.
Badr
H.
El-Goharey
This paper presents the results obtained when using three different models of the asynchronous machine. The first order model is used to determine the steady-state performance when the rotor of the machine is fed with different direct- and quadrature-axis components of control voltages. The third and fifth order models are simulated and implemented into PSCAD/EMTDC software. These models are used to determine the dynamic behavior of the asynchronous machine when it is connected to an infinite bus and operating with normal conditions. Also, they are used to determine the performance when the induction machine is subjected to three-phase symmetrical faults.
Induction machine
modeling
Steady-state performance
Dynamic behavior
Doubly fed induction machine
2012
05
01
1
17
https://iceeng.journals.ekb.eg/article_30798_cd13c2bf648334b84c6b217803a89599.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Optimal PID Controller for AVR System Using Particle Swarm Optimization
H.
Abu-Seada
W.
Mansor
F.
Bendary
A.
Emery
M.
Hassan
This paper presents a method to get the optimal tuning of Proportional Integral Derivative (PID) controller parameters for an AVR system of a synchronous generator using Particle Swarm Optimization (PSO) algorithm. The AVR is not initially robust to variations of the power system parameters. Therefore, it was necessary to use PID controller to increase the stability margin and to improve performance of the system. Tuning of optimum (PID) controller parameter yield highquality solution. A new criterion for time domain performance evaluation was defined. Simulation for comparison between the proposed method and Ziegler-Nichols method is done. The proposed method was indeed more efficient also. Theterminal voltage step response for AVR model will be discussed in different cases and the effect of adding rate feed back stabilizer to the model on the terminal voltage response. Then the rate feedback will be compared with the proposed PID controller based on use of (PSO) method to find its coefficients. Different simulation results are presented and discussed.
2012
05
01
1
18
https://iceeng.journals.ekb.eg/article_30799_4e0904e25d8fa75a4c25f0a498f5ec21.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Hybrid FrFT and FFT based Multimode Transmission OFDM System Based
Ahmed
Solyman
Sherif
Elgamel
Stephan
Weiss
John
Soraghan
The popularity of multicarrier systems such as orthogonal frequency division multiplexing (OFDM) is based on the ability to cancel inter-symbol-interference (ISI) and channel distortion using a single tap equalizer in the case of a stationary channel. In doubly selective fading channels OFDM transceivers are unable to diagonalize the channel matrix and consequently inter carrier interference (ICI) appears. The discrete fractional Fourier transform (FrFT) has been suggested to enhance performance over traditional OFDM systems when transmitting over doubly-dispersive channels. In this paper a novel hybrid multicarrier system based on the Fractional Fourier transform and Fourier transform is presented. Taking advantage of these properties, we propose an adaptive transmission in those channels using multimode transmission of FrFT-OFDM and FT-OFDM, and evaluate its performances through computer simulations.
Discrete Fourier transform
discrete fractional Fourier transform
Mobile Digital video
Digital Video Broadcasting
Orthogonal frequency-division multiplexing
Time-varying frequency-selective channels
2012
05
01
1
12
https://iceeng.journals.ekb.eg/article_30800_8edbb29a5b485d837bb1933138883c31.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Modified PTS for PAPR Reduction in MIMIO-OFDM Wireless Systems
Gamal
Abdel–Hamid
Multicarrier modulation is an attractive technique for fourth generation wireless communication. Orthogonal Frequency Division Multiplexing (OFDM) is multi-carrier transmission scheme. Its high PAPR (Peak-to-Average Power Ratio) of the transmitted signal is a major drawback. We propose to reduce PAPR by probabilistic method of modified Partial Transmits Sequence (PTS), using forward error-correcting codes (FECs) such as Golay codes are employed by finding the optimum phase weighting factors and the sub block partition schemes that can achieve the lowest PAPR and computational complexity of MIMO-OFDM wireless systems. Simulation results show that the modified PTS technique achieves better PAPR reduction with reduced computational complexity of PTS scheme in the MIMO-OFDM systems.
Orthogonal frequency division multiplexing (OFDM)
Peak–to-Average Power Ratio (PAPR)
modified Partial Transmit sequence (MPTS)
Multi- Input-Multi Output Antenna (MIMO)
2012
05
01
1
13
https://iceeng.journals.ekb.eg/article_30801_a21aaefa76387548de5f877ba4c602b1.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Constant Envelope Single-carrier Frequency Division Multiple Access (SC-FDMA)
Hossam Eldin
Hassan
Farouk
Al-fuhaidy
Khairy
El-barbary
Single-carrier frequency division multiple access (SC-FDMA) has been adopted as a possible air interface for future wireless networks. It combines most of the advantages of orthogonal frequency division multiple access (OFDMA) and the low peak-toaverage-power ratio (PAPR) of single-carrier transmission. In this paper, a new transceiver scheme of Discrete Cosine Transform (DCT) SC-FDMA system is suggested. The suggested system called CE DCT SC-FDMA which refers to constant envelope discrete cosine transform SC-FDMA is based on phase modulation (PM). The output from PM component has the advantage of constant envelope (i.e. 0 dB PAPR) which allows the power amplifier (PA) to operate near the saturation region, thus maximizing the power efficiency and the coverage area. The proposed system is implemented with frequency domain equalization (FDE) to obtain high diversity gains over the frequency multipath channel. The effect of modulation index is evaluated via simulation thus the optimum value can be selected.
SC-FDMA
PAPR
PM
DFT
DCT
M-PAM and FDE
2012
05
01
1
14
https://iceeng.journals.ekb.eg/article_30802_cc950cc0b277099749a32acc2bc6e7cd.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
A New Single Carrier Frequency Division Multiple Access Based on Discrete Cosine Transform Spread OFDMA.
Hossam Eldin
Hassan
Farouk
Al-fuhaidy
Khairy
El-barbary
A single carrier frequency division multiple access (SC-FDMA), is a technique that has a similar performance and essentially the same overall complexity as those of orthogonal frequency division multiple access (OFDMA).In this paper, a strong "energy compaction" property of discrete cosine transform (DCT) is exploiting to enhance the performance of SC-FDMA system. A new SC-FDMA system for uplink wireless transmissions is proposed. The proposed system is based on DCT prior to the OFDMA modulation at the transmitter and reverse operation performed at the receiver. The proposed discrete cosine fourier transform (DCFT) SC-FDMA signal is compared with that of the DFT SC-FDMA and OFDMA signals in terms of bit error rate (BER) and peak-to average power ratio (PAPR). Moreover, the proposed system is compared to arecently introduced DCT SC-FDMA system. Simulation results show that the proposed DCFT SC-FDMA provides a significant improvement in BER performance than the DFT SC-FDMA, OFDMA and DCT SC-FDMA. There is a BER improvement of a gain up to 7 dB compared to OFDMA, 5 dB when compared to DFT SC-FDMA and 3 dB when compared to DCT SC-FDMA. In addition, it is found that the PAPR of the DCFT SC-FDMA signals is lower than that of OFDMA signals. Moreover, the proposed system complexity is comparable with the traditional DCT SC-FDMA.
SC-FDMA
OFDMA
PAPR
DCT and DFT
2012
05
01
1
15
https://iceeng.journals.ekb.eg/article_30803_0cd59626ab0f62efd5975354d00f13fe.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Optimizing QoS for Voice and Video using DiffServ-MPLS
N.
Almofary
F.
Zaki
All the new emerging QoS architectures are motivated by the desire to improve the overall performance of an IP network. Differentiated Services (Diffserv) define a model for implementing scalable differentiation of QoS in the Internet. Multiprotocol Label Switching (MPLS) is a fast label-based switching technique that offers new QoS capabilities for large scale IP networks. When an MPLS network supports DiffServ, traffic flows can receive class-based network treatment that provides bases for QoS guarantees.The objective of this work is to study the influence of the QoS mechanism via DiffServ-MPLS on network parameters such as jitter, delay and throughput . The comprehensive study showed general improvement in the throughput, jitter and delay particularly of voice and video transmission when using DiffServ-awareMPLS network as compared to pure IP only or MPLS only.
VOIP
MPLS
Diffserv QoS
OPNET
2012
05
01
1
13
https://iceeng.journals.ekb.eg/article_30804_6f5fe2ad92b8386dd2bfe115cd969bd8.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Appraisal of Different Particle Filter Resampling Schemes Effect in Robot Localization
Imbaby
Mahmoud
Asmaa
Abd El Tawab
May
Salama
Howida
Abd El-Halym
This paper considers the effect of the Resampling schemes in the behavior of Particle Filter (PF) based robot localizer. The investigated schemes are Multinomial Resampling, Residual Resampling, Residual Systematic Resampling, Stratified Resampling and Systematic Resampling. An algorithm is built in Matlab environment to host these schemes. The performances are evaluated in terms of computational complexity and error from ground truth and the results are reported. The results showed that the localization plan which adopts the Systematic or Stratified Resampling scheme achieves higher accuracy localization while decreasing consumed computational time. However, the difference is not significant. Moreover, a particle excitation strategy is proposed. This strategy achieved significant improvement in the behavior of PF based robot localization.
Particle Filter
Robot Localization
Resampling
2012
05
01
1
9
https://iceeng.journals.ekb.eg/article_30805_16efca1a8694eb5956a01005c479a349.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Modeling and Measurements of Laser Spot Position Determination Circuit with a Quad Detector
Mohamed
Heweage
Samy
Ghoniemy
Ayman
Mokhtar
Mekheimer
Soliman
Ahmed
Eldamarawy
In this paper we are interested in modeling, simulation, and measurement of laser spot position determination circuit (LSPDC) with a quadrant detector (QD). Photodiode is modeled using its differential equations then implemented using ORCAD –pspise. Starting with the output of the detector, the circuit modeling and simulation for the preamplifier, post amplifier, ADC and microcontroller card were performed. PCB card implementation was performed and integrated with the QD and the necessary optical system components. The implementation of the full LSPDC with the detector is performed. General system for testing the spot LSPDC was performed with a laser source simulating the incident radiation and a mechanical system to enable adjusting different angles. Good agreement was achieved between the measured data and the adjusted angles with a small error attributed to the error in the adjusted mechanical system and the stability of the used laser source.
