ORIGINAL_ARTICLE
Comparative Study of Video Compression Techniques
This paper summarizes our efforts in describing the main concepts of the video coding and explaining how these concepts achieve the video compression. Due to the large size of the raw digital video, it should be stored or transmitted in a compressed format. A lot of video compression standards were implemented to convert the large bits of the raw digital video into a compact format with a small number of bits. Also this paper presents the basic characteristics and the properties of the video compression techniques like H.261, H.263, MPEG-1, MPEG-2, MPEG-4, MPEG-7and H.264 and provides a comparative study to explain the strength and the limitation of each technique. Also this paper introduces FFMPEG codec as a research tool for studying the performance comparison analysis of the H.264, MPEG-4 and MPEG-2 compression techniques. Experimental quality comparisons measure the PSNR (peak Signal to Noise Ratio) and VQM (Video Quality Model) of H.264, MPEG-4 and MPEG-2 for several video sequences and bit rates.
https://mjeer.journals.ekb.eg/article_64378_d41d8cd98f00b204e9800998ecf8427e.pdf
2018-01-01
1
32
10.21608/mjeer.2018.64378
Ahmed I.
Sallam
1
Dept. of Computer Science and Eng., Faculty of Elect., Eng., Menoufia University
AUTHOR
Osama S.
Faragallah
2
Dept. of Computer Science and Eng., Faculty of Elect., Eng., Menoufia University
AUTHOR
El-Sayed M.
El-Rabaie
3
Dept. of Electronics and Electrical Communications, Faculty of Engineering, Menoufia University.
AUTHOR
px; "> <[1] D. Gall, "MPEG: A video compression standard for multimedia
1
application," Communications of the ACM - Special issue on digital
2
multimedia systems, vol. 34, pp. 46-58, 1991.
3
[2] A. Watson, J. Hu , J. Mcgowan, "Digital video quality metric based on
4
human vision," Journal of Electronic imaging, Vol. 10, No.1, pp. 20–29,
5
[3] G. Sullivan, T. Wiegand, "Video Compression - From Concepts to the
6
H.264/AVC Standard," Proceedings of the IEEE, VOL. 93, NO. 1, pp18 -
7
[4] A. BOVIK, "Hand Book of Image and Video Processing," Chapter 6,
8
Elsevier Academic Press, San Diego, CA, 2005.
9
[5] M. Abomhara, O. Khalifa, O. Zakaria, A. Zaidan, B. Zaidan, A. Rame,
10
"Video Compression Techniques: An Overview," Proceedings Journal of
11
Applied Sciences, Asian Network for Scientific information, pp. 1-7, 2010.
12
[6] W. Joseph, "Digital video compression-an overview," Journal of Light
13
wave Technology, Vol 11, No 1, pp. 70-75, 1993.
14
[7] ITU-T, "Video codec for audiovisual services at px64 kbits/s," ITU-T Rec.
15
H.261, 1993.
16
[8] ITU-T and ISO/IEC JTC 1, "Generic coding of moving pictures and
17
associated audio information – Part 2: Video," ITU-T Rec. H.262 and
18
ISO/IEC 13818-2 (MPEG-2), Nov. 1994.
19
[9] ITU-T: "Video coding for low bit rate communication," Recommendation
20
H.263, 1996.
21
[10] ITU-T Recommendation H.261,"Line transmission of non-telephone
22
signals," Video codec for audio visual services at quality p x 64 kbits/s,
23
[11] Z. Lei, N. Georganas, "H.263 video transcoding for spatial resolution
24
downscaling," Proceedings International Conference on Information
25
Technology: Coding and Computing, pp.425-430, 2002.
26
[12] ISO/IEC JTC 1, "Coding of moving pictures and associated audio for
27
digital storage media at up to about 1.5 Mbit/s – Part 2: Video," ISO/IEC
28
11172 (MPEG-1), Nov. 1993.
29
[13] ISO/IEC, "The MPEG-2 international standard," Reference number
30
ISO/IEC 13818-2, 1996.
31
[14] T. Ebrahimi, C. Horne, "MPEG-4 natural video coding - an overview,"
32
Proceedings Signal Processing: Image Communication, Vol. 15, pp. 365-
33
385, 2000.
34
[15] T. Sikora, "The MPEG-4 video standard verification model," Proceedings
35
IEEE Transactions on Circuit and Systems for Video Technology, vol. 7,
36
pp. 19-31, 1997.
37
[16] ISO/IEC 15938-6, "MPEG-7: Reference Software," 2002.
38
[17] I. Richardson, "The H.264 Advanced Video Compression Standard," Wiley
39
Publishing, 2010.
40
[18] T. Wiegand, G. Sullivan, G. Bjontegaard, A. Luthra, "Overview of the
41
H.264/AVC Video Coding Standard," Proceedings IEEE Trans. on Circuits
42
and Systems for Video Technology, Vol. 13, No. 7, pp. 560-576, 2003.
43
[19] F. Xiao, "DCT-based Video Quality Evaluation,"
44
http://ise.stanford.edu/class/ee392j/projects/ projects/xiao_report.pdf
45
[20] https://www.ffmpeg.org/ (Access Date: 20-December-2015).
46
[21] http://trace.eas.asu.edu/yuv/ (Access Date: 20-December-2015).
47
[22] MSU Graphics and Media Lab, Video Group,MSU codecs,
48
www.compression.ru/ video/ (Access Date: 20-December-2015).
49
ORIGINAL_ARTICLE
Joint Equalization and Coding Schemes for Underwater Acoustic MIMO-OFDM Systems
Underwater Acoustic (UWA) communication systems support low data rate, and have bad performance as compared to traditional wireless systems. This is due to attenuation, ambient noise, water salinity, temperature, etc. Hence, channel coding is introduced in order to enhance the UWA system performance. This paper presents a joint Frequency Domain Equalization (FDE) and Low Density Parity Check (LDPC) coding scheme in UWA Orthogonal Frequency Division Multiplexing (OFDM) in order to reduce the effect of the UWA system poor link. The proposed UWA system performance is evaluated via extensive simulations over different channels. Simulation results show that the proposed equalization with LDPC codes gives a good improvement in the UWA system performance.
https://mjeer.journals.ekb.eg/article_64379_d41d8cd98f00b204e9800998ecf8427e.pdf
2018-01-01
33
52
10.21608/mjeer.2018.64379
Low Density Parity Check (LDPC) Code
Multiple Input Multiple Output (MIMO)
OFDM
FDE
K.
Ramadan
1
Dept. of Electronics and Electrical Communications, Faculty of Engineering, Menoufia University
AUTHOR
M. I.
Dessouky
2
Dept. of Electronics and Electrical Communications, Faculty of Engineering, Menoufia University
AUTHOR
M.
Elkordy
3
Dept. of Electronics and Electrical Communications, Faculty of Engineering, Menoufia University
AUTHOR
S.
Elagooz
4
Dept. of Electronics and Electrical Communications, Faculty of Engineering, Menoufia University
AUTHOR
F. E. A
bd El-Samie
5
Dept. of Electronics and Electrical Communications, Faculty of Engineering, Menoufia University
AUTHOR
0px; "> [1] Radosevic, R. Ahmed, T. Duman, J. Proakis, and M. Stojanovic, "Adaptive
1
OFDM modulation for underwater acoustic communications: Design
2
considerations and experimental results," IEEE Journal of Oceanic
3
Engineering, p. 357–370, April 2014.
4
[2] X. Cheng, M. Wen, X. Cheng, and L. Yang, "Effective self-cancellation of
5
inter carrier interference for OFDM underwater acoustic communications,"
6
in in Proceedings of the International Conference on Under Water Networks
7
and Systems (WUWNet), Kaohsiung, Taiwan, Nov. 2013.
8
[3] P. Amini, R. Chen, and B. Farhang-Boroujeny, "Filterbank multicarrier
9
communications for underwater acoustic channels," IEEE Journal of
10
Oceanic Engineering, vol. 99, p. 1–16, 2014.
11
[4] S. J. Hwang and P. Schniter, "Efficient multicarrier communication for
12
highly spread underwater acoustic channels," IEEE Journal on Selected
13
Areas in Communications, vol. 26, pp. 1674-1683, December 2008.
14
[5] H. Yu, W. Kim, and K. Chang, "A study of multicarrier modulation schemes
15
for underwater acoustic communications," in International Conference on
16
Information and Communication Technology Convergence (ICTC), Oct
17
[6] J. Z. Huang, S. Zhou, et al. , "Progressive Inter-carrier Interference
18
Equalization for OFDM Transmission over Time-varying Underwater
19
Acoustic Channels," IEEE Journal of Selected Topics in Signal Processing,
20
vol. 5, p. 1524–1536 , Dec. 2011, .
21
[7] L. Zhang, T. Kang, H. Song, W. Hodgkiss, and X. Xu, "MIMO-OFDM
22
acoustic communication in shallow water," in OCEANS-San Diego, Sept
23
[8] P. Bouvet and A. Loussert, "An analysis of MIMO-OFDM for shallow
24
water acoustic communications," in OCEANS, Sept 2011.
25
[9] Jun Tao, Yahong Rosa Zheng, Chengshan Xiao, T. C. Yang, and Wen-Bin
26
Yang, "Channel Equalization for Single Carrier MIMO Underwater
27
Acoustic Communications," EURASIP Journal on Advances in Signal
28
Processing , 2010.
29
[10] J. W. Choi, R. J. Drost, A. C. Singer, and J. Preisig, "Iterative multi-channel
30
equalization and decoding for high frequency underwater acoustic
31
communications," in Proceedings of the 5th IEEE Sensor Array and
32
Multichannel Signal Processing Workshop, July 2008.
33
[11] Y. R. Zheng, C. Xiao, T. C. Yang, and W.-B. Yang, "Frequency- domain
34
channel estimation and equalization for shallow- water acoustic
35
communications," Physical Communication, vol. 3, p. 48–63 , 2010.
36
[12] Yuri Labrador, Masoumeh Karimi , Deng Pan, and Jerry Miller,
37
"Modulation and Error Correction in the Underwater Acoustic
38
Communication Channel," IJCSNS International Journal of Computer
39
Science and Network Security, vol. 9, July 2009.
40
[13] Zhao Liang, Zhu Weiqing, "Particle filtering detection in turbo coded
41
OFDM system over underwater acoustic communication channels," in 16th
42
IEEE International Symposium on the Applications of Ferroelectrics, ISAF,
43
[14] J. Andersen and V. Zyablov, "Interleaver Design for Turbo Coding," in Pro.
44
On Turbo Codes and Related Topic, France, Sept. 1997.
45
[15] Chen Yougan, Xu Xiaomei, and Zhang Lan, "Performance Analysis of
46
LDPC Codes over Shallow Water Acoustic Channels," in 5th International
47
Conference on Wireless Communications, Networking and Mobile
48
Computing, 2009.
49
[16] Wei Han, Jianguo Huang, and Min Jiang, "Performance Analysis of
50
Underwater Digital Speech Communication System Based on LDPC
51
Codes," in Industrial Electronica and Applications (ICIEA), IEEE 4th
52
International Conference, 2009.
53
[17] R. Gallager, "Low density parity check codes," IRE Trans. Info. Theory, pp.
54
21-28, 1962.
55
[18] R. G. Gallager, "Low density parity check codes," in MIT Press, ,
56
Cambridge, 1963.
57
[19] F. S. Al-Kamali, M. I. Dessouky, B. M. Sallam, F. Shawki W. Al-Hanafy,
58
and F. E. Abd El-Samie, "Joint Low-Complexity Equalization and Carrier
59
Frequency Offsets Compensation Scheme for MIMO SC-FDMA Systems,"
60
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, vol. 11,
61
[20] P. Qarabaqi and M. Stojanovic, "Statistical characterization and
62
computation- ally efficient modeling of a class of underwater acoustic
63
communication channels," EEE Journal of Oceanic Engineering, vol. 38,
64
no. Special, pp. 701-717, Oct. 2013.
65
[21] D. Tse and P. Viswanath, Fundamentals of Wireless Communications,
66
Cambridge Press, 2005
67
ORIGINAL_ARTICLE
A Statistical Seizure Prediction Approach Based on Savitzky-Golay Smoothing
"> This paper presents an enhanced seizure prediction technique based on a statistical approach for channel selection depending on amplitude, median, mean, variance, and derivative of processed EEG signals. The EEG pre-processing depends on Savitzky Golay (S-G) digital filter for smoothing of the signals, while maintaining the signal peaks. This technique consists of two phases; training, by randomly selected hours from normal, ictal and pre-ictal periods, and then estimating five Probability Density Functions (PDFs), and testing, by discrimination between normal and pre-ictal periods, and then the determination of a discrimination count threshold to predict the epilepsy seizure. Applying this approach on patients’ data taken by MIT shows that we can achieve high prediction accuracy (93.5%) with low false alarm rate (0.148/h) and a good prediction time (51.8166 min).
https://mjeer.journals.ekb.eg/article_64386_d41d8cd98f00b204e9800998ecf8427e.pdf
2018-01-01
53
70
10.21608/mjeer.2018.64386
Ahmed
Sedik
1
Dept. of Electronics and Communications Engineering, Faculty of Engineering, Tanta University.
AUTHOR
Turky
Alotaiby
2
King Abdalziz City for Science and Technology, Riyadh City, KSA
AUTHOR
Heba
El-Khobby
3
Dept. of Electronics and Communications Engineering, Faculty of Engineering, Tanta University.
AUTHOR
Mahmoud
Atea
4
Dept. of Electronics and Communications Engineering, Faculty of Engineering, Tanta University.
AUTHOR
Saleh A.
Alshebeili
5
king saud university, Riyadh City
AUTHOR
Fathi E.
Abd El-Samie
6
Dept. of Electronics and Electrical Communications, Faculty of Engineering, Menoufia University
AUTHOR
-width: 0px; "> <[1] H. Berger , “Über des Elekrenkephalogramm des Menschen, ” Archiv für
1
Psychiatrie und Nervenkrankheiten, Vol. 87, No. 1, pp 527-570, 1929.
2
[2] A T Tzallas, M G Tsipouras, D G. Tsalikakis, E C Karvounis, L Astrakas,
3
S Konitsiotis, M Tzaphlidou, Automated Epileptic Seizure Detection
4
Methods: A Review Study, Epilepsy - Histological,
5
Electroencephalographic and Psychological Aspects, Dr. Dejan Stevanovic
6
(Ed.), ISBN: 978-953-51-0082-9, InTech, (2012).
