+ All Categories
Home > Documents > Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong...

Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong...

Date post: 01-May-2018
Category:
Upload: phamkhuong
View: 219 times
Download: 2 times
Share this document with a friend
141
THE 27 th NATIONAL RADIO SCIENCE CONFERENCE (NRSC’ 2010) March 16-18, 2010 Under The Auspices of Organized by The Academy of Scientific Research and Technology The National Radio Science Committee & Prof. Mohammed A. Ezz- Elarab President of Prof. Mohammed T. Hussin President of the Academy of Scientific Research &
Transcript
Page 1: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

THE 27th NATIONAL RADIO SCIENCE CONFERENCE

(NRSC’ 2010)

March 16-18, 2010

Under The Auspices of

Organized by

The Academy of Scientific Research and Technology

The National Radio Science Committee&

The Faculty of Electronic Engineering, Menoufiya University, Egypt.

Prof. Mohammed A. Ezz-Elarab President of

the Menoufiya University

Prof. Mohammed T. HussinPresident of the Academy of

Scientific Research & Technology

Page 2: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

HONORARY CHAIRMAN

CONFERENCE CHAIRMANProf. Ibrahim Salem

Chairman of the Egyptian NRSC Committee.

CONFERENCE CO-CHAIRMANProf. Atef Elsayed Abou-Elazm

Dean of the Faculty of Electronic Engineering,Menoufiya University, Egypt.

CONFERENCE VICE-CHAIRMANProf. El-Sayed El-Rabaie

Vice-Dean for Graduate Studies and Research,Faculty of Electronic Engineering, Menoufiya University, Egypt.

GENERAL SECRETARYProf. Said E. El-Khamy

2

Prof. Mohammed A. Ezz-Elarab President of

the Menoufiya University

Page 3: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

Faculty of Engineering, Alex. University, Alexandria, Egypt.

Sponsors

The Academy of Scientific Research and Technology.

The National Radio Science Committee

NRSC

The Faculty of Electronic Engineering, Menoufiya University, Egypt.

The IEEE Egypt Section

3

Page 4: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

Electronic Devices Society

Committees

Steering Committee(members of the NRSC)

Prof. Abd El-Hady A. AmmarProf. Abd El-Wahab F. HassanProf. Ahmed K. Abou-ElsoudProf. Ahmed M. El-SherbiniProf. Elhelaly M. A. EidProf. El-Sayed M. SaadProf. Esmat A. AbdallahProf. Hadia M. S. El-HennawyProf. Hamdi A. ElmikatiProf. Hamdi A. EmaraProf. Hassan A. El-KamchouchiProf. Ibrahim A. Salem

Prof. Kamal H. AwadallaProf. Mamdouh F. FahmyProf. Mohamed A. Aboul-DahabProf. Mohamed E. Abdel-AzizProf. Mohamed E. Nasr Prof. Mohamed H. El-FoulyProf. Mohamed K. El-SaidProf. Mohamed M. MokhtarProf. Mosalem A. ShaltoutProf. Said E. El-Khamy

4

Page 5: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

Prof. Salwa H. A. El-Ramly

Local CommitteeProf. Atef Elsayed Abou-ElazmProf. El-Sayed M. El-RabaieProf. Said M. El-HalafawyProf. Kamal H. AwadallaProf. Taha Elsayed TahaProf. Mohammed A. F. HelalProf. Moawad I. MoawadProf. Nawal A. El-FishawyDr. Ahmed ShoumanDr. Hamdy SharsharDr. Wageh M. SewelamDr. Gamal Mahrous Attiya Dr. Fathy E. Abdel samieDr. Yasser ElbagouryDr. Alaa Eldeen M. AbbasMrs. Rawya A. Abdel GawadMr. Abd-El-Naby Youssef

5

Page 6: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

Miss. Ola El-TawabMr. Hamdy R. AhmedMr. Hassan E. A. SharsharMr. Hisham G. Abo TablMr. Abdel Mohaymen GhanemMr. Mohammed A. Silem

The NRSC 2010 Program

Tuesday, March 16, 201009:00 – 10:00

Registration

10:00 – 11:00

Opening Ceremony (Lect. 4)

11:00 – 12:00

Invited Paper I (Prof. Atef El-Sherbiny)

12:00 – 12:30

Coffee Break

12:30 – 15:00

Session 1BElectromagnetics

Session 1C Optoelectronics

Session 1DDevices &

Cir.

Session 1KBioinformatics

15:00 – 16:00

Lunch

Wednesday, March 17, 201009:00 – 10:30

Session 2CWireless

Communication

Session 2DDevices & Circuits

Session 2KMedical Imaging

10:30 – 11:00

Coffee Break

11:00 – Invited Paper II (Prof. A. Sebak)

6

Page 7: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

12:0012:00 – 12:30

Coffee Break

12:30 – 14:00

Session 3CSignal Processing

Session 3D Optoelectronics

Session 3KMedical Signal Processing

14:00 – 15:00

Lunch

Thursday, March 18, 201009:00 – 10:30

Session 4CImage Processing

Session 5CInformation Security

Session 6CCoding Systems

10:30 – 11:00

Coffee Break

11:00 – 12:00

Invited Paper III (Prof. Suling Zhao)

12:00 – 12:30

Coffee Break

12:30 – 13:30

Poster Session

13:30 – 14:30

Closing Session

14:30 – 15:30

Lunch

Invited Papers

Tuesday, March 16, 2010

Invited Paper I(Room)Lect. 4 Chairperson: Prof. Said Elkhamy 11.00:12.00

INV1 : “Reflectarray Antennas: Recent Developments and Challenges” Atef Elsherbeni & OthersCenter of Applied Electromagnetic Systems Research (CAESR), Department of

7

Page 8: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

Electrical Engineering The University of Mississippi, University, MS 38677

Wednesday, March 17, 2010

Invited Paper II(Room)Lect. 4 Chairperson: Prof. Atef Abo El_Azm 11.00:12.00

INV2 : “Ultra Wideband (UWB) Antennas: Analysis, Design and Applications” Abdelrazik Sebak & OthersConcordia University, Canada

Thursday, March 18, 2010

Invited Paper III(Room)Lect. 4 Chairperson: Prof. Ibrahim Salem 11.00:12.00

INV3 : “The Electroluminescence of Organic Light Emitting Diodes (OLED) controlled by Oranic Thin Film Transistors (OTFTs)" Suling Zhao, Zheng Xu, Yongsheng Wang, and Xurong XuKey Laboratory of Luminescence and Optical Information (Beijing Jiaotong University), Ministry of Education Beijing 100044 China.

8

Page 9: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

SessionsTuesday 16th March 2010

Session 1B: ElectromagneticsLecture Theatre

3

Session Chairs: Prof. Hamdi Elmikati Prof. Mohamed Aboul-Dahab Prof. Saber Zaiudeen

March 16, 201012.30:15.00

9

Page 10: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

B1: “Steering Vector Transformation Technique for the Design of Wideband Beamformer”

M.E. Shaban and S.E. Kishk

B2: “Design of Reflectionless Multilayer Dielectric Structures for Electromagnetics”Fatma S. Saeed, Mahmoud G. T. Elkholy, and Adel A. Saleeb

B3: “Path Loss Bounds for WiMAX: Concept and Analysis” Mohamed Ali Aboul- Dahab and Hossam Mohamed Kamel

B4: “A Compact Ultrawideband Overlapped Printed Monopole Antenna” S.H. Zainud-Deen, Rami A. Al-Essa and S.M.M. Ibrahem

B5: “Multiple Constraint space time adaptive processing (STAP) using real elements based on direct data domain least squares (D3LS)approach”

Hassan M. ElKamchouchi, A.E.Mohamed and Wael A. E. Ali

B6: “Stub-Free Improved performance compact Low-pass filter”Adel Abdel-Rahman

B7: “Capacitor-Loaded ground-Plane slot resonator with high quality factor”Adel Abdel-Rahman and A. Omar

B8: " A New Synthetic Aperture Radar in Which the Platform is Moving in a Curved Path",

Hassan M. Elkamchouchi and Noha Abd El Aziz

B9: "Different Techniques for Widening the Bandwidth of Stacked Microstrip Patch Antennas"

A. S. Elkorany, A. A. Sharshar, and S. M. Elhalafawy.

Session 1C: Wireless CommunicationsLecture Theatre

4

Session Chairs: Prof. Salwa El-RamlyProf. Saeid ElnoubyProf. Adel Salieb

March 16, 2010 12.30:15.00

10

Page 11: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

C1: “Cooperative Space-Time/Frequency Coding for Uplink Single-Carrier FDMA Systems”

A. Y. Al-nahari , F. A. Abd El-Samie, and M. I. Dessouky

C2: “Low-Complexity Equalization Scheme for MIMO Uplink SC-FDMA Systems”F. S. Al-kamali, M. I. Dessouky, B. M. Sallam, F. Shawki and F. E. Abd El-Samie

C3: “Proposed Scheme for Reducing PAPR in STBC MIMO OFDM in the Presence of Nonlinear Power Amplifier ”

Mona Shokair and Hefzalla Sakran C4: “Peak to Average Power Ratio Reduction in Single Carrier Frequency

Divison Multible Access Systems”Mohamed Salah Gamal Abdel-Fadeel, Zaki B. Nossair

C5: “Enhanced Performance of Handover in 3G Mobile Networks”Saied M. Abd El-atty

Session 1D: Devices and CircuitsLecture Theatre

5

Session Chairs: Prof. Hadia El-HennawyProf. Esmat Abdallah Prof. Mohamed Ibrahim

March 16, 201012.30:15.00

D1: “Design and Characterization of an mm-Wave Low Noise Amplifier in 4G Broadband Packet Radio Access Systems”