Photodiode modeling
Quad detector
spot position measurements
2012
05
01
1
17
https://iceeng.journals.ekb.eg/article_30806_857ebcfe613b9a679abddda8bad5811a.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
A Comparison Study between Inferred State-Space and Neural Network Based System Identifications Using Adaptive Genetic Algorithm for Unmanned Helicopter Model
Ahmed
Hosny
In this paper, system identifications of an unmanned aerial vehicle (UAV) based on inferred state space and multiple neural networks were presented. In this work an optimization approach was used to conclude an inferred state space and the multiple neural networks system identifications based on the genetic algorithms separately. The UAV is a multi-input multi-output (MIMO) nonlinear system. Models for such MIMO system are expected to be adaptive to dynamic behavior and robust to environmental variations. This task of accurate modeling has been achieved with multi-neural networkarchitecture in the most recent years. The presented work is focusing on an inferred state space based system identification which is a new approach seldom used, but it is also easier and more stable compared with the multi-network based system identification during the modeling of dynamic behavior of nonlinear systems. In other words the number of inputs used in the genetic algorithm to obtain an inferred state space is almost one third of the number of inputs needed to develop the multi-layer recurrent neural network architecture to simulate the required dynamic behavior of a real model. The neural network models are based on the autoregressive technique with linear and nonlinear networks. The simulation results presented in this paper show the superiority of the inferred state space model compared with the autoregressive technique based multi-neural network.
UAV Unmanned Aerial Vehicle
RC Remote Control
PI Performance Index
RNN Recurrent Neural Network
GA Genetic Algorithm
ISS Inferred State Space
2012
05
01
1
21
https://iceeng.journals.ekb.eg/article_30807_6a729682f8a9b8612a31af4c3bf3fdbf.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Design and Implementation of Digital Delay Line Integrator (DDLI) using FPGA and DSP
Saad
El gayar
Fathy
Ahmed
Nabil
Mikhail
In the present work, the design and implementation of digital delay line integrator (DDLI) which is a common radar signal processing technique is proposed. The design and implementation is achieved using two of the new developed digital hardware platforms: Digital Signal Processors (DSP) and Field Programmable Gate Arrays (FPGAs). Comparison between these developed digital hardware platforms based on the implemented DDLI is introduced. This is done to find out the aspects of choosing which platform is the best for implementing certain radar signal processing technique.
2012
05
01
1
9
https://iceeng.journals.ekb.eg/article_30808_165f7e398b94152c9467e8d978b68358.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Design for Testability Technique for Microcontroller
Sherif
Morsy
Mohamed
El-Mahlawy
Gouda
Mohamed
Testing of embedded system including microcontroller is difficult task with external Automatic Test Equipment (ATE). Therefore, empowering the microcontroller to test itself as software-based self-testing (SBST) looks the suitable solution like the microprocessor testing. Practically, the SBST is not suitable for microcontroller testing. It utilizes large space area in the program memory inside the microcontroller that has limited space area in the available memory. Also, it cannot test all microcontroller internal modules and when it test internal modules it cannot make sure that the General Purpose Input Output (GPIO) of the microcontroller work probably without using external ATE. So the Design for Testability (DFT)methodology that uses Instruction Set Architecture (ISA) of the microcontroller family to generate test subroutines and for the Test Pattern Generator (TPG) and part of the Built-In Self-Test (BIST) control unit and uses the external ATE for the other part of the BIST control unit and for the test response compaction (TRC) and evaluation. This paper introduces a hybrid testing methodology that combines both SBST and hardware-based self-test (HBST) for microcontroller testing as an efficient DFT methodology. It introduces for either in the field or as part of a production test of a microcontroller as an example of the system of chip (SoC). This DFT methodology is based on divide and conquer algorithm and requires knowledge of the ISA of the microcontroller to test not only the embedded processor found in microcontroller but also test other peripherals found in it using brute force technique. The comparison between the SBST and the presented hybrid methodology is based on memory utilization, number of clock cycles that was taken to complete each test and the number of modules that can be tested using each of them. Experimental results indicate that the presented methodology is superior in memory utilization, test time and can test all microcontroller modules for both 18F4X2 and 16F87X families.
Design-for-Tetability (DFT)
Built-In Self-Test (BIST)
2012
05
01
1
18
https://iceeng.journals.ekb.eg/article_30809_1a2a4357123742dc676a44944378e73c.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Fusion of Low-Cost MEMS IMU/GPS Integrated Navigation System
A.
Abosekeen
A.
Abdalla
In this paper, the multi-sensor data fusion technique based on fuzzy clustering is used to fuse the data from low cost MEMS IMUs to build an INS model. Using this model, the inertial navigation data PVA is extracted. The navigation data PVA is integrated with the GPS data using Kalman filters to build an accurate navigation system of an UAV. Simulation results show that the method can achieve higher accuracy solutions with low cost IMU sensors and improve the performance ofintegrated navigation system.
Data fusion
fuzzy
data clustering
Inertial Navigation system (INS)
Global Navigation system(GPS)
Kalman Filter(KF)
andINS/GPS Integration
2012
05
01
1
23
https://iceeng.journals.ekb.eg/article_30810_3101bbd16c3b44f85fc92f377a5123aa.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
The generation of Bessel beams using nanoscale planar slit arrays
Ismail
Nassar
Aladin
Kamel
Diaa
Khalil
Omar
Omar
In this paper we propose a nanoscale planar lens structure for generating Bessel beam like fields to achieve large focal lengths and depth of fields. The structure consists of sub wavelength slits of different widths constructed on a thin metallic slab that is surrounded by air on both sides. The proposed structure is simulated using a modal technique that represents the structure as a waveguide and solves for the modes of the waveguide. Although diffraction affects the behavior of the generated beam from that of conventional Bessel beams, the simulation results show that the proposed structure is very promising for obtaining a very compact Bessel beam generator.
Planar lens
Bessel beam
Modal technique
2012
05
01
1
10
https://iceeng.journals.ekb.eg/article_30811_2f850bdd79a06de038414fab38c925b7.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Effect of Mutual Coupling on MIMO capacity of a Microstrip Antenna Array
M.
Aldemerdash
A.
Abdin
A.
Mitkees
H.
Elmikati
The effect of mutual coupling on the capacity of Multiple-Input-Multiple Output (MIMO) antenna systems is demonstrated by considering a linear array of a four element line fed microstrip patch array. This array is designed at ISM band withfrequency of 2.45 GHz on FR4 Epoxy substrate with relative permittivity (er) of 4.4. The simulation results obtained with this array are compared with the results of a similar array having 2 columns and 4 rows spiral Electromagnetic Band Gap (EBG) structure. The spacing between array elements is variable at the transmitting end and fixed at the receiving end with 0.5l. Array impedance matrices are obtained from simulation results generated by the Ansoft designer software and then used in the calculation of the required coupling matrix. The one-ring channel model is used to compute the correlation between paths and mean capacity of the MIMO system for equal power (EP) and waterfilling (WF) schemes at SNR of 20 dB. A maximum mutual coupling reduction of 17 dB is achieved as a result of using spiral EBG structure. For element spacing in the range (0.48l - 0.6l), which is suitable for the design of antenna arrays, the mutual coupling reduces the correlation level from the ideal case by about 0.15 and the mean capacity by (0.1 – 0.42) b/s/Hz. The reduction of the mutual coupling by spiral EBG structure improves the correlation and the mean capacity that their values are reaching the ideal.
MIMO systems
Antenna Arrays
mutual coupling
EBG structure
Channel Capacity
onering model
SCM model
Kroncker model
2012
05
01
1
12
https://iceeng.journals.ekb.eg/article_30812_f3c3d5dcc7d9f1808fb7a91e95825efd.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
A multi-objective fuzzy-based procedure for maximal preventive reactive power dispatch problem
Adel
Abou El-Ela
Ragab
El-Sehiemy
Abdul Allah
Shaheen
This paper presents a proposed procedure depends on the multi-objective fuzzy linear programming (MFLP) technique to obtain the optimal reactive power reserve for generators and static switchable VAr sources, as a preventive control action to overcome any emergency condition. The proposed procedure is very significant to eliminate violation constraints and give an optimal reactive power reserve for multioperating conditions. The proposed multi-objective functions are: minimizing the real transmission losses, maximizing the reactive power reserve at certain generator, maximizing the reactive power reserve at all generation system and/or switchable VAr devices. The proposed MFLP is applied to a 5-bus test system and the West Delta region system as a part of the Egyptian Unified network. The numerical results showthat the proposed MFLP technique achieves a feasible real power loss with maximal reactive reserve for power systems.
fuzzy linear programming
optimal reactive power dispatch
preventive actions
2012
05
01
1
18
https://iceeng.journals.ekb.eg/article_30813_9152bef654375898c099fe376c54e704.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Power cables inspection using Matlab graphical user interface aided by thermal camera
F.
Selim
A.
Azmy
I.
Bedir
H.
El desuoki
This paper proposes an efficient method to predict and solve abnormal conditions in all types of electrical cables using Matlab Graphic User Interface “GUI” with thermal imaging infrared “IR” camera. Traditional techniques can not easily predict faults and cannot give a complete diagnose about them. Using any type of thermal cameras enables detecting abnormal conditions of cables by the technical operator (thermographer) depending on their thermal state. Then, thermal images can be sent to the advanced program (GUI) according to the proposed technique. Based on cables database, theproposed interface program and the projected technique are able to: 1) obtain the thermal profile of the system; 2) process and analyze collected thermal data, and 3) apply a simulated artificial technique to define the particular condition or fault corresponding to the thermal signature. The final performed report can contain: 1) problems that are found in the components and the system itself, 2) suggest remedy and any necessary corrective action with time schedule, and 3) give the priority of solving these problems with respect to repair maintenance time, 4) proper selections of cables types and size.
Matlab Graphic User Interface
thermal imaging infrared
2012
05
01
1
11
https://iceeng.journals.ekb.eg/article_30815_80f28d33b7e893c0d3f56c369953446b.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
IMPACT OF OPERATING DISPERSED GENERATORS ON THE OPERATION OF ELECTRICAL UTILITY WITH APPLICATION IN EGYPT
S.