7
[3] T. Alotaiby, S. A. Alshebeili, T. Alshawi, I. Ahmad, F. E. Abd El-Samie,
8
“EEG Seizure Detection and Prediction Algorithms: A survey,” Accepted
9
for Publication in EURASIP Journal of Advances in Signal Processing.
10
[4] R. Scherer, G. Moitzi, I. Daly, G. R. Müller-Putz, “ On the Use of Games
11
for Noninvasive EEG-Based Functional Brain Mapping,” IEEE e-adjust: auto; -webkit-text-stroke-wiTransactions on Computational Intelligence and AI in Games, Vol. 5, No.
12
2, pp. 155-163, June, 2013.
13
[5] S. Makeig, C. Kothe, T. Mullen, N. Bigdely-Shamlo, Z. Zhang, K. KreutzDelgado, “ Evolving Signal Processing for Brain–Computer Interfaces, “
14
Proceedings of the IEEE, Vol. 100, pp. 1567-1584, May, 2012.
15
[6] D. J. Thurman, E. Beghi, C. E. Begley, A. T. Berg, J. R. Buchhalter, D.
16
Ding, D. C. Hesdorffer, W. A. Hauser, Lewis Kazis, Rosemarie
17
Kobau, Barbara Kroner, D. Labiner, K. Liow, G. Logroscino, M. T.
18
Medina, C. R. Newton, K. Parko, A. Paschal, P. Preux, J.W. Sander, A.
19
Selassie, W. Theodore, T. Tomson, and S.Wiebe for the ILAE Commission
20
on Epidemiology, “Standards for epidemiologic studies and surveillance of
21
epilepsy,” Vol. 52, Issue Supplement s7, pp. 1–26, September, 2011.
22
[7] S. H. Hung, C. F. Chao, S. K. Wang, B. S. Lin, C. T. Lin, “ VLSI
23
implementation for Epileptic Seizure Prediction System based on Wavelet
24
and Chaos Theory,” Proceedings of the IEEE TENCON, 2010.
25
[8] A. Aarabi, B. He, “A rule-based seizure prediction method for focal
26
neocortical epilepsy,” Clinical Neurophysiology Vol. 123, pp. 1111–1122,
27
[9] LI et al. “SEIZURE PREDICTION USING SPIKE RATE OF
28
INTRACRANIAL EEG” IEEE TRANSACTIONS ON NEURAL
29
SYSTEMS AND REHABILITATION ENGINEERING, VOL. 21, NO. 6,
30
NOVEMBER 2013.
31
[10] K. Gadhoumi, J. M. Lina, J. Gotman, “Seizure prediction in patients with
32
mesial temporal lobe epilepsy using EEG measures of state similarity,”
33
Clinical Neurophysiology, Vol. 124, pp. 1745-1754, 2013.
34
[11] M. Pezarv and M. Paul, “Epileptic Seizure Prediction by Exploiting
35
Spatiotemporal Relationship of EEG Signals using Phase Correlation”
36
IEEE Transactions on Neural Systems and Rehabilitation Engineering,
37
Vol. 10, No. 1109, pp. 2458982, 2015
38
[12] M. I. Khalid et al. “Online Adaptive Seizure Prediction Algorithm for
39
Scalp EEG” IEEE International Conference on Information and
40
Communication Technology Research, 2015
41
[13] Y. Qi, Y. Wang, X. Zheng, J. Zhang, J. Zhu, J. Guo,” Efficient Epileptic
42
Seizure Detection by a Combined IMF-VoE Feature,” Proceedings of the
43
International Conference of the IEEE EMBS, 2012.
44
[14] S. Xie, S. Krishnan, “Signal Decomposition by Multi-scale PCA and Its
45
Applications to Long-term EEG Signal Classification,” Proceedings of the
46
IEEE International Conference on Complex Medical Engineering, 2011.
47
[15] M. R. Miri, A. M. Nasrabadi, “A New Seizure Prediction Method Based
48
on Return Map,” Proceedings of the Iranian Conference on BioMedical
49
Engineering, 2011
50
kit-text-stroke-width: 0px; "> [16] J. R. Williamson, D. W. Bliss , D. W. Browne, J. T. Narayanan,” Seizure
51
prediction using EEG spatiotemporal correlation structure,” Epilepsy &
52
Behavior, Vol. 25 pp. 230–238, 2012.
53
[17] A. Savitzky, M.J.E. Golay, “Smoothing and differentiation of data by
54
simplified least square procedure”, Anal.Chem.36(8)(1964)1627–1639.
55
[18] J. Lue, K. Ying, J. Bai, “Savitzky–Golay smoothing and differentiation
56
filter for even number data”, Signal Process.85 (7) (2005)1429–1434.
57
[19] H. Hassanpour, “A time-frequency approach for noise reduction”,
58
Digit.Signal Process. 18(5) (2008)728–738.
59
[20] S. M. Kuo, B. H. Lee, W. Tian, Real-Time Digital Signal Processing,
60
Implementations and Applications, John Wiley & Sons, 2006.
61
[21] F. E. Abd El-Samie, Information Security for Automatic Speaker
62
Identification, 1st Edition, Springer, 2011.
63
[22] L. Yin, R. Yang, M. Gabbouj, Y. Neuvo, “Weighted Median Filters: A
64
Tutorial,” IEEE Transactions on Circuits and Systems-II: Analog and
65
Digital Signal Processing, Vol. 43, No. 3, pp. 157-192, 1996.
66
[23] http://physionet.org/pn6/chbmit/
67
ORIGINAL_ARTICLE
Landmine Detection from GPR Images With Gauss Gradient Method
Ground-Penetrating Radar (GPR) represents an efficient technique for landmine detection. Image processing methods are applied on GPR images in order to reduce the false alarms generated due to the environmental distortions and clutter. This paper presents an efficient method for landmine detection from GPR images depending on the gauss gradient method. The main idea is to apply the Gauss gradient on landmine images as a differentiator to reinforce the landmine objects in the image if existing. After that, both the image histogram and cumulative histogram are estimated. From the obtained histograms for images with and without landmines, we can set a threshold value on the cumulative histogram curve to differentiate between the cases of existing and absent landmine. Simulation results show the success of the proposed method in detecting landmines from GPR images.
https://mjeer.journals.ekb.eg/article_64392_d41d8cd98f00b204e9800998ecf8427e.pdf
2018-01-01
71
88
10.21608/mjeer.2018.64392
Fatma M.
Ghamry
1
Faculty of Engineering, Zagazig University, Zagazig, Egypt.
AUTHOR
Mahmoud I.
Abdalla
2
Faculty of Engineering, Zagazig University, Zagazig, Egypt.
AUTHOR
Naglaa F.
Soliman
3
Faculty of Computer and Information Sciences, Princess Nourah University, Riyadh, Saudi Arabia.
AUTHOR
Fathi E.
Abd El-Samie
4
Dept. of Electronics and Electrical Communications, Faculty of Electronic Engineering, Menoufia University, Menouf, Egypt.
AUTHOR
t-text-stroke-width: 0px; "> 1. F. Abujarad, A. S. Omar and W. Al-Nuaimy, “Ground penetrating radar signal
1
processing for landmine detection'', tenth international conference on ground
2
penetrating radar, June 2004, pp. 697-700.
3
2. H. Kasban, O. Zahran, M. El-Kordy, S. M. Elaraby, S. El-Rabie and F. E. Abd ElSamie, “Efficient detection of landmines from acoustic images”, Progress In
4
Electromagnetic Research Conference, 2009, pp. 79–92.
5
3. H. Kasban, O. Zahran, M. EL-kordy, S. M. EL araby and F. E. Abd El-samie,
6
“landmines detection technologies: A comparative study”, 1st Symposium on Living
7
with Landscapes, Cairo, Egypt, November 2008, pp. 32-37.
8
4. H. Kasban, O. Zahran, M. El-Kordy, S. M. Elaraby, S. EL-Rabaie and F. E. Abd ElSamie, “Optimizing Automatic Object Detection from Images in Laser Doppler
9
Vibrometer Based Acoustic to Seismic Landmine Detection System”, 26th national
10
radio science conference, March 2009, pp.1-9.
11
5. H. Kasban, O. Zahran, Sayed M. Elaraby, M. El-Kordy and F. E. Abd El-Samie, “A
12
Comparative Study of Landmine Detection Techniques”, international journal Sens
13
Imaging, 2010, pp. 89–112.
14
6. Frucci, Maria S. Baja, Gabriella, “From Segmentation to Binarization of Gray-level
15
Images”. Journal of Pattern Recognition Research., 2008, pp.1–13.
16
e-adjust: auto; -webkit-text-stroke-wi7. M. Nixon and A.Aguado, “Feature extraction and image processing”, Elsevier,
17
second edition 2008, pp. 1-9.
18
8. J. K. Paik, C. P. Lee, and M. A. Abidi, “Image Processing-Based Mine Detection
19
Techniques Using Multiple Sensors: A Review”, Subsurface Sensing Technologies
20
and Applications: An International Journal, Vol. 3, No. 3, July 2002, pp. 153-202.
21
9. J. J. Daniels, “ Ground Penetrating Radar fundamentals”, Prepared as an appendix to
22
a report to the U.S.EPA, Nov. 25, 2000.
23
10. V. s. Blake, “ Image processing and interpretation of Ground Penetrating Radar
24
data”, caa conference ,1994, pp.175-179.
25
11. R.grimberg,R.stelgmann,N.iftimie and A.savin , “Ground Penetrating Radar as tool
26
for nondestructive evaluation of soil”, 6th NDT6th European Conference on Non
27
Destructive Testing, Oct 2011 , pp.10-12 .
28
12. D. Hunter, “ Ground penetrating Radar: A review of the basics”, poster, November
29
2010, pp1-3.
30
13. A. K. Hocaoglu, P. D. Gader, J. M. Keller and B. N. Nelson , “Anti-Personnel Land
31
Mine Detection and Discrimination using Acoustic Data”, International Journal of
32
Subsurface Sensing Technologies and Applications, April 2002 .
33
14. U. S. khan, w. Al nuaimy and F. E. AbdEL.Samie, “Detection of landmines and
34
underground utilities from acoustic and GPR images with cepstral approach”,
35
journal of Visual Communication and Image Representation., May 2010 , pp. 730-
36
15. R. SakagushiL. M. Collins, L. W. Nolte and G. Sapiro, “Image processing methods
37
applied to landmine detection in GPR”, Proquest LLC 2013, pp. 17-36.
38
16. S.Sekhar, F.E.Abd El-Samie, Panyu, W.Al-Nuaimy,and A.K.Nadi, “Automated
39
Localization Of Retinal Features”, Applied Optics, July 2011.
40
17. P. A. Torrione, K. D. Morton, R. Sakaguchi, and L. M. Collins “Histograms of
41
Oriented Gradients for Landmine Detection in Ground-Penetrating Radar Data”,
42
IEEE Transactions On Geoscience And Remote Sensening , vol. 52, no. 3, March
43
18. N. Dalal and B. Triggs, “Histograms of oriented gradients for humandetection,” in
44
Proc. IEEE Comput. Soc. Conf. Comput. Vis. PatternRecognit., vol. 1. Jun. 2005,
45
pp. 886–893.
46
e-adjust: auto; -webkit-text-stroke-wi7. M. Nixon and A.Aguado, “Feature extraction and image processing”, Elsevier,
47
second edition 2008, pp. 1-9.
48
8. J. K. Paik, C. P. Lee, and M. A. Abidi, “Image Processing-Based Mine Detection
49
Techniques Using Multiple Sensors: A Review”, Subsurface Sensing Technologies
50
and Applications: An International Journal, Vol. 3, No. 3, July 2002, pp. 153-202.
51
9. J. J. Daniels, “ Ground Penetrating Radar fundamentals”, Prepared as an appendix to
52
a report to the U.S.EPA, Nov. 25, 2000.
53
10. V. s. Blake, “ Image processing and interpretation of Ground Penetrating Radar
54
data”, caa conference ,1994, pp.175-179.
55
11. R.grimberg,R.stelgmann,N.iftimie and A.savin , “Ground Penetrating Radar as tool
56
for nondestructive evaluation of soil”, 6th NDT6th European Conference on Non
57
Destructive Testing, Oct 2011 , pp.10-12 .
58
12. D. Hunter, “ Ground penetrating Radar: A review of the basics”, poster, November
59
2010, pp1-3.
60
13. A. K. Hocaoglu, P. D. Gader, J. M. Keller and B. N. Nelson , “Anti-Personnel Land
61
Mine Detection and Discrimination using Acoustic Data”, International Journal of
62
Subsurface Sensing Technologies and Applications, April 2002 .
63
14. U. S. khan, w. Al nuaimy and F. E. AbdEL.Samie, “Detection of landmines and
64
underground utilities from acoustic and GPR images with cepstral approach”,
65
journal of Visual Communication and Image Representation., May 2010 , pp. 730-
66
15. R. SakagushiL. M. Collins, L. W. Nolte and G. Sapiro, “Image processing methods
67
applied to landmine detection in GPR”, Proquest LLC 2013, pp. 17-36.
68
16. S.Sekhar, F.E.Abd El-Samie, Panyu, W.Al-Nuaimy,and A.K.Nadi, “Automated
69
Localization Of Retinal Features”, Applied Optics, July 2011.
70
17. P. A. Torrione, K. D. Morton, R. Sakaguchi, and L. M. Collins “Histograms of
71
Oriented Gradients for Landmine Detection in Ground-Penetrating Radar Data”,
72
IEEE Transactions On Geoscience And Remote Sensening , vol. 52, no. 3, March
73
18. N. Dalal and B. Triggs, “Histograms of oriented gradients for humandetection,” in
74
Proc. IEEE Comput. Soc. Conf. Comput. Vis. PatternRecognit., vol. 1. Jun. 2005,
75
pp. 886–893.
76
ORIGINAL_ARTICLE
Efficient Implementation of SC-FDMA with PAPR Reduction and Channel equalization
The Single-Carrier Frequency Division Multiple Access (SC-FDMA) system is a popular system in mobile communication systems because of its advantage of low Peak-to-Average-Power-Ratio (PAPR), and the use of frequency-domain equalizers techniques to reduce Inter-Symbol Interference (ISI) and Inter-Carrier Interference (ICI). This paper presents a comprehensive study of the SC-FDMA system with PAPR reduction using clipping and filtering in the presence of channel estimation errors for two different versions of SC-FDMA adopting the FFT and the DCT. The effect of peak power reduction and the channel estimation error on the system Bit Error Rate (BER) is investigated. Simulation results have proved that the BER performance is not much affected by the PAPR reduction.
https://mjeer.journals.ekb.eg/article_64396_d41d8cd98f00b204e9800998ecf8427e.pdf
2018-01-01
89
108
10.21608/mjeer.2018.64396
SC-FDMA
DFT-SC-FDMA and DCT-SC-FDMA
Amal
Fawzy
1
Dept. of Electronics and Electrical Communications, Faculty of Engineering, Tanta University.