M. Al-Azab D2: “Comparative Study of Different Small Signal Modelling for FET Devices”

R. R. Elsharkawy, S. El-Rabie, M. Hindy, M. I. Dessouky D3: “Voltage-Mode Cass-D 2.4-GHz 130-nm CMOS RF Power Amplifier for Mobile

Communication Systems”Hafez Fouad, Abdel-halim

Session 1k: BioinformaticsLecture Theatre

Session Chairs Prof. Mohamed Abdel-Aziz March 16, 2010

11

Page 12: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

6 Prof. Fatma Abo-Shady Prof. Taha Elsayed 12.30:15.00

k1 : “Genomic Sequences Differential Compression Model”H. Afify, M. Islam, M. Abdel Wahed, and Y. M. Kadah

k2 :“Performance Comparison of the Structure Learning Bayesian Network Algorithms Using Gene Expression Data”

Fadhl M. Al-Akwaa1, Nahed H. Solouma, and Yasser M. Kadah

k3 :“A New Software to Construct Gene Regulatory Networks From Microarrays Data” Fadhl M. Al-Akwaa1, Nahed H. Solouma, and Yasser M. Kadah.

k4: “The Influence of Pre-processing and Gene Rank Aggregation on Microarray Data Analysis”

Vidan Fathi Ghoniem, Nahed H. Souluma, and Yasser M. Kadah

K5: “Identifying Candidate Informative Genes for Biomarker Prediction of Liver Cancer”Nagwan M. Abdel Samee, Nahed H. Solouma, Mahmoud Elhefnawy, Abdalla S.

Ahmed and Yasser M. Kadah

K6: “Estimation of The Correlation Between Protein Sub-Function Categories Based on Overlapping Proteins”

Khaled S. Ahmed, Nahed H. Solouma, and Yasser M. Kadah

12

Page 13: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

SessionsWednesday 17th March 2010

13

Page 14: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

Session 2C: Wireless CommunicationsLecture Theatre

4

Session Chairs: Prof. El-Sayed A. ElbadawyProf. Mohammad Nasr Prof. Sami El-Dalil

March 17, 201009.00:10.30

C6: “Peak-to-Average Power Ratio Reduction for OFDM Signals with Unequal Power Distribution Strategy and the Selective Mapping Technique”

Emad S. Hassan, Said E. El-Khamy, Moawad I. Dessouky, Sami A. El-Dolil, and Fathi E. Abd El-Samie

C7: “Fine Timing Estimation for IEEE 802.16e Downlink Based on Frequency Domain Processing”

Ahmed M. Hamza, Essam A. Sourour, and Said E. El-Khamy, C8: “Trade-Off Between Complexity and BER Performance of a Polynomial SVD-

Based Broadband MIMO Transceiver”Waleed Al-Hanafy and Stephan Weiss

C9: “Greedy Power Allocation for Multicarrier Systems with Reduced Complexity” Waleed Al-Hanafy and Stephan Weiss

C10: “Energy-Efficient Routing in Variable-Power Wireless Sensor Networks”Ahmed Ibrahim Hassan, Maha Elsabrouty, and Salwa El-Ramly

C11: “Modeling os 3GPP Voice Call Continuity Handoff”H. S. Kamel A. Zekry

Session 2D: Devices and CircuitsLecture Theatre

5

Session Chairs: Prof. Ibrahim El-DokanyProf. Adel El-HennawyProf. Kamel Hassan

March 17, 201009.00:10.30

D4: “An Enhanced Vision System for Sorting Ceramic Plates Based on Hybrid Algorithm and USB Interfacing Circuitry”

Farid A. Tolbah, Ahmed M. Aly and Waleed A. El-Badry D5: “A VHDL-AMS Model of a Controlled Chua Circuit ”

R. M Rizk , A. A. A. Nasser , and E. A. Bakr

14

Page 15: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

D6: “Error Sensitivity in the FFT Inversion Method for two Layer Model” Essam A. Hashish

Session 2k: Medical Imaging Lecture Theatre

6

Session Chairs:Prof. Mohamed El-Fouly Prof. Waleed FakhrProf. Abd Elaziz Ibrahim

March 17, 201009.00:10.30

 K7 : “Application of Rough Set Approach for Skin Lesions Segmentation”N. A. Masood, H. M. Mashali, and Abdalla S. A. Mohamed

k 8: “New Contrast Material To Enhance MRI Image of Brain”Yasser Mostafa Kadah , Samir M.Badawi, Wael Abou EL-wafa Ahmed and Hatem Sallam

k 9: “Robust Three-Dimensional Model for Dentate Mandible with Temporomandibular Joint Based on Actual Computed Tomography Data”Tamer M. Nassef, Nahed H. Solouma, Mona K. Marie, Mohamed Elkhodary, Abdullah S. Ahmed and Yasser M. Kadah

k10: “Signal Processing Methodologies for Digital Beamforming and Image Reconstruction in Ultrasound Imaging”Mawia A. Hassan, Ahmed S. Mohamed, Abo-Bakr M.Youssef, and Yasser M. Kadah

k11: “A New Genomic Signal Processing Method for Identifying Protein-Coding Regions in a DNA Sequence”Ashraf M. Aziz

15

Page 16: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

Session 3C: Signal ProcessingLecture Theatre

4

Session Chairs: Prof. El-Sayed M. SaadProf. Magdy FekryProf. Nagi Messieha

March 17, 201012.30:14.00

C12: “Using Radiotracer in Industrial Applications”H. Kasban , O. Zahran , H. Arafa , M. El-Kordy , S. M. Elaraby and F. Abd El-Samie

C13: “Optimum Fractional Fourier Filtering For Monopulse Processors Distortion” Sherif A Elgamel and John Soraghan

C14: “Noise Estimation for LDPC Decoding on Power Lines”Seif Shebl, Nawal El-Fishawy, Atef Abou Elazm, and Fathi Abd El-Samie

C15: “Wavelet-Based Mel-Frequency Cepstral Coefficients for Speaker Identication using Hidden Markov Models”Mohamed L. A. AbdAlla and Hanaa S. Ali

C16: “Automated Classification of Galaxies using Empirical Mode Decomposition”Mohamed Maher, M.A. Mohamed, and A.I. Abdel Fattah

C17: “An Effective K-Anonymity Clustering Method for Minimize Data Privacy Preservation Effectiveness in Data Mining Results”Mohammed A. El-Rashedy, Hoda S. Sroor, Nabil M. A. Ayad and Taha E. Taha

Session 3D: OptoelectronicsLecture Theatre

5

Session Chairs: Prof. Ahmed Khairy Abo-ElsoudProf. Diaa-Eldeen KhaleilProf. Mohamed El-Kordy

March 17, 201012.30:14.00

D7: “Optimum Conditions for a High Bit Rate RZ Soliton Train in EDFA with Nonadiabatic Amplification” Mohamed F. Hassan, Hossam Zwiel, Moustafa H. Aly, and Ahmed E.El-Samahy

16

Page 17: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

D8: “Unequal Load Balance Routing For OBS Networks Based On Optical Parameters Dependent Metric”

Mohamed M. Ali, Wael Hosny, El-Sayed A. El-Badawy and Moustafa H. Aly D9: “Backward Pumped Distributed Fiber Raman Amplifiers”

Nihal M. Anwar and Moustafa H. Aly

D10: “Modeling of Semiconductor Nanocrystal Quantum Dot Based Microcavity Light Emitting Diod”

Ahmed E. Morra , Wageh S. and Atef Abou El-Azm

Session 3k: Medical Signal ProcessingLecture Theatre

6

Session Chairs:Prof. Mazhar Tayel Prof. Mohamed El_AdawyProf. Ali Hassan Mostafa

March 17, 201012.30:14.00

K12 : “Human Identification Using ECG Signal”Mohamed M. Tawfik, Hany Selim and Tarek Kamal

k13:“A Novel Method for ECG Signal Discrimination of Cardiac Arrhythmias Based on Pade’s Approximation Technique”

Moustafa A. Bani-Hasan, Yaser M. Kadah, Mohamed E. M. Rasmy, and Fatma M.El-Hefnawi.

k14: “Implanting an Ultra-Wide Band Sensor in the Human Body”Mohamed A. A. El-Dosoky, and A. S Omar.

K15: “A Cheap Proposed Method for Measuring the Glucose Concentration in the Blood”

Mohamed A. A. Eldosoky.K16: " The Coding System of the Finger Movements Detected by the Ultra-Wide Band

Radar"Mohamed A. A. El-Dosoky

17

Page 18: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

SessionsThursday 18th March 2010

18

Page 19: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

Session 4C: Image ProcessingLecture Theatre

4

Session Chairs: Prof. Mamdouh Fahmy Prof. Tadros HaliemProf. Meawwad I. Desouky

March 18, 201009.00:10.30

C18: “Neural Modeling of Maximum Entropy Image Interpolation”Eman A. soltan, Sayed El-Rabaie, Nawal. A. El-Fishawy , Said E. Elkhamy, and F. E. Abd El-samie

C19: “A Novel Image Recovery Against Lost Descriptions in Mesh Networks”Hussein H. Maza’ar, and Hesham N. Elmahdy

C20: “Super-resolution with Adaptive Directional Total Variation Regularization for Document Images” Osama A. Omer.