Allam
A.
EL-Zeftawy
N.
Shehata
This work aims to assess the impact of dispersed wind generators (DWG) on the operation of distribution systems and determine the optimal location and penetration level (PL) of these generators with multi-system constrains to achieve a single and multi-objectives function. Genetic algorithm (GA) and SWARM are used as a modern optimization techniques, also the conventional linear programming (LP) technique also been employed to confirm the optimization results obtained by both GA and SWARM techniques, when they applied to assess the impact of DWG on an Egyptian utility operation. These impacts included active and reactive power losses and voltage profiles.
2012
05
01
1
10
https://iceeng.journals.ekb.eg/article_30816_3c99c1e40f0dfa6004ee8737a62ae002.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Design of the Power Control Module of TD-SCDMA in Fast Fading Channels
Hatem
Zakaria
Alaa
El-Shafie
A.
Al-Bassiouni
Power Control is essential for CDMA based Mobile Communication Systems. Power Control treats the near far problem, enhances the coverage and the capacity and overcomes fading. Adaptive Power Control improves the system performance in case of severe fading conditions. This paper considers the design of the Power Control module of TD-SCDMA system in fast fading condition. A closed loop adaptive step size power control algorithm is suggested. The proposed power control module can be easily implemented within the TD-SCDMA chipset.
CDMA
fast fading
TD-SCDMA and power control
2012
05
01
1
9
https://iceeng.journals.ekb.eg/article_30817_a6a95d97f0213be9a51d11008dfeacea.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Curvelet transform for water bodies extraction from high resolution satellite images
Mohamed
Elhabiby
A.
Elsharkawy
N.
El-Sheimy
In this research paper, a new implementation on the second generation curvelet transform in the edge detection of coastline is presented and applied on WorldView-2 imagery, together with a comparison with the classical edge detection methods such as Canny operator and the traditional wavelet transforms. This implementation is aiming to compare this new approach to the traditional edge detection techniques. It is found that the curvelet proposed implementation performs better in detecting larger and elongated structures compared to the Canny and the wavelet transforms. However, Although this method is promising and efficient for edge detection, the quality of the edge detection is still a function of the pre-processing steps (the classification step in this research paper) , as any edge detector will suffer from the heterogeneity of the images especially when using very high resolution imagery.
Curvelet transform
Wavelet Transform
edge detection
high resolution satellite imagery
2012
05
01
1
19
https://iceeng.journals.ekb.eg/article_30818_1501ec7c24120427fbf9984c0ab2eff0.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Optimal Orbit Parameters for Power Subsystem of LEO Satellites
M.
El-Heddeiny
M.
Ashry
M.
Bader
A.
ATALLAH
The main objective of this paper is to design a Low-Earth-Orbit (LEO) Satellite Power Subsystem based on the variations in orbit parameters. Additionally, finding out the optimal orbit, altitude, and inclination angle; considering both solar array components and energy storage devices. There are two main challenges in this work. The first challenge is to provide the Electrical Power Subsystem (EPS) with an additional power to compensate for the solar cell’s degradation until End-of-Life (EOL) due to the presence of a rarefied atmosphere in LEO. The second challenge arises as a result of eclipses experienced by LEO more frequently and thus more charging/discharging cycles than satellites in Geosynchronous Earth orbit (GEO) leading to more stresses on the LEO batteries, which means higher degradation and lower performance. Accordingly, the aforementioned challenges were tackled by the simulation and analysis based on thevariations of the orbit parameters using Satellite Tool Kit software (STK8.1.1) to result in the optimal orbit, altitude, and inclination angle which provide maximum value for the total generated energy by the solar array during the mission. More importantly, we arrived at the minimum mass and area for solar array simultaneously with minimum values for the batteries’: mass, volume, capacity, and total number of cycles, leading to a reduction in the charge/discharge cycles, i.e. lower degradation and higher performance.
altitude
Beta angle
Inclination angle
LEO Satellite
Orbit parameters
2012
05
01
1
25
https://iceeng.journals.ekb.eg/article_30819_f80485fadf73c4cdfaa9650e83f14ca0.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Tradeoffs for Selecting Orbital Parameters of an Earth Observation Satellite
E.
Sanad
A.
EL Raffie
F.
Altohamy
M.
Zayan
Selection of orbital parameters for earth observation satellites is the most reflective factor upon fulfillment of the space mission requirements. Practically, straight forward approach for selection of these parameters does not exist. Therefore, it is necessary to follow a complex process that requires tradeoffs among the different parameters and the correspondingorbit-related requirements. Multiple mission requirements often drive the orbit to different or even opposite trends. For Earth observation satellites, the most important orbit-related requirements are the Earth coverage, payload performance characteristics, ground communication, environment and survivability, orbit life time, availability of launch vehicleand legal and political constraints. In this work, analyses of how each orbital parameter would affect these requirements are introduced. Then the tradeoffs for compromising among contradictions are presented. To demonstrate with numerical example, a mathematical modeling for the correlations among altitude, revisit time, ground resolution and a singlesatellite slewing maneuver angle is developed. To implement for large scope of the mentioned parameters, a corresponding Matlab computer program is also developed. As an output, four parametric charts representing the correlations among altitudes, satellite slewing maneuver angle, ground resolution and the revisit time are obtained. The revisit time works as a parameter in these charts. Finally, a demonstrative tradeoff is introduced via those charts.
[Orbital parameters
Earth observation
Earth coverage
satellite orbit design
satellite tracking
orbital altitude
and orbital revisit time]
2012
05
01
1
12
https://iceeng.journals.ekb.eg/article_30820_29f80c12c5fef42db2416ea733f33c40.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Automatic control education using FlightGear and MATLAB based virtual lab
M.
Moness
A.
Mostafa
M.
Abdel-Fadeel
A.
Aly
A.
Al-Shamandy
In this paper, a virtual lab based on MATLAB and FlightGear flight simulator is discussed and developed. The virtual lab consists of number of experiments that enhances the understanding of fundamental concepts of classical control forundergraduate students. The objective of the virtual lab is to design a stability augmentation system for C310 aircraft model according to known flying qualities then implement a hold autopilot for the aircraft. This objective is achieved through a series of experiments, animation and simulation to illustrate main concepts of classical control like modeling, time domain analysis, frequency domain Analysis, non-minimum phase systems, root locus, feedback design and PID compensation. These concepts are demonstrated in four experiments through the analysis and design of a flight controlsystem for Cessna 310 aircraft on FlightGear flight simulator. The developed virtual lab can be used easily by students to study and visualize classical control principles using FlightGear and MATLAB GUI with an attractive case study of a flight control system.
virtual lab
automatic control education
flight simulator and FlightGear
2012
05
01
1
15
https://iceeng.journals.ekb.eg/article_31372_babaedab4f2e1a8bbdd2e60d718c6eab.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Comparison between Kalman Filter and PHD Filter in Multi-target Tracking
M.
Nabil
H.
Kamal
M.
Hassan
Tracking a maneuvering target weakens the performance of predictive-model-based Bayesian state estimators (Kalman Filter). Therefore, the Probability Hypothesis Density (PHD) filter was proposed to overcome this problem. In this paper, the performance of Kalman filter, modified Kalman filter, and PHD filter in tracking a highly maneuverable target is shown. All three algorithms to track a maneuverable target are applied. Monte Carlo simulation showed that the PHD filter provides promising performance compared to Kalman filter. In particular, the algorithm is capable of tracking multiple crossing maneuvering targets.
Multi-target Tracking
Kalman filter
Probability Hypothesis Density (PHD Filter)
2012
05
01
1
14
https://iceeng.journals.ekb.eg/article_31375_1c02a2231628eb73a8566ab310416ef2.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Design and Implementation of Digital Missile Trajectory Controller
A.
Sobh
A.
Eldamarawy
Y.
Elhalwagy
R.
Elbardeny
The missile mission success depends on robust guidance techniques in which the missile is to be guided to fulfill a correct trajectory up to hit point. This paper is devoted to discuss the design, implementation and verification of a digital trajectory generator (DTG) and its application for guided vehicles. The DTG is fed with target position and environmental parameters. The suitable trajectory missile attitude angles are generated as a function of time and are transmitted from the launcher to the missile via the four standard control wire dispended from the missile during flight. For the simulationpurposes, an adaptation is developed to interface the DTG with the software based missile simulator through the standard USB port. A synchronizer is embedded in the DTG hardware design to synchronize and simulate the missile leave launch event. The design is verified by comparing the results of the basic stand alone flight simulator and those with the DTG hardware in the loop simulations in various operating points. Promising results showed potential for an on-going research and development for the system of concern. Developed DTG is a must step on upgrading the guided vehicles via using a goniometer in the launcher or via integrated onboard with homing head.
Robust guidance
Digital trajectory generator (DTG)
Embedded Systems
Programmer electronic controller (PEC)
semi-automatic command to line of sight (SACLOS)
2012
05
01
1
10
https://iceeng.journals.ekb.eg/article_31378_b60da785955a86d19f957c6d0fa90eea.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
AUTOMATIC ADAPTIVE WINDOW TRACKING BASED ON COLOR PROBABILITY DISTRIBUTION
Wael
Yousf
Osama
Elmowafy
Ibrahim
Abdl-Dayem
Alaa Eldin
Fahmy
This paper introduces a proposed modified approach of an end-to-end technique for moving targets tracking. The tracking technique is processed on a real-time video stream. The proposed approach is a prolongation of the Continuously Adaptive Mean Shift (CAMShift) algorithm applications. Sever variations in target shape, size and luminosity can be dealt better using this algorithm. Edge detection technique is used to deal with the change in target shape and size. An estimator is used to deal with luminosity changes. A proper size of tracking window is built with minor extra computational overhead. Experimental results show the effectiveness of the proposed algorithm.
Tracking
CAMShift
edge detection
2012
05
01
1
9
https://iceeng.journals.ekb.eg/article_31379_41b3c241ed023585661a9dd41af6f8ef.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Automatic detection of sleep apnea using a hidden Markov model and nonlinear analysis of nocturial oximetry
Fatma
Abdel- Mageed
F.