AUTHOR
Mustafa M.
Abd Elnaby
2
Dept. of Electronics and Electrical Communications, Faculty of Engineering, Tanta University.
AUTHOR
F. E.
Abd El Samie
3
Dept. of Electronics and Electrical Communications, Faculty of Engineering, Menoufia University.
AUTHOR
Salah
khamis
4
Dept. of Electronics and Electrical Communications, Faculty of Engineering, Tanta University.
AUTHOR
Sameh
Napoleon
5
Dept. of Electronics and Electrical Communications, Faculty of Engineering, Tanta University.
AUTHOR
width: 0px; "> </[1] Li-Wen Hsu and Dah-Chung Chang, “2*2 STBC MIMO OFDM Receiver design for WLAN with estimation of different transmits carrier
1
frequency offsets”, International Journal of Electrical and Electronic Engineering & Telecommunications (IJEETC), 2014. [2] Sonia Rani, Manish Kansal, “A survey on channel estimation in MIMO-OFDM systems”, international Journal of engineering and computer science , Vol.4, No.3, March 2015. [3] Murtadha Ali Nsaif Shukur, Dr. Kuldip Pahwa, Er. Ankur Singhal, “ implementing SC-FDMA and OFDMA in matlab”, International Journal Of Computing and Corporate Research, vol.3, issue 6, November 2013. [4] M. Saraswathi , S. P. K. Babu, “A Novel Investigation on BER Measurement of SC-FDMA System with Combined Tomlinson-stroke-width: 0px; "> Harashima Precoding and Reed Solomon Coding”, Indian Journal of science and technology, Vol8(26), October 2015. [5] Mamta Bisht and Alok Joshi, “various techniques to reduce PAPR in OFDM systems: A survey”, International Journal of Signal Processing, image Processing and Pattern Recognition, vol. 8, No. 11 (2015). [6] Md.Munjure Mowla, Md.Yeakub Ali and Rifat Ahmed Aoni,
2
“performance comparison of two clipping based filtering methods for PAPR reduction in OFDM signal”, International Journal of Mobile Network Communications and Telematics, vol.4, No.1, February 2014.
3
[7] Y. Rahmatallah and S. Mohan, “Peak-to-Average Power Ratio
4
Reduction in OFDM System: A Survey and Taxonomy”, IEEE Communication Surveys and Tutorials, vol. 15, no. 5, (2013), pp. 1567- 1592. [8] R. Van Nee and R. Prasad, OFDM for Wireless Multimedia Communications, Artech House, 2000.
5
[9] D.Falconer et al., “Frequency Domain Equalization for Single-Carrier Broadband Wireless Systems,” IEEE Commun. Mag., Apr. 2002. [10] Xue Jianbin, Li Songbai , ''An SC-FDMA Channel Estimation Algorithm Research Based on Pilot Signals'', Atlantis Press, Paris, France, 2013. [11] Fathi E.Abd El-Samie, Faisal S. Al-Kamali, Azzam Y.Alnahari, Moawad I. Dessouky, ''SC-FDMA mobile communications'', Boca Roton London New York, 2010. [12] X. Zhu, R. D. Murch, ''Novel frequency domain equalization Architectures for a single-carrier wireless MIMO system'', in Proc. IEEE VTC, PP.874-878, Fall 2002. [13] A. V. Oppenheim, R. W. Schafer, and J. R. Buck, Discrete-Time Signal Processing, 2nd ed., Prentice Hall, Upper Saddle River, NJ, 1999. [14]Rupul Safaya,''A Multipath Channel Estimation Algorithm using a Kalman filter'', Electrical Engineering and Computer Science, 1997. [15]Neetha. L., N. V. S. V. Vijay Kumar, ''Channel Estimation and Carrier Frequency Offset Estimation for Multiuser Uplink for OFDM System'', International Journal of Engineering Research & Technology (IJERT), Vol. 3 Issue 4, April – 2014. [16] Edward Kasem, Roman Maršalek, ''The Performance of LTE Advanced Uplink in Flat Rayleigh and Pedestrian Channels'', elektrorevue ISSN 1213-1539, VOL.4, NO.3, DECEMBER 2013. [17] Raad Farhood Chisab, Member IEEE and Prof. (Dr.) C. K. Shukla , ''dth: 0px; "> Performance Evaluation of 4G-LTE-SCFDMA Scheme under SUI and ITU Channel Models'', International Journal of Engineering & Technology IJET-IJENS, vol. l-14, No. 01, February 2014 [18] J. Proakis. Digital Communications. Chapter 11, 4th Edition, 2000. [19] Ferran Conillera Vilar, Antonio Macilio Pereira de Lucena,” IMPLEMENTATION OF ZERO FORCING AND MMSE EQUALIZATION TECHNIQUES IN OFDM”, Fortaleza, Brasil, December2014. [20] Jon Mark, Weihua Zhuang, ''Wireless Communications and Networking'', Electrical & Computing Engineering, 2003. [21] Shilpa Bavi, Sudhirkumar Dhotre,'' PAPR Reduction in OFDM system using clipping and filtering method'', International Journal of Advanced Research in computer science and software Engineering, Vol.5, Issue 2, February 2015. [22]J. Heiskala and J. Terry, OFDM Wireless LANs: A Theoretical and Practical Guide. Sams Publishing, 2002. [23]Yasir Rahmatallah, Seshadri Mohan, Member, "Peak-To-Average
6
Power Ratio Reduction in OFDM Systems: A Survey and Taxonomy”, IEEE Communications surveys & tutorials, vol. 15, no. 4, fourth quarter 2013. [24] H. Ochiai and H. Imai, “On the clipping for peak power reduction of
7
OFDM signals,” in Proc. IEE Global Communications Conference (GLOBECOM), San Francisco, USA, 2000, pp. 731–735.
8
---------------------------------------
9
ORIGINAL_ARTICLE
Efficient Implementation of Adaptive Wiener Filter for Pitch Detection from Noisy Speech Signals
In this paper, we present an implementation of adaptive Wiener filtering as a speech enhancement technique for the pitch detection purpose from speech signals affected by noise. The adaptive Wiener filtering is used as a pre-processing stage for speech enhancement, and then a combined technique from Auto-Correlation Function (ACF) and Average Magnitude Difference Function (AMDF) is implemented to get accurate results. The main objective is to improve the process of detecting the fundamental frequency of the speech signal. The adaptive Wiener filter shows a superiority in the proposed pitch detection method as compared to the traditional Wiener filterandspectral subtraction.
https://mjeer.journals.ekb.eg/article_64399_d41d8cd98f00b204e9800998ecf8427e.pdf
2018-01-01
109
126
10.21608/mjeer.2018.64399
Speech enhancement
Pitch detection
AMDF
ACF
and Adaptive Wiener filter
Marwa A.
Nasr
1
Dept. of Electronics and Electrical Communications, Faculty of Electronic Engineering, Menoufia University, Menouf, Egypt
AUTHOR
Mohammed
Abd-Elnaby
2
Dept. of Electronics and Electrical Communications, Faculty of Electronic Engineering, Menoufia University, Menouf, Egypt
AUTHOR
Adel S.
El-Fishawy
3
Dept. of Electronics and Electrical Communications, Faculty of Electronic Engineering, Menoufia University, Menouf, Egypt
AUTHOR
S.
El-Rabaie
4
Dept. of Electronics and Electrical Communications, Faculty of Electronic Engineering, Menoufia University, Menouf, Egypt
AUTHOR
Fathi E.
Abd El-Samie
5
Dept. of Electronics and Electrical Communications, Faculty of Electronic Engineering, Menoufia University, Menouf, Egypt
AUTHOR
0px; "> [1] F. Labelle, R. Lefebvre and P. Gournay , “Subjective Evaluation of the Effects of Speech Coding on the Perception of Emotions", ISPACS 2016. [2] A. A. Razak, M.I.Z. Abidin and R. Komiya, “Emotion Pitch Variation Analysis in Malay and English Voice Samples”, Proc. The 9th AsiaPacific Conference on Communications (APCC), Vol. 1, pp. 108 – 112, September 2003.
1
adjust: auto; -webkit-text-stroke-widt[3] M. Tamura, T. Masuko , K. Tokuda and T. Kobayashi, “Adaptation of Pitch and Spectrum for HMM-based Speech Synthesis using MLLR”, Proc. IEEE International Conference on Acoustic, Speech and Signal Processing (ICASSP, pp. 805-808), May 2001. [4]L. Qin, Q. Li and X. Guan, “Extraction for Musical Signals with
2
Modified AMDF”, pp. 3599-3602, ICMT 2011. [5] G. Muhammad, “Noise-Robust Pitch Detection using Auto-correlation
3
Function with Enhancements”, Vol. 22, Comp. & Info. Sci, pp. 13-28, Riyadh 2010. [6] T. Abe, T. Kobayashi and S. Imai, “Robust Pitch Estimation with Harmonics Enhancement in Noisy Environment based on Instantaneous Frequency”, Proc. International Conference on Spoken Language Processing (ICSLP), Vol. 2, pp. 1277-1280, 1996. [7] P. McLeod. "Fast, Accurate Pitch Detection Tools for Music
4
Analysis”, Ph.D. thesis, the University of Otago, Dunedin, New Zealand, 30 May 2008. [8] W. Fangming and P. Yip, “Cepstrum Analysis using Discrete Trigonometric Transforms”, IEEE Trans. ASSP, Vol. 39, no. 2, pp. 538- 541, 1991.
5
[9] H. Huang and J. Pan , “Speech pitch determination based on HuangHilbert transform”, Signal Processing, Vol. 86, no. 4, pp. 792-803, 2005. [10] M. A. Abd El-Fattah, M.I. Dessouky, S. M. Diab, F. E. El-Samie,
6
“Adaptive Wiener Filter Approach for Speech Enhancement,” Progress in Electromagnetic Research PIER M, Vol. 4, pp.167-184, 2008. [11] X. Xu, T. Zhang, S. Shi and Y. Zhang, “An Improved Pitch Detection of Speech Combined with Speech Enhancement”, 7th International Congress on Image and Signal Processing, pp. 778-782, 2014. [12] G. Muhammad, “Noise-Robust Pitch Detection Algorithm Based on AMDF with Clustering Analysis Picking Peaks”, J. King Saud University, Vol. 22, pp. 1144-1148, 2009. [13] S. Kumar, S. Bhattacharya and P. Patel, “A New Pitch Detection Scheme Based on ACF and AMDF", IEEE International Conference on Advanced Communication Control and Computing Technologies (ICACCCT), pp. 1235-1240, 2014.
7
[14] S. F. Boll, “Suppression of Acoustic Noise in Speech Using Spectral Sub- traction”, IEEE Trans. Acoustics, Speech, and Signal Processing. Vol. ASSP-29. no. 2, pp. 113-120, April 1979.
8
[15] J. S. Lim and A. V. Oppenheim, “Enhancement and Bandwidth
9
Compression of Noisy Speech,” Proc. IEEE, Vol. 12, pp. 197-210, 1979.
10
ORIGINAL_ARTICLE
New Band notched UWB monopole antenna using Hexagonal SRR
In this paper an UWB monopole antenna with band notch characteristics using hexagonal split ring resonator (HSRR) is presented and examined. This antenna is fed by Coplanar Waveguide (CPW). Varying SRR dimensions different notch frequencies can be obtained. By using single HSRR a notch frequency can be obtained at 6.2 GHz but by using two HSRR with different dimensions two notch frequencies can be obtained at 6.2 GHz (for WLAN) and 8.9 GHz (for x-band communication application). The proposed antenna loaded with single or double HSRRs yields directive pattern in the E- plane and omnidirectional pattern in H-plane. Also in both cases the gain is suppressed at the notch frequencies and the proposed antenna gives high radiation efficiency. Finite element method FEM is used to simulate the proposed structures using HFSS.
https://mjeer.journals.ekb.eg/article_64403_d41d8cd98f00b204e9800998ecf8427e.pdf
2018-01-01
127
138
10.21608/mjeer.2018.64403
UWB antenna
CPW
Notch frequency
hexagonal SRR
FEM
HFSS
Ghidaa T.
Ahmed
1
Dept. of Electronics and Electrical Communications, Faculty of Electronic Engineering, Menouf 32952, Menoufia University, Egypt
AUTHOR
Ahmed S.
Elkorany
2
Dept. of Electronics and Electrical Communications, Faculty of Electronic Engineering, Menouf 32952, Menoufia University, Egypt
AUTHOR
Said M.
Elhalafawy
3
Dept. of Electronics and Electrical Communications, Faculty of Electronic Engineering, Menouf 32952, Menoufia University, Egypt
AUTHOR
Demyana A.
Saleeb
4
Faculty of Engineering, Kafr ElShiekh University Egypt
AUTHOR
troke-width: 0px; "> [1] FCC, Federal Communications Commission, “First report and
1
order”, April 2002. [2] G.-L. Ning, H.-Y. Lai, Z.-Y. Lei, Y.-J. Xie, and K. Yang, “UWB antenna with dual band rejection for WLAN / WIMAX bands using
2
CSRRs”, PIER Letters, Vol. 26, 69-78, 2011.
3
[3] Ahmad A. Gheethan and Dimitris E. Anagnostou, “Dual BandReject UWB Antenna with Sharp Rejection of Narrow and CloselySpaced Bands”,IEEE Transactions on Antennas and Propagation, Vol. 60, No. 4, pp.2071 – 2076, April 2012.
4
[4] Jiangjiang Li, YunSheng Liu and ShaoQun Luo, “Four-BandNotched UWB Antenna Using Three Circular Split-Rings and a Square Split-Ring”, Communication Problem-Solving (ICCP), IEEE International Conference on, 2014. [5] Y. Zhang, C. Yu, Y.D. Don, W. Hong, C. Yu, Z.Q. Kuai, and J.Y.
