Menoufia University, Faculty of Electronic Engineering
Menoufia Journal of Electronic Engineering Research
1687-1189
2682-3535
25
2
2016
07
01
Enhancement of the Radio Over Fiber (ROF) Communication Systems Using WDM with Modified Differential Phase Shift Keying (DPSK) Techniques
135
146
EN
Abd El-Naser A
Mohamed
Department of Electronics and Electrical Communications, Faculty of Electronic
Engineering, Menoufia University, Menouf, 32952, Egypt
Ahmed Nabih Zaki
Rashed
Department of Electronics and Electrical Communications, Faculty of Electronic
Engineering, Menoufia University, Menouf, 32952, Egypt
Mohamed S. F.
Tabbour
Department of Electronics and Electrical Communications, Faculty of Electronic
Engineering, Menoufia University, Menouf, 32952, Egypt
Amira M.
Ismail
Department of Electronics and Electrical Communications, Faculty of Electronic
Engineering, Menoufia University, Menouf, 32952, Egypt
10.21608/mjeer.2016.64092
<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;">Recently, the most efficient technologies to provide high-quality<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> service and support the ever-growing data traffic in worldwide<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> Passive Optical Networks (PONs) are Radio over Fiber (ROF)<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> and Wavelength Division Multiplexing (WDM). Sub-Carrier<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> Multiplexing (SCM) provides high capacity transmissions at<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> lower costs and enables fiber based wireless access. It uses<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> optical components for high performance but limitations of<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> electronic components cause electronic bottleneck, which leads<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> to limit the bit rate, number of users and the overall system<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> performance. In this paper, An attempt has been made to<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> extend the number of users up to 20 users with a bit rate of 10<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> Gbps , a transmission distance of up to 100 Km with various<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> fiber cables and reduce the number of electronic components<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> for the detection of baseband signals . Here the blend of WDM<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> and Sub-Carrier Multiplexing (SCM) with modified differential<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> phase shift keying (DPSK) modulation provides a more flexible<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> platform and high dispersion tolerance for high-speed optical<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> transport networks with high efficiency of optical bandwidth.<br style="font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: -webkit-auto; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px;" /></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span>
https://mjeer.journals.ekb.eg/article_64092.html
https://mjeer.journals.ekb.eg/article_64092_d41d8cd98f00b204e9800998ecf8427e.pdf
Menoufia University, Faculty of Electronic Engineering
Menoufia Journal of Electronic Engineering Research
1687-1189
2682-3535
25
2
2016
07
01
Optical Preamplifier and Inline Amplifiers Comparison Based Raman-EDFA Hybrid Amplifiers in 40 × 10 Gb/s DWDM System
147
160
EN
Ibrahim M.
El-Dokany
Dept. of Electronics and Electrical Communications Engineering, Faculty of Electronic
Engineering, Menouf 32951, Menoufia University, EGYPT
Abd El–Naser A.
Mohamed
Dept. of Electronics and Electrical Communications Engineering, Faculty of Electronic
Engineering, Menouf 32951, Menoufia University, EGYPT
Ahmed Nabih Zaki
Rashed
Dept. of Electronics and Electrical Communications Engineering, Faculty of Electronic
Engineering, Menouf 32951, Menoufia University, EGYPT
Sarah
El-Tahan
Dept. of Electronics and Electrical Communications Engineering, Faculty of Electronic
Engineering, Menouf 32951, Menoufia University, EGYPT
10.21608/mjeer.2016.64093
<span style="font-size: 11pt; color: #000000; font-style: normal; font-variant: normal;">his paper presents forty channels dense wavelength-division<br /><span style="font-size: 11pt; color: #000000; font-style: normal; font-variant: normal;">multiplexing (DWDM) system using a hybrid optical amplifier<br /><span style="font-size: 11pt; color: #000000; font-style: normal; font-variant: normal;">composed of Raman optical amplifiers and erbium doped fiber<br /><span style="font-size: 11pt; color: #000000; font-style: normal; font-variant: normal;">amplifier (EDFA). The forty channel DWDM system have been<br /><span style="font-size: 11pt; color: #000000; font-style: normal; font-variant: normal;">designed and simulated to study the behavior of the proposed<br /><span style="font-size: 11pt; color: #000000; font-style: normal; font-variant: normal;">Raman-EDFA amplifier as preamplifier and in-line amplifier to<br /><span style="font-size: 11pt; color: #000000; font-style: normal; font-variant: normal;">select one which have better performance with maximum<br /><span style="font-size: 11pt; color: #000000; font-style: normal; font-variant: normal;">transmission distance. These configurations are transmitted and<br /><span style="font-size: 11pt; color: #000000; font-style: normal; font-variant: normal;">measured over different distances. The optical link composed of<br /><span style="font-size: 11pt; color: #000000; font-style: normal; font-variant: normal;">dispersion compensated fiber (DCF) and single mode fiber (SMF)<br /><span style="font-size: 11pt; color: #000000; font-style: normal; font-variant: normal;">to limit the chromatic dispersion. The performance of the proposed<br /><span style="font-size: 11pt; color: #000000; font-style: normal; font-variant: normal;">hybrid optical amplifier as preamplifier and as in-line amplifier were<br /><span style="font-size: 11pt; color: #000000; font-style: normal; font-variant: normal;">evaluated by bit error rate (BER), output power, gain and quality<br /><span style="font-size: 11pt; color: #000000; font-style: normal; font-variant: normal;">factor (QF). Moreover, it calculate the number of spans and the<br /><span style="font-size: 11pt; color: #000000; font-style: normal; font-variant: normal;">length of each span which give maximum transmission distance for<br /><span style="font-size: 11pt; color: #000000; font-style: normal; font-variant: normal;">Raman-EDFA hybrid amplifier using the two positions as in-line<br /><span style="font-size: 11pt; color: #000000; font-style: normal; font-variant: normal;">amplifier along the fiber and as preamplifier at the end of the fiber.<br /><span style="font-size: 11pt; color: #000000; font-style: normal; font-variant: normal;">It is found that Raman-EDFA hybrid amplifier as preamplifier<br /><span style="font-size: 11pt; color: #000000; font-style: normal; font-variant: normal;">performed better than in-line optical amplifier.</span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span><br style="font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: -webkit-auto; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px;" /></span>
https://mjeer.journals.ekb.eg/article_64093.html
https://mjeer.journals.ekb.eg/article_64093_d41d8cd98f00b204e9800998ecf8427e.pdf
Menoufia University, Faculty of Electronic Engineering
Menoufia Journal of Electronic Engineering Research
1687-1189
2682-3535
25
2
2016
07
01
Performance Analysis of Self-Healing Cluster Controlled Mobility Scheme for Data Security in UWSNs based on Proactive and Reactive Peers
168
178
EN
Amir S.
Elsafrawey
Dept. of Electronics and Electrical Communications, Faculty of Electronic Engineering,
Menoufia University, Menouf 32952, Egypt.
Emad S.
Hassan
Dept. of Electronics and Electrical Communications, Faculty of Electronic Engineering,
Menoufia University, Menouf 32952, Egypt.
Moawad I.
Dessouky
Dept. of Electronics and Electrical Communications, Faculty of Electronic Engineering,
Menoufia University, Menouf 32952, Egypt.
10.21608/mjeer.2016.64094
<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;">This paper proposes a Self-Healing Cluster Controlled Mobility<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> scheme based on hybrid cooperation between both Proactive<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> and Reactive peers at both network and cluster levels to<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> guarantee the security in Unattended Wireless Sensor<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> Networks. The proposed scheme depends on controlled mobility<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> of sick and healed sensors inside a cluster of sick sensors to<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> increase the chance of finding health peers and as a result it<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> enhances both data security and self-healing probability inside<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> the network. The analytical analysis of Self-Healing Cluster<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> Controlled Mobility scheme using both two types of peers<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> ensures a better performance with respect to the backward<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> secrecy faster and better than the use of proactive peers alone.<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> A set of analytical results are carried out to demonstrate the<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> effectiveness of the proposed scheme in the attendance of an<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> Adversary. The obtained results show that the proposed<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> scheme achieves a probability of BSe to be compromised of<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> 0.004 compared with 0.065 for CHSHRD scheme.<br style="font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: -webkit-auto; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px;" /></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span>
https://mjeer.journals.ekb.eg/article_64094.html
https://mjeer.journals.ekb.eg/article_64094_d41d8cd98f00b204e9800998ecf8427e.pdf
Menoufia University, Faculty of Electronic Engineering
Menoufia Journal of Electronic Engineering Research
1687-1189
2682-3535
25
2
2016
07
01
Compression of ECG Signal Based on Improving the Signal Sparsity Adopting QRS-Complex Estimation and Spatial Domain Transforms
179
190
EN
Mohammed
Abo-Zahhad
Electrical and Electronics Eng. Dept., Faculty of Eng., Assiut University, Egypt.
Aziza
Hussein
Computer and Systems Dept., Faculty of Engineering, Minia University, Egypt.
Abdelfatah
Mohamed
Electrical and Electronics Eng. Dept., Faculty of Eng., Assiut University, Egypt.