Abou Chadi
Hosam
Salah
Shahira
Loza
The aim of this work is to develop an automatic system that can be used as an assistant tool for the detection and diagnosis of different kinds of sleep Apnea (Obstructive, Hypopnea and Central Apnea, respectively). Three nonlinear techniques were used for feature extraction: Central tendency measures (CTM), Lempel-Ziv complexity (LZC) and Approximate Entropy (ApEn) for oxygen saturation signals (SaO2). A statistical Comparison using (t – test) was performed for comparing the population mean of normal group with each of the Sleep Apnea groups for the nonlinear parameters. Three Hidden Markov Models (HMMs), based on Baum–Welch algorithm were proposed to estimate the optimal number of the parameters. The results have showed that the use of HMM and the nonlinear features gave promising results used for classifying Sleep Apnea diseases.
2012
05
01
1
13
https://iceeng.journals.ekb.eg/article_32689_014b3984ab0c183826c618a2f17f4374.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Analysis and classification of sleep EEG
Noha
El-Kafrawy
F.
Abou-Chadi
S.
Rihan
In the present paper, a comparative study of performance for three techniques of feature extraction is presented in order to classify the sleep stages using EEG signals. A multilayer feed forward neural network was used for classification. Six sleep EEG records for each of ten patients were selected from Cairo Center of Sleep Disorder. Three methodologies of analysis were utilized for feature extraction. These include: autoregressive modeling (AR), bispectral analysis, and discrete wavelet transform (DWT), where principle component analysis (PCA) was used to reduce feature dimensionality. The features derived from the three methodologies of signal analysis were used as input feature vectors to the classifier. Information fusion is very important task in pattern recognition as it is difficult to develop classifiers with a highidentification performance rate. The multilayer feed forward neural network gives higher classification rate using the data fusion at the feature extraction level. It reaches 83.4%.
Autorgressive modeling
Bispectral Analysis
Discrete Wavelet Transform
principle componenet analysis
multilayer feed forward neural network
2012
05
01
1
8
https://iceeng.journals.ekb.eg/article_32692_7a5a8ed0ef48b58dc562b3916a291eb2.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Protein function Motif extraction based on single function category sequence alignment in yeast
Khaled
Ahmed
Protein function prediction is one of the most vital problems in the field of proteomics since it leads to determining cell functions and identifying the diseases and their effect. Since proteome is divided into clusters, each cluster (group of proteins) should have common characteristics. One of these characteristics is to have the same functions. In this study we try to extract motifs for each sub-function category of yeast proteins. The technique is based on applying multiple sequence alignment (MSA) to all yeast protein function categories. The protein sequences are collected from different data sources as DIP, PIR, and SWISS PROT and CLC program is used to apply the sequence alignment. The technique is applied to proteins having single function only that because multi function proteins can be affected by the functions correlation. Threshold is determined for every protein function category to indicate the most common frequent amino acids to be a feature for this category. After implementing the algorithm, sequence is verified with some proteins have the correct functions and the gained results are good. The technique is considered as verification method for protein function prediction. And reference database table is constructed based on the extracted motifs.
sequence alignment
Motif extraction
consensus
Function category
2012
05
01
1
9
https://iceeng.journals.ekb.eg/article_32694_d55d3c3e6507f98352e48f93ae27ea60.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Extraction of Human Iris Patterns for Biometric keys Generation
Khaled
Hassanain
Eman
Hesham
With the increasing reliance on electronic information, which needs to be exchanged across the internet or stored on open networks, cryptography is becoming an increasingly important feature of computer security. A biometric key dependentcryptosystem is proposed, to ensure the security of the whole system by using iris pattern as a key in a cryptosystem, like, Key-dependent Advanced Encryption Standard (KAES). KAES is used to ensure that no trapdoor is present in cipher and to expand the key-space to slow down attacks. The proposed system gave significant results under various tests for the key uniqueness and the system randomness.
AES
SHA-1AES
KAES
MD5
RNG
PRNG
SHA-1
2012
05
01
1
13
https://iceeng.journals.ekb.eg/article_32695_c8f326f07c09dc1bb1fb305483624985.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
GENERATION OF SOLAR COMBINED CYCLE POWER PLANTS WITH APPLICATION IN EGYPT
A.
El.Zeftawy
S.
Allam
H.
Diab
Renewable energy sources (RESs) are used with the bulk power supply in many of the world countries and Egypt. Also, solar technology is available option of these RESs for Egypt, because the sunrise from 3000 to 4000 hours per year with average solar radiation of 2000 to 2400 kWh/m2/year in many regions of Egypt. Solar thermal power plants (STPPs) are the most economic form of solar technology for electricity generation. These STPPs are consisted of four elements. These are solar collector, receiver, transport-storage and energy conversion. Also, this power plant may be integrated with gas or/and steam turbine of a conventional power plant (CPP).The generation of a STPP depends on the efficiency of its elements, the meteorological data at the installation site, and the integrated combined cycle with CPPs. So, this paper aims to model the efficiency of the STPP elements and the generation of this power plant with an integrated solar combined cycle (ISCC) power plant. This model is applied numerically to compute the generation of the first STPP integrated with a gas power plant at El-Kuraymat, considering the design of this power plant and meteorological data at the aforementioned site in Egypt.
solar energy
Solar Thermal Power Plant
Integrated Solar Combined Cycle
modeling
Generation
Egypt
2012
05
01
1
16
https://iceeng.journals.ekb.eg/article_32697_93827222ee3a12adb707d43cdfcbefbb.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Effective of hall current on unsteady Couette flow with heat transfer in the presence of a heat source and uniform suction and injection
Hazem
Attia
Karem
Ewis
Ibrahim
Abd Elmaksoud
The unsteady magnetohydrodynamic (MHD) Couette flow with heat transfer of an electrically conducting, viscous, incompressible fluid bounded by two parallel insulating porous plates is studied in the presence of uniform suction and injection and a heat source considering the Hall effect. An externally applied uniform magnetic field as well as a uniform suction and injection are applied in the direction perpendicular to the plates. A uniform and constant pressure gradient is imposed in the axial direction. The two plates are kept at different but constant temperatures while the Joule and viscousdissipations are included in the energy equation. The effect of the Hall current and the uniform suction and injection on both the velocity and temperature distributions is investigated and interesting results are presented for different values of the parameters of the problem.
Couette flow
Hydromagnetic
heat transfer
Hall current
numerical solution
2012
05
01
1
13
https://iceeng.journals.ekb.eg/article_32699_a60e76e6d4047fec9e5bbf0f35b1fd0e.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Circular pipe flow of a dusty Casson fluid considering the hall effect
Hazem
Attia
Karem
Ewis
Ibrahim
Abd Elmaksoud
Abstract:In the present paper, the time varying flow of a dusty viscous incompressibleconducting non-Newtonian Casson fluid through a circular pipe is studied consideringthe Hall effect. A constant pressure gradient in the axial direction and a externaluniform magnetic field perpendicular to the flow direction are applied. A numericalsolution is obtained for the governing nonlinear equations using finite differences andthe effect of the different physical parameters on the velocity distributions of fluid anddust particles are reported.
Magneto-fluid mechanics
computational methods
flow in channels
circular pipe flow
non-Newtonian fluid
Casson fluid
Hall current
2012
05
01
1
13
https://iceeng.journals.ekb.eg/article_32700_e41bfe8b6db75e0ec8ac471e3e5c71ba.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Narrowband Interference Cancellation in DS-CDMA System Using a Suppression Filter
A.
Hanafy
Khairy
El-Barbary
Hossam
Abou Bakr
Ashraf
Samy
In this paper the performance of the DS-CDMA system employing a suppression filter for rejection of narrow band interference (NBI) is provided. Two types of NBI, namely the binary phase shift keying (BPSK) and the single tone interferences, are considered. The behavior of the DS-CDMA system with and without a suppression filter over aRaleigh fading channel and under the effect of the two types of NBI is analyzed. The effects of suppression filter coefficients, DS-CDMA system parameters, and the NBI parameters on the performance of the system are evaluated analytically. It is shown that the suppression filter is more effective against the single tone NBI than in the case ofthe BPSK NBI. Moreover, it is proved that using a suppression filter with total three taps is sufficient to mitigate the effect of either the BPSK or single tone NBI.
CDMA
narrowband interference
suppression filter
2012
05
01
1
15
https://iceeng.journals.ekb.eg/article_32702_709d055c8200f5cd3b66af0fb678433d.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Collision Problem Avoidance in Packet Acquisition for Frequency Hopped Random Multiple Access
M.
Sakr
A.
Al-Moghazy
H.
Abou-Bakr
M.
Fikri
Random multiple access (RMA) comprises a large class of multiple access protocols, such as ALOHA. A common characteristic of all RMA protocols is that when a user transmits a data packet other users waiting until the transmission finished, so RMA can achieve very low latency and limit the network performance. In this paper a new technique that uses time and frequency hopping is proposed to solve the collision problem in packet acquisition of frequency hopped systems operating in random multiple access (RMA) environments. Moreover, the proposed scheme also improves the system performance due to the idea of dividing the time and frequency between all users in the system. Each user has a PN code pattern for any transmitted sync pulse that is responsible for selecting the frequency channel that carry the pulse andselects the time slot that the pulse uses it. We have presented an analytical approach for the proposed scheme to determine the packet acquisition performance in a RMA environment. To illustrate the accuracy of the analytical results, simulations are performed over a wide range of parameters such as the pulse length, pulse duty cycle, number of synchronization pulses and the number of users in the system.
Frequency Hopping
Packet Acquisition
Multiple Access Interference
2012
05
01
1
11
https://iceeng.journals.ekb.eg/article_32705_e5905d4868c92e03f20f5e936f4bac13.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Multi-user Detection with Different Linear Equalizers for the Downlink MIMO MC-CDMA Systems over Frequency Selective Fading Channel
Belal
Al-fuhaidi
Hossam Eldin.
