@article { author = {Gad, Ramadan and EL-SAYED, Ayman and EL-Fishawy, Nawal and Zorkany, Mohamed}, title = {Iris Template Localization over Internet of Things (IoT)}, journal = {Menoufia Journal of Electronic Engineering Research}, volume = {28}, number = {1}, pages = {1-18}, year = {2019}, publisher = {Menoufia University, Faculty of Electronic Engineering}, issn = {1687-1189}, eissn = {2682-3535}, doi = {10.21608/mjeer.2019.62662}, abstract = {Internet of Things (IoT) is growing vastly and survive technology.So; it needs authentication solutions (as iris recognition) to bringsafety, and convenience in data and network sharing in the internetof things era. Iris segmentation is most critical stage in the irisrecognition system. Some challenges to localize iris such asocclusion by eyelids, eyelashes, and corneal or specular reflection.This paper proposes, a modified algorithm based on maskingtechnique; to localize iris. It solves the limitation of the iris data lossand inconsistencies factors, for capturing conditions and differentresolution images. This method gives satisfactory results in factorsof accuracy and execution time to be used over IoT. Thesegmentation success rate is more than 99.545(%), and executiontime in worst case 0.758 (sec).The obtained results improve theefficiency of the proposed iris recognition method and improve IoTsecurity and authentication.}, keywords = {Internet of Things (IoT),Iris segmentation,Iris localization,Masking technique}, url = {https://mjeer.journals.ekb.eg/article_62662.html}, eprint = {https://mjeer.journals.ekb.eg/article_62662_ccdc49091a605594000df431c7deaea1.pdf} } @article { author = {EL-Hossainy, Mohammad and Shalaby, Raafat and Abo-Zalam, Belal}, title = {Modified PDOS-based LQG Controller for Inverted Pendulum}, journal = {Menoufia Journal of Electronic Engineering Research}, volume = {28}, number = {1}, pages = {19-44}, year = {2019}, publisher = {Menoufia University, Faculty of Electronic Engineering}, issn = {1687-1189}, eissn = {2682-3535}, doi = {10.21608/mjeer.2019.62719}, abstract = {This paper deals with the holing issue of inverted pendulum (IP)system. In traditional LQG controller, trying out various Q and Rweights are mandatory to achieve the optimum gains of the statefeedback controller. This trial-and-error process is time consuming,cumbersome and leads, usually, to a non-optimized response for IPsystem. ModifiedPrescribed Degree of Stability (PDOS)-basedLQGcontroller (MLQG) is proposed to stabilize the IP. The proposedPendulum swing-upwhich is based on total energy shaping is firstlysurveyed.MLQG is supported by simulation experiments and isintensively tested and compared to PD and LQG controllers. Thesimulation results proved the competitiveness and the capability ofthe proposed schemeto stabilize the IP to a predetermined degreeof stability with optimized response.  }, keywords = {}, url = {https://mjeer.journals.ekb.eg/article_62719.html}, eprint = {} } @article { author = {Aboshosha, Sahar and Zahran, Osama and El-Kordy, Mohamed and Dessouky, Moawad and Abd El-Samie, Fathi}, title = {Resolution and Quality Enhancement of Images Using Contrast Limit Adaptive Histogram Equalization}, journal = {Menoufia Journal of Electronic Engineering Research}, volume = {28}, number = {1}, pages = {45-60}, year = {2019}, publisher = {Menoufia University, Faculty of Electronic Engineering}, issn = {1687-1189}, eissn = {2682-3535}, doi = {10.21608/mjeer.2019.62722}, abstract = {In this paper, hybrid approaches for quality enhancement of imagescompiled from Contrast Limited Adaptive Histogram Equalization(CLAHE) and image interpolation are presented. Adaptive histogramequalization is employed for contrast enhancement, while imageinterpolation is used for resolution enhancement. Both the CLAHE andimage interpolation are used interchangeably to check the mostsuitable scheme for quality enhancement of images. The utilizedinterpolation techniques during paper are polynomial-basedtechniques. Simulation results have proved that the application ofCLAHE firstly enhances the image quality in a better way.