10.21608/mjeer.2016.64095
<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;">In this paper, an ECG signal compression technique based on<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> improving the signal sparsity adopting QRS-complex estimation<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> and spatial domain transforms is proposed. Compressive<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> Sensing (CS) framework is utilized for this purpose; where the<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> difference between the rate of change of a signal and the rate of<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> change of its information contents is utilized. The proposed<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> method starts with estimating the QRS-complex through the<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> detection of the maximum amplitudes and the start and end<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> points of the signal components. The error signal calculated as<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> the difference between the estimated QRS-complex samples<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> and original ECG samples is transformed using either DWT,<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> DCT or FFT. QRS-complex estimation results in sparser timedomain error signal and the sparsity is increased by adopting<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> the spatial-domain transforms. The proposed technique is<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> assessed by calculating PRD and CR. Numerical results<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> indicate that DWT gives a higher CR and lower PRD. The effect<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> of increasing the signal sparsity, signal length, wavelet filters<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> and wavelet decomposition levels have been studied.<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> Comparison with recently published results [1] adopted only<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> QRS-estimation and DWT indicate that the utilization of CS with<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> both QRS-estimation and DWT yields to improved acceptable<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> retrieved signal quality and higher CR. Moreover, comparison<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> with other four CS-based algorithms [2]-[5] and other traditional<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> ECG compression algorithm [6] indicates the superior<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> performance of the proposed algorithm.<br style="font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: -webkit-auto; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px;" /></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span>.<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"><span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"><span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"><span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"><span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"><span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"><span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"><span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"><span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"><span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"><span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"><span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"><span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"><span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"><span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"><span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"><span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"><span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"><span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"><span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"><span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"><span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"><span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"><span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"><br style="font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: -webkit-auto; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px;" /></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span>
https://mjeer.journals.ekb.eg/article_64095.html
https://mjeer.journals.ekb.eg/article_64095_d41d8cd98f00b204e9800998ecf8427e.pdf
Menoufia University, Faculty of Electronic Engineering
Menoufia Journal of Electronic Engineering Research
1687-1189
2682-3535
25
2
2016
07
01
Enhanced Audio Cryptosystem Using Multiple Secret Keys and Permutations in Time and Transform Domains
191
212
EN
Mahmoud
Farouk
Dept. of Computer Science and Eng., Faculty of Elect., Eng., Menoufia University
Osama S.
Faragallah
Dept. of Computer Science and Eng., Faculty of Elect., Eng., Menoufia University
2
Dept. of Information Technology, College of Computers and Information Dept. of Computer Science and Eng., Faculty of Elect., Eng., Menoufia University
2
Dept. of Information Technology, College of Computers and Information
Osama A.
Elshakankiry
Dept. of Computer Science and Eng., Faculty of Elect., Eng., Menoufia University
2
Dept. of Information Technology, College of Computers and Information
Technology, Taif University, Al-Hawiya 21974, Kingdom of Saudi Arabia.
Ahmed
Elmhalaway
Dept. of Computer Science and Eng., Faculty of Elect., Eng., Menoufia University
Hala S.
El-sayed
Dept. of Electrical Engineering, Faculty of Engineering, Menoufia University.
10.21608/mjeer.2016.64096
<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;">This paper presents an enhanced audio speech cryptosystem<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> based on three enhancements for permutation and substitution<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> of speech segments using multiple secret keys and<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> permutations in time and transform domains. The first<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> enhancement method is based on repeating the first and last<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> permutation steps in both encryption/decryption procedures for<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> several times to enhance the security level. The second and<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> third enhancement methods are based on adding two additional<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> secret keys generated from the original key besides the utilized<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> three keys. This adds another security layer for the modified<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> developed audio cryptosystem. Simulation experiments<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> demonstrated that these modifications enhance the security<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> level and quality for the audio cryptosystem compared with a<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> recent audio cryptosystem.<br style="font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: -webkit-auto; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px;" /></span></span></span></span></span></span></span></span></span></span></span></span></span></span>
https://mjeer.journals.ekb.eg/article_64096.html
https://mjeer.journals.ekb.eg/article_64096_d41d8cd98f00b204e9800998ecf8427e.pdf
Menoufia University, Faculty of Electronic Engineering
Menoufia Journal of Electronic Engineering Research
1687-1189
2682-3535
25
2
2016
07
01
An Efficient Approach for Simple Iris Localization and Normalization Technique
213
226
EN
Ramadan
Gad
0000-0002-9042-4899
Dept. of Computer Science and Eng., Faculty of Elect., Engineering, Menoufia
University, Egypt.
ramadangad@el-eng.menofia.edu.eg
Ayman
EL-Sayed
Dept. of Computer Science and Eng., Faculty of Elect., Engineering, Menoufia
University, Egypt.