Hassan
Moataz
Salah
Salah
Alagooz
Modern wireless communications require an efficient spectrum usage and high channel capacity and throughput. Multiple input and multiple output (MIMO), Linear equalizers, multi-user detection (MUD) and multicarrier code-division multiple access (MCCDMA) are possible solutions to achieve spectral efficiency, high channel capacity, eliminate MAI , eliminate ISI and robustness against frequency selective fading. In this paper, we combine all these techniques and investigate BER performance. We propose a low complexity receiver structure for Single-input Multiple-output (SIMO) downlinkMC-CDMA systems. It employs an interference cancellation scheme to suppress the interference caused by the multipath fading channel. Also, the proposed scheme is developed for Multiple-input Multiple-output (MIMO) MC-CDMA system. Theperformance analysis of Downlink MIMO MC-CDMA systems with V-BLAST over frequency selective fading channel is investigated under various number of transmit and receive antennas. The simulation results show that MIMO MC-CDMA with V-BLAST multi-user detection provides high data rate and the BER significant improvement when MIMO-MC CDMA with multi user detection and different linear equalizers is applied.
MC-CDMA
SIMO
MIMO
MMSE
RZF
PIC
ISI
MAI and rake receiver
2012
05
01
1
21
https://iceeng.journals.ekb.eg/article_32706_63f9d3ead352471ef06880e2fd127cd6.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
On The Study of Signal Bandwidth Limitations for Wideband DOA Estimation
Mohamed.
Alsholle
Mahmoud.
Abdalla
Hesham.
Elregaily
Abd-El-Aziz.
Mitkeess
The paper presents the study of limitations of different techniques used for direction of arrival (DOA) estimation of uncorrelated and correlated wideband signals. The study was restricting the inter-sensor spacing of the array antenna to minimal wavelength of the applied wideband signal to avoid spatial ambiguity. The effect of the bandwidth on the estimation accuracy of wideband DOA is described for the case of two incident signals. First we analyzed two uncorrelated signals using MUSIC method. Second we suppose that the two signals are coherent using ML method. The study demonstrated that tradeoff between the signal bandwidth and DOA resolution of wideband signal. The paper suggests suggests reducing the array antenna elements as a solution for this tradeoff.
Multiple Signal Calcification (MUSIC)
Direction of Arrival estimation (DOA)
Maximum likelihood (ML)
Fast Fourier Transform (FFT)
2012
05
01
1
12
https://iceeng.journals.ekb.eg/article_32709_190683b146924dde51337a4a0a4d54dd.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
A survey of resource discovery in computational grids
Hesham
Ali
Alaa E.
Abdel-Hakim
Mohammed
Ahmed
Abstract:Grid computing is a wide spread technology in recent years. It offers an effective way tobuild high-performance or high-throughput computing systems, allowing users toefficiently access and integrate geographically distributed computers, data, andapplications. Searching and locating the resource which match the user's requirements inan efficient and timely manner is the important phase in grid computing which calledresource discovery. Discovering resources in grid environment is complex due to theheterogeneous nature, dynamic availability of resources, resources are owned bydifferent individuals and organizations and each having their own resource managementpolicies i.e. different access and cost models. There are many different approaches inliterature for solving this problem (e.g. Centralized-based, Hierarchical-based, Agentbasedand P2P-based). This paper provides a survey and analysis on ongoing researchesas well as evaluation summery of those approaches on this specific area. We believe thatthis survey would be useful for academic and industry based researchers who areengaged in the design of scalable computational Grid.
grid computing
resource discovery
hierarchical
p2p
Agents
2012
05
01
1
30
https://iceeng.journals.ekb.eg/article_32712_c6d38f7ccab4729b1a5d4d4e09f886db.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Non-blocking minimum processes coordinated checkpointing for hierarchical computational grid
Gamal
El-Sayed
Aref
Abdullah
Fault tolerance is an important property in grid computing as the dependability of individual grid resources may not be able to be guaranteed. Common fault tolerance techniques in distributed systems are normally achieved with checkpoint recovery, message logging with checkpointing, or through task replication on alternative resources in cases of a system outage. In this paper, we present a mailbox-based non-blocking minimum processes coordinated checkpoint protocol for hierarchical grid. In our grid model, processes on different processors communicate indirectly by sending messages over the network through mailbox-based technique at a shared node. The mailbox of each process can be exploited as an events logger since it logs the messages sent to the process in strict FIFO order. The main advantages of our approach are achieving more parallelism and suiting the highly dynamic environment where processes frequently migrate from onenode to anotherز
Coordinated checkpointing
Fault tolerant
non-blocking
message logging
2012
05
01
1
13
https://iceeng.journals.ekb.eg/article_32714_61b589cb9bff62dc22bbcd1e39d467b3.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Fault-tolerant scalable hierarchical scheduling in grid computing
Gamal
El-Sayed
Aref
Abdullah
Computational grids have the potential for solving large-scale scientific applications using heterogeneous, distributed and possibly non-dedicated resources. Grid environment is dynamic in nature, hence scalable and fault-tolerant scheduling is amuch needed to schedule parallel applications with inter-process communication. In this paper, we propose a hierarchical and fault-tolerant scheduling approach, in which the application’s processes communicate indirectly by sending messages over the network through mailbox-based communication technique at a shared node. In grid, process often migrates from one node to another, so this technique ensures the reliable delivery of messages; prevents messages sent to the migrating process form losing. A nonevolutionary mapping heuristic based on Max-Min approach is also proposed formapping such applications on grid resources. Finally, MPICH-V1 protocol is integrated into our scheduling framework that exploits the mailbox-based technique instead of channel memories. The simulation experimental results demonstrate that, the proposed approach as a whole effectively schedules the grid applications in scalable and fault tolerant way thereby ensures the application to be executed within its deadline making the grid environment trust worthy.
Grid scheduling
fault-tolerance
MPICH-V1
rescheduling
checkpointing
2012
05
01
1
27
https://iceeng.journals.ekb.eg/article_32716_d0fc3762d1f26d273a001f41dcc497f6.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Key performance indices for EDCs in Egypt
Hafez
Elsalmawy
Kamelia
Youssef
Shereen
Abdulla
Iman
Ahmed
Continuity of supply is characterized by the number and duration of interruptions. Several indicators are used to evaluate the continuity of supply in transmission and distribution networks. The most widely used reliability indices are SAIFI, SAIDI, CAIDI, ENS and CENS (IEEE std. 1366-2000 and CIGRE study committee (C2). Regulation can aim to compensate customers for long supply interruptions, keep restoration time under control, and create incentives to reduce the total number and duration of interruptions. The paper presents and assessments the key performance indices for electric distribution system in Egypt, monitored, calculated and analysed by EGYPTERA to concentrate on the guideline values for distribution system, and to provide an optimal level of customer service.
power distribution
key Performance indices
performance evaluation
Availability
energy not supplied
2012
05
01
1
10
https://iceeng.journals.ekb.eg/article_32719_843aa135eed579bb016508f218d08565.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Reliability and maintainability analysis of medium voltage transformers in Egypt
M.
Abdelfatah
M.
EL-Shimy
H.
Ismail
In this paper, outage data analysis of 66 kV and 33 kV power transformers is considered. Outage-data is obtained from the Egyptian Electricity Transmission Company. Outage-data analysis over eight years from 2002 to 2009 of 1557 transformers with MVA rating ranging from 10 MVA to 40 MVA is presented. Several indices are determined for evaluating the reliability of power transformers. The knowledge of these indices is essential for proper system planning and operation. Forced outages due to correct and false action of transformer’s protection systems are carefully considered. The trend of the determined hazard function indicated that a significant number of the transformers is probably being operated in the wear-out phase; however, detailed ageing analysis is required to determine the reliability state of each transformer. The determined values for the maintainability and availability shows significant variations with time. The results are compared with the IEEE 1979 survey.
Power transformers
transformer failure
outage data
forced outage
customer interruption
2012
05
01
1
17
https://iceeng.journals.ekb.eg/article_32720_653930fceff567204a843bbf87ea9dff.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Dynamic Economic Load Dispatch of Thermal Power System Using Particle Swarm Optimization Technique
W.
MANSOUR
M.
SALAMA
S.
ABDELMAKSOUD
H.
HENRY
Economic load dispatch (ELD) problem is one of the most important problems to be solved in the operation and planning of a power system. The main objective of the ELD problem is to determine the optimal schedule of output powers of allgenerating units so as to meet the required load demand at minimum operating cost while satisfying system equality and inequality constraints. This paper presents a new approach using Particle Swarm Optimization (PSO) for solving theELD problem with considering the generator constraints, ramp rate limits and transmission line losses. The proposed approach has been evaluated on 26-bus, 6- unit system. The obtained results of the proposed method are compared with those obtained from the conventional lambda iteration method. The results show that the proposed approach is feasible and efficient.
economic load dispatch
Particle Swarm Optimization
Ramp rate limits. and system equality and inequality constraints [1]
2012
05
01
1
16
https://iceeng.journals.ekb.eg/article_32722_dda13495764c6cdfe5ff3aeb8494eac0.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Novel Unit Protective Relaying Concept for EHV Interconnected Networks
Dina
Mourad
E.
Shehab_Eldin
A.
Abd-Elaziz
In interconnected network, the fault at any section may appear as a forward or a backward at more than one relaying station. This may deceive any protection system using the current signal only. This paper presents a novel principle solution for such problem. The proposed protection is based on extracting the transient components, initiated by faults, using the fourth sequential overlapping derivative, (SOD), concept. SOD is applied to the current and the voltage signals at both protected line terminals. The multiplier of the produced transient components is used as a novel relaying signal. The polarity of the initial change of this relaying signal is depending on the fault direction. Exchanging data between relaying stations using a suitable communication channel enable us to discriminate between internal and external faults and send a tripping signal to the prober circuit breakers. Simulation tests are carried out by ATP program while the relaying concept is established by using MATLAB program. Extensive number of simulation cases, including fault type, fault resistance, fault inception time and load switching effects are presented. Results showed a high sensitivity for internal faults, and high security and stability for external faults. Moreover, no need for samples synchronization and current transformer saturation compensation.