}, keywords = {Contrast limited adaptive histogram equalization,interpolation,and contrast enhancement}, url = {https://mjeer.journals.ekb.eg/article_62722.html}, eprint = {} } @article { author = {Abdelaal, Ayman and Abdel-Samie, Fathi and Dessouki, Moawad}, title = {A DIFFSERV-AWAREFORM OF MULTI-PROTOCOL LABEL SWITCHING TRAFFIC ENGINEERING OVER VIRTUAL PRIVATE NETWORKS}, journal = {Menoufia Journal of Electronic Engineering Research}, volume = {28}, number = {1}, pages = {61-84}, year = {2019}, publisher = {Menoufia University, Faculty of Electronic Engineering}, issn = {1687-1189}, eissn = {2682-3535}, doi = {10.21608/mjeer.2019.62724}, abstract = {High bandwidth Internet connections and applications demands aregrowing so rapidly because of the Internet arising usages either onbusiness or entertainment. Adding new links to cover the extrademand is the simplest solution but it always comes with financialissues due to the extra cost it adds. That’s why researchers andleading companies should search for smarter alternatives. InternetService Providers (ISPs) should improve their networks inperspective of the utilization of the bandwidth and the managementof their resources. Two techniques have been introduced separatelyto support in addressing the bandwidth utilization problems in theISPs networks, the Multi-Protocol Label Switching – TrafficEngineering (MPLS-TE) and the DiffServ Quality of Service (QoS).Inthis paper, the two techniques are used together to get the highestperformance, the best resources management and an efficientbandwidth utilization. Multiple experiments have been held indifferent variations using one or more of the Diffserv-aware MPLSTE, Low Latency Queuing (LLQ), Russian Dolls Model (RDM) andMaximum Allocation Model (MAM) model. The best results for bothIPv4 and IPv6 were obtained using Diffserv-aware TE in RDM modelin conjunction with LLQ.}, keywords = {MPLS-TE,DiffServ-QoS and VPN}, url = {https://mjeer.journals.ekb.eg/article_62724.html}, eprint = {} } @article { author = {Ghazy, Rania and El-Rabaie, el-sayed and Dessouky, Moawad and El-Fishawy, Nawal and Abd El-Samie, Fathi}, title = {SYN Flood Attack Detection Usiing AR Model}, journal = {Menoufia Journal of Electronic Engineering Research}, volume = {28}, number = {1}, pages = {85-92}, year = {2019}, publisher = {Menoufia University, Faculty of Electronic Engineering}, issn = {1687-1189}, eissn = {2682-3535}, doi = {10.21608/mjeer.2019.62725}, abstract = {Due to the sophisticated characteristics of auto-regressive (AR)modeling approach, it finds applications in most anomaly detectionprocesses. This paper extends the concept of AR modeling tocreate models for the estimated auto-correlation between data andcontrol planes packet counts of the network traffic. These modelsare fed with the anomaly traffic containing SYN flood attack. Theestimated residuals in these scenarios are used as indicators forthe attacks. Simulation results revealed the success of attackdetection using the proposed approach.}, keywords = {auto-regressive,control planes and network traffic}, url = {https://mjeer.journals.ekb.eg/article_62725.html}, eprint = {https://mjeer.journals.ekb.eg/article_62725_3f04b76a933a08f901ee138f2a5b3054.pdf} } @article { author = {Naguib, Ahmed and Saad, Waleed and Shokair, Mona}, title = {Proposed Energy Efficient Multi-Layer MAC Protocoll for Massive MTC over LTE Wireless Network}, journal = {Menoufia Journal of Electronic Engineering Research}, volume = {28}, number = {1}, pages = {93-108}, year = {2019}, publisher = {Menoufia University, Faculty of Electronic Engineering}, issn = {1687-1189}, eissn = {2682-3535}, doi = {10.21608/mjeer.2019.62727}, abstract = {Energy efficiency is one of the prime consideration in designingMachine Type Communication (MTC) networks, because of thebattery-powered machine nodes. Therefore, extending