C21: “Homomorphic Image Watermarking With A Singular Value Decompossition Algorithm”Hanaa A. Abdallah, Mohiy M. Hadhoud Abdalhameed A. Shaalan and Fathi E. Abd El-Samie

C22: “A New Image Watermarking Technique Using Histogram Tailored Chaotic Maps”, S.E El-Khamy , M.R. M. Rizk and A. E. Youssef

Session 5C: Information SecurityLecture Theatre

5

Session Chairs: Prof. Abd-Elhady AmmarProf. Hossam Eldin HussainٍProf. Nawal El-Fishawy

March 18, 201009.00:10.30

C23: “A Flexible Symmetric-Key Block Cipher Algorithm”, Ibrahim F. Elashry, Osama S. Farag Allah, Alaa M. Abbas, S. El-Rabie, and Fathi E. Abd El-Samie

C24: “Fast and Flexible Symmetrical Encryption Algorithm Based on Key-Updating”A. Kisk, N. W. Meseha, N. M. Ayad, N. A. Elfishawy, and Fathi E. Abd El-Samie

19

Page 20: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

C25: “Generation of Strong Cryptographic Key Using Wavelete- Based Irs Codes” Hassan Elkamchouchi, Waffa Shouaib and Yasmine Abouelseoud

C26: “New Symmetric Cipher Enhanced by the Universal GPS Unique Data (SEU_GPS)” Hassan M. ElKamchouchi and Fatma Ahmed

Session 6C: Coding SystemsLecture Theatre

6

Session Chairs: Prof. Hassan El-KamshouchiProf. Ahmed El-SherbienyProf. Abd-El-Aziem Sobeih

March 18, 201009.00:10.30

C27: “Improving the Performance Of CPC With Delay Diversity Scheme In Mobile WIMAX System”Ahmed Ebian, Mona Shokair and K. H. Awadalla

C28: “Real-Time Audio Signal Transmission Over The ACL Link In Bluetooth Systems”M.A. Mohamed Wl-Bendary, A. A. Abou-El-azm, N. A. El-Fishawy, A. Hagagg, S. Shawki and F. E. Abd El-Samie

C29: “Analysis and Simulation for Alamouti Coded OFDM System Over Time Variant Channel”, Bassant A. M. Ahmed, Mirette M. Sadek, and Salwa H. El Ramly.

C30: “A Cooperative Multi-Rate Algorithm Based on Decode and Forward Transmission and Variable Length Complete Complementary Codes”Said E. El-Khamy, Ahmed K. Aboulseoud, Mohamed A. Mokhtar and Noha O. El-Ganainy

C31:"Proposed Design of DC Low Voltage Acceleration System"M. M. Abdelrahman and S.G. Zachary

Poster PapersLecture Theatre

4

Session Chairs: Prof. Mohammed FokaireenProf. Magdi Kotb

March 18, 201012.30:13.30

P1: “Performance Evaluation of Optical Code Division Multiple Access (OCDMA) Systems with Chaotic Spreading Codes Based on Baker Map”Gamal A. Hussein, Ibrahim M. Eldokany, Abdelnaser A. Mohamed, Osama A. Oraby and Fathi E. Abd EL-Samie.

P2: “DSP implemention aspects for a generic frequency hopped transceiver”

20

Page 21: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

Hossam E. Ahmed, A. A. Zekry Adel Elhennawy Ayman M. HassanP3: "Simulation of Some Advanced Technologies in Wireless Commu-nication

Systems"Mustafa Ahmed Abdel Hady and Mustafa Mohamed Abd Allah Meselhy

21

Page 22: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

22

Page 23: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

Invited Paper I(Room)Lect. 4 Chairperson: Prof. Said Elkhamy March 16, 2010

11.00:12.00

Reflectarray Antennas: Recent Developments and Challenges

Fan Yang, Ang Yu, P. Nayeri, B. Devireddy, T. Elsherbeni, and A. Elsherbeni

Center of Applied Electromagnetic Systems Research (CAESR) Department of Electrical Engineering, the University of Mississippi,

Reflectarray antennas are similar in principal to parabolic reflectors, while the bulky curved surface of the parabolic reflector is replaced with a planar antenna array. Thus, the reflectarray antennas have low-profile, low-mass and low-cost, and they are more suitable for deployment particularly for space applications [1-2]. The concept of the reflectarray was initially introduced using waveguide technology in the 1960’s, but the reflectarray didn’t receive much attention until the development of microstrip reflectarrays in the late 1980’s. A reflectarray antenna consists of a planar reflecting surface and an illuminating feed source. On the reflecting surface, there is an array of printed antenna elements whose reflection phases are individually controlled to produce a planar phase front. The space feeding scheme eliminates the design complexity and energy losses of a feeding network in traditional phased array designs, resulting in a higher efficiency. Therefore, the reflectarray antennas combine the favorable features of conventional parabolic reflectors and phased array antennas, and become an excellent candidate for high gain antenna applications.Based on the support from the National Aeronautics and Space Administration (NASA), United States of America, the authors’ group at The University of Mississippi has been working on the reflectarray antennas and is one of the leading research groups in the world. This paper summarizes our recent developments on

23

Page 24: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

reflectarray antennas, including the analysis and synthesis methods of reflectarrays, wideband and multi-band reflectarray designs, multi-beam reflectarray designs, and THz/optic reflectarray antennas. The paper also discusses several challenging topics in this area, with the hope to stimulate and promote reflectarray research for future applications.

Invited Paper II(Room)Lect. 4 Chairperson: Prof. Atef Abo El_Azm March 17,

201011.00:12.00

Ultra Wideband (UWB) Antennas: Analysis, Design and Applications

Osama Haraz1, Abdallah Alshehri2 and Abdelrazik Sebak3

1 Concordia University, 2 Prince Sultan Advanced Technologies Research Institute, 3 Aramco

Current and future wireless products are evolving towards reduction in physical size together with increasing functionality, operating frequency, and bandwidth. With rapid growth, managing the capacity and quality of the wireless air interface becomes a challenge. This challenge becomes even greater as the users expectations of quality, mobility, and application bandwidth increase as wireless service offerings evolve over time to offer data rates in the hundreds of megabits per second. Ultra-wideband (UWB) radio is emerging as an innovative solution for the increase demand for short-range low cost reduced-power wireless devices with video transfer capability within home and office environments. Applications of UWB devices also include measurement, radar, and imaging systems. The primary objective of this talk is to address the above requirements and present innovative solutions with focus on study, design and implement novel UWB low profile antennas that satisfy UWB technology requirement. There are many challenges that must be overcome. One fundamental challenge is to design UWB antennas that can satisfy the requirements of this technology. Another challenge in designing UWB antenna is attaining the wide impedance bandwidth while maintaining high radiation efficiency. In addition, there is usually a trade-off between the bandwidth and the size of antenna. To meet wireless industry requirements for small size antennas to be used in handheld and RF/Microwave devices, our efforts include miniaturization process that compromises between the size and performance of the antenna. In addition, to avoid potential interference with near wireless local area networks (WLAN), the shape of developed UWB antennas maybe altered by inserting slots on the antenna surface.

24

Page 25: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

This will result in a high band rejection at WLAN frequencies. Several techniques are used for optimal UWB bandwidth performance of the UWB antenna designs in this work. The undertaken work focuses on planar antennas printed on PCBs. Therefore, this research introduces novel designs of microstrip-fed, small, low-profile, printed microstrip UWB antennas using different bandwidth-enhancement techniques to satisfy UWB bandwidth. Simulated and measured results are also presented for planar UWB antenna arrays with bidirectional radiation patterns based on identical UWB antenna elements for UWB communications applications.

Invited Paper III(Room)Lect. 4 Chairperson: Prof. Ibrahim Salem March 18, 2010

11.00:12.00

The Electroluminescence of Organic Light Emitting Diodes (OLED) controlled by Oranic Thin Film Transistors (OTFTs)

Suling Zhao, Zheng Xu*, Yongsheng Wang, Xurong Xu

Key Laboratory of Luminescence and Optical Information (Beijing Jiaotong University), Ministry of Education, Beijing 100044, China

Abstract

In this paper, single organic light emitting diodes (OLED) on ITO glass are prepared. The emission layers are PVK:Eu(TTA)3Dipy and PVK: Gd0.5 Eu0.5(TTA)3Dipy, respectively. The emission of PVK around 400nm and emissions of Eu3+ at 581nm, 594nm and 613nm are observed in the electroluminescence of PVK:Eu(TTA)3Dipy. But only emissions of Eu3+ are detected in the electroluminescence of PVK: Gd0.5 Eu0.5(TTA)3Dipy. OLEDs with the emission layer of PVK: Gd0.5 Eu0.5(TTA)3Dipy on the organic thin film transistors (OTFTs) are prepared. After calculated from the electric and transfer characteristics curves of OTFTs, when VDS=5V, μEF is 0.017cm2/v.s, VTH is -5.4V, and Ion/off is 4.18×103, respectively. The electroluminescence * Corresponding author: [email protected]

25

Page 26: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

brightness of OLEDs is controlled by OTFTs. When the gate voltage of OTFTs is fixed as a constant, the electroluminescence brightness of OLEDs increases firstly and then achieves its saturation along with the increasing of the source-drain voltage VDS. When the source-drain voltage is a constant, the electroluminescence brightness of OLEDs increases along with the increasing of the gate voltage VGS.

26

Page 27: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

B1Lecture Theatre

3

Session Chairs: Prof. Hamdi Elmikati Prof. Mohamed Aboul-Dahab Prof. Saber Zaiudeen

March 16, 201012.30:15.00

Steering Vector Transformation Technique for the Design of Wideband Beamformer

M.E. Shaban1 S.E. Kishk2

1Research Assistant at Mansoura University, Egypt ([email protected])

2Assistant Professor at Mansoura University, Egypt ([email protected])

Abstract

Steering vector transformation technique for wideband antenna array is presented. Wideband direction of arrival (DoA) estimation using this technique is illustrated. In the present work, steering vector transformation is applied to the conventional frequency domain beamformer to enhance the frequency invariance of the mainlobe pattern. Several simulation examples are presented to illustrate the advantage of the proposed frequency domain beamformer over the

27

Page 28: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

conventional one. As the array size increases or the inter element spacing decreases, the proposed beamformer still has a better frequency invariant property of the mainlobe pattern than the conventional beamformer. Finally, using windows, a better frequency invariant property of the mainlobe pattern is obtained by the proposed beamformer than the conventional one.