5
Zhou, “Planar Ultra wideband antennas with multiple notched bands based on etched slots on the patch and/or split ring resonators xt-size-adjust: auto; -webkit-text-stron the feed line,” IEEE Transactions on Antennas and Propagations, vol. 56, pp. 3063–3068, 2008. [6] P. Wang, Y. J. Huang, Y.H. Sun and G.J. Wen, “Compact CPW-fed planar monopole antenna with distinct triple bands for WiFi /
6
WiMAX applications,” Electronic Lettetters, vol. 48, No.7, Mar. 2012.
7
[7] W. Che, and W. Jiang, “A novel UWB antenna with dual notched bands for WiMAX and WLAN applications,” IEEE Antennas Wireless Propagation Letters, vol. 11, pp. 293–296, 2012.
8
[8] W. T. Li, X.W. Shi, W. Feng and Y.Q. Hei, “Planar antenna for 3G/Bluetooth/WiMAX and UWB applications with dual
9
band notched characteristics,” IEEE Antennas Wireless Propagation Letters, vol. 11, pp. 61–64, 2012.
10
[9] D. Jiang, W. Lin, Y. Xu, and R. Xu, “Compact dual-band-notched
11
UWB planar monopole antenna with modified CSRR,” Electronic Letters, vol. 48, No.20, Sep. 2012. [10] M.-C. Tang, D. Wang, T. Deng, S. Xiao, J. Guan, B. Wang, and G.-
12
D. Ge, “Compact UWB antenna with multiple band-notches for
13
WiMAX and WLAN,”IEEE Transactions on Antennas and Propagations, vol. 59,no. 4, pp. 1372-1376, April 2011. [11] L. Li, J. S. Hong, Z.L. Zhou, Y.H. Sun, and B. Z. Wang, “Compact dual- band-notched UWB planar monopole antenna with modified
14
SRR,” Electronic Letters, vol. 47, No.17, pp. 950–951, 2011.
15
[12] X.J Liao, Y. Li, H.C Yang, N. Han, and Y.H. Sun, “UWB antenna with dual narrow band notches for lower and upper WLAN bands,” Electronic Letters, vol. 46, pp. 1593–1594, 2010.
16
[13] H. W. Liu, C.F. Yang, and C.H. Ku, “Novel CPW-fed planar
17
monopole antenna for WiMAX/WLAN applications,” IEEE Antennas Wireless Propagation Letters, vol. 9, pp 240–243, 2010. [14] D. T. Nguyen, H. C. Park and D. H. Lee, “Very compact printed triple band-notched UWB antenna with quarter-wavelength slots,” IEEE Antennas Wireless Propagation Letters, vol. 11, pp. 411–414, 2012. [15] Y.-Y. Yang and Q.-X. Chu, “A compact ultrawideband antenna with 3.4/5.5 GHz dual band-notched characteristics”, IEEE, transactions on antennas and propagations ,vol. 56, no. 12, pp. 3637-3644, Dec. 2008.
18
; -webkit-text-stroke-width: 0px; "> [16] B. Badamchi, J. Nourinia, C. Ghobadi, and A. V. Shahmirzadi,
19
“Design of Compact Reconfigurable Ultra-Wideband Slot Antenna
20
with Switchable Single/Dual Band Notch Functions,” IET Microwave, Antennas and Propagations, Vol. 8, Issue 8, pp. 541– 548, 2014.
21
[17] Jin, Peng, “Improving the Performance of Antennas with
22
Metamaterial Constructs”, ,for the degree of doctor of philosophy in the graduate college, Department of Electric and Computer Engineering, The University of Arizona, 2010.
23
[18] Sumanth Reddy A, “Design of Compact Zeroth-Order Resonant
24
Antenna Based on CRLH TL”, chapter2, for the degree of Master of Technology, Department of Electronics and Communication Engineering National Institute of Technology, Rourkela, May 2013. [19] R. Marqués and F. Martín. Split Ring Resonators and Related Topologies. Ch.16 in Theory and Phenomena of Metamaterials, Ed. F. Capolino CRC Press, FL, 2009.
25
[20] Y. M.M. Antar, J. Y. Sidiqui, and C. Saha, “Compact SRR loaded UWB Circular Monopole Antenna with Frequency Notch
26
Characteristics”, IEEE Transactions on Antennas and Propagations, vol. 62, no.8. pp. 4015-4020, 2014. [21] Y. M.M. Antar, J. Y. Sidiqui, and C. Saha, “Compact Dual SRR Loaded UWB Monopole Antenna with Dual Frequency and
27
Wideband Notch Characteristics,” IEEE Antennas and Wireless Propagation Letters, vol. 14, pp 100-103, 2014. [22] Y. M.M. Antar, J. Y. Sidiqui, and C. Saha, “Multilayered Stacked Square SRR Coupled UWB Monopole Antenna with Dual Notch
28
Function,” IEEE Antennas and Propagation Society International Symposium, Memphis, Tennessee, USA, pp. 787-788, 2014.
29
[23] J. Y. Sidiqui, and C. Saha,” A Comparative Analysis for Split Ring
30
Resonators of Different Geometrical Shapes”, IEEE, Applied Electromagnetics Conference, Kolkata, India, 2011.
31
[24] Deepti Das Krishna and Tessa Mathew, “A Planar UWB Antenna Design with Triple Band-Notches for WiMAX, WLAN and downlink of X-band satellite communications system”,TENCON 2015 IEEE Region 10 Conference, pp.1-4, 2015.
32
ORIGINAL_ARTICLE
Fixed to Mobile 5G Millimeter Wave Channel Model
The predominant direction in modern wireless mobile communication is to take advantage of using new spectrums in the Fifth Generation (5G) of mobile networks which planned to be started by 2020. These new spectrums can be provided through Millimeter Wave (mmW) bands which extended from 30 GHz to 300 GHz and have not been exploited before in the previous generations of mobile. This paper presents a closed form expressions for small scale fading space-time correlation function at mmW bands to get the appropriate antenna spacing in MIMO systems to be used in uncorrelated mmW 5G systems. First a geometry based three dimensional (3D) cylinder channel model has been built followed by its impulse response. Form the model the MIMO channel space-time correlation at different mmW bands has been extracted. The analytical model validity has been checked by comparing its results with that published earlier for the Third generation as a special case.
https://mjeer.journals.ekb.eg/article_64406_d41d8cd98f00b204e9800998ecf8427e.pdf
2018-01-01
139
150
10.21608/mjeer.2018.64406
Basim M.
Eldowek
1
Department of Electronics and Electrical Communications, Faculty of Electronic Engineering, Menoufia University, Menouf, 32952, Egypt.
AUTHOR
Saied M.
Abd El-atty
2
Department of Electronics and Electrical Communications, Faculty of Electronic Engineering, Menoufia University, Menouf, 32952, Egypt.
AUTHOR
El-Sayed M
El-Rabaie
3
Department of Electronics and Electrical Communications, Faculty of Electronic Engineering, Menoufia University, Menouf, 32952, Egypt.
AUTHOR
Fathi E.
Abd El-Samie
4
Department of Electronics and Electrical Communications, Faculty of Electronic Engineering, Menoufia University, Menouf, 32952, Egypt.
AUTHOR
Sally
Abdulaziz
5
Industrial Electronics and Control Engineering Department Faculty of Electronic Engineering Menoufia University, Minouf, Egypt
LEAD_AUTHOR
dth: 0px; "> [1] T. S. Rappaport et al., “Millimeter Wave Wireless Communications,”
1
Pearson/Prentice Hall, 2015.
2
[2] Y. Azar, G. N. Wong, K. Wang, R. Mayzus, J. K. Schulz, H. Zhao, F.
3
Gutierrez, D. Hwang, and T. S. Rappaport, “28 GHz Propagation
4
Measurements for Outdoor Cellular Communications Using Steerable Beam
5
Antennas in New York City,” 2013 IEEE International Conference on
6
Communications (ICC), Budapest, pp. 5143-5147, 2013.
7
[3] G. R. MacCartney and T. S. Rappaport, “73 GHz Millimeter wave
8
Propagation Measurements for Outdoor Urban Mobile and Backhaul
9
Communications in New York City,” 2014 IEEE International Conference
10
adjust: auto; -webkit-text-stroke-widton Communications (ICC), Sydney, NSW, pp. 4862-4867, 2014.
11
[4] G. R. MacCartney, M. K. Samimi, and T. S. Rappaport, "Omnidirectional
12
Path Loss Models in New York City at 28 GHz and 73 GHz,“ 2014 IEEE
13
25th Annual International Symposium on Personal, Indoor, and Mobile
14
Radio Communication (PIMRC), Washington DC, pp. 227-231, 2014.
15
[5] T. S. Rappaport, J. N. Murdock, and F. Gutierrez, “State of the Art in 60-
16
GHz Integrated Circuits and Systems for Wireless Communications,”
17
Proceedings of the IEEE, vol. 99, no. 8, pp. 1390–1436, August 2011.
18
[6] 3GPP TR 36.873, “Study on 3D channel model for LTE”, Release 12,
19
v1.3.0, February, 2014 (available at www.3gpp.org).
20
[7] M. K. Samimi and T. S. Rappaport, “Ultra-wideband Statistical Channel
21
Model for 28 GHz Millimeter-wave Urban NLOS Environments,” 2014
22
IEEE Global Telecommunications Conference, Austin, Texas, December
23
[8] M. K. Samimi and T. S. Rappaport,”3-D Statistical Channel Model for
24
Millimeter-Wave Outdoor Mobile Broadband Communications,” 2015 IEEE
25
International Conference on Communications (ICC), London, pp. 2430-
26
2436, 2015.
27
[9] T. S. Rappaport, et. al., “Millimeter Wave Mobile Communications for 5G
28
Cellular: It Will Work!”, IEEE Access, vol. 1, pp. 335-349, 2013.
29
[10] T. Aulin, “A modified Model for the Fading at a Mobile Radio Channel,”
30
IEEE Transactions on Vehicular Technology, vol. 28, no. 3, pp. 182-203,
31
Aug. 1979.
32
[11] A.M.D. Turkmani and J.D. Parsons, “Characterization of Mobile Radio
33
Signals: Model Description,” IEE Proceedings I - Communications, Speech
34
and Vision, vol. 138, no. 6, pp. 549-556, Dec. 1991.
35
[12] A. Abdi andM. Kaveh, “A space–time Correlation Model for Multielement
36
Antenna Systems in Mobile Fading Channels,” IEEE Journal on Selected
37
Areas in Communications., vol. 20, no. 3, pp. 550–560, Apr. 2002.
38
[13] A. G. Zajic and G. L. Stuber, “Three-Dimensional Modeling, Simulation,
39
and Capacity Analysis of Space–Time Correlated Mobile-to-Mobile
40
Channels," in IEEE Transactions on Vehicular Technology, vol. 57, no. 4,
41
pp. 2042-2054, July 2008.
42
[14] E. T. Michailidis and A. G. Kanatas, “Three-Dimensional HAP-MIMO
43
Channels: Modeling and Analysis of Space-Time Correlation,” in IEEE
44
Transactions on Vehicular Technology, vol. 59, no. 5, pp. 2232-2242, Jun
45
[15] Basim Eldowek, Emmanouel Michailidis, Yasser Albagory, Mohamad AbdElnaby, El-Sayed El-Rabaie, Moawad Dessouky, Abdel-Aziz Shalaby,
46
Bassiouny Sallam, Fathi Abd El-Samie, Athanasios Kanatas., "Complex dth: 0px; "> Envelope Second-Order Statistics in High-Altitude Platforms
47
Communication Channels", Springer Wireless Personal Communications,
48
vol. 77, no. 4, pp 2517-2535, 2014.
49
[16] J. Salz and J. H. Winters, “Effect of Fading Correlation on Adaptive Arrays
50
in Digital Mobile Radio,” IEEE Transactions on Vehicular Technology, vol.
51
43, no. 4, pp. 1049–1057, Nov. 1994.
52
[17] K. I. Pedersen, P. E. Mogensen and B. H. Fleury, "Power azimuth spectrum
53
in outdoor environments," in Electronics Letters, vol. 33, no. 18, pp. 1583-
54
1584, Aug 1997.
55
[18] K. I. Pedersen, P. E. Mogensen and B. H. Fleury, "Power azimuth spectrum
56
in outdoor environments," in Electronics Letters, vol. 33, no. 18, pp. 1583-
57
1584, Aug 1997.
58
[19] T. Taga, “Analysis for Mean Effective Gain of Mobile Antennas in Land
59
Mobile Radio Environments,” IEEE Transactions on Vehicular Technology,
60
vol. 39, no. 2, pp. 117–131, May 1990.
61
[20] E. T. Michailidis and A. G. Kanatas, "A three dimensional model for land
62
mobile-HAP-MIMO fading channels," 2008 10th International Workshop
63
on Signal Processing for Space Communications, Rhodes Island, 2008, pp.
64
ORIGINAL_ARTICLE
Performance Enhancement for Unipolar OFDMbased Optical Wireless Communication Systems
Optical wireless communication (OWC) is one of the leading technologies nowadays, especially with the limited-band shortage of radio frequency communication. OWC offers high data transmission, free wide bandwidth with high data security. Data transmission within the diffused indoor OWC systems at high speed will extend the channel impulse response over other symbol periods with many reflections causing an interference called inter-symbol interference (ISI). This interference distorts the transmitted data symbols and affects the signal recovery at the receiver side. This paper studies the performance enhancement for OWC systems over a ceiling bounce channel considering a hamming error coding model for unipolar OFDMbased optical communication system with the use of equalization to mitigate and reduce the degradation effects of channel distortion and ISI for reliable and correct detection at the receiver.
https://mjeer.journals.ekb.eg/article_64521_d41d8cd98f00b204e9800998ecf8427e.pdf
2018-01-01
151
174
10.21608/mjeer.2018.64521
Safie El-Din Nasr
Mohamed
1
* Dept. of Electronics and Electrical Communications, Faculty of Engineering, Menoufia University.
AUTHOR
Abd El-Naser A.
Mohamed
2
Dept. of Electronics and Electrical Communications, Faculty of Engineering, Menoufia University.
AUTHOR
Fathi E.
Abd El-Samie
3
Dept. of Electronics and Electrical Communications, Faculty of Engineering, Menoufia University.
AUTHOR
Ahmed Nabih Zaki
Rashed
4
Dept. of Electronics and Electrical Communications, Faculty of Engineering, Menoufia University
AUTHOR
ebkit-text-stroke-width: 0px; "> [1] M. N. O. Sadiku, S.M. Musa and S. R. Nelatury, “Free Space Optical
1
Communications: An Overview,” European Scientific Journal, vol. 12, no.