the networklifetime can be done by using more energy efficient techniques. Thedramatically increase in the number of machine nodes in manyaspects of our life makes the wireless standards to adopt Machineto Machine (M2M) communication in its new specifications. Themassive number of machines need a new MAC protocol that makesfull use of the node’s battery, so that node can live longer time. Inthis paper, a new protocol called Multi-Layer MAC (ML-MAC) willbe suggested, and then integrating this protocol into LTE networkwill be made. Calculations of energy efficiency, delay, andthroughput as a performance parameter will be done. Simulationresults show that proposed ML-MAC protocol is more energyefficient compared to traditional IEEE 802.11 MAC protocol andSensor MAC (S-MAC) protocol. Moreover, prolonging the networklifetime can be done by using the new ML-MAC protocol thanothers.}, keywords = {}, url = {https://mjeer.journals.ekb.eg/article_62727.html}, eprint = {https://mjeer.journals.ekb.eg/article_62727_9709135bed1b0f630dcfcce52badd831.pdf} } @article { author = {EL-SAYED, Tharwat and Badawy, Mohamed and El-Sayed, Ayman}, title = {Impact of Small Files on Hadoop Performance: Literature Survey and Open Points}, journal = {Menoufia Journal of Electronic Engineering Research}, volume = {28}, number = {1}, pages = {109-120}, year = {2019}, publisher = {Menoufia University, Faculty of Electronic Engineering}, issn = {1687-1189}, eissn = {2682-3535}, doi = {10.21608/mjeer.2019.62728}, abstract = {Hadoop is an open-source framework written by java and used for bigdata processing. It consists of two main components: HadoopDistributed File System (HDFS) and MapReduce. HDFS is used tostore data while MapReduce is used to distribute and process anapplication tasks in a distributed processing form. Recently, severalresearchers employ Hadoop for processing big data. The resultsindicate that Hadoop performs well with Large Files (files larger thanData Node block size). Nevertheless, Hadoop performance decreaseswith small files that are less than its block size. This is because, smallfiles consume the memory of both the DataNode and the NameNode,and increases the execution time of the applications (i.e. decreasesMapReduce performance). In this paper, the problem of the small filesin Hadoop is defined and the existing approaches to solve this problemare classified and discussed. In addition, some open points that mustbe considered when thinking of a better approach to improve theHadoop performance when processing the small files.}, keywords = {Hadoop,Big Data,Small Files,Hive,HBase,Amazon EMR,S3DistCp}, url = {https://mjeer.journals.ekb.eg/article_62728.html}, eprint = {https://mjeer.journals.ekb.eg/article_62728_c818f3f951476c6005647f9ba7364efd.pdf} } @article { author = {Mohammed, Abd El-Naser and El-Eraki, Ahmed and Azar, Marwa}, title = {Crosstalk Free Routing Algorithm for High Speed Optical Multistage Interconnection Network}, journal = {Menoufia Journal of Electronic Engineering Research}, volume = {28}, number = {1}, pages = {121-136}, year = {2019}, publisher = {Menoufia University, Faculty of Electronic Engineering}, issn = {1687-1189}, eissn = {2682-3535}, doi = {10.21608/mjeer.2019.62746}, abstract = {High speed optical interconnection networks are further more integratedfor modern computing systems and parallel computing. Optical multistageinterconnection network (OMIN) is a popular dynamic network schemesthat are used in switching and communication of high speed opticalinterconnection network applications. However, OMINs introducecrosstalk which results from coupling two signals within one SwitchingElement. This paper highlights the breakthroughs in the area ofscheduling methods and crosstalk free routing in optical interconnectionnetworks, and proposes new timely conflict free routing algorithms.