B2Lecture Theatre

3

Session Chairs: Prof. Hamdi Elmikati Prof. Mohamed Aboul-Dahab Prof. Saber Zaiudeen

March 16, 201012.30:15.00

Design of Reflectionless Multilayer Dielectric Structures for Electromagnetics

Fatma S. Saeed, Mahmoud G. T. Elkholy, and Adel A. Saleeb

Faculty of Electronic Engineering, Menouf, Egypt, [email protected]

Abstract

In many situations it is required to reduce reflection coefficient of electromagnetic waves. A multilayered dielectric structure was designed for this purpose. The structure works within a specified frequency range and gives a specified reduction of reflection coefficient (called attenuation). Collin's method used for the design was presented. Variation of number of layers with bandwidth was

28

Page 29: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

calculated for a fixed value of attenuation. Also ,was calculated the number of layers with attenuation for fixed bandwidth. A multilayered radome to protect reflector antennas was designed. Also a multilayer thin film was designed to reduce reflection of light incident on the surface of solar cells.

B3Lecture Theatre

3

Session Chairs: Prof. Hamdi Elmikati Prof. Mohamed Aboul-Dahab Prof. Saber Zaiudeen

March 16, 201012.30:15.00

Path Loss Bounds for WiMAX: Concept and Analysis

Mohamed Ali Aboul- Dahab1 and Hossam Mohamed Kamel2

1 Arab Academy For Science And Technology, Cairo, Egypt [email protected] National Telecommunication Institute Cairo, Egypt [email protected]

Abstract:

Broadband technology has rapidly become a need for all the population. WiMAX is designed for broadband wireless access (BWA) that operates above 2 GHz. This paper presents a methodology for processing path loss measurement results in an attempt for calculating the bounds for the path loss using Least Square

29

Page 30: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

Approximation. Use has been made of the propagation measurements at 3.5 GHz frequency band for WiMAX systems that have been taken from cells in different places. The proposed methodology with the given analysis can help designers of the network to have clear vision of the losses in such power limited system.

B4Lecture Theatre

3

Session Chairs: Prof. Hamdi Elmikati Prof. Mohamed Aboul-Dahab Prof. Saber Zaiudeen

March 16, 201012.30:15.00

A Compact Ultrawideband Overlapped Printed Monopole Antenna.

S.H. Zainud-Deen, Rami A. Al-Essa and S.M.M. Ibrahem

* Faculty of Engineering, Altahadi University, Sirte-Libya ** Faculty of Engineering, Helwan University, Egypt.

E-mail: [email protected].

Abstract:

Configurations of overlapped rectangular patches printed antennas with a slitted ground plane have been investigated. Two and three overlapped patches are used. The effect of overlapping patches on the impedance bandwidth, input impedance, VSWR, gain and radiation patterns has been studied. Rectangular and elliptical slits in the ground

30

Page 31: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

plane are used to improve the impedance bandwidth of the antenna. Overlapping slots are cut in the radiating surface to reduce the size of the metal material of the antenna. The proposed structure provides 13.3 GHz bandwidth for 10-dB return loss ranging from 3.1 to 16.4 GHz. The simulated radiation patterns are also shown as well. The proposed antenna features UWB behavior with near omnidirectional characteristics and good radiation efficiency.

B5Lecture Theatre

3

Session Chairs: Prof. Hamdi Elmikati Prof. Mohamed Aboul-Dahab Prof. Saber Zaiudeen

March 16, 201012.30:15.00

Multiple Constraint Space Time Adaptive Processing (STAP) using Real Elements Based on Direct Data

Domain Least Squares (D3LS) Approach

Hassan M. Elkamchouchi1, Darwish A. E. Mohamed2, and Wael A. E. Ali2

1 Alex. University2 AAST.

Abstract

In this paper, a Direct Data Domain Least Squares (D3LS) approach is developed for multiple target detection in Space Time Adaptive Processing (STAP) based on real elements of finite length dipole. The

31

Page 32: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

mutual coupling between real elements will affect on the estimation of complex amplitude of Signal of Interest (SOI). It is necessary to use a transformation matrix to compensate for the strong mutual coupling that exists between the antenna elements. Then, we will apply the multiple constrained STAP D3LS on the compensated voltages. Numerical simulations show that multiple beams are directed towards target directions and maintain their gains constrained along those directions.

B6Lecture Theatre

3

Session Chairs: Prof. Hamdi Elmikati Prof. Mohamed Aboul-Dahab Prof. Saber Zaiudeen

March 16, 201012.30:15.00

Stub-Free Improved Performance Compact Low-pass Filter

Adel Abdel-Rahman

Faculty of Engineering, South Valley University-Qena83523 – Qena, Egypt

E-mail: [email protected]

Abstract

32

Page 33: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

This paper introduces an improved performance stubless low-pass filter by using lumped capacitors as shunt capacitance elements. The filter has a cut-off frequency of 4 GHz and a wide stop-band up to more than 13 GHz with a rejection better than 26 dB. The measured insertion loss of the filter within the passband is less than 0.3 dB. The filter has a length of just 6.5 mm. The experimental results agree well with the predicted ones.

B7Lecture Theatre

3

Session Chairs: Prof. Hamdi Elmikati Prof. Mohamed Aboul-Dahab Prof. Saber Zaiudeen

March 16, 201012.30:15.00

Capacitor-Loaded Ground-Plane Slot Resonator with High Quality Factor

A. Abdel-Rahman1 and A. Omar2, Fellow, IEEE

1 Faculty of Engineering, South Valley University-Qena 83523- Qena Egypt ([email protected])

2 Chair of Microwave and Communication Engineering, University of Magdeburg,39106 Magdeburg, Germany ([email protected])

Abstract

33

Page 34: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

In this paper, a very small ground plane slot is generated by combining a rectangular slot with a lumped element capacitor is proposed. The proposed structure works as a resonating rectangular slot located underneath the 50 microstrip line. The lumped capacitor within the slot increases the effective capacitance of the resonator and lowers its resonant frequency. The resonance bandwidth is greatly decreased much which causes the quality factor to be improved owing to enhancement of the in the resonator. Besides the much reduction of the resonator dimensions, the radiation losses are also reduced. The position of the lumped capacitor within the slot affects the resonant frequency of the structure. With this configuration, the length of the resonator is reduced by 72%. In order to validate the feasibility of stored energy the proposed structure, a resonator with resonant frequency of 4 GHz is designed, fabricated, and measured. The experimental results agree well with the simulation.

B8Lecture Theatre

3

Session Chairs: Prof. Hamdi Elmikati Prof. Mohamed Aboul-Dahab Prof. Saber Zaiudeen

March 16, 201012.30:15.00

A New Synthetic Aperture Radar in Which the Platform Moving in a Curved Path

Hassan M. Elkamchouchi, Noha Ahmed Abd El Aziz

Alex. University

Abstract

34

Page 35: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

Synthetic Aperture Radar (SAR) refers to a technique used to synthesize a very long antenna by combining signals (echoes) received by the radar as it moves along its flight track aperture radar mapping is usually performed along a straight path, all previous researches and derivations considered motion of a synthetic aperture radar on a platform moving in a straight line with constant velocity and with no acceleration, In this paper we made a more practical assumption where we considered motion of SAR on a moving platform in a curved path where the target could be viewed in a better view from many angles. This paper presents a method for imaging the slant plane data collected by synthetic aperture radar (SAR) over the full rotation or a partial segment of a circular flight path and compared the length of the flight path and azimuth resolution in case of conventional and circular SARs.

B9Lecture Theatre

3

Session Chairs: Prof. Hamdi Elmikati Prof. Mohamed Aboul-Dahab Prof. Saber Zaiudeen

March 16, 201012.30:15.00

Different Techniques for Widening the Bandwidth of Stacked Microstrip Patch Antennas

A. S. Elkorany, A. A. Sharshar, S. M. Elhalafawy

Department of Electronics and Communications, Faculty of Electronic Engineering, Menoufia University, Menouf, 32952, Egypt.

35

Page 36: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

E-mails: [email protected], [email protected], [email protected]

Abstract

A novel ultra wideband stacked microstrip patch antenna (MPA) is proposed. In the new design multi techniques have been considered for widening the antenna impedance bandwidth. A stacked patch is assumed and is taken larger than the excited one. The position of the stacked patch has been shifted many times and the effect of that on the impedance bandwidth has been tested. A shorting metallic pin was introduced between the stacked patch and the ground plane. The thickness of the whole antenna is small as 5.5 mm. The dielectric material between the ground plane and the stacked patch was made of two slices of different dielectric constants. The antenna bandwidth has been examined with changing the dielectric materials types. An impedance bandwidth of about 2.52:1 has been reached in the frequency range from 5.8 GHz to 14.6 GHz. Also an impedance bandwidth of about 2.54:1 has been reached in the frequency range from 7.1 GHz to 18 GHz. The proposed antenna has a monopole like radiation and is suitable for wireless networking, amateur radio, microwave links, and door openers.