2
9, doi: 10.19044/esj.2016.v12n9p55, Feb. 2016.
3
[2] Dissanayake S. D., Armstrong J., Hranilovic S., "Performance analysis of
4
noise cancellation in a diversity combined ACO-OFDM system,"
5
International Conference Transparent Optical Networks (ICTON), pp.1-4,
6
2-5 Jul. 2012.
7
[3] J. R. Barry, E. A. Lee, and D. G. Messerschmitt, “Digital Communication,”
8
3rd ed., Kluwer Academic Publishers, Norwood, MA, 2004.
9
[4] S. Dimitrov and H. Haas, “Optimum Signal Shaping in OFDM-based
10
Optical Wireless Communication Systems,” Vehicular Technology
11
Conference, Apr. 2012.
12
[5] A. Sevincer, A. Bhattarai, M. Bilgi, M. Yuksel and N. Pala, “LIGHTNETs:
13
Smart LIGHTing and Mobile Optical Wireless NETworks,” IEEE
14
Communications Surveys & Tutorials, vol. 15, no. 4, pp. 1620 – 1641,
15
Apr. 2013.
16
[6] Z. Ghassemlooy, W. Popoola and S. Rajbhandari, “Optical Wireless
17
Communications,” Aug. 2012.
18
[7] A. Burr “Modulation and Coding for Wireless Communications,” UK:
19
Prentice-Hall, 2001.
20
[8] M.A. Khalighi and M. Uysal, “Survey on Free Space Optical
21
Communication: A Communication Theory Perspective,” IEEE
22
Communications Surveys & Tutorials, vol. 16, no.8, pp. 2231–2258, Nov2014 auto; -webkit-text-stroke-width: 0px; [9] A. Tiwari and V. K. Sahu, “Error Correction Channel Coding Practices for
23
Wireless Communication Systems,” International Journal of Advanced
24
Research in Computer and Communication Engineering, Vol. 4, no. 10, pp.
25
151-159, Oct. 2015.
26
[10] D. Barros, S. Wilson, and J. Kahn, “Comparison of orthogonal frequency
27
division multiplexing and pulse-amplitude modulation in indoor optical
28
wireless links,” IEEE Trans. Communication, vol. 60, no.1, pp. 153–163,
29
Jan. 2012.
30
[11] J. Armstrong, B. J. C. Schmidt, D. Kalra, H. A. Suraweera, and A. J.
31
Lowery, “Performance of asymmetrically clipped optical OFDM in
32
AWGN for an intensity modulated direct detection system,” Proc. of IEEE
33
Globecom, pp. 1-5, Dec. 2006.
34
[12] Rashed Islam, Pallab Choudhury and Muhammad Ashiqul Islam,
35
“Analysis of DCO-OFDM and Flip-OFDM for IM/DD Optical Wireless
36
System,” International Conference on Electrical and Computer
37
Engineering, pp. 32-35, Dec. 2014.
38
[13] Ming Jiang, "Direct Current Bias Optimization of the LDPC Coded DCO
39
OFDM Systems", IEEE Photonics Technology Letters, vol. 27, no. 19, pp.
40
161-164, Oct. 2015.
41
[14] Ji Zhou, Yaojun Qiao, Zhuo Cai, and Yuefeng Ji, “Asymmetrically
42
Clipped Optical Fast OFDM Based on Discrete Cosine Transform for
43
IM/DD Systems,” Journal of Lightwave Technology, vol. 33, no. 9, pp.
44
1920-1927, May 1, 2015.
45
[15] W. Xu, M.Wu, X. You, and C. Zhao, “ACO-OFDM-Specified Recoverable
46
Upper Clipping With Efficient Detection for Optical Wireless
47
Communications “,IEEE Photonics Journal, VOL. 6, NO. 5, OCTOBER
48
[16] J. Armstrong and B. J. C. Schmidt, “Comparison of asymmetrically clipped
49
optical OFDM and DC-biased optical OFDM in AWGN,” IEEE Commun.
50
Lett., vol. 12, no. 5, pp. 343–345, May 2008.
51
[17] N. Fernando, Y. Hong, and E. Viterbo, “Flip-OFDM for Optical Wireless
52
Communications,” IEEE Information Theory Workshop 2011, Paraty,
53
Brazil , Oct. 2011.
54
[18] N. Fernando, Y. Hong, and E. Viterbo, “Flip-OFDM for unipolar
55
communication systems,” IEEE Trans. Comm., vol. 60, no. 12, pp. 3726-
56
3733, Dec. 2012.
57
ORIGINAL_ARTICLE
Hybrid Steganography of Color Images Using Discrete Cosine Transform and Discrete Wavelet Transform
; "> This paper introduces a hybrid approach for steganography of color images using Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT). This approach is used for hiding more than one color image into an uncorrelated colorspace “YDbDr” of a color cover image using the DWT and DCT. In this approach, the DCT coefficients of the secret image are weighted by a small factor and then embedded into the DWT of the cover image to keep the effect of steganography invisible, to make it more security by encrypting the secret data before embedding into a cover image. After that, we show the effect of additive white Gaussian noise (AWGN) on the proposed algorithm.
https://mjeer.journals.ekb.eg/article_64527_d41d8cd98f00b204e9800998ecf8427e.pdf
2018-01-01
175
196
10.21608/mjeer.2018.64527
A.A.
Eyssa
1
Dept. of Electrical Engineering and Eng., Faculty of Elect., Eng., zagazig University.
AUTHOR
F. E.
Abd El-Samie
2
Dept. of Electronics and Electrical Communications, Faculty of Engineering, Menoufia University.
AUTHOR
A. E.
Abd-Elnaiem
3
Dept. of Electrical Engineering and Eng., Faculty of Elect., Eng., zagazig University.
AUTHOR
to; -webkit-text-stroke-width: 0px; ">[1] A. Cheddad, J. Condell, Kevin Curran, P. McKevitt.” Digital image
1
steganography: Survey and analysis of current methods”, science direct, Volume
2
90, Issue 3, March 2010, Pages 727–752.
3
[2] M. N. Islam, M. F. Islam, K. Shahrabi, “Robust information security system
4
using steganography, orthogonal code and joint transform correlation” , Optik -
5
International Journal for Light and Electron Optics, Volume 126, Issue 23,
6
December 2015, Pages 4026-4031.
7
[3] S. Pereira, T. Pun,” Robust template matching for affine resistant image
8
watermarks”, IEEE Transactions on Image Processing ( Volume: 9, Issue: 6, Jun
9
[4] SudipGhosh, Sayandip De, Santi Prasad Maity, HafizurRahaman,” A novel
10
dual purpose spatial domain algorithm for digital image watermarking and
11
cryptography using Extended Hamming Code”, Electrical Information and
12
Communication Technology (EICT), 2015 2nd International Conference on, 28
13
January 2016
14
[5] Shruti C. Dande , Sushma S. Agrawal , Sunil R. Hirekhan ,“Implementation
15
of colour image steganography using LSB and edge detection technique: A
16
LabVIEW approach”, Communication and Signal Processing (ICCSP), 2016
17
International Conference on, Date Added to IEEE Xplore: 24 November 2016.
18
[6] P. Malathi, T. Gireeshkumar ,”Relating the Embedding Efficiency of LSB
19
Steganography Techniques in Spatial and Transform Domains”, Proceedings of
20
the 6th International Conference on Advances in Computing and
21
Communications , Volume 93, 2016, Pages 878–885
22
[7] O. J.Sandoval; M. C.Hernandez; M. N.Miyatake; H. P.Meana; K.
23
Toscano,”MedinaImage-adaptive steganalysis for LSB Matching steganography
24
“, 2016 39th International Conference on Telecommunications and Signal
25
Processing (TSP) ,Pages: 478 – 483 .
26
[8] Cryptography and Coding: 12th IMA International Conference, IMACC 2009
27
[9] H.N. Latha, M.V. Palachandra, M. Rao ,” Real Time Implementation and
28
Performance Evaluation of WCDMA System over AWGN Channel on
29
TMS320C6713DSK”,Original Research Article Procedia Technology, Volume
30
4, 2012, Pages 82-86 st: auto; -webkit-text-stroke-width: 0[10] K. S. Seethalakshmi , Usha B A , Sangeetha K N ,” Security enhancement
31
in image steganography using neural networks and visual cryptography”, 2016
32
International Conference on Computation System and Information Technology
33
for Sustainable Solutions (CSITSS) , IEEE Conference Publications,Year: 2016
34
,Pages: 396 - 403
35
[11] S. Lahiri; P. Paul; S. Banerjee; S. Mitra; A. Mukhopadhyay; M.
36
Gangopadhyaya ,” Image steganography on coloured images using edge based
37
Data Hiding in DCT domain” , 2016 IEEE 7th Annual Information Technology,
38
Electronics and Mobile Communication Conference (IEMCON) ,Year: 2016 ,
39
Pages: 1 - 8, DOI: 10.1109/IEMCON.2016.7746270 ,IEEE Conference
40
Publications
41
[12] K. Muhammad, M. Sajjad, I. Mehmood, S.Rho, S. W. Baik ,” Image
42
steganography using uncorrelated color space and its application for security of
43
visual contents in online social networks” , Future Generation Computer
44
Systems, In Press, Corrected Proof, Available online 27 November 2016.
45
[13] Sahar A. El_Rahman , “ A comparative analysis of image steganography
46
based on DCT algorithm and steganography tool to hide nuclear reactors
47
confidential information” , Computers and Electrical Engineering ,Available
48
online 19 September 2016.
49
[14] H. Dadgostar, F. Afsari “Image steganography based on interval-valued
50
intuitionistic fuzzy edge detection and modified LSB” , Journal of Information
51
Security and Applications, Volume 30, October 2016, Pages 94-104
52
[15] SirajSidhik, S.K. Sudheer, V.P. MahadhevanPillai ,” Performance and
53
analysis of high capacity Steganography of color images involving Wavelet
54
Transform”, Optik - International Journal for Light and Electron Optics, Volume
55
126, Issue 23, December 2015, Pages 3755-3760
56
[16] D. Baby, J. Thomas, G. Augustine, E. George, N. R. Michael,” A Novel
57
DWT based Image Securing Method using Steganography”, International
58
Conference on Information and Communication Technologies (ICICT 2014), (
59
[17] Rachit Jain, J. B. Sharma,” Symmetric color image encryption algorithm
60
using fractional DRPM and chaotic baker map “,Recent Trends in Electronics,
61
Information & Communication Technology (RTEICT), IEEE International
62
Conference on, 09 January 2017
63
[18] A. Mehto, N. MehraAdaptive,” Lossless Medical Image Watermarking
64
Algorithm Based on DCT & DWT” ,Procedia Computer Science, Volume 78,
65
2016, Pages 88-94
66
[19] E. H. Houssein, M. A. S. Ali and A. E. Hassanien, "An image steganography
67
algorithm using Haar Discrete Wavelet Transform with Advanced Encryption
68
System," /2016 Federated Conference on Computer
69
[20] AkankshaKaushal, VineetaChaudhary,” Secured Image Steganography
70
using Different Transform Domain”,International Journal of Computer
71
Applications (0975 – 8887) Volume 77– No.2, September 2013. e-width: 0px; "> [21] K. RamamohanRao،P. Yip ,” Discrete Cosine Transform: Algorithms,
72
Advantages, Applications”COPY RIGHT ©1990 by ACADMIC PRESS ,INC.
73
[22] B. G. Banik and S. K. Bandyopadhyay, "Implementation of image
74
steganography algorithm using scrambled image and quantization coefficient
75
modification in DCT," 2015 IEEE International Conference on Research in
76
Computational Intelligence and Communication Networks (ICRCICN), Kolkata,
77
2015, pp. 400-405.
78
[23] M. R. Asif; Qi Chun; S. Hussain; M. S. FareedMultiple, “ licence plate
79
detection for Chinese vehicles in dense traffic scenarios”, IET Intelligent
80
Transport Systems ,IET Journals &Magazines,Year: 2016, Volume: 10, Issue: 8
81
,Pages: 535 - 544, DOI: 10.1049/iet-its.2016.0008.
82
[24] Z. Wang, A.C. Bovik, H.R. Sheik, E.P. Simoncell, “Image quality
83
assessment from error visibility to structural similarity”, IEEE Trans. Image
84
Process. 13 (4) (2004April) 600–612.
85
ORIGINAL_ARTICLE
Efficient and Robust Spectrum Allocation Algorithm for underlay Cognitive Radio Network under imperfect Channel State Information
Designing efficient radio resource allocation scheme for Underlay Cognitive radio (CR) has drawn many interests. Most of the existing works assumed perfect channel state information (CSI). In this paper, a spectrum allocation algorithm for underlay multi-user orthogonal frequency division multiplexing (MU-OFDM) based cognitive radio systems under imperfect CSI is proposed to maximize the throughput performance. During the first phase, the receiver estimates the channel and sends a feedback to the transmitter. During the second phase, the proposed scheme efficiently distributes the available subcarriers among cognitive users to maximize the cognitive network throughput while preserving the QoS of the primary users. The proposed algorithm considers the conventional Interference Power Constraint (IPC) to preserve the QoS of the primary users. The simulations results demonstrate that the proposed scheme significantly outperform the conventional IPC based scheme in terms of the achieved CR network throughput and the robustness against estimation error of CSI. Also, it is shown that the achieved CR throughput by the proposed algorithm is enhanced by 102% than that of the conventional IPC based schemes.
https://mjeer.journals.ekb.eg/article_64531_d41d8cd98f00b204e9800998ecf8427e.pdf
2018-01-01
197
212
10.21608/mjeer.2018.64531
Channel state information (CSI)
cognitive radio
Interference Constraints
OFDM
spectrum sharing
subcarrier allocation
Kyrillos
Youssef
1
Dept. of Electronics and Electrical Communications, Faculty of Electronic Engineering, Menouf, Menoufia University, Egypt.
AUTHOR
Nagy
Messiha
2
Dept. of Electronics and Electrical Communications, Faculty of Electronic Engineering, Menouf, Menoufia University, Egypt
AUTHOR
Mohammed
Abd-Elnaby
3
Dept. of Electronics and Electrical Communications, Faculty of Electronic Engineering, Menouf, Menoufia University, Egypt
AUTHOR
xt-stroke-width: 0px; "> [1] X. Kang, H. K. Garg, Y. Liang, and R. Zhang, '' Optimal power allocation for
1
OFDM-based cognitive radio with new primary transmission protection criteria,"
2
IEEE Transactions on Wireless Communications, vol. 9, no. 6, pp. 2066-2075,
3
June 2010.