}, keywords = {}, url = {https://mjeer.journals.ekb.eg/article_62746.html}, eprint = {https://mjeer.journals.ekb.eg/article_62746_c6795cbc8c582ad1cb12825f30408a1b.pdf} } @article { author = {Nasr, Aida and El-Bahnasawy, Nirmeen and Attiya, Gamal and El-Sayed, Ayman}, title = {A Proposed Meta-Heuristic Approach for Cloudlets Scheduling in Cloud Computing Environment}, journal = {Menoufia Journal of Electronic Engineering Research}, volume = {28}, number = {1}, pages = {137-158}, year = {2019}, publisher = {Menoufia University, Faculty of Electronic Engineering}, issn = {1687-1189}, eissn = {2682-3535}, doi = {10.21608/mjeer.2019.62747}, abstract = {This paper presents a new hybrid approach, called ACOSA, forcloudlets scheduling to enhance the scheduler behavior in Cloudcomputing (CC) environment and to overcome the resultsoscillation problem of the existing meta-heuristic schedulingalgorithms. The proposed approach combines both the AntColony Optimization (ACO) and Simulated Annealing (SA)algorithm to improve both quality of solutions and time complexityof the scheduling algorithm. The proposed approach is evaluatedby using the well-known CloudSim, and the results are comparedwith the ant colony and simulated annealing separately in terms ofschedule length, load balancing, and time complexity. Itdecreases the schedule length by 29.75% with SA and 12.25%with ACO. The ACOSA provides higher load balancing degree. Itimproves the balancing degree ratio by 36.36% than SA and12.13% than ACO algorithms.}, keywords = {}, url = {https://mjeer.journals.ekb.eg/article_62747.html}, eprint = {https://mjeer.journals.ekb.eg/article_62747_991e9633f0fc39ab7f6db8c7fc431b2f.pdf} } @article { author = {Elaskily, Mohamed and Aslan, Heba and Dessouky, Mohamed and Abd El-Samie, Fathi and Faragallah, Osama and Elshakankiry, Osama}, title = {Enhanced Fiilltterr-based SIFT Apprroach fforr Copy-Move Forrgerry Dettecttiion}, journal = {Menoufia Journal of Electronic Engineering Research}, volume = {28}, number = {1}, pages = {159-182}, year = {2019}, publisher = {Menoufia University, Faculty of Electronic Engineering}, issn = {1687-1189}, eissn = {2682-3535}, doi = {10.21608/mjeer.2019.62749}, abstract = {Image forgeries are applied to give the digital images othermeanings or to deceive the viewers. Image forgeries appear inmany cases such as judges in courts, cybercrimes, military andintelligence deception, or defamation of important characters.There are many different types of image forgeries such as copymove forgery, image retouching, image splicing, image morphing,and image resampling. Copy move forgery is the widest type andeasy to apply between all digital image forgeries. Scale InvariantFeatures Transform (SIFT) algorithm is used strongly to detectcopy move forgeries due to its efficiency in digital image analysis.SIFT algorithm is extracting image features, which are invariant togeometrical transformations such as scaling, translation, androtation. These features are used in performing the matchingbetween different views of a scene or an object. This paperenhances the efficiency of using SIFT algorithm in detecting copymove forgery by two ways. Firstly, it enhances the image itself byapplying different types of digital filters to reinforce the imagefeatures giving the ability to detect forgeries. Butterworth low-passfilter, a high-pass filter, and the combination of them are appliedto this task. Secondly, the matching strategy is adapted based ona new thresholding approach to increase the true positive rateand decrease the false positive rate. Experimental results showthat the proposed approach gives better results compared withtraditional copy-move detection approaches. In addition, it gives better stability and reliability to different copy-move forgery conditions.