EHV interconnected transmission network
SOD
unit protection
relaying system
2012
05
01
1
12
https://iceeng.journals.ekb.eg/article_32725_7ca391a1314698d8555453f23aa562fc.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Detection and location of distribution systems faults using Wavelet packet transform based overcurrent relay
Doaa
Ibrahim
Mohamed
Abdel Aziz
Nabil
Abdel Fattah
Ahmed
Adly
This paper presents a scheme to increase the sensitivity of overcurrent protection. The proposed scheme applies wavelet packet transform, since it can preserve both time and frequency information with high resolution. The proposed scheme demonstrates its feasible performance in detecting short circuit faults, calculating fault location with moderate accuracy and detecting nonlinear high impedance faults. In addition, the proposed scheme examines the load current continuously and has the ability of changing the relay pick up value adaptively. The examined tested cases include different internalshort circuit fault conditions, different nonlinear high impedance faults, and non fault situations such as normal load changing. The obtained results indicate that the developed scheme is fast, robust, reliable and suitable for power distribution systems.
Digital Overcurrent Relay
fault location
High Impedance Faults
Wavelet Packet Transform
2012
05
01
1
15
https://iceeng.journals.ekb.eg/article_32759_9cc27a3d9f5d32a0a53ba27b60db7080.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Two approaches for directional overcurrent relays coordination in interconnected power systems with distributed generation
Saadoun
Mostafa
Doaa
Ibrahim
Essam El-Din
Abo El-Zahab
Abstract:Connection of distributed generation (DGs) powered by renewable energy resources inpower systems has numerous benefits. However the presence of these (DGs) increasethe fault current levels in different points, and disturb the protection coordination of theexisting relays. Two approaches are proposed for coordination of directional overcurrentrelays (DOCRs) in power systems with (DGs), depending on the types of system relayseither adaptive or non adaptive.For adaptive protection system, the first proposed approach is based on linearprogramming technique which used to calculate the relay settings in case of DGsexisting or not. For non-adaptive protection system, the second proposed approach isintroduced, in which minimum impedance of fault current limiter is calculated to restorethe coordination of relays without altering the original relay settings. The two proposedapproaches are implemented and tested on IEEE-39 bus test system.
Distributed generation
Fault Current Limiter
Relay Setting
Relays Coordination
2012
05
01
1
17
https://iceeng.journals.ekb.eg/article_32761_427430b57adb8a521cfd8313b2c0ede1.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
A Novel TSA Array for Automotive Radars at 79 GHz
Ahmed
Nafe
Abstract:The shift of the frequency band assigned for automotive radars from 24 GHz to 79 GHz led toan increased research in the area of design of radars that operate at the new band from 76 to81 GHz. The antenna plays a key role in the operation of a radar sensor. Designing anantenna that provides high directivity and low side lobe level and at the same time to be smallin size and of low manufacturing cost in mass production is a challenging task for researchers.In this work, investigations on Tapered Slot Antenna (TSA) arrays operating at 79 GHzsuitable to meet automotive radars demands were carried out. A Fermi-Dirac based TSA wasstudied parametrically and optimized with the aid of CST microwave studio. The optimizeddesign was fabricated along with its attached feeding structures and shielded housing tosuppress unwanted feed radiation. The measurement of reflection coefficient indicatedwideband behavior (< -10dB) extending nearly over the whole E-band. Despite its small size(3.75 by 7.5 mm) the antenna showed fairly high gain (≈10 dB). A 4 -element E-plane arraywas built and a parallel feeding network was optimized to feed the array elements with equalamplitudes and phases. The array was fabricated and measured showing a gain of 13.8 dB anda side lobe level of 14 dB indicating that it is attractive candidate for employment inautomotive radar sensors, especially when the number of the array elements is increased.
2012
05
01
1
9
https://iceeng.journals.ekb.eg/article_32763_ed78500494b5957a9597d12dc91bcc36.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
WiMAX structured combat network – performance analysis
Jovan
Bajčetić
Boban
Pavlović
Davorin
Mikluc
Abstract:The elements of a battlefield nowadays are the unexhausted source of information.Modern battle environment requires extremely mobile armed systems what leads tothe fact that network infrastructure needs to be more agile. The information exchangein these conditions is done mostly using the radio. The node mobility is imperativeand is the beginning of all the beginnings when the network analysis is ought to beperformed. Movement of the nodes is rarely measured below 60 km/h and requiredbit rate is mostly always above 1 Mb/s. To achieve this, the migration to newtechnologies, like the one described by IEEE 802.16e standard is required.The paper gives the battle operation information exchange analysis which takes placeinto the flat, intercepted urban area. The information exchange is done using the cellstructured network consisted of WiMAX base stations. The transceiver systemdescribed by ETSI TS 102 177 V1.5.1 (2010-05) is analyzed in detail thanks toMATLAB program package. The real battle situation simulation, coverage andinterference analysis is achieved using ATDI HTZ software.At the end, the basic assumptions review of the simulation is given. The behavior ofthe transmitted signal modulated using various modulation schemes in jammingenvironment is analyzed considering different Signal to Noise Ratios (SNR). Theperformance of the WiMAX base station transceiver network system doing fasthandover of a given subscriber is observed. The simulated network gives theemergent data on which basis the final conclusion about network performances inrough electromagnetic environment is given.
WiMAX tranceiver
Modulation
Fading
handover
ATDI HTZ software
2012
05
01
1
17
https://iceeng.journals.ekb.eg/article_32766_76d89f2a6659b5bda888b5c8a70a0afb.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Enhancement of WiMAX Mutual Authentication Protocol
Ahmed
El-Amin
Alaa El -Din
Rohiem
Essam
Abd-Elwanees
The mutual authentication mechanism in the IEEE802.16e can avoid the man-in-middle attack, and can protect the multi-hop WiMax security in efficiency.An enhanced mutual authentication flow was proposed in this paper, which enhances the security and working efficiency of the mutual authentication in mobileWiMax system. The proposed scheme heightens the security and practicability of WiMax system, which has better referenced value to the improvement of IEEE 802.16e standards.
2012
05
01
1
6
https://iceeng.journals.ekb.eg/article_32772_a1d6f1f67e1d2a292d0a9d7d80fda639.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
WiMAX 802.16 Networks: Threats, attacks, and Solutions
Ahmed
El-Amin
Alaa El -Din
Rohiem
Essam
Abd-Elwanees
Worldwide Interoperability for Microwave Access (WiMAX) is going to be an emerging wireless technology for the future. With the increasing popularity of Broadband internet, wireless networking market is thriving. Wireless network is not fully secure due to rapid release of new technologies, market competition and lack of physical infrastructure. In the IEEE 802.11 technology, security was added later. In IEEE 802.16, security has been considered as the main issue during the design of the protocol. However, security mechanism of the IEEE 802.16 (WiMAX) still remains a question. WiMAX is relatively anew technology; not deployed widely to justify the evidence of threats, risk and vulnerability in real situations. This paper will address the security aspects of the IEEE 802.16 Standard and point out the security vulnerabilities, threats and risks associated with this standard and their countermeasures.
2012
05
01
1
15
https://iceeng.journals.ekb.eg/article_32775_c7c79cf3071bf68c59c9cb658c0cc00b.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
PILEUP RECOVERY ALGORITHMS FOR DIGITAL GAMMA RAY SPECTROSCOPY
Imbaby
Mahmoud
Mohamed
El_Tokhy
Hussein
Konber
This paper presents algorithms for overcoming a common problem of gamma ray spectroscopy, namely the peak pileup recovery problem. Three different approaches are studied and evaluated within a spectroscopy system. The algorithms are evaluated by the means of parameters error and fitting error calculations. The first approach is a direct search based on Nelder-Mead technique without any derivatives in order to find the local minimum points. A Gaussian shape in conjunction with the peak height and its position of each pulse are used to construct the pulse. So, the main pulse parameters such aspeak amplitude, position and width can be determined. The second algorithm is based on the nonlinear least square method. This approach has accuracy of recovering the original pulses with mean square error of 4.7306x10-12. In this paper another technique is tried. This technique which is proposed as third algorithm is based on a maximum peak search method combined with the first derivative method to determine peak position of each pulse. Comparison among these approaches is conducted in terms of parameters errors. The pulse parameters have been calculated and compared with the actual one. The second approach shows the best accuracy, for determining peak height and position, but the widthparameter scored the highest error.
Peak Pileup
Tail Pileup
Least-Square Fitting
Nelder-Mead Modified Simplex
2012
05
01
1
17
https://iceeng.journals.ekb.eg/article_32777_c14dd1a431cad7c33d7640cc980d92c2.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Experimental Comparison among Pileup Recovery Algorithms for Digital Gamma-Ray Spectroscopy
Imbaby
Mahmoud
Mohamed
El_Tokhy
Hussein
Konber
This paper presents algorithms for overcoming a common problem of gamma-ray spectroscopy, namely the peak pileup recovery problem. Three different approaches are studied and evaluated within a spectroscopy system. The first approach is a direct search based on Nelder-Mead technique without any derivatives in order to find the local minimum points. A Gaussian shape in conjunction with the peak height and its position of each pulse are used to construct the pulse. Hence, the main pulse parameters such as peak amplitude, position and width can be determined. The second algorithm isbased on the nonlinear least square method. In this paper another technique is tried. This technique which is proposed as third algorithm is based on a maximum peak search method combined with the first derivative method to determine peak position of each pulse. Comparison among these approaches is conducted in terms of parameters errors and execution time. This comparison based on a reference signal from 137Cs point source acquired by data acquisition system. The third approach shows the best accuracy, for determining accurate energy spectrum. Therefore, it provides better isotope identification than other algorithms.
Peak Pileup
Tail Pileup
Least-Square Fitting
Nelder-Mead Modified Simplex
2012
05
01
1
20
https://iceeng.journals.ekb.eg/article_32783_9d79a00fc92d797b0798f11fa5e94003.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
A Low cost FPGA implementation of real time video cryptography system using AES (Rijndael) algorithm.
I.
Ismail
Ehab.
Elsehely
A.