4
[2] R. Engelman, and C. K. Abrokwah, “Spectrum policy task force,” Federal
5
Communications Commission, ET Docket No. 02-135, Tech. Rep., Nov. 2002.
6
[3] W. Yu and Q. Liu, "Dynamic spectrum management with interference
7
constraint and proportional fairness," IEEE Tencon – Spring, pp. 520 – 524,
8
[4] J. P. Hong and W. Choi, “Gains and Limits of Diversity Techniques
9
Cognitive Radio Systems,” Journal of Communications and Networks, vol. 19,
10
no. 2, pp. 97-104, April 2017.
11
[5] G. Bansal, Md. J. Hossain, and V. K. Bhargava, “Adaptive power loading for
12
OFDM-based cognitive radio systems,” in Proc. of IEEE International
13
Conference on Communications. ICC’07, pp. 5137-5142, June 2007.
14
[6] J. Mitola III and G. Q. Maguire Jr., “Cognitive radio: making software radios
15
more personal,” IEEE Personal Communications, vol. 6, no. 4, pp. 13–18, 1999.
16
[7] J. Mitola, Cognitive Radio Architecture: The Engineering Foundations of
17
Radio XML, Wiley-Interscience, New York, NY, USA, 2006 . ebkit-text-size-adjust: auto; -webkit-[8] S. Sasipriya and R.Vigneshram , “An Overview of Cognitive Radio in 5G
18
Wireless Communications,” IEEE International Conference on Computational
19
Intelligence and Computing Research, pp. 1–5, 2016.
20
[9] T. A. Le and K. Navaie, “On the Interference Tolerance of the Primary
21
System in Cognitive Radio Networks,” IEEE Wireless Communications Letters,
22
pp. 1–4, 2015.
23
[10] G. Sharma and R. Sharma, “A Review on recent advances in spectrum
24
sensing, Energy Efficiency and Security Threats in Cognitive Radio Networks,”
25
International Conference on Microwave, Optical and Communications
26
Engineering, IIT Bhubaneswar, India, pp. 1–4, December 2015.
27
[11] M. G. Kibria, F. Yuan and F. Kojima, “Feedback Bits Allocation for
28
Interference Minimization in Cognitive Radio Communications,” IEEE Wireless
29
Communications Letters, pp. 1–4, 2015.
30
[12] Y. Li, Z. Chen, and Y. Gong, “Optimal Power Allocation for Coordinated
31
Transmission in Cognitive Radio Networks,” IEEE Trans. Wireless Commun.,
32
pp. 1–5, 2015.
33
[13] J. Zou, Q. Wu, H. Xiong, and C. W. Chen, “Dynamic Spectrum Access and
34
Power Allocation for Cooperative Cognitive Radio Networks,” IEEE
35
Transactions on Signal Processing, pp. 1–33,2015.
36
[14] Y. Xu, X. Zhao and F. Hu, “Interference minimization based power
37
allocation for Cognitive radio networks with imperfect spectrum sensing,” IEEE
38
Wireless Communications and Networking Conference, pp. 1–6, 2016.
39
[15] G. Bansal, J. Hossain, V. K. Bhargava, and T. Le_Ngoc, “Subcarrier and
40
power allocation for OFDMA_based cognitive radio systems with joint overlay
41
and underlay spectrum access mechanism,” IEEE Trans. Veh. Tech_ nol., 62,
42
pp. 1111–1122, 2013.
43
[16] R. K. Jangir, “Power Allocation Schemes for OFDM-Based
44
Cognitive Radio Networks,” RAECS UIET Panjab University Chandigarh, pp.
45
1-6, December 2015.
46
[17] A. Sultana, L. Zhao, and X. Fernando, “Power Allocation using Geometric
47
Water Filling for OFDM-based Cognitive Radio Networks,” IEEE, pp. 1–5,
48
2016. [18] A.Ahmad, S. Ahmad, M. H. Rehmani and N. Hassan, “A Survey on
49
Radio Resource Allocation in Cognitive Radio Sensor Networks”, IEEE
50
Communications Surveys & Tutorials, pp. 1-32, 2015.
51
[19] R. Masmoudi , E. V. Belmega , I. Fijalkow, and N. Sellami, “Joint
52
Scheduling and Power Allocation in Cognitive Radio Systems IEEE ICC, pp. 1-
53
[20] E. Bedeer, O. A. Dobre, M. H. Ahmed, and K. E. Baddour, " A novel
54
algorithm for rate/power allocation in OFDM-based cognitive radio systems
55
with statistical interference constraints," Signal processing for communications ; "> symposium, IEEE Global Communications Conference (GLOBECOM), pp.
56
3504-3509, 2013.
57
[21] R. Bouraoui and H. Besbes, "Dynamic resource allocation for cognitive
58
OFDMA networks based on “two witnesses rule” for cooperative spectrum
59
sensing," IEEE 22nd International Symposium on personal, Indoor and mobile
60
radio communications, pp. 359-363, 2013.
61
[22] A. Sabbah and M. Ibnkahla, "Optimizing dynamic spectrum allocation for
62
cognitive radio networks using hybrid access scheme," IEEE Wireless
63
Communications and Networking Conference (WCNC), pp. 1-6, 2016.
64
ORIGINAL_ARTICLE
An Enhanced Image Cryptosystem 1- Dimensional Chaotic Map Based
This paper demonstrates three modified algorithms for Logistic map utilized for image cryptosystem. The original Logistic map has a small range for key space. The three modified algorithms increased Key space range due to the expansion of the original Logistic map parameter. According to an increase in the parameter range, the Key space range will be wider than in the original Logistic map, hence withstands brute-force attack. The modified algorithm presents a good evaluation analysis such as encryption quality and security analysis.
https://mjeer.journals.ekb.eg/article_64537_d41d8cd98f00b204e9800998ecf8427e.pdf
2018-01-01
213
236
10.21608/mjeer.2018.64537
Ayman M.
Hemdan
1
Dept. of Computer Science and Eng., Faculty of Elect., Eng., Menoufia University
AUTHOR
Osama S.
Faragalla
2
Department of Information Technology, College of Computers and Information Technology, Taif University, Al-Hawiya, Kingdom of Saudi Arabia.
AUTHOR
Osama
Elshakankiry
3
Department of Information Technology, College of Computers and Information Technology, Taif University, Al-Hawiya, Kingdom of Saudi Arabia.
AUTHOR
Ahmed
Elmhalaway
4
Dept. of Computer Science and Eng., Faculty of Elect., Eng., Menoufia University
AUTHOR
-stroke-width: 0px; "> [1] William Stallings ”Cryptography and Network Security Principles and
1
Practices”, Fourth Edition, Prentice Hall, 16 Nov. 2005.
2
[2] Debdeep Mukhopadhyay, Behrouz A. Forouzan ”Cryptography and
3
Network Security”, 2nd Edition, Mcgraw Hill Education, 2011.
4
[3] Kocarev, Ljupco, Lian, Shiguo ”Chaos-based Cryptography”, Springer
5
[4] Di Xiao, Xiaofeng Liao, Pengcheng Wei “Analysis and improvement of a
6
chaos-based image encryption algorithm”, Chaos, Solitons & Fractals,
7
Vol. 40, Issue 5, p.2191-2199, June 2009 .
8
[5] X. Shu-Jiang, W. Ying-Long, W. Ji-Zhi, and T. Min, “A novel image
9
encryption scheme based on chaotic maps,” in Signal Processing, 2008.
10
ICSP 2008. 9th International Conference on. IEEE, 2008, pp. 1014–1018.-size-adjust: auto; -webkit-text-strok[6] Gokavarapu S., Kumari S.V.,”A Novel Encryption Using One Dimensional
11
Chaotic Maps “, 49th Annual Convention of the Computer Society of India
12
(CSI) Volume 1. Advances in Intelligent Systems and Computing, vol 337.
13
Springer, 2015.
14
[7] Murillo-Escobar, Cruz-Hernández, Abundiz-Pérez & López-Gutiérrez
15
”Implementation of an improved chaotic encryption algorithm for realtime embedded systems by using a 32-bit microcontroller” Elsevier,
16
Volume 45, Part B, Pages 297–309, September 2016 .
17
[8] R. Clark Robinson ”An Introduction to Chaotic Dynamical Systems
18
Continuous and Discrete”, Second Edition, Pearson Education, 2010.
19
[9] Robert L. Devaney ”An Introduction to Chaotic Dynamical Systems”,
20
Second Edition, Westview press, 2003.
21
[10] N. K. Pareek, V. Patidar, and K. K. Sud, “Image encryption using chaotic
22
logistic map,” Image and Vision Computing, vol. 24, no. 9, pp. 926–934,
23
[11] S.Haliuk, O. Krulikovskyi and L. Politanskyi, "Analysis of pixels
24
permutations based on discretized Chirikov map," 2016 13th International
25
Conference on Modern Problems of Radio Engineering,
26
Telecommunications and Computer Science (TCSET), Lviv, 2016, pp.
27
[12] N.F. Elabady, H.M. Abdalkader, M.I. Moussa & S.F. Sabbeh, “ Image
28
encryption based on new one-dimensional chaotic map”, ICET 2014-
29
2nd International Conference on Engineering and Technology, (2015),
30
pp.851-892.
31
[13] J.X. Chen, Z.L. Zhu, C. Fu & H. Yu, “A fast chaos-based image encryption
32
scheme with a dynamic state variables selection mechanism”
33
Communications in Nonlinear Science and Numerical Simulation, vol. 20,
34
(2015), pp.846-860 .
35
[14] S. Rohith, K.N. Bhat, S. Hari & A. Nandini, “Image encryption and
36
decryption using chaotic key sequence generate by sequence of
37
logistic map and sequence of states of Linear Feedback Shift
38
Register”, International Conference on Advances in Electronic, Computers
39
and Communications, vol. 6, (2015), pp.1124-1130 .
40
[15] A. Akhshani, A. Akhavan, S.-C. Lim, Z. Hassan, “An image encryption
41
scheme based on quantum logistic map ", Commun Nonlinear Sci Numer
42
Simulat, Elsevier, pp. 4653–4661, 2012.
43
[16] Yue Wu, Joseph P. Noonan, Sos Agaian, “NPCR and UACI Randomness
44
Tests for Image Encryption” Journal of Selected Areas in
45
Telecommunications (JSAT), April Edition, 2011.
46
[17] S. Kamali, R. Shakerian, M. Hedayati, and M. Rahmani, “A new modified
47
version of advanced encryption standard based algorithm for image
48
encryption,” in Electronics and Information Engineering (ICEIE), 2010
49
International Conference On, vol. 1. IEEE, 2010, pp. V1–141.xt-stroke-width: 0px; "> [18] H. Elkamchouchi and M. Makar, “Measuring encryption quality for bitmap
50
images encrypted with rijndael and kamkar block encrypteds,” in Radio
51
Science Conference, 2005. NRSC 2005. Proceedings of the TwentySecond National. IEEE, 2005, pp. 277–284.
52
[19] R. Gray, Entropy and information theory. Springer Verlag, 2010 .
53
[20] Y. Zhou, L. Bao, and C. L. Philip Chen, “A new 1D chaotic system for
54
image encryption,” Signal Processing, vol. 97, pp. 172–182, 2014 .
55
[21] Y. Zhou, Z. Hua, C.-M. Pun, and C. L. Philip Chen, “Cascade chaotic
56
system with applications,” IEEE Transactions on Cybernetics, vol.45, no.9,
57
pp. 2001–2012, 2015.
58
[22] H.S. Kwok and W.K.S. Tang, "A fast image encryption system based on
59
chaotic maps with finite precision representation", Chaos, Solitons &
60
Fractals, vol. 32, no. 4, pp. 1518-1529, 2007.
61
[23] V. Cambareri, M. Mangia, F. Pareschi, R. Rovatti, and G. Setti, “On
62
known-plaintext attacks to a compressed sensing-based encryption: a
63
quantitative analysis,” IEEE Transactions on Information Forensics and
64
Security, vol. 10, no. 10, pp. 2182–2195, 2015.
65
ORIGINAL_ARTICLE
Performance Study of HEVC and H.264 Video Coding Standards
This paper summarizes efforts in describing the main concepts of the two recent video coding standards H.265/MPEG-HEVC (High-Efficiency Video Coding) and H.264/MPEG-AVC. The High Efficiency Video Coding (HEVC) is the successor video coding standard to H.264/MPEG-4 AVC (Advanced Video Coding) and was developed in 2013 by the Joint Collaborative Team on Video Coding (JCT-VC) from the ISO/IEC Moving Picture Experts Group (MPEG) and ITU-T Video Coding Experts Group (VCEG). An overview of the technical characteristics of the High Efficiency Video Coding (HEVC) standard is presented. It has been shown that the HEVC standard provides a significant improvement on the compression performance compared with the H.264 AVC. The FFMPEG codec is used as a research tool for studying the performance analysis and comparison of the HEVC and H.264 AVC compression standers. Evaluation metrics for comparison includes the PSNR (peak-peak Signal to Noise Ratio), VQM (Video Quality Model), MSAD, Delta and SSIM of HEVC and H.264 AVC for several video sequences and bit rates.
https://mjeer.journals.ekb.eg/article_64543_d41d8cd98f00b204e9800998ecf8427e.pdf
2018-01-01
237
260
10.21608/mjeer.2018.64543
Ahmed I.
Sallam
1
Dept. of Computer Science and Eng., Faculty of Elect., Eng., Menoufia University
AUTHOR
Osama S.
Faragallah
2
Dept. of Computer Science and Eng., Faculty of Elect., Eng., Menoufia University
AUTHOR
El-Sayed M.
El-Rabaie
3
Dept. of Electronics and Electrical Communications, Faculty of Engineering, Menoufia University.
AUTHOR
"> [1] ITU-T Recommendation H.261,"Line transmission of non-telephone
1
signals," Video codec for audio visual services at quality p x 64 kbits/s,
2
[2] ITU-T: "Video coding for low bit rate communication," Recommendation
3
H.263, 1996.
4
[3] ISO/IEC JTC 1, "Coding of moving pictures and associated audio for
5
digital storage media at up to about 1.5 Mbit/s – Part 2: Video," ISO/IEC
6
11172 (MPEG-1), Nov. 1993 .