36

Page 37: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

C1Lecture Theatre

4

Session Chairs: Prof. Salwa El-RamlyProf. Saeid ElnoubyProf. Adel Salieb

March 16, 2010 12.30:15.00

Cooperative Space-Time/Frequency Coding for Uplink Single-Carrier FDMA Systems

A. Y. Al-nahari, F. A. Abd El-Samie, and M. I. Dessouky Department of Electronics and Electrical Communications

Faculty of Electronic Engineering, Menoufia University, Menouf, Egypt

37

Page 38: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

E-mails: [email protected], [email protected], [email protected]

Abstract

Single-carrier frequency division multiple access (SC-FDMA) is considered as a promising technique that is adopted in the uplink for the upcoming 3GPP long term evolution (LTE). This is because it keeps most of the advantages of OFDMA in addition to low peak to average power ratio (PAPR). Designing diversity achieving schemes for SC-FDMA is a challenging task. The code should not affect the PAPR among other constraints. In this paper, we propose a cooperative diversity schemes for SC-FDMA systems. Specifically, distributed space time/frequency codes are proposed. The proposed distributed space-frequency code (DSFC) takes into account the low PAPR which is the feature of the system. Both decode-and-forward (DAF) and amplify-and-forward (AAF) protocols are considered. Erroneous decoding at the relay node is taken into account. Moreover, we propose a bandwidth efficient distributed space-time code (DSTC) for slow fading relay channels with DAF. Analytical and simulation results indicate that the proposed schemes achieve full diversity at the expense of small performance loss.

C2Lecture Theatre

4

Session Chairs: Prof. Salwa El-RamlyProf. Saeid ElnoubyProf. Adel Salieb

March 16, 2010 12.30:15.00

Low-Complexity Equalization Scheme for Uplink MIMO SC-FDMA Systems

F. S. Al-kamali, M. I. Dessouky, B. M. Sallam, F. Shawki and F. E. Abd El-Samie

38

Page 39: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

Department of Electronics and Electrical Communications, Faculty of Electronic Engineering, Menoufia University, Menouf, 32952, Egypt

Email: {faisalalkamali, dr_moawad, farid_shawki, fathi_sayed}@yahoo.com.

Abstract In this paper, we propose an efficient low-complexity equalization scheme for multiple-input multiple-output (MIMO) uplink single-carrier frequency division multiple access (SC-FDMA) systems. The proposed scheme avoids the complexity problem associated with the conventional MIMO zero-forcing (ZF) equalizer as well as the noise enhancement problem. The matrix inversion process associated with the proposed equalization scheme is performed in two steps to reduce complexity. A regularization term is added in the second step of the matrix inversion to avoid the noise enhancement. Simulation experiments on uplink MIMO SC-FDMA systems show that the proposed equalization scheme provides better performance than that of the ZF equalizer and its complexity is far less than that of the ZF equalizer.

C3Lecture Theatre

4

Session Chairs: Prof. Salwa El-RamlyProf. Saeid ElnoubyProf. Adel Salieb

March 16, 2010 12.30:15.00

Proposed Scheme for Reducing PAPR in STBC MIMO OFDM in the Presence of Nonlinear Power Amplifier

Mona Shokair and Hefzalla Sakran Faculty of Electronic Engineering, El-Menoufia University, Egypt

39

Page 40: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

Tel:+20119389376Fax:+20-48-3660716

[email protected]

Abstract

This paper presents proposed scheme for reducing Peak to Average Power Ratio (PAPR) in Space Time Block Codes Multi-input Multi-output Orthogonal Frequency Division Multiplexing (STBC MIMO-OFDM) system. The main idea of this paper is to use a combination of two appropriate methods. First is the distortionless method using data interleaving. Second is the distortion method of clipping. Comparison between our proposed method and system that uses each method alone will be achieved. Moreover, the effect of main parameters will be studied. Also, the effect of using different number of antenna elements will be investigated. Simulation results show that, the peak power decreases more than 4 dB and SNR also reduces by 6 dB at Bit Error Rate (BER) =10-4 in presence of nonlinear High Power Amplifier (HPA).

C4Lecture Theatre

4

Session Chairs: Prof. Salwa El-RamlyProf. Saeid ElnoubyProf. Adel Salieb

March 16, 2010 12.30:15.00

Peak to Average Power Ratio Reduction in Single Carrier Frequency Divison Multiple

Access Systems

40

Page 41: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

Mohamed Salah1 Gamal Abdel-Fadeel2 Zaki B. Nossair3

1Teach. Assist., MTI University, [email protected]. Dr., Helwan University, [email protected].

3Associate Prof. Dr., Helwan University, [email protected].

Abstract

The major advantage of single carrier frequency division multiple access (SC-FDMA) over orthogonal frequency division multiple access OFDMA is that the SC-FDMA signal has lower peak-to-average power ratio (PAPR). To achieve low PAPR, a novel scheme, SC-OFDMA with super frame using intermediate mapping (SF-IFDMA), is proposed in this paper. In our proposed scheme, B frames with N subcarriers will be combined into one super frame, then SC-FDMA technique is applied to reduce the PAPR of the super frame; the super frame with lowered PAPR will finally be divided into B SC-FDMA frames for the transmission. The combining and dividing process is equivalent to the concatenation process. The proposed scheme requires no side information and can significantly reduce PAPR while maintaining small number of subcarriers.

C5Lecture Theatre

4

Session Chairs: Prof. Salwa El-RamlyProf. Saeid ElnoubyProf. Adel Salieb

March 16, 2010 12.30:15.00

Enhanced Performance of Handover in 3G Mobile Network

41

Page 42: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

Saied M. Abd El-attyDepartment of Electronics and Electrical Communications,

Faculty of Electronic Engineering, Menoufia University, Menouf, [email protected]

Abstract

In this paper, we propose an enhanced packet scheduling scheme to favour UEs that experienced handover (HO) in 3G mobile networks based-WCDMA system. The main idea of the proposed scheme is not only prioritized the HO connections at the CAC level but also prioritized the HO connections at the scheduler level. At the CAC level, a guard code scheme favours HO calls over new calls. At the scheduler level, a Packet Scheduler based-HandOver Class (PS-HOC) scheme makes use of the elapsed time of HO connections to classify the HO requests into prioritized HO and non-prioritized HO calls. However, PS-HOC sorts the connections based on their delay sensitivity and their channel quality. The performance of the proposed scheme is compared with delay driven scheduler (DDS) scheme [3] in terms of average packet delay, average queue size and average packet dropping rate. The simulation results show the effectiveness of our proposed scheme.

C6Lecture Theatre

4

Session Chairs: Prof. El-Sayed A. ElbadawyProf. Mohammad Nasr Prof. Sami El-Dalil

March 17, 201009.00:10.30

42

Page 43: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

Peak-to-Average Power Ratio Reduction for OFDM Signals with Unequal Power Distribution Strategy and

the Selective Mapping Technique

Emad S. Hassan1, Said E. El-Khamy2, Moawad I. Dessouky1, Sami A. El-Dolil1, and Fathi E. Abd El-Samie1

1Deptartment of Electronics and Electrical Communications, Faculty of Electronic Engineering, Menoufia University, Menouf 32952, Egypt.

E-mails: [email protected], [email protected]

2Department of Electrical Engineering, Faculty of Engineering, Alexandria University, Alexandria 21544, Egypt. E-mail: [email protected]

Abstract

In this paper, we present a new approach for peak to average power ratio (PAPR) reduction in orthogonal frequency division multiplexing (OFDM) signals. This approach is based on assigning powers to the different subcarriers of OFDM using an unequal power distribution strategy and then using the selective mapping (SLM) technique. The effect of the nonlinear power amplifier (PA) on the performance of the OFDM system is studied. Expressions are derived for the distributions of the PAPR in the cases of equal and unequal power distribution strategies. The amount of power saving resulting from using the SLM technique with the unequal power distribution strategy is estimated.

C7Lecture Theatre

4

Session Chairs: Prof. El-Sayed A. ElbadawyProf. Mohammad Nasr Prof. Sami El-Dalil

March 17, 201009.00:10.30

43

Page 44: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

Fine Timing Estimation for IEEE 802.16e Downlink Based on Frequency Domain Processing

Ahmed M. Hamza, Essam A. Sourour, Senior Member IEEE, and Said E. El-Khamy, Life Fellow IEEE

Department of Electrical Engineering, Faculty of Engineering, Alexandria University, Alexandria 21544, Egypt

E –mails: [email protected], [email protected], [email protected] Abstract

Time synchronization in WiMAX downlink is realized in two steps, coarse initial synchronization and fine time tracking. Coarse synchronization is done once at the beginning, while fine tracking is done every frame to keep the mobile station in sync with the base station. This paper focuses on the fine tracking step. In this paper, we show different methods with different levels of complexity that can be used in fine timing estimation and we apply them to the downlink of WiMAX IEEE 802.16e system. Two new simple methods are proposed and compared to other existing methods. The proposed methods use the phase information in frequency domain to estimate the time offset. Multiple Access Interference (MAI) effect is studied for all methods. Simulation results in both Additive White Gaussian Noise (AWGN) and frequency selective fading channels show that the new less-complex methods are comparable to the existing methods and even superior in some cases.

C8Lecture Theatre

4

Session Chairs: Prof. El-Sayed A. ElbadawyProf. Mohammad Nasr

March 17, 201009.00:10.30

44

Page 45: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

Prof. Sami El-Dalil

Trade-Off between Complexity and BER Performance of a Polynomial SVD-Based Broadband MIMO

Transceiver

Waleed Al-Hanafy*‡ and Stephan Weiss*

* CeSIP, Dept. of EEE, Univ. of Strathclyde, Glasgow, Scotland, UK‡ Electronic & Comm. Dept., Faculty of Electronic Eng., Menoufia Univ.,

Menouf, EgyptEmail: [email protected]

Abstract

In this paper we investigate non-linear precoding solutions for the problem of broadband multiple-input multiple-output (MIMO) systems. Based on polynomial singular value decomposition (PSVD) we can decouple a broadband MIMO channel into independent dispersive spectrally majorised single-input single-output (SISO) subchannels. In this contribution, the focus of our work is to explore the influence of approximations on the PSVD, and the performance degradation that can be expected as a result.