Abdulla
The demand for efficient, real time video cryptography systems has become more prominent in our life, especially for military and sensitive-civilian applications. FPGA implementation of video cryptography systems is suitable for both video and cryptography processes due to video data rate, flexibility to design modifications, and cryptography algorithm agility. In this paper, a bulk video cryptography system using AES (Advanced Encryption Standard) is designed and implemented on low cost FPGA Xilinx Spartan-III™. Bulk encryption is used to encrypt both video data and video synch to increase the cryptanalysis complexity for intruders. The design is implemented on different stages; camera interface, video frame grabber, VGA monitor interface, SDRAM controller, crypto processor, and communication channel interface. The design has been tested first using a generated video pattern, and using external composite PAL/NTSC video camera source. The design is implemented for XC3S1000 and the results were significant for speed and area, it reached 77.6 Mbytes/sec. data throughput that fulfills the minimum requirements of colorful, 30 FPS video data rate of 27 Mbytes/sec., and the designoccupies 3,738 slices (48 % of chip size).
[AES
FPGA
Cryptography
low cost video encryption
real time video encryption]
2012
05
01
1
12
https://iceeng.journals.ekb.eg/article_32786_c6e907207f4fa3da9e9699d66d45acf6.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Torsional Torques Reduction in Starting of Three-Phase Induction Motor
Ahmed
Hafez
M.
Algassab
This paper proposes a simple starting method for three-phase induction motor. The technique has the advantages of alleviating torsional toques in sub/super synchronous range. The feasibility of the proposed method was validated by a rigorous simulation work.
Torsional torques
natural frequency
Large three-phase induction motors
2012
05
01
1
10
https://iceeng.journals.ekb.eg/article_32788_86fd5fcc2c45767d59c3d13ee10136fa.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
OPTIMUM TUNING OF PID CONTROLLER FOR A PERMANENT MAGNET BRUSHLESS MOTOR
F.
Hassan
A.
EL-Wakeel
A.
Kamel
A.
Abdel-hamed
The proportional-integral-derivative (PID) controllers were the most popular controllers of this century because of their remarkable effectiveness, simplicity of implementation and broad applicability. However, PID controllers are poorly tuned in practice with most of the tuning done manually which is difficult and time consuming. The computational intelligence has purposed genetic algorithms (GA) and particle swarm optimization (PSO) as opened paths to a new generation of advanced process control. The main objective of these techniques is to design an industrial control system able to achieve optimal performance when facing variable types of disturbances which are unknown in most practical applications. This paper presents a comparison study of using two algorithms for the tuning of PID-controllers for speed control of a Permanent Magnet Brushless DC (BLDC) Motor. The PSO has superior features, including easy implementation, stable convergence characteristic and good computational efficiency. The BLDC Motor is modelled using system identification toolbox. Comparing GA with PSO method proves that the PSO was more efficient in improving the step response characteristics. Experimental results have been investigated to show their agreement with simulation one.
Permanent Magnet Brushless DC (BLDC) Motor
particle swarm optimization (PSO)
Genetic algorithm (GA)
PID controller
and optimal control
2012
05
01
1
12
https://iceeng.journals.ekb.eg/article_32791_5d7b822799754786173d473033a15d94.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Implementing Type 2 Coordination to Improve the Performance of the Motor Control Center (MCC)
Walid
Abdel-Hameed
Mostafa
Ebid
This paper explains the criteria of selection and coordination between the motor control centers (MCCs) components to meet the need of motor service continuity in the most of industrial processes. The aim behind this study is to obtain high level of coordination between the MCC components which is denoted by Type 2 coordination. The requirements of Type 2 coordination are illustrated in this research; this is according to IEC 947-4-1, where illustrates different methods of meeting these requirements. Also, this research proposed an algorithm to compare between implementing either fuses or circuit breakers (CBs) as short circuit protection device (SCPDs) in the MCC.
Three phase induction motors, Motor starters and protection, Coordination of motor circuits
Motor control centers (MCCs)
2012
05
01
1
11
https://iceeng.journals.ekb.eg/article_32793_88c8cd2002cf62ef52a9082efe16663a.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Optimal allocation of SVC to enhance voltage stability of power systems
Hosam
Youssef
Doaa
Ibrahim
Amr
Abd El Fattah
With the continuous increase of power demand, FACTS provide a suitable solution by maximizing the usage of existing utilities rather than increasing power generation and building new lines. Due to high cost of such devices their optimal allocation must be ascertained. Particle swarm optimization (PSO) is used in this paper to determine the best location and size of Static VAR Compensator (SVC) where the objective function is to achieve the accepted voltage profile taking into consideration the SVC cost. Simulations are performed on IEEE-14 test system. Results prove the effectiveness of PSO in solving such allocation problem.
allocation
Flexible AC Transmission Systems (FACTS)
Optimization
particle swarm optimization (PSO)
Static Var Compensator (SVC)
2012
05
01
1
9
https://iceeng.journals.ekb.eg/article_32795_e4fe1e7e56a973291ba2f87351887f43.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Load shedding as a corrective action against voltage collapse
A.
Abdelaziz
A.
Taha
M.
Mostafa
A.
Hassan
The phenomenon of voltage collapse eclipses a potential hazard for the transmission and distribution systems. The load shedding for avoiding the existence of voltage instability in power systems is taken as a remedial action during emergency states. Te load shedding strategy for power systems with location and quantity of load to be shed is presented in this paper. Two methods are used for this purpose. The first method is based on a mathematical calculation of an indicator of risk of voltage instability. The second method is based on a fuzzy load shedding based algorithm that uses a voltage stability indicator for averting voltage collapse. Applications to the standard IEEE 14- bus system are presented to validate the applicability of the two proposed methods.
Load shedding
Voltage Instability
L-indicator
Fuzzy Logic
2012
05
01
1
19
https://iceeng.journals.ekb.eg/article_32797_23cebe7cc5db6867db6eeca4dace4ebe.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
A simple novel method for considering static voltage stability indicator in a power system
W.
Mansour
M.
Salama
N.
Abd-El-Hakeem
The voltage stability is the ability of the power system to provide adequate reactive power under all operating conditions and to maintain stable load voltage magnitude within specified operating limits. The voltage instability leading to collapse appears to be due to the inability of networks to meet a demand for reactive power at certain critical or weak buses. It can be recognized by noting excessive fall in voltage for small increase in load and increasing difficulty in controlling system voltage. Therefore voltage collapse prediction must take in consideration in power system planning and operation. In this paper a novel indicator from a parallel algorithm will be presented to predict the voltage instability or the proximity of a collapse. The indicator uses the obtained data of a normal load flow to identify the weak buses in the power system.This method has carried out over changing the load power factor. Obtained results for the IEEE 5 bus system considering the effects of STATCOM on voltage stability are presented and discussed.
Voltage stability
Voltage Instability
Voltage collapse
Voltage collapse prediction
Voltage Collapse Indicator
FACTS devices and Parallel algorithm
2012
05
01
1
10
https://iceeng.journals.ekb.eg/article_32799_a20cd827001486b511b54426d378baf3.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
A Moderate Weight EAP Authentication Method (EAP-MEAP) for Wireless Local Area Network
AHMED
EL- NAGAR
AHMED
ABD EL-HAFEZ
ADEL
EL-HNAWY
IEEE 802.11standard for Wireless Local Area Networks (WLANs) is facing more and more problems linked to security threats, which expose legitimate users to increased risk. Therefore, the security is always a major concern for WLAN development and one of the major challenges in WLAN security issue is authentication. Extensible Authentication Protocol (EAP) has been widely used for that important aspect. EAP is a framework of authentication process that uses several methods to perform that process. In this paper, the flows of the existing EAP methods will be analyzed and illustrated.Then, a new EAP method Extensible Authentication Protocol -Moderate Weight Extensible Authentication Protocol “EAP-MEAP” will be proposed. This method combines between the simplicity of deployment and management of password methods and the robustness of certificated ones. EAP-MEAP can be used widely in IEEE802.11 for WLANs (Wi- Fi and its application domains) as solution to the presented flaws. A security assessment to the proposed protocol will be presented.Finally, the checked and verified results of the EAP- MEAP security properties using the specialized model checker AVISPA, which provides formal proofs of the security protocols.
Wireless network
Security protocol
Access control
EAP
HLPSL
2012
05
01
1
23
https://iceeng.journals.ekb.eg/article_32800_552d66b47c10283edb87b1a70b6b6fe6.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Moderate EAP-TLS Protocol - A New Approche
Ahmed
ELNagar
Ahmed
Abd-EL-Hafez
Adel
ELHnawy
Security has always been a major concern in the development of Wireless Local Area Networks (WLAN) as they are based on wireless technology, i.e. no physical connections exist. One of the major problems in WLAN security is authentication.EAP (Extensible Authentication Protocol) is an authentication framework that uses several authentication techniques such as TLS, TTLS, PEAP and LEAP. EAP-TLS (EAP- Transport Layer Security Protocol) is widely used in WLAN (Wi- Fi /802.11 and Wi-MAX/802.16) as a solution to the authentication problem. This paper presents EAP-TLS security in details, explores its weaknesses and provides detailed EAP-TLS assessment. As a solution to the presented flaws, we present in details the proposed Moderate EAP- TLS for overcoming such shortages. Finally, we present a security assessment to our proposed protocol compared to EAP-TLS.