}, keywords = {}, url = {https://mjeer.journals.ekb.eg/article_62749.html}, eprint = {https://mjeer.journals.ekb.eg/article_62749_c4860862fc9227227543cde736c234e6.pdf} } @article { author = {Arafa, Mohamed and Elwekeil, Mohamed and Dessouky, Moawad}, title = {In-Sequence Zeros-Ones Patterns Exploiting Approach for Spatial Modulation Performance Enhancement}, journal = {Menoufia Journal of Electronic Engineering Research}, volume = {28}, number = {1}, pages = {183-196}, year = {2019}, publisher = {Menoufia University, Faculty of Electronic Engineering}, issn = {1687-1189}, eissn = {2682-3535}, doi = {10.21608/mjeer.2019.62751}, abstract = {This paper presents a proposed approach for enhancing both thespectral efficiency of spatial modulation and symbol error rate. Themain idea is to exploiting repeated long zeros and ones sequencesin the transmitted data, and mapping them into the signalconstellation of Three Dimension (3-D) spatial constellation ofspatial modulation. The obtained results indicate that the symbolerror rate (SER) performance of the proposed algorithm is better ascompared to traditional spatial modulation (SM), at a certainnumber of modulated-symbol selecting bits. The performanceenhancement is affirmed by Monte Carlo simulations that show asignificant improvement in SER in favor of the proposed approachcompared to traditional SM. In addition, the proposed approachprovides more improvement of SER performance, especially, whenthe number of receiving antennas is increased. Furthermore, itprovides an improvement of spectral efficiency as compared totraditional spatial modulation.}, keywords = {}, url = {https://mjeer.journals.ekb.eg/article_62751.html}, eprint = {https://mjeer.journals.ekb.eg/article_62751_b753fe2b446770fed17a769a474b8469.pdf} } @article { author = {Dessouky, Ahmed and Eltholth, Ashraf and Taha, Taha and Abd El-samie, Fathi}, title = {Applying the Linear Spectral Estimation Techniques for both DNA Sequence Analysis and Exon Region Prediction}, journal = {Menoufia Journal of Electronic Engineering Research}, volume = {28}, number = {1}, pages = {197-216}, year = {2019}, publisher = {Menoufia University, Faculty of Electronic Engineering}, issn = {1687-1189}, eissn = {2682-3535}, doi = {10.21608/mjeer.2019.62752}, abstract = {Bioinformatics means the analysis of biological information usingcomputers and statistical techniques. This paper presents the linearspectral estimation techniques based on DFT that applied for theanalysis of deoxyribonucleic acid (DNA) sequence. These methodsare useful frequency domain presentation techniques whichimprove the analysis of DNA sequence. The representation of DNAsequence in frequency domain is useful to extract some desirableinformation which cannot be extracted from the time domainanalysis of that sequence. In addition, this paper investigates thelocation of exon in DNA sequences using linear spectral estimationtechniques for gene prediction in DNA sequences in exon. Acomparison study between all these linear spectral estimationtechniques is performed.}, keywords = {}, url = {https://mjeer.journals.ekb.eg/article_62752.html}, eprint = {} } @article { author = {Rashed, Ahmed and Mohamed, Abd El-Naser and Tabbour, Mohamed and Saad, Naira}, title = {All Optical Switching Logic Gates Based on Nonlinear Semiconductor Optical Amplifiers Effects}, journal = {Menoufia Journal of Electronic Engineering Research}, volume = {28}, number = {1}, pages = {217-236}, year = {2019}, publisher = {Menoufia University, Faculty of Electronic Engineering}, issn = {1687-1189}, eissn = {2682-3535}, doi = {10.21608/mjeer.2019.62754}, abstract = {This paper studies the problem of data access at the receiver withlarge bit error rate and low quality factor. Due to this issue theinformation got inaccurately at the receiver side, the data shouldhave high quality factor and low bit error rate to be simple ofidentification at the receiver when using the gates. The nonlinearproperties of the semiconductor optical amplifier (SOA) are utilizedto accomplish the Boolean variable based math work, in whichAND, NAND, and OR gates potentially used to endorse theBoolean function. Through blend this gates together any Booleanfunction can be accomplished and utilized to perform optical signalprocessing. The quality factor and BER are measured by utilizingthe eye diagram analyzer, the state of the output bit and alsoshaped by the oscilloscope visualizer in Optiwave simulationprogram. These models can be used for wavelength converter,header recognition, parity checking, binary addition, packet-headermodification, encoding and encryption with pattern matching, anddata encryption with high speed and high quality factor.