C9Lecture Theatre

4

Session Chairs: Prof. El-Sayed A. ElbadawyProf. Mohammad Nasr Prof. Sami El-Dalil

March 17, 201009.00:10.30

45

Page 46: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

Greedy Power Allocation for Multicarrier Systems with Reduced Complexity

Waleed Al-Hanafy*‡ and Stephan Weiss*

* CeSIP, Dept. of EEE, Univ. of Strathclyde, Glasgow, Scotland, UK‡ Electronic & Comm. Dept., Faculty of Electronic Eng., Menoufia Univ.,

Menouf, EgyptEmail: [email protected]

Abstract

In this paper we consider a reduced complexity discrete bit loading for Multicarrier systems based on the greedy power allocation (GPA) under the constraints of transmit power budget, target BER, and maximum permissible QAM modulation order. Compared to the standard GPA, which is optimal in terms of maximising the data throughput, three suboptimal schemes are proposed, which perform GPA on subsets of subcarriers only. These subsets are created by considering the minimum SNR boundaries of QAM levels for a given BER. We demonstrate how these schemes can reduce complexity. Two of the proposed algorithms can achieve near optimal performance by including a transfer of residual power between groups at the expense of a very small extra cost. It is shown that the two near optimal schemes, while greatly reducing complexity, perform best in two separate and distinct SNR regions.

C10Lecture Theatre

4

Session Chairs: Prof. El-Sayed A. ElbadawyProf. Mohammad Nasr

March 17, 201009.00:10.30

46

Page 47: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

Prof. Sami El-Dalil

Energy-Efficient routing in Variable-Power Wireless Sensor Networks

Ahmed Ibrahim Hassan1, Maha Elsabrouty2, and Salwa El-Ramly2

1 Ericsson Egypt Ltd., IEEE Student Member.2 Elect. and Comm. Eng. Dept., AASTMT, Cairo, Egypt.

Email: [email protected], [email protected], [email protected]

ABSTRACT

Data-centric routing approaches have been proposed in the literature to provide more energy-efficient routing as opposed to the traditional end-to-end routing schemes known as address-centric approaches. Energy efficient routing is particularly important for Wireless Sensor Networks (WSN), which have severe energy constraints. In this paper, we present the variable-power data-centric routing technique in which each sensor node (source) adjusts its transmission power based on the distance between itself and the receiver (data recipient/sink). Simulation results show that more energy savings are achieved in the variable-power scenario than in fixed-power scenario where transmission power is constant and is independent of the characteristics of the link between the transmitter and the receiver.

C11Lecture Theatre

Session Chairs: Prof. El-Sayed A. Elbadawy March 17, 2010

47

Page 48: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

4 Prof. Mohammad Nasr Prof. Sami El-Dalil 09.00:10.30

Modeling of 3GPP Voice Call Continuity Handoff

Dr. Abd El_Halim Zekry1 , Dr.Hesham Sayed Kamel2

1Faculty of engineering, Ain ShamsUniversity, [email protected] Telecom, [email protected]

Abstract

Fourth Generation (4G) system is seen as a full integration of all the coexisting systems. 4G network is ALL IP (AIP) network that provides seamless capabilities ensuring End-user mobility, Terminal mobility and session mobility.Third Generation Partnership Project (3GPP) standardized IP Multimedia Subsystem (IMS) to provide real time multimedia communication over cellular. The Voice Call Consstinuity (VCC) function is an IMS Application Server supports handoff between Circuit Switched (CS) traffic and Voice over packet. VCC employees Session Initiation Protocol (SIP) to setup the new communication leg and to release the old legs. In this work, queuing model was developed to estimate the end to end delay during Vertical Handoff. The model uses realistic system parameter assumptions for radio link delays, IMS processing, SIP signaling and SIP compression. The model uses User Datagram Protocol (UDP) and Transmission Control Protocol (TCP) as transport options and was calibrated with Lab measurements.Our model shows that the use of UDP instead of TCP can make the session handoff 6-18% percent shorter for Frame Error Rate (FER) lower than 4 % while the application of Low-layer retransmission mechanisms, such as Radio Link Protocol (RLP), considerably improves the session handoff delay. In environments with high FER, the handoff delay with RLP remains small (4-5s) for both of UDP and TCP. Our model shows that when UDP is used with RLP, the overall handoff delay is reduced by 28% with respect to TCP for all FER. The model has been verified against testbed measurements. Results show 4-6% error.

C12Lecture Session Chairs: March 17, 2010

48

Page 49: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

Theatre 4

Prof. El-Sayed M. SaadProf. Magdy FekryProf. Nagi Messieha 12.30:14.00

Using Radiotracer in Industrial ApplicationsH. Kasban 1, O. Zahran 2, H. Arafa1, M. El-Kordy 2, S. M. S. Elaraby1 and F. E. Abd El-Samie2

1 Engineering Dept., Nuclear Research Center, Atomic Energy Authority, EgyptE-mails: [email protected], [email protected]

2 Dept. of Electronics and Communications, Faculty of Electronic Engineering, Menoufia University, Menouf, 32952, Egypt.E-mails: [email protected], [email protected], [email protected]

Abstract

This paper presents three laboratory experiments, which have been carried out using the Molybdenum-99 (Mo99) radiotracer to measure the residence time distribution (RTD), the mixing time and the flow rate in a water flow rig. The results of the RTD measurement experiment are preprocessed using the MATLAB software for background correction, radioactive decay correction, starting point correction, filtering, and data extrapolation. After preprocessing, six mathematical models are investigated on this data using the International Atomic Energy Agency (IAEA) RTD software. The parameters of each model are optimized to calculate the value of the RTD, and to determine the model, which gives the best match with the practical data. The selected model with the best match is used to calculate the RTD in this experiment. The mixing time experiment is carried out for different rotation speeds and repeated three times in each case. The results show that the mixing time is inversely proportional to the rotation speed. The flow rate experiment is carried out to measure the flow rate in the flow rig. The experimental results show a high reliability of the radiotracer used in the RTD, mixing time and flow rate measurements.

C13Lecture Session Chairs: March 17, 2010

49

Page 50: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

Theatre 4

Prof. El-Sayed M. SaadProf. Magdy FekryProf. Nagi Messieha 12.30:14.00

Optimum Fractional Fourier Filtering For Monopulse Processors Distortion

Sherif A Elgamel1 John Soraghan2

1 Military Technical College, Egypt, [email protected] University of Strathclyde, UK, [email protected]

Abstract

Conventional monopulse radar processors are used to track a target that appears in the look direction beam width. The distortion produced when additional targets appear in the look direction beam width can cause severe erroneous outcomes from the monopulse processor. This leads to errors in the target tracking angles that may cause the target tracker to fail. A new signal processing algorithm is presented in this paper that is based on the use of optimal Fractional Fourier Transform (FrFT) filtering to solve this problem. The relative performance of the new filtering method over traditional based methods is assessed using standard deviation angle estimation error (STDAE) for a range of simulated environments. The proposed system configurations with the optimum FrFT filters succeeds in effectively cancelling additional target signals appearing in the look direction beam width even if these target have the same Doppler frequency.

C14Lecture Theatre

Session Chairs: Prof. El-Sayed M. Saad March 17, 2010

50

Page 51: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

4 Prof. Magdy FekryProf. Nagi Messieha 12.30:14.00

Noise Estimation for LDPC Decoding on Power Lines Seif Shebl, Nawal El-Fishawy, Atef Abou Elazm, and Fathi Abd El-Samie

Faculty of Electronic Engineering, Menoufia University, Menouf, EgyptEmails: [email protected], [email protected],

[email protected] and [email protected]

AbstractPower Line Communications (PLC) has received much attention due to the wide connectivity and availability of power lines. Effective PLC must overcome the harsh and noisy environments inherent in PLC channels. Noise in power lines is modeled as a cyclostationary Gaussian process. In order to achieve reliable communication using power lines, effective measures including error control techniques need to be taken against this particular noise. Low-Density Parity-Check (LDPC) codes have excellent performance in power lines. This paper presents two new iterative algorithms for noise estimation on power lines based on Higher-order statistics and Maximum-Likelihood (ML) estimation principle, respectively. The algorithm based on Higher-order statistics uses second, fourth, and sixth moments of the received noisy signal to provide a signal-to-noise ratio (SNR) estimate. For the ML estimation algorithm, a derivation of the ML estimate of the amplitude of a Binary Phase-Shift Keying (BPSK) modulated signal is presented. Then, the proposed iterative search algorithm is developed. The proposed algorithms are especially favorable in cases of low SNR values, e.g., the ML estimation algorithm can achieve as large as 7.5 dB and 11.7 dB gains over conventional estimators at an SNR of -5 dB and -10 dB, respectively. Furthermore, since accurate SNR estimation is required for “good” (in terms of bit-error rate (BER)) decoding performance of LDPC codes, the performance the proposed schemes is compared to some of the previously suggested SNR estimation algorithms. Finally, simulation results show that the proposed estimators perform close-to-optimum at a significantly lower computational complexity.