WLAN
Authentication protocols
EAP-TLS
LEAP
2012
05
01
1
12
https://iceeng.journals.ekb.eg/article_32803_f025c7cadcf278d8b3747f37cdba2e64.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
The effect of Radio Resource Management in the performance of Heterogeneous Cellular Networks
Tarek
Attia
Comparing market estimates for wireless personal communication and considering recent wide band multimedia services with the existing spectrum allocations for these types of systems show that spectrum resource management remains a very important topic. The coexistence of different cellular networks in the same geographical area requires joint radio resource management (JRRM) for efficient radio resource utilization and enhancement of quality of service (QoS) provisioning, maintain the planned coverage area and provide high capacity. This paper intends to provide an overview of the RRM problem and envisaged solutions in a Beyond 3G framework. Different scenarios of call admission control inheterogeneous cellular networks are analyzed and compared. Further, we focus on joint call admission control (JCAC) algorithms in heterogeneous cellular networks and present a JCAC model and assumptions for evaluating and discussing the performance of the JCAC algorithm through simulation results.
radio resource management
cellular networks
2012
05
01
1
15
https://iceeng.journals.ekb.eg/article_32804_283b5c11556cdf5f04e76b9fc24216e2.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Narrowband Interference Mitigation in IR-UWB Communication Systems Using Code Sequence Selection
Ehab
Shaheen
In this paper we will show that the impact of narrowband interference signal on the performance of direct sequence ultra wide band communication system in a Log-normal flat fading channel can be easily mitigated. The idea of the proposed mitigation technique is based on adapting the ultra wideband transmitted spectrum with the suitable selection of the direct sequence pseudo random code sequence in order to counteract narrowband interference and at the same time to guarantee low spectral emissions over existing narrowband communication systems.
Ultra-wideband, Narrow band interference, Log-normal fading channel
code adaptation
2012
05
01
1
13
https://iceeng.journals.ekb.eg/article_32806_87dbe000bdd305eba6b97c7db814b8d4.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
A New Approach for LFMCWRadar using Wigner-Ville Distribution
Sameh
Salem
Fathy
Ahmed
Mamdouh
Ibrahim
Abdel Rahman
Elbardawiny
This paper introduces the application of Wigner- Ville Distribution (WVD) in LFMCW radar systems to perform the range-Doppler processing of targets instead of FFT processing. The proposed approach enhances the detection capability of the LFMCW radar based on the fact that the side lobe levels (SLLs) in WVD spectrum are very small in magnitude, this fact facilities the realization of LFMCW radar by WVD without the need of additional weighting to reduce SLL in FFT-based approach. Computer simulation via Monte Carlo trials is provided to evaluate the performance of the proposed WVD-based LFMCW radar compared to that of the FFT-based one. The Receiver Operating Characteristics (ROC) is used as the performance measure. Simulation results validate the superiority of the proposed approach.
LFMCW radar
WVD
and FFT
2012
05
01
1
9
https://iceeng.journals.ekb.eg/article_32808_47eacd9d3aa33d1afe424daa205b7af6.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Biometrics: The Next Era of the Authentication Technology
Ali
Awad
Unlike the traditional authentication systems, biometrics technology is based on something we are such as fingerprint, face, voice, and iris patterns. Biometrics technology is immutable for forgery, duplication, guessing, and hacking, therefore, it overcomes most of the traditional techniques problems. Due to its high reliability and security confidence, biometrics authentication can be deployed in many sensitive domains including physical access to restricted areas, e-commerce, and electronic banking. Moreover, the implementations of biometrics authentication can be extended further to cover the network security and the client-server based authentication scheme. Biometrics authentication is keep growing day by day, but similar to any security system; it has many challenges with respect to the processing time, the authentication accuracy, and the overall system’s reliability. Many research themes have been developed to tackle different biometrics problems and the output of these researches contributes very well for closing different biometrics authentication wholes.
2012
05
01
1
1
https://iceeng.journals.ekb.eg/article_32809_f72555ab374c79597f2a9fb7db5031fa.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
RF-based Traffic Detection and Identification
Amal
Al-Husseiny
Moustafa
Youssef
Road traffic congestion estimation is a critical function that affects both developed and developing countries alike. We present Monitor as a novel RF-based traffic detection system that is capable of detecting the existence of objects, i.e. vehicles or humans within an area of interest. Compared to the current approaches for traffic estimation, Monitor is low-cost, does not disrupt traffic during installation, works for non-laned traffic, and does not require active user participation. Our approach is based on the fact that the presence of an object in an RF environment affects the signal strength, and hence can be used for detecting objects. We present the Monitor system architecture and how it uses statistical techniques, based on the mean and variance of the received RF signal strength, to detect the presence of objects. Implementation of Monitor on standard RF equipment shows its capability of detecting the presence of objects with high accuracy highlighting its promise for different vehicle-related applications and a wider range of domains including surveillance applications, border protection, and intrusion detection.
2012
05
01
1
1
https://iceeng.journals.ekb.eg/article_32811_2b5d6fe6533e7d314f5c5949cf6c86cd.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Investigation Techniques in Ground Water
Ashraf
Mohamed
In this paper, I discuss and show the investigation techniques in ground water and the purpose of this research is to share with industry investigation techniques. In particular, the methodology, the findings and lessons learned. These techniques have applications at several sites, These investigations include the groundwater monitoring system, the radiological source term assessment and the atomospheric deposition modeling that include processes assessments, video inspections, and assessment of tritium migration through concrete, hydrostatic tracer tests, tritium/helium-3 residence times and tritium in soil.
2012
05
01
1
1
https://iceeng.journals.ekb.eg/article_32813_949b346e9620d6cbe5d36037a32a1e45.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Renewable Energy and Energy Saving
A.
Heggo
In the next century, modern and developing countries will need more electrical power to satisfy future demand. Therefore, the rate of electricity consumption will increase year by year. Most countries install and establish large electrical project to satisfy their needs for electrical energy. There is no doubt that any progress in developing plans will depend upon the existing electricity resources. Consequently the world, today and in the future will need to produce more than its needs of electrical energy. So, energy is considered as the back bone of satisfaction of developed programs. Renewable energy resources are considered as extended supply not only for power feeding but also to keep environment nature. The option of improving and saving electrical energy has become one of the important and serious options. This option is used today instead of the installation a new stations for electrical energy generation. In this work we shall present some methods of power generation such a Solar, Hydroelectric, and Wind power station. The environmental problems are an important issue in the world.
2012
05
01
1
1
https://iceeng.journals.ekb.eg/article_32814_263b6279b703fa4f3c75bf92ab2d651a.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
The Subsurface Nano Indentation Effects on Stainless Steel
A.
Hebatalrahman
Abstract:Stainless steel 316L has a lot of applications in buildings and architectures such asenvelopes and clad fixations. Some alloying elements were added to improve pittingcorrosion of stainless steel 316L In order to study of the effect of UV laser irradiationon Stainless steel 316L, it was irradiated by 308 nm Excimer laser at different numberof pulses in the range from 2000 pulses to 50000 pulses. The nanoindentationmeasurements were performed on the surface of both untreated AISI 316L stainlesssteel and on laser irradiated samples in order to determine their hardness, stiffness andelastic properties, the effect of alloying elements on the irradiation process of Austeniticstainless steel was evaluated. The research emphasis that laser irradiation is a promisingtechnique for surface hardening of materials can not be heat treated by conventionalmethods.
2012
05
01
1
1
https://iceeng.journals.ekb.eg/article_32816_0aa7ca9966dd9b2a4e4ddba686640b4d.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Printed Electronics
Khaled
Shehata
Low cost printed electronics have gained a great deal of interest over the past 5 years because of their promise to greatly reduce the cost of many electronic applications. In particular these applications include radio frequency identification (RFID) tags, displays, printed circuit boards (PCB)/keypads, chemical sensors, etc. The talk willinclude:O Motivations for Printed ElectronicsO Printing TechnologiesO Printing MaterialsO ChallengesO Applications
2012
05
01
1
1
https://iceeng.journals.ekb.eg/article_32817_4ef24aeef0845c495f8b4b469cbc3842.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Mind Control Weapons
Samir
Waly
Mind control weapons started in Japan during Second World War as antipersonnel weapons, the aim was programmed assassinations without any error or hesitation by persons who will never recognize what they done .The Japanese did experiments on homeless, homosexual and war prisoners. In these experiments they injected their "patients" by different kinds of narcotic drugs such as opium and berbotric acid. Due to these experiments three thousand persons were killed. In the same time similar experiments were done in NAZI concentration camps especially in oshvits concentration camp at Poland, they forced their war prisoners to get "sodium panthonat" which is known as "TRUTH DRUG" since anyone who takes that drug will tell the truth. As soon as the Second World War finished, USA got all that secret researches andstarts to arrange it and to develop and update it. They started tens of secret projects in this field. Started by two letters namely MK which stands for mind control. These projects were "Mk-ultra" then "Mk-artichoke" then "Mk delta". One of these projects was to cancel the memory completely. After that a new step was done by prof "Alan Fray", he uses electromagnetic wave to remotely make his patients to sleep. Later prof "Josef sharp" was able to transfer spoken words through microwave pulses; this project was very useful to deaf persons to speak without using mouth or ears. In 1974 prof "G.F. Skapitz "starts new science called "Sociological electronics" by which you can see spoken words. Prof. "Delgado" declared in 1966 that "actions and all human sensations and emotions could be completely controlled through electromagnetic waves".
2012
05
01
1
1
https://iceeng.journals.ekb.eg/article_32819_4fcaaffa186e64c296438421020f5e2f.pdf
The International Conference on Electrical Engineering
2636-4433
2636-4433
2012
8
8th International Conference on Electrical Engineering ICEENG 2012
Modern Wind Turbines
Amged
El-Wakeel
Usama
AbouZayed
Reda
Yousef
W.
Sabry
The main goal of this work is to present a design and implementation of a modern wind turbine. It can be installed on the rooftop of residential and commercial buildings and generate electric power from low speed wind energy. By this way, it becomes suitable for urban and isolated areas and those areas in which traditional large wind turbines are not practical. The main principal of it is to amplify; nearly duplicate, the ambient wind speed using wind tunnel effect. Theoretically, doubling the wind speed with tunnel effect increases the generated electric energy by a factor of eight. It can operate at ambient wind speeds of as low as four meters per second. In this work, the wind turbine is equipped with a 10 kVA Permanent Magnet DC (PMDC) Generator and all the necessary equipment for conditioning the output power. It can be used as off-grid power source; which is suitable for isolated places. The whole system is implemented and tested at one of the commercial buildings in Shark El-Ewinat (Far Egyptian South-East deserts). The design and implementation results will be demonstrated. Future work will be presented in the last section.
2012
05
01
1
1
https://iceeng.journals.ekb.eg/article_32821_1fb635347a7fabc986dc6d145cdf69f9.pdf