7
[4] T. Ebrahimi, C. Horne, "MPEG-4 natural video coding - an overview,"
8
Proceedings Signal Processing: Image Communication, Vol. 15, pp. 365-
9
385, 2000. "> [5] ISO/IEC, "The MPEG-2 International Standard," Reference number
10
ISO/IEC 13818-2, 1996.
11
[6] I. Richardson, "The H.264 Advanced Video Compression Standard," Wiley
12
Publishing, 2010.
13
[7] G. Sullivan, J. Ohm, W. Han and T. Wiegand, "Overview of the High
14
Efficiency Video Coding (HEVC) Standard," IEEE Transactions on
15
Circuits and Systems For Video Technology, Vol. 22, No. 12, pp. 1649-
16
1668, December 2012.
17
[8] B. Bross, "High Efficiency Video Coding (HEVC) Text Specification draft
18
8," JCTVC-J1003, Joint Collaborative Team on Video Coding of ITU-T
19
SG16 WP3 and ISO/IEC JTC1/SC29/WG11, 10th Meeting: Stockholm,
20
SE, Jul. 2012.
21
[9] M. Wang, K. NgiNgan and L. Xu, "Efficient H.264/AVC Video Coding
22
with Adaptive Transforms," IEEE Transactions On Multimedia, Vol. 16,
23
No. 4, pp. 933–946, June 2014.
24
[10] M. Wien, "High Efficiency Video Coding Tools and Specification,"
25
Springer, Verlag Berlin Heidelberg, 2015.
26
[11] V. Madhukar, G. Sullivan, "High Efficiency VideoCoding (HEVC),"
27
Springer, International Publishing Switzerland, 2014.
28
[12] F. Bossen, B. Bross, K. Suhring and D. Flynn, "HEVC Complexity and
29
Implementation Analysis," IEEE Transactions on Circuits and Systems for
30
Video Technology, Vol. 22, No. 12, pp. 1685-1696, December 2012.
31
[13] K. Misra, Member, A. Segall, M. Horowitz, S. Xu, A. Fuldseth and M.
32
Zhou, "An Overview of Tiles in HEVC," IEEE Journal Of Selected Topics
33
In Signal Processing, Vol. 7, No. 6, pp. 969-977, December 2013.
34
[14] G. Sullivan, J. Boyce, Y. Chen, J. Ohm, A. Segall and A.
35
Vetro,"Standardized Extensions of High Efficiency Video Coding
36
(HEVC)," IEEE Journal Of Selected Topics In Signal Processing, Vol. 7,
37
No. 6, pp.1001-116, December 2013.
38
[15] J. Vanne, M. Viitanen and T. Hamalainen, "Efficient Mode Decision
39
Schemes for HEVC Inter Prediction," IEEE Transactions on Circuits and
40
Systems for Video Technology, Vol. 24, No. 9, pp. 1579-1593, September
41
[16] J. Lin, Y. Chen, Y. Huang and S. Lei, "Motion Vector Coding in the HEVC
42
Standard," IEEE Journal Of Selected Topics In Signal Processing, Vol. 7,
43
No. 6, pp. 957-968, December 2013.
44
[17] R. Sjoberg, Y. Chen, A. Fujibayashi, M. Hannuksela, J. Samuelsson, T.
45
Tan, Y. Wang and S. Wenger, "Overview of HEVC High-Level Syntax and
46
Reference Picture Management," IEEE Transactions On Circuits And
47
Systems For Video Technology, Vol. 22, No. 12, pp. 1858-1870,
48
December 2012.
49
[18] J. Sole, R. Joshi, N. Nguyen, T. Ji, M. Karczewicz, G. Clare, F. Henry, A.
50
Dueanas, "Transform Coefficient Coding in HEVC," IEEE Transactions On "> Circuits And Systems For Video Technology, Vol. 22, No. 12, pp. 1765-
51
1777 ., December 2012
52
[19] C. Fu, E. Alshina, A. Alshin, Y. Huang, C. Chen, C. Tsai, C. Hsu, S. Lei, J.
53
Park and W. Han, "Sample Adaptive Offset in the HEVC Standard," IEEE
54
Transactions on Circuits And Systems For Video Technology, Vol. 22, No.
55
12, pp. 1755-1763, December 2012 .
56
[20] V. Sze, M. Budagavi, "High Throughput CABAC Entropy Coding in
57
HEVC," IEEE Transactions on Circuits and Systems for Video
58
Technology, Vol. 22, No. 12, pp.1778-1791, Dec 2012 .
59
[21] J. Vanne, M. Viitanen, T. Hamalainen, and A. Hallapuro, "Comparative
60
Rate-Distortion-Complexity Analysis of HEVC and AVC Video Codecs,"
61
IEEE Transactions on Circuits and Systems for Video Technology, Vol.
62
22, No. 12, pp. 1885-1898, Dec 2012.
63
[22] J. Ohm, G. Sullivan, H. Schwarz, T. Tan and T. Wiegand, "Comparison of
64
the Coding Efficiency of Video Coding Standards—Including High
65
Efficiency Video Coding (HEVC)," Proceedings of the IEEE Transactions
66
On Circuits And Systems For Video Technology, Vol. 22, No. 12, pp.
67
1669-1684, Dec 2012.
68
[23] https://www.ffmpeg.org/. (Access Date:- 10 December 2015).
69
[24] http://ultravideo.cs.tut.fi/#testsequences (Access Date:- 9 December
70
[25] MSU Graphics and Media Lab, Video Group, MSU codecs,
71
www.compression.ru/ video/ (Access Date:- 9 November 2015).
72
ORIGINAL_ARTICLE
Time-delayed positive-position and velocity fefe edback controller to suppress the lateral vibrations in nonlinear Jeffcott-rotor system
Within this paper, the negative-velocity and positive-positionfeedback (PPF) controllers are combined together to eliminate thelateral vibrations of a vertically supported nonlinear Jeffcott-rotorsystem. Time-delays (1 and 2 ) in the control loop are included inthe system model. The slow-flow modulating equations governingthe whole system vibration amplitudes are derived utilizingasymptotic analyses. The maximum limits of 1 and 2 at which thesystem solution remains stable are illustrated. The analysesapproved that the integration of velocity controller to the PPF one,improves the control efficiency and stretches the stable limits of both 1 and 2 . Finally, numerical confirmations for the obtained analyticalresults are included, which are in excellent agreement with theanalytical solution
https://mjeer.journals.ekb.eg/article_64548_d41d8cd98f00b204e9800998ecf8427e.pdf
2018-01-01
261
278
10.21608/mjeer.2018.64548
M.
Eissa
1
Dept. of Physics and Eng., Mathematics, Faculty of Elect., Eng., Menoufia University.
AUTHOR
M.
Kamel
2
Dept. of Physics and Eng., Mathematics, Faculty of Elect., Eng., Menoufia University.
AUTHOR
N. A.
Saeed
3
Dept. of Physics and Eng., Mathematics, Faculty of Elect., Eng., Menoufia University
AUTHOR
W. A.
El-Ganaini
4
Dept. of Physics and Eng., Mathematics, Faculty of Elect., Eng., Menoufia University
AUTHOR
H. A.
El-Gohary
5
Dept. of Physics and Eng., Mathematics, Faculty of Elect., Eng., Menoufia University.
AUTHOR
text-size-adjust: auto; -webkit-text-sReferences
1
[1] T. Yamamoto “On the vibrations of a shaft supported by bearings having
2
radial clearances,” Trans. Jpn. Soc. Mech. Eng,Vol. 103, No. 21, pp.186-
3
[2] T. Yamamoto “On the critical speed of a shaft of subharmonic oscillation,”
4
Trans. Jpn. Soc. Mech. Eng,Vol. 111, No. 21, pp.853-858, 1955
5
[3] F.F. Ehrich“Subharmonic vibration of rotors in bearing clearance,” ASME
6
Paper No. 66-MD-1.
7
[4] F. F. Ehrich “High-order subharmonic response of high-speed rotors in
8
bearing clearance,” ASME J. Vib. Acoust. Stress. Reliab. Des, Vol. 110,
9
No. 1, pp.9-16, 1988
10
[5] T. Yamamoto and Y. Ishida“Theoretical discussions on vibrations of a
11
rotating shaft with nonlinear spring characteristics,” Trans. Jpn. Soc.
12
Mech. Eng. Ser. C 41, pp.1374-1384, 1975. (in Japanese)
13
[6] R. Ganesan“Dynamic response and stability of a rotor support system with
14
non-symmetric bearing clearances,” Mech. Mach. Theory Vol. 31, No. 6,
15
pp.781-798, 1996.
16
[7] Y. Kim and S. Noah“Quasi-periodic response and stability analysis for a
17
non-linear Jeffcott rotor,” Journal of Sound and Vibration Vol. 190, No. 2,
18
pp.239-253, 1996.
19
[8] T. Kashimura, H. Yabuno, T. Inoue,and Y. Ishida“Analysis of 1/2-order
20
subharmonic resonance in a horizontally supported Jeffcott rotor,”
21
ICSV14, 9–12 July 2007, Cairns, Australia
22
[9] H. Yabuno, T. Kashimura, T. Inoue, and Y. Ishida“Nonlinear normal
23
modes and primary resonance of horizontally supported Jeffcott rotor,”
24
Nonlinear Dynamics Vol. 66, pp.377-387, 2011.
25
[10] N. A. Saeed and H. A. El-Gohary “On the nonlinear oscillations of a
26
horizontally supported Jeffcott rotor with a nonlinear restoring force,”
27
Nonlinear Dynamics Vol. 88, pp.293-314, 2017.
28
[11] Y. Ishida and T. Inoue“Vibration Suppression of nonlinear rotor systems
29
using a dynamic damper,” Journal of Vibration and Control Vol. 13, No. 8,
30
pp.1127-1143, 2007.
31
[12] N. A. Saeed and M. kamel“Nonlinear PD-controller to suppress the
32
nonlinear oscillations of horizontally supported Jeffcott-rotor system,”
33
International Journal of Non-Linear Mechanics Vol. 87, pp.109-124, 2016.
34
[13] N. A. Saeed and W. A. El-Ganaini“Time-delayed control to suppress the
35
nonlinear vibrations of a horizontally suspended Jeffcott-rotor system,”
36
Applied Mathematical Modelling Vol. 44, pp.523-539, 2017.
37
[14] N. A. Saeed and W. A. El-Ganaini“Utilizing time-delays to quench the
38
nonlinear vibrationsof a two-degree-of-freedom system,” MeccanicaDOI:
39
10.1007/s11012-017-0643-z, 2017. dth: 0px; "> [15] M.Eissa and N. A.Saeed“Nonlinear vibration control of a horizontally
40
supported Jeffcott-rotor system,” Journal of Vibration and Control DOI:
41
10.1177/1077546317693928, (2017).
42
[16] A. Nayfeh and D. Mook“Nonlinear Oscillations,” Wiley, New York, 1995.
43
[17] L. F. Shampine and S. Thompson “Solving DDEs in MATLAB,” Applied
44
Numerical Mathematics Vol. 37, pp.441-458, 2001.
45
ORIGINAL_ARTICLE
Redundancy Elimination Techniques in Wireless Multimedia SensorNetworks: Survey
The evolution of Wireless Multimedia Sensor Networks(WMSNs) has been enhanced by the existence of cheap hardware such as microphones and (CMOS) cameras that can ubiquitously hold multimedia content from the entire environment. The spatial proximity of the different cameras (the overlapping Field of Views (FoVs)) causes a transmission of redundant data. Redundancy is the existence of data that is additional to the actual data and permits. A redundancy causes transmission of same data repeatedly. In WMSN, the redundant data elimination is a critical task to reduce the communication cost in terms of unnecessary energy wastage, bandwidth used and CPU processing. In this context, this paper proposed a brief discussion of the following techniques: i) Event monitoring based actuation algorithms which depends on activating the minimum number of cameras sensors while still maintaining the necessary coverage of the event of interest to reduce the possibility of multimedia data redundancy. ii) Cover set construction strategies for enabling efficient scheduling of nodes in mission-critical surveillance applications. iii) Clustering algorithms for WMSNs based on the overlapped field of views (FoVs) coverage areas.
https://mjeer.journals.ekb.eg/article_64675_d41d8cd98f00b204e9800998ecf8427e.pdf
2018-01-01
279
316
10.21608/mjeer.2018.64675
Wireless Multimedia Sensor Network (WMSN)
Reda. S.
Tantawi
1
of Mathematics, Faculty of Science, Zagazig University, Zagazig, P. O. Box 44519, Egypt.
AUTHOR
Ahmed
Salim
2
of Mathematics, Faculty of Science, Zagazig University, Zagazig, P. O. Box 44519, Egypt.
AUTHOR
Hagar
Ramadan
3
Dept. of Mathematics, Faculty of Science, Zagazig University, Zagazig, P. O. Box 44519, Egypt
AUTHOR
e-width: 0px; "> [1] J. Zheng, and A. Jamalipour, ”Wireless sensor networks a
1
networking perspective,” Wiley-IEEE Press, 489 Pages, 2009.
2
[2] A. A. Ahmed, ”A real-time routing protocol with adaptive traffic
3
shaping for multimedia streaming over next-generation of Wireless
4
Multimedia Sensor Networks,” Pervasive and Mobile Computing,
5
Accepted January 2017, In press.
6
[3] A. A. Khan , and H. Agrawal, ”A survey paper on applications and
7
challenges in wireless sensor network,” International Journal of
8
Innovative Research in Science, Engineering and Technology, vol.
9
5, no. 1, pp. 607-614, Januray 2016.
10
[4] A. Rathee, R. Singh, and A. Nandini, ”Wireless sensor network
11
challenges and possibilities,” Inter- national Journal of Computer auto; -webkit-text-stroke-width: 0px; Applications, vol. 140, no. 2, pp. 1-15, April 2016.
12
[5] R. JayeshRasal, S. V.Gumaste, and G. S. Deokate, ”Survey on
13
diff erent routing issues and design challenges in WSN,” International
14
Journal of Scientific Engineering and Applied Science (IJSEAS), vol.
15
1, no. 4, pp. 189-192, July 2015.
16
[6] E. Gurses, and O.B. Akan, ”Multimedia communication in wireless
17
sensor networks,” Ann. Telecom- mun, vol.60, no. 7, pp. 799-827,
18
[8] M. Rahimi, R. Baer, O. I. Iroezi, J. C. Garcia, J. Warrior, D. Estrin,
19
and M. Srivastava, ”Cyclops: in situ image sensing and interpretation in
20
wireless sensor networks,” In SenSys 05: Proceedings of the 3rd
21
international conference on Embedded networked sensor systems,
22
USA, 2005.