}, keywords = {optical switching,AND gate,NAND gate,and OR gate,Semiconductor optical amplifier (SOA),optical nonlinearity}, url = {https://mjeer.journals.ekb.eg/article_62754.html}, eprint = {} } @article { author = {Younis, Ola and Essa, Salah and El-Sayed, Ayman}, title = {An Enhanced Grroup Key Managementt Scheme for MANET}, journal = {Menoufia Journal of Electronic Engineering Research}, volume = {28}, number = {1}, pages = {237-274}, year = {2019}, publisher = {Menoufia University, Faculty of Electronic Engineering}, issn = {1687-1189}, eissn = {2682-3535}, doi = {10.21608/mjeer.2019.62755}, abstract = {The basic motivation behind this paper is to demonstrate asolution for a group key management. The real concern is toprovide security issues in such framework, and how to deal withthe cryptographic keys that are required. To design functional andadequate key management frameworks, it is important torecognize attributes of the mobile ad hoc network and whytraditional key management frameworks can't be utilized. Thepurpose of the key management is to give secure ways to handlethe cryptographic keying generation, distribution, and the keymaintenance. In this paper, we propose an effective keymanagement technique, called a Transition Key ManagementScheme (TKMS), for a mobile ad hoc network that is based on npartiesDiffie Hellman protocol. Using transient keys is to overseetemporally members who recently joined the network group.TKMS expects to minimize the key management overhead in thenetwork because of highly dynamic sessions of membershipcomparing with the other techniques.}, keywords = {}, url = {https://mjeer.journals.ekb.eg/article_62755.html}, eprint = {} } @article { author = {Shoukralla, Email and Elganaini, W. and Markos, M.}, title = {Numerical solution of singular Fredholm integral equations of the first kind using Newton interpolation}, journal = {Menoufia Journal of Electronic Engineering Research}, volume = {28}, number = {1}, pages = {275-288}, year = {2019}, publisher = {Menoufia University, Faculty of Electronic Engineering}, issn = {1687-1189}, eissn = {2682-3535}, doi = {10.21608/mjeer.2019.62756}, abstract = {In this paper a computational technique is presented for thenumerical solution of a certain potential-type singular Fredholmintegral equation of the first kind with singular unknown densityfunction, and a weakly singular logarithmic kernel. This equation isequivalent to the solution of the Dirichlet boundary value problemfor Laplace equation for an open contour in the plane. Theparameterization of the open contour facilitates the treatment of thedensity function’s singularity in the neighborhood of the end-pointsof the contour, and the kernel’s singularity. The unknown densityfunction is replaced by a product of two functions; the first explicitlyexpresses the bad behavior of the density function, while thesecond is a regular unknown function, which will be interpolatedusing Newton interpolation in a matrix form. The singularity of theparameterized kernel is treated by expanding the two argumentparametric functions into Taylor polynomial of the first degree aboutthe singular parameter. Moreover, two asymptote formulas areused for the approximation of the kernel. In addition, an adaptiveGauss–Legendre formula, is applied for the computations of theobtained convergent integrals. Thus the required numerical solutionis found to be equivalent to the solution of a system of algebraicequations. The numerical solution of the illustrated example iscloser to the exact solution; which ensures the high accuracy of thepresented computational technique.