M.
Zorkany
Dept. of Electronic and Communication Engineering, National Telecommunication
Institute, Egypt.
Nawal
EL-Fishawy
Dept. of Computer Science and Eng., Faculty of Elect., Engineering, Menoufia
University, Egypt.
10.21608/mjeer.2016.64100
<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;">Iris segmentation is a critical step in iris recognition system.<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> Some challenges to segment iris such as occlusion by eyelids,<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> eyelashes, and corneal and specular reflection. Traditional<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> techniques to remove these artifacts were more complex,<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> computationally exhaustive, time consuming, sensitive to noise,<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> and large memory occupation. In this paper, a novel approach is<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> proposed to isolate the iris free of artifacts without changing its<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> structure. In this method, the segmentation, normalization, and<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> unwrapping steps are merged into one step. A series of<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> morphological operations to remove reflections are<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> implemented. Pupil is detected by using threshold technique.<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> This method gives better results in factors of image quality,<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> accuracy, and less memory occupation in general purpose<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> processor. As a result, this proposed technique is suitable for<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> hardware and real-time applications as it is fast, more accurate,<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> no deformation of iris structure, and less complex.<br style="font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: -webkit-auto; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px;" /></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span>
https://mjeer.journals.ekb.eg/article_64100.html
https://mjeer.journals.ekb.eg/article_64100_d41d8cd98f00b204e9800998ecf8427e.pdf
Menoufia University, Faculty of Electronic Engineering
Menoufia Journal of Electronic Engineering Research
1687-1189
2682-3535
25
2
2016
07
01
Validating Ranking in Web Documents Using Normalized Social Media Information
227
246
EN
Ahmed Samy Abd El Aziz
Moursi
0000-0003-0486-0465
Computer Science and Engineering Department, Faculty of Electronic Engineering in Menouf, Menoufia University
ahmed.samy@el-eng.menofia.edu.eg
Nawal A.
El-Fishawy
Dept. of Computer Eng., Arab Academy for Science and Technology & Maritime
Transport, Egypt.
Sherin M.
Youssef
Dept. of Computer Eng., Arab Academy for Science and Technology & Maritime
Transport, Egypt.
10.21608/mjeer.2016.64105
<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;">Social Information Retrieval (SIR) is a relatively new domain<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> which uses social information to enhance information retrieval<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> processes. To find more interesting search results, social<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> behavior can indicate how much these results are interesting.<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> Social interaction over Web 2.0 are used here to enhance<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> ranking of web results in response to a query. A dataset from<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> Open Directory Project (ODP) is used here to show the<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> improvement of ranking. We propose the usage of normalization<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> and social services weights to give better performance. The<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> proposed framework gets data from various types of social info<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> (social bookmarking, social news, social network, discovery<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> engines). Data is parsed into fields and significant values are<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> used in the ranking process. Precision and Mean Average<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> Precision (MAP) are used to evaluate results. Simulation results<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> show better ranking with the proposed model.<br style="font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: -webkit-auto; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px;" /></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span>
https://mjeer.journals.ekb.eg/article_64105.html
https://mjeer.journals.ekb.eg/article_64105_d41d8cd98f00b204e9800998ecf8427e.pdf
Menoufia University, Faculty of Electronic Engineering
Menoufia Journal of Electronic Engineering Research
1687-1189
2682-3535
25
2
2016
07
01
A new Traffic Congestion Detection Algorithm using Vehicle-to-Vehicle Communications
227
246
EN
Heba
EL-SERSY
Dept. of Computer Science and Eng., Faculty of Elect., Eng., Menoufia University
Ayman
EL-SAYED
0000-0002-4437-259X
Dept. of Computer Science and Eng., Faculty of Elect., Eng., Menoufia University
ayman.elsayed@el-eng.menofia.edu.eg
10.21608/mjeer.2016.64109
<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;">Traffic Congestion in Egypt roads is the same problem facing<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> many cities around the world where traffic congestion has a<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> great challenge both on traffic safety and environment<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> population. The solutions that already exist are based on<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> infrastructure equipments used to detect traffic congestion and<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> try to solve this problem such as electronic traffic lights and<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> smart cameras. All the infrastructure systems have the<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> limitations of high deployment costs and limited coverage. This<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> paper aims to the development of traffic congestion detection<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> system by proposing a new vehicle-to-vehicle (V2V) congestion<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> detection algorithm. The new algorithm based only on vehicles<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> without any need for additional infrastructure. The proposed<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> algorithm called TCD where each vehicle collects traffic<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> information in the road and exchanges it with other vehicles.