23
[9] S. Hengstler, D. Prashanth, S. Fong, and H. Agha jan, ”Mesheye: a
24
hybridresolution smart camera mote for applications in distributed
25
intelligent surveillance,” In: Information Processing in Sensor
26
Networks (IPSN-SPOTS), Cambridge, MA, April 2007.
27
[10] Crossbow IMote2. <http ://www.xbow.com >, Last access 5/7/2014.
28
[11] A. Rowe, A. Goode, D. Goel, and I. Nourbakhsh, ”Cmucam3: an
29
open programmable embedded vision sensor,” In Technical Report,
30
Carnegie Mellon Robotics Institute, 2007.
31
[12] U. M. Erdem, and S. Sclaroff , ”Optimal placement of cameras in
32
floorplans to satisfy task require- ments and cost constraints,” In
33
Proceedings of the 5th Workshop on Omnidirectional Vision, Camera
34
Networks and Non-Classical Cameras (Omnivis ’04), Prague, Czech
35
Republic, 2004.
36
[13] N. Tezcan, and W. Wang, ”Self-orienting wireless multimedia
37
sensor networks for occlusion-free viewpoints,” Computer
38
Networks(Elsevier), vol. 52, no. 13, pp. 2558-2567, 2008.
39
[14] H. ZainEldin, M. A. Elhosseini, and H. A. Ali, ”Image compression
40
algorithms in wireless multimedia sensor networks: A survey,” Ain
41
Shams Engineering Journal, vol. 6, no. 2, pp. 481-490, June 2015.
42
[15] I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E.Cayirci,
43
”Wireless sensor networks: a survey,” Computer Networks, vol. 38, pp.
44
393-422, 2002.
45
[16] K. Akkaya, M. Demirbas, R. S. Aygun, ”The impact of data auto; -webkit-text-stroke-width: 0px; aggregation on the performance of wireless sensor networks,” Wireless
46
Communications and Mobile Computing Journal, vol. 8, no. 2, PP.
47
171-193, 2008.
48
[17] Z. Xue, K. Loo, J. Cosmas, and P. Yip, ”Distributed video coding
49
in wireless multimedia sensor network for multimedia broadcasting,”
50
WSEAS Transactions on Communications, vol. 7, no. 5, PP.
51
418-427, 2008.
52
[18] Z. Weia, S.Lijuan, G. Jian, and L. Linfeng, ”Image
53
compression scheme based on PCA for wireless multimedia sensor
54
networks,” Journal of China Universities of Posts and
55
Telecommunica- tions(Elsevier), vol. 23, no. 1, pp. 22-30, February
56
[19] T. Melodia, I. F. Akyildiz, ”Cross-layer quality of service support for
57
uwb wireless multimedia sensor networks,” In IEEE INFOCOM, Mini
58
Conference, Phoenix, AZ, April 2008.
59
[20] L. Savidge, H. Lee, H. Agha jan, A. Goldsmith, ”Qos-based
60
geographic routing for event-driven image sensor networks,” In:
61
Broadband Advanced Sensor Networks (BaseNets), Boston, MA,
62
October 2005.
63
[21] J. O’Rourke, ”Open problem from art gallery solved,” International
64
Journal of Computational Ge- ometry and Applications, vol. 2, no. 2,
65
PP. 215-217, 1992.
66
[22] E. Yildiz, K. Akkaya, and E.Sisikoglu, ”Optimal camera placement
67
for providing angular coverage in wireless video sensor networks,”
68
IEEE Transactions on Computers, vol. 63, no. 7, PP. 1812-1825,
69
[23] N. Tezcan, and W. Wang, ”Self-orienting wireless multimedia
70
sensor networks for occlusion-free viewpoints,” Computer
71
Networks(Elsevier), vol. 52, pp. 2558-2567, 2008.
72
[24] N. Bendimerad, and B. Kechar,” Rotational wireless video sensor
73
networks with obstacle avoidance capability for improving disaster area
74
coverage,” Journal Information Process System, vol.11, no.4, pp.
75
509-527, December 2015.
76
[25] S. B. B. Priyadarshini, and S.Panigrahi, ”Centralised cum
77
subcentralised scheme for multi-event coverage and optimum camera
78
activation in wireless multimedia sensor networks,” IET Networks,
79
ORIGINAL_ARTICLE
Error Correction Coding for Performance Enhancement of ADO-OFDM System in the Presence of Weak Atmospheric Turbulence
In Free Space Optics (FSO) systems, atmospheric turbulence is consideredas the main problem. The overall performance of FSO system may bedegraded in the presence of weak atmospheric turbulence. This paperoffers an approach for performance improvement of FSO systems byusing Asymmetrically Clipped DC-biased Orthogonal Frequency DivisionMultiplexing (ADO-OFDM) with error correction coding, especially inthe presence of weak atmospheric turbulence. Generally, most studiesabout ADO-OFDM do not consider the turbulence effect. In this paper, wetake this effect into consideration and try to reduce its drawbacks usingerror correction coding. ADO-OFDM is a form of IntensityModulation/Direct Detection (IM/DD) Optical Orthogonal FrequencyDivision Multiplexing (O-OFDM) system that merges aspects ofAsymmetrically Clipped Optical OFDM (ACO-OFDM) and DC-biasedOptical OFDM (DCO-OFDM). The log-normal distribution model is usedto express the weak atmospheric turbulence effect. This paper proposes anapproach to mitigate the effect of weak atmospheric turbulence using errorcorrection coding. A comparative study between Hamming and LDPCcoding is presented in this paper for performance enhancement. From theobtained results, it is observed that Hamming code gives a performanceenhancement by approximately 5.5 dB at BER =10-3 and fading strength. LDPC code gives a performance enhancement byapproximately 1.5 dB at BER= 10-1 and fading strength. AtEbNo= 1 dB , it is seen that BER=0.112 in case of using Hamming code,this value decrease to become 0.06327 in case of using LDPC code.
https://mjeer.journals.ekb.eg/article_64676_d41d8cd98f00b204e9800998ecf8427e.pdf
2018-01-01
317
336
10.21608/mjeer.2018.64676
Hend
Ibrahim
1
Dept. of Electronics and Communications, Faculty of Engineering, Zagazig University
AUTHOR
Naglaa
Fathi
2
Dept. of Electronics and Communications, Faculty of Engineering, Zagazig University
AUTHOR
Mahmoud
Ibrahim
3
Dept. of Electronics and Communications, Faculty of Engineering, Zagazig University
AUTHOR
Fathi
El-Sayed
4
Dept. of Electronics and Communications, Faculty of Electronic Engineering, Minufiya University.
AUTHOR
ebkit-text-stroke-width: 0px; "> 1] Singh, C., et al. “A review of indoor optical wireless systems,” IETE
1
Technical review, Vol. 19, No. 1-2, pp. 3-17, 2002.
2
[2] Ghassemlooy, Z. and W.O. Popoola “Terrestrial Free-Space Optical
3
Communications,” InTech, 2010.
4
[3] Sharma, V. and N. Kumar, “Improved analysis of 2.5 Gbps-inter-satellite
5
link (ISL) in inter-satellite optical-wireless communication (IsOWC)
6
system,” Optics Communications, Vol. 286, pp. 99-102, 2013.
7
[4] Yura, H. and W. McKinley “Optical scintillation statistics for IR
8
ground-to-space laser communication systems, ” Applied Optics, Vol.
9
22, No. 21, pp. 3353-3358, 1983.
10
[5] Andrews, L.C. and R.L. Phillips “Laser beam propagation through
11
random media,” SPIE press Bellingham, WA, Vol. 1, 2005.
12
[6] Andrews, L.C., R.L. Phillips, and C.Y. Hopen “Laser beam scintillation
13
with applications,” SPIE press, Vol. 99,2001.
14
[7] Goodman and J., “Statistical Optics (New York: J. Wiley & Sons),” Inc,
15
[8] Karp, S. and et al., “Optical Channels: Fibers, Clouds, Water, and the
16
Atmosphere (Applications of Communications Theory),” Plenum, 1988.
17
t-text-size-adjust: auto; -webkit-text[9] Osche and G.R., “Optical detection theory for laser applications,”
18
Optical Detection Theory for Laser Applications, by Gregory R. Osche,
19
pp. 424. ISBN 0-471-22411-1. Wiley-VCH, July 2002., pp. 424, 2002.
20
[10] Al-Habash, M., L.C. Andrews, and R.L. Phillips “Mathematical model
21
for the irradiance probability density function of a laser beam
22
propagating through turbulent media.,” Optical Engineering, Vol. 40,
23
No. 8, pp. 1554-1562, 2001.
24
[11] Andrews, L.C. and et al., “Theory of optical scintillation: Gaussianbeam wave model,” Waves in Random Media, Vol. 11, No. 3, pp. 271-
25
291, 2001.
26
[12] Denic, S.Z. and et al., “Information theoretic limits for free-space optical
27
channels with and without memory,” Journal of Lightwave Technology,
28
Vol.26, No. 19, pp.3376-3384, 2008.
29
[13] Gappmair and W., “Further results on the capacity of free-space optical
30
channels in turbulent atmosphere,” IET communications, Vol. 5, No.9,
31
pp.1262-1267, 2011.
32
[14] Majumdar and A.K., “Free-space laser communication performance in
33
the atmospheric channel,” Journal of Optical and Fiber Communications
34
Reports, Vol. 2, No. 4, pp. 245-396, 2005.
35
[15] Zhu, X. and J.M. Kahn, “Free-space optical communication through
36
atmospheric turbulence channel, ” IEEE Transactions on
37
communications, Vol. 50, No. 8, pp. 1293-1300, 2002.
38
[16] Ghassemlooy, Z., W.O. Popoola, and E. Leitgeb “Free-space optical
39
communication using subearrier modulation in gamma-gamma
40
atmospheric turbulence,” ICTON'07. 9th International Conference on, in
41
Transparent Optical Networks,IEEE, 2007.
42
[17] Kiasaleh and K., “Performance of APD-based, PPM free-space optical
43
communication systems in atmospheric turbulence,” IEEE Transactions
44
on Communications, Vol. 53, No. 9, pp. 1455-1461, 2005.
45
[18] Armstrong and J., “OFDM for optical communications,” Journal of
46
lightwave technology, Vol. 27, No. 3, pp. 189-204, 2009.
47
[19] Garcia-Zambrana and A., “Error rate performance for STBC in freespace optical communications through strong atmospheric turbulence,”
48
IEEE communications letters, Vol. 11, No. 5, 2007.
49
[20] Armstrong, J. and A. Lowery “Power efficient optical OFDM,”
50
Electronics Letters, Vol. 42, No. 2, pp.370-372, 2006.
51
[21] Kahn, J.M. and J.R. Barry “Wireless infrared communications,”
52
Proceedings of the IEEE, Vol. 85, No. 2, pp. 265-298, 1997.
53
[22] Hamming and R.W., “Error detecting and error correcting codes, ”Bell
54
Labs Technical Journal, Vol. 29, No. 2, pp. 147-160, 1950.
55
[23] Gallager and R., “Low density parity check codes, Research Monograph
56
series,” MIT Press, Cambridge, 1963.
57
ORIGINAL_ARTICLE
On Orthogonal Double Covers of Complete Bipartite Graph by the Disjoint Union of Graphs
The existence problem of the orthogonal double covers of the graphs is a well-known problem in the theory of combinatorial designs. In this paper, we construct the orthogonal double covers of the complete bipartite graph by the disjoint union of paths, copies of a caterpillar, copies of a certain path, and by other certain defined graph. We use the vector method as a helping tool for constructing our results, the advantage of this method is that it is accessible to discrete mathematicians not intimately familiar with the theory of the orthogonal double covers.
https://mjeer.journals.ekb.eg/article_64678_d41d8cd98f00b204e9800998ecf8427e.pdf
2018-01-01
337
345
10.21608/mjeer.2018.64678
Saied A.
El-Serafi
1
Dept. of Physics and Engineering Mathematics, Faculty of Electronic Engineering, Menoufia University.
AUTHOR
Magdi
M. Kamel
2
Dept. of Physics and Engineering Mathematics, Faculty of Electronic Engineering, Menoufia University.
AUTHOR
Ramadan A.
El-Shanawany
3
Dept. of Physics and Engineering Mathematics, Faculty of Electronic Engineering, Menoufia University.
AUTHOR
Ahmed I.
El-Mesad y
4
Dept. of Physics and Engineering Mathematics, Faculty of Electronic Engineering, Menoufia University.
AUTHOR
o; -webkit-text-stroke-width: 0px; "> [1] M. J. Demetrovics, Z. Füredi, and G. O. H. Katona, “Minimum matrix
1
representations of closure operations”, Discrete Appl. Math, Vol. 11, pp.
2
115-128, 1985.
3
[2] J. Demetrovics and G. O. H. Katona, “External combinatorial problems in
4
relational database”, In Fundamentals of combinatorics of computation
5
theory, pp. 110-119. Springer, Berlin, 1981.
6
[3] K. Heinrich, “Graph decompositions and designs, In (C. J. Colbourn and
7
J. H. Dinitz, eds.), The CRC Handbook of Combinatorial Designs, Chapter
8
IV. 22”, CRC Press, Boca Raton, 1996.
9
[4] R. Scapellato, R. El-Shanawany and M. Higazy, “Orthogonal double
10
covers of Cayley graphs”, Discrete Appl. Math, Vol. 157, pp. 3111-3118,
11
[5] R. El-Shanawany, M. Higazy, H. Shabana and A. El-Mesady, “Cartesian
12
product of two symmetric starter vectors of orthogonal double covers”,
13
AKCE International Journal of Graphs and Combinatorics, Vol. 12, pp. 59-
14
[6] H.-D.O.F. Gronau, S. Hartman, M. Grüttmüller, U. Leck and V. Leck, “On
15
orthogonal double covers of graphs”, Design Codes Cryptography, Vol.
16
27, pp. 49-91, 2002.
17
[7] R. El-Shanawany, H.-D.O.F. Gronau, and M. Grüttmüller, “Orthogonal
18
double covers of
19
by small graphs”, Discrete Appl. Math, Vol. 138,
20
pp. 47-63, 2004.
21
[8] M. Higazy, “A study on the orthogonal double covers of the complete
22
bipartite graphs”, Master thesis, Menoufia University; 2006.
23