C15Lecture Theatre

Session Chairs: Prof. El-Sayed M. Saad March 17, 2010

51

Page 52: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

4 Prof. Magdy FekryProf. Nagi Messieha 12.30:14.00

Wavelet-Based Mel-Frequency Cepstral Coefficients for Speaker Identification using Hidden Markov Models

Mahmoud I. A. Abdalla1 and Hanaa S. Ali2

Electronics & Communication Dept. Zagazig University1E-mail:[email protected]

2E-mail:[email protected]

Abstract

To improve the performance of speaker identification systems, an effective and robust method is proposed to extract speech features, capable of operating in noisy environment. Based on the time-frequency multi-resolution property of wavelet transform, the input speech signal is decomposed into various frequency channels. For capturing the characteristic of the signal, the Mel-frequency Cepstral Coefficients (MFCCs) of the wavelet channels are calculated. Hidden Markov Models (HMMs) were used for the recognition stage as they give better recognition for the speaker’s features than Dynamic Time Warping (DTW). Comparison of the proposed approach with the MFCCs conventional feature extraction method shows that the proposed method not only effectively reduces the influence of noise, but also improves recognition. A recognition rate of 99.3% was obtained using the proposed feature extraction technique compared to 98.7% using the MFCCs. When the test patterns were corrupted by additive white Gaussian noise with 20 dB S/N ratio, the recognition rate was 97.3% using the proposed method compared to 93.3% using the MFCCs.

C16Lecture Theatre

Session Chairs: Prof. El-Sayed M. Saad March 17, 2010

52

Page 53: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

4 Prof. Magdy FekryProf. Nagi Messieha 12.30:14.00

AUTOMATED CLASSIFICATION OF GALAXIES USING EMPIRICAL MODE DECOMPOSITIONMohamed Maher1, M.A. Mohamed2, and A.I. Abdel-Fattah2

1Misr Higher Institute of Technology & Engineering, Egypt: [email protected]

2Faculty of Engineering – Mansoura University – Egypt: [email protected];[email protected]

Abstract

Classifying Galaxy information is one of the most important challenges for astronomers as it can provide important clues about the origin and evolution of the universe. In this paper; the performance of ten Artificial Neural Networks (ANNs) based classifiers was evaluated and tested, based on a selected set of features. These features were extracted using empirical mode decomposition (EMD) technique producing a time-frequency representation that can be evaluated for each galaxy type depending on a set of intrinsic mode functions (IMFs) that satisfying the sifting algorithm. The results showed that; the Jordan Elman Network (JEN) based classifier provides the best results; about 0.65985713% error in classification. The dataset was taken from standardized catalogue from Zsolt Frei website.

C17Lecture Theatre

4

Session Chairs: Prof. El-Sayed M. SaadProf. Magdy Fekry

March 17, 201012.30:14.00

53

Page 54: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

Prof. Nagi Messieha

An Effective K-Anonymity Clustering Method for Minimize Data Privacy Preservation Effectiveness in Data Mining Results

Mohammed A. El-Rashedy1, Hoda S. Sroor1, Nabil M. A. Ayad2 and Taha E. Taha3

1 Dept. of Computer Science & Eng., Faculty of Electronic Eng., Menoufia University, Egypt.2 Nuclear Research Center, Atomic Energy Authority, Egypt.3 Dept. of Electronics& Electrical comm.., Faculty of Electronic En., Menoufia University.

Abstract

Data mining has been a common methodology to retrieve and discover useful knowledge from the very vast amounts of data in organizations. Data mining has been viewed as a threat to privacy because of the wide spread proliferation of electronic data maintained by the corporations. Data privacy preservation has drawn considerable interest in data mining researches recently. The k-anonymity model is one of the most known novel privacy preserving approaches that have been extensively studied for the past few years; these models omitted the effect of data privacy preservation in the data mining results. In this paper we propose an effective approach that uses the idea of clustering for conducting the k-anonymity to minimize the effect of information loss which produced from data privacy preservation in the data mining results, which is very effective extremely in the decision making accuracy. A suitable metric to estimate this effect is developed. A set of experiments were carried out on the database of the Urology and Nephrology Center, Mansoura, Egypt. The obtained results show that the proposed method keeps data privacy preservation with very low effect in the data mining results compared with greedy k-member and one pass k-means algorithms.

C18Lecture Theatre

4

Session Chairs: Prof. Mamdouh Fahmy Prof. Tadros Haliem

March 18, 2010

54

Page 55: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

Prof. Meawwad I. Desouky 09.00:10.30

Neural Modeling of Maximum Entropy Image Interpolation

Eman A. Soltan1, Sayed El-Rabaie1, Nawal A. El-Fishawy1, Said E. El-Khamy2 and Fathi E. Abd El-Samie1

1Department of Electronics and Communications, Faculty of Electronic Engineering, Menoufia University, Menouf, 32952, Egypt.

Emails: [email protected], [email protected] , [email protected], [email protected]

2 Department of Electrical Engineering, Faculty of Engineering, Alexandria University, Alexandria 21544, Egypt. Email : [email protected]

Abstract

In this paper, a neural implementation is suggested for the maximum entropy image interpolation technique. The performance of the suggested neural image interpolation algorithm is compared to that of the maximum entropy image interpolation technique. The proposed approach is efficient from the mean square error (MSE) point of view and the computation complexity point of view by reducing the number of computations required. Simulation results show that the suggested implementation has a slight reduction in the peak signal-to-noise ratio (PSNR) of interpolated images as compared to maximum entropy image interpolation technique, but with a noticeable reduction in the computation cost.

C19Lecture Theatre

Session Chairs: Prof. Mamdouh Fahmy March 18, 2010

55

Page 56: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

4 Prof. Tadros HaliemProf. Meawwad I. Desouky 09.00:10.30

A Novel Image Recovery against Lost Descriptions in Mesh Networks

Hussein H. Maza’ar,Hesham N. Elmahdy

Information Technology Dept., Faculty of Computers & Information, Cairo University

E-mails: [email protected], [email protected]

Abstract

This paper presents a proposal for transmitting and recovering images using Multiple Description Coding (MDC) techniques over unreliable multiple links in a mesh network, while using network coding technique to add protection paths. In pure MDC, the loss of one or two descriptions degrades the received image quality. In the proposed technique, the protection paths ensure that all the descriptions are received even when one or two descriptions are lost, but at the expense of additional links and data bandwidth. A comparative evaluation based on simulation is presented.

C20Lecture Theatre

Session Chairs: Prof. Mamdouh Fahmy March 18, 2010

56

Page 57: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

4 Prof. Tadros HaliemProf. Meawwad I. Desouky 09.00:10.30

SUPER-RESOLUTION WITH ADAPTIVE DIRECTIONAL TOTAL VARIATION REGULARIZATION FOR DOCUMENT

IMAGES

Osama A. Omer

Department of Electrical Engineering,South Valley University, Aswan, Egypt,

E-mail: [email protected].

Abstract

We propose a super-resolution algorithm based on local adaptation. In the proposed algorithm, the mapping function from the low-resolution images to high-resolution image is estimated by adaptation. Moreover, the property of the high-resolution image is learned and incorporated in a regularization-based restoration. The proposed regularization term is used as a general directional total variation with adaptive weights. The adaptive weights of the directional total variation are estimated based on the property of the partially reconstructed high-resolution image. The regularization function can be thought as a linear combination of smoothness in different directions. The proposed algorithm is tested for document images with various types of data, including plots, equations, draws and texts, existing in real documents.

C21Lecture Theatre

Session Chairs: Prof. Mamdouh Fahmy March 18, 2010

57

Page 58: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

4 Prof. Tadros HaliemProf. Meawwad I. Desouky 09.00:10.30

Homomorphic Image Watermarking With A Singular Value Decomposition Algorithm

Hanaa A. Abdallah*, Mohiy M. hadhoud #, Abdalhameed A. Shaalan* and Fathi E. Abd El-samie**

*Faculty of Engineering, Zagazig university, Zagazig, Egypt.#Faculty of computers and information, Menofia University, Shebin Elkom, Egypt.**Department of Electronics and Electrical Communications, Faculty of Electronic

Engineering, Menoufia University, Menouf, 32952, EgyptE-mails :{ flower002a, mmhadhoud, shaalan, fathi_sayed}@yahoo.com}

Abstract

This paper presents a new homomorphic image watermarking method implementing the singular value decomposition (SVD) algorithm .The basic idea of the proposed method is based on embedding the watermark with the SVD algorithm in the reflectance component after the homomorphic transform. The reflectance component contains most of the image features, and hence watermarks imbedded in this component will survive most of the attacks. A comparison study is held between the traditional method of Liu for SVD watermarking, SVD watermarking in the Log domain, and the proposed method. Simulation results reveal that the proposed method is more robust than the other methods, especially in the presence of attacks.

C22Lecture Theatre

Session Chairs: Prof. Mamdouh Fahmy March 18, 2010

58

Page 59: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

4 Prof. Tadros HaliemProf. Meawwad I. Desouky 09.00:10.30

A New Image Watermarking Technique Using Histogram Tailored Chaotic Maps

Said E. El-Khamy, Life Fellow IEEE1, Mohamed. R.M. Rizk, Senior Member IEEE2, and Amira. E. Youssef3

1,2 Department of Electrical Engineering, Faculty of Engineering,Alex. University,Alexandria 21544, Egypt, Emails: [email protected] , [email protected] ,

3 Alexandria Higher Institute of Engineering and Technology, Smoha, Alexandria. E-mail:[email protected]

ABSTRACT

In this paper, we propose a new image authentication and information hiding scheme based on chaotic encryption. The scheme is based on the invariant property of the histogram of the chaotic sequence matched to the host image as well as starting the chaotic map synthesis from a confidential starting point. The synthesized chaotic sequence, having the same histogram as that of a secretly chosen part of the host image, is combined with a cover image to generate a chaotic scrambled cover sequence. The Discrete Wavelet Transform (DWT) of this combination is then used to modulate a part, having a confidential location, of the discrete wavelet transform of a host image. Either the sequence or the cover image can be the hidden information. The security properties of the proposed schemes are firstly analyzed and the merits of new scheme are quantitatively analyzed by computer simulation.