<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> According to the information saved by each vehicle, the vehicle<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> analyzes this information and determines the congestion<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> occurrence. When congestion occurs vehicles send warning<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> messages to other vehicles so they can avoid congestion area<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> and change their route. The new algorithm namely (TCD) from<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> simulation results provide more awareness about traffic<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> congestion with less messages exchanged.<br style="font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: -webkit-auto; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px;" /></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span>
https://mjeer.journals.ekb.eg/article_64109.html
https://mjeer.journals.ekb.eg/article_64109_d41d8cd98f00b204e9800998ecf8427e.pdf
Menoufia University, Faculty of Electronic Engineering
Menoufia Journal of Electronic Engineering Research
1687-1189
2682-3535
25
2
2016
07
01
New Hybrid Algorithm for Human Cancer Diseases Classification
267
282
EN
Hanaa
Salem
Communications & Computer Dept., Faculty of Engineering, Delta University, Egypt
Gamal
Attiya
0000-0002-4771-9165
Dept. of Computer Science and Eng., Faculty of Elect., Eng., Menoufia University
gamal.attiya@yahoo.com
Nawal
El-Fishawy
Dept. of Computer Science and Eng., Faculty of Elect., Eng., Menoufia University
nelfishawy@hotmail.com
10.21608/mjeer.2016.64116
"> <span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;">Cancer disease, in any of its forms, represents a major cause of<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> death worldwide. Hence, detecting the cancer disease earlier<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> and classifying the different tumor types is of the greatest<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> importance. Early diagnosis of various tumor types gives better<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> treatment and minimization of toxicity on patients. Accordingly,<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> creating methodologies that able to differentiate efficiently<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> between cancer subtypes is essential. This paper presents a new<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> hybrid methodology to classify Human cancer diseases based on<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> the gene expression profiles. The proposed methodology<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> combines both Information gain (IG) and Deep Genetic Algorithm<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> (DGA). It first uses IG for feature selection, then uses Genetic<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> Algorithm (GA) for feature reduction and finally uses Genetic<br /><span style="font-family: Arial; font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;">Programming (GP) for cancer types’ classification. The proposed<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> methodology is evaluated by classifying cancer diseases in<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> seven cancer datasets and the results are compared with that<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> obtained by the most recent approaches.</span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span>
https://mjeer.journals.ekb.eg/article_64116.html
https://mjeer.journals.ekb.eg/article_64116_d41d8cd98f00b204e9800998ecf8427e.pdf
Menoufia University, Faculty of Electronic Engineering
Menoufia Journal of Electronic Engineering Research
1687-1189
2682-3535
25
2
2016
07
01
Self-adaptive Intelligent Algorithms for Regulating Elastic Coupled Multi-motor System Exposed to Variable Loading
283
304
EN
Essam A.
El-Araby
Menoufia University, Faculty of Electronic Engineering, Egypt
Mohammad A.
El-Bardini
Menoufia University, Faculty of Electronic Engineering, Egypt
Nabila M.
El-Rabaie
Menoufia University, Faculty of Electronic Engineering, Egypt
10.21608/mjeer.2016.64120
<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;">This paper deals with a well-known type of MIMO electromechanical systems used in industry, which is the multi-motor<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> elastic coupled system (ECMMS). This system is characterized<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> by its complexity, nonlinearity, oscillatory behavior and<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> associated mechanical vibration. The oscillatory behavior of this<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> system is coming from the multiple elastic coupling which<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> causes tortional oscillations and in some cases, tortional<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> resonance which leads to various damages in the system. In<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> literature, classic multi-loop control scheme has been applied to<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> this type of systems. In this paper, a decentralized structure of<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> control system is proposed for controlling the ECMMS. The core<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> controllers of the proposed decentralized control system are<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> self-adaptive local controllers. Two different adaptive algorithms<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> are adopted practically and given comparable results. The main<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> target of the proposed algorithms is to attenuate the effect of<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> mechanical oscillations resulted in the ECMMS effectively. An<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> experimental prototype of ECMMS is used to provide related<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> experimental data. Moreover, stability analysis and convergence<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> criterion based on Lyapunov stability theory is presented in the<span style="font-size: 12pt; color: #000000; font-style: normal; font-variant: normal;"> paper.<br style="font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: -webkit-auto; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px;" /></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span></span>
https://mjeer.journals.ekb.eg/article_64120.html
https://mjeer.journals.ekb.eg/article_64120_d41d8cd98f00b204e9800998ecf8427e.pdf