}, keywords = {Electro-optics,electromagnetism,Fredholm integral equations,well-posed,singular,logarithmic kernel}, url = {https://mjeer.journals.ekb.eg/article_62756.html}, eprint = {https://mjeer.journals.ekb.eg/article_62756_a27b14c54735f351f9b72788601fc0ca.pdf} } @article { author = {Ghandour, Christena and Zekry, Abdel Halim and Mohammed, Nazmi and El-Rabaie, Sayed}, title = {An In-depth Survey of Visible Light Communication Modulating and Coding schemes for Diming/Flicker Avoidance Technollogies}, journal = {Menoufia Journal of Electronic Engineering Research}, volume = {28}, number = {1}, pages = {289-312}, year = {2019}, publisher = {Menoufia University, Faculty of Electronic Engineering}, issn = {1687-1189}, eissn = {2682-3535}, doi = {10.21608/mjeer.2019.62757}, abstract = {Visible light communication (VLC) is considered as a promisingtechnique for the wireless technology of the 21st century. UtilizingLight Emitting Diode (LED) technology adds a wide area ofapplications for VLC. Most important one is that VLC can provideillumination/communication jointly. To achieve efficientcommercial VLC communication/illumination system one needsto profit from dimming schemes/flicker. Availability of suitablesystem designs and enhancing system's power requirements arekey advantages for using dimming schemes. Effective dimmingschemes/flicker are mainly achieved through several VLC basedon modulation techniques. In last few years many kinds ofliterature discussed independently wide range of modulationschemes to address the effectively previous issue. However, fewsurveys for these works are presented in the field. This paperprovides an in-depth survey of VLC based dimming scheme.Therefore, the kinds of modulation and coding techniques arecollected and categorized of more than 60 papers extending frompioneering papers to the state of the art in the field. In addition,research and current issues are discussed especially in whichtrends in VLC based dimming/flicker.}, keywords = {Visible Light Communication (VLC),Light-Emitting Diode (LED),photodiode (PD)}, url = {https://mjeer.journals.ekb.eg/article_62757.html}, eprint = {https://mjeer.journals.ekb.eg/article_62757_8982d425ddf0d96b19759e6049241f75.pdf} } @article { author = {Hasabelnaby, Mahmoud and Selmy, Hossam and Dessouky, Moawad}, title = {Network Availability of Hybrid FSO/mmW 5G Fronthaul Network in C-RAN Architecture}, journal = {Menoufia Journal of Electronic Engineering Research}, volume = {28}, number = {1}, pages = {313-329}, year = {2019}, publisher = {Menoufia University, Faculty of Electronic Engineering}, issn = {1687-1189}, eissn = {2682-3535}, doi = {10.21608/mjeer.2019.62758}, abstract = {New innovation approach called -centralized radio access network(Cloud-RAN or C-RAN) - architecture is developed to meet theexplosive growth in mobile traffic in the 5th generation (5G) mobilenetworks especially in the need of high-speed, high capacity, realtimedata, and high-reliability. In C-RAN architecture, fronthaulnetworks connect between the radio units called -Remote RadioHeads (RRHs)- and the processing unit called -Base BandProcessing Unit (BBU)-. Recently, hybrid free space optics (FSO)and millimeter waves (mmW) network is considered to be apromising solution that can match with the requirements of 5Gfronthaul networks. In this paper, hybrid FSO/mmW links at eachRRH is proposed to enhance the performance of C-RAN fronthaulnetwork at various weather conditions. The performance of hybridFSO/mmW technology as a fronthaul network is evaluated atdifferent weather conditions and compared to other technologies.The numerical results reveal that improvements are obtained innetwork reliability using hybrid FSO/mmW fronthaul network,especially at severe weather conditions.}, keywords = {}, url = {https://mjeer.journals.ekb.eg/article_62758.html}, eprint = {https://mjeer.journals.ekb.eg/article_62758_d35ec228b91b5a7b421edd511c973052.pdf} }