C23Lecture Session Chairs: March 18, 2010

59

Page 60: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

Theatre 5

Prof. Abd-Elhady AmmarProf. Hossam Eldin HussainٍProf. Nawal El-Fishawy 09.00:10.30

A Flexible Symmetric-Key Block Cipher Algorithm

Ibrahim F. Elashry1, Osama S. Farag Allah2, Alaa M. Abbas3, S. El-Rabaie3, and Fathi E. Abd El-Samie3

1 Department of Electrical Communications, Faculty of Engineering, Kafrelsheikh University, Kafrelsheikh, Egypt

2 Department of Computers Engineering, Faculty of Electronic Engineering, Menoufia University, Menouf, Egypt

3 Department of Electronics and Electrical Communications, Faculty of Electronic Engineering, Menoufia University, Menouf, 32952, Egypt.

E-mails: [email protected] , [email protected] , [email protected] , [email protected] , and [email protected]

ABSTRACT

In this paper, we present a symmetric-key encryption algorithm that is designed to encrypt data blocks of any size , which is an integer multiple of 32 bits .This algorithm depends on four parameters; the word size (w), the non-negative number of rounds (r), the key length in bytes (b), and the block size (L). The key feature of the proposed algorithm is that the number of keys used in the encryption/decryption processes depends only on the number of rounds, not the block size. Thus, any block can be encrypted using the same number of keys, if the same number of rounds is used. The proposed algorithm was compared to the advanced encryption standard (AES). The test results show that the proposed algorithm has a self-confusion/diffusion mechanism, does not depend on the plainimage, and has a better computation time and throughput.

C24

60

Page 61: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

Lecture Theatre

5

Session Chairs: Prof. Abd-Elhady AmmarProf. Hossam Eldin HussainٍProf. Nawal El-Fishawy

March 18, 201009.00:10.30

FAST AND FLEXIBLE SYMMETRICAL ENCRYPTION ALGORITHM BASED ON KEY-

UPDATING

Amr M. Kishk1, Nagy W. Messiha2, Nabil M. A. Ayad 1, Nawal A. Elfeshawy2, and Fathi E. Abdel-Samie2

1Egyptian Atomic Energy Authority EAEAE-mails: [email protected] , [email protected]

2Faculty of Electronic Engineering, Menouf, EgyptE-mails: [email protected] , [email protected] ,

[email protected]

Abstract

Hacking is one of the greatest problems in the wireless local area networks. Many algorithms have been used to prevent the outside attacks to eavesdrop or prevent the data to be transferred to the end-user safely and correctly. The growth of the technologies reduces the time taken to crack the encryption algorithms. In this paper, a new symmetrical encryption algorithm is proposed that prevents the outside attacks depending on key-updating. The horizontal shift and vertical shift increase the complexity of the new algorithm besides the using of S-Box. It avoids key exchange between users and reduces the time taken for the encryption and decryption. It operates at high data rate in comparison with The Data Encryption Standard (DES), Triple DES (TDES), Advanced Encryption Standard (AES-256), and RC6

61

Page 62: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

algorithms. The new algorithm is applied successfully on both text file and voice message.

C25Lecture Theatre

5

Session Chairs: Prof. Abd-Elhady AmmarProf. Hossam Eldin HussainٍProf. Nawal El-Fishawy

March 18, 201009.00:10.30

Generation of Strong Cryptographic Keys Using Wavelet-Based Iris Codes

Hassan Elkamchouchi, Wafaa Shouaib, Yasmine Abouelseoud*

Faculty of Engineering, Alexandria University, Egypt*email address: [email protected]

Abstract

Biometric features, such as iris codes, have recently received much attention in recognition systems. However, in this paper, we propose an alternative application for such features. We propose to use biometric traits in the generation of private keys in public key cryptosystems. We examined the randomness in wavelet-based iris codes by applying several statistical tests on them. Motivated by the high level of randomness in iris codes and the independence between iris codes of distinct individuals, this paper proposes that iris codes can be used as a source for generating strong private keys. The generated private key can be safely stored on a tamper-resistant smart card. These private keys provide an excellent link between the identity of the key owner and the key itself. In case of disputes, a customer

62

Page 63: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

cannot blame the card issuing authority for providing him with a weak key, as it is his own iris code.

C26Lecture Theatre

5

Session Chairs: Prof. Abd-Elhady AmmarProf. Hossam Eldin HussainٍProf. Nawal El-Fishawy

March 18, 201009.00:10.30

New Symmetric Cipher Enhanced By the Universal GPS Unique Data (SEU_GPS)

Hassan M. Elkamchouchi1 and Fatma Ahmed2

1Elec. Eng. Dept, Fac. of Eng. Alexandria University, senior member IEEE [email protected]

2Elec. Eng. Dept, Fac. of Eng. Alexandria University. [email protected]

AbstractThis paper gives a new symmetric cryptosystem having a key dependent block length and key dependent rounds, enhanced by a rotor with controlled time, key and the universal GPS data. The plaintext block is divided into basic sub-blocks each of thirty-two bits in length. The new Proposal can encrypt blocks of plaintext of length 256, 512, or 1024 bits into blocks of different length. Also the key length can be 256, 512, or 1024 bits. The total number of rounds depends on the key length. It uses thirty-two bits s-boxes implemented using thirty-two bits affine transformation modulo addition and thirty-two bits XORING are used followed by

modulo multiplication. The secret key is encrypted using a key rotor to avoid any weakness points in the user key. The proposal performs a complex set of operations on the encrypted secret key to produce a set of subkeys. Also it uses four banks of rotors. All cylinders are relatively prime in length. The first bank performs the encryption process. It uses sixty cylinders operating on all the ASCII 9 characters arranged by the Universal GPS data. The second bank has eight cylinders that are used in four operations. The first operation is to encrypt the user key. In this step, the rotor is arranged by the encrypted universal GPS data. The second operation is to encrypt and expand the local time array. In this step, the user key arranges the rotor. The third operation is used to encrypt and expand the universal GPS data. In this step, the rotor is arranged by the user key and the local time array. The fourth operation is used to encrypt each letter of plaintext. The resulting output is then used in index bank to

63

Page 64: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

determine which cylinder in the first bank will turn after this letter is encrypted. The third bank has five cylinders that are used to encrypt the output from the second bank. The fourth bank performs the decision process. It uses sixteen cylinders arranged using the user key.The proposed algorithm is compared with the well known DES, AES and RTCKP symmetric systems and gives excellent results from the point of view of the security characteristics and the statistics of the ciphertext.

C27Lecture Theatre

6

Session Chairs: Prof. Hassan El-KamshouchiProf. Ahmed El-SherbienyProf. Abd-El-Aziem Sobeih

March 18, 201009.00:10.30

Improving the Performance of CPC with Delay Diversity Scheme in Mobile WiMAX System

Ahmed Ebian1, Mona Shokair 2and Kamal Awadalla2

1 Telecom Egypt, Transmission Department, [email protected] Faculty of Electronic Engineering, Menoufia University, Egypt

[email protected], [email protected]

AbstractIn a wireless communication system, an RF modulated signal from a transmitter may reach a receiver via a number of propagation paths. The characteristics of the propagation paths typically vary over time. To provide diversity against deleterious path effects and improve performance, multiple transmit and receive antennas may be used. Multiple antennas can be used for increasing the diversity gain or increasing the data rate in wireless communication. If the propagation paths between the transmit and receive antennas are linearly independent (i.e., a transmission on one path is not formed as a linear combination of the transmissions on the other paths), which is generally true at least an extent, then the likelihood of correctly receiving a data transmission increases as the number of antennas increases. Generally, diversity is increased and performance is improved as the number of transmit and receive antennas is increased. In this paper, mobile WiMAX system using Convolutional Product Code (CPC) as a coding technique will be implemented in time varying multipath channel and the results for SNR versus BER will be investigated. These results are compared by those obtained using CPC with

64

Page 65: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

Delay Diversity Scheme (DDS). Also the effect of the puncture technique will be applied on our system. Simulation results show that the delay diversity scheme with CPC technique gives better BER performance than WiMAX system without this scheme. The comparisons are done at different types of modulation techniques and different sizes of IFFT. For example, at the comparison at 16QAM and IFFT with 128 subcarriers, the amount of improvements equals to 4 dB at BER equals to 10-2.

C28Lecture Theatre

6

Session Chairs: Prof. Hassan El-KamshouchiProf. Ahmed El-SherbienyProf. Abd-El-Aziem Sobeih

March 18, 201009.00:10.30

Real-Time Audio Signal Transmission over the ACL Link in Bluetooth Systems

M. A. Mohamed El-Bendary**, A. E. Abou-El-azm*, N. A. El-Fishawy*, A. Hagagg**, F. Shawki* and F. E. Abd El-Samie*

* Department of Electronics and Electrical Communications, Faculty of Electronic Engineering, Menoufia University, Menouf, 32952, Egypt

* * Department of Communication Technology, Faculty of Industrial Education, Helwan University, Egypt

Emails: {mohsenbendary, atef_aboulazm, nawalelfishawy, farid_shawki, fathi_sayed}@yahoo.com.

Abstract In this paper, we propose the transmission of audio signals over the asynchronous connectionless (ACL) link in Bluetooth systems. In traditional Bluetooth systems, audio signals are transmitted over the synchronous connection-oriented (SCO) link, which has a limited data rate. The SCO link requires the transmission of two, four, or six slots for transmitting HV1 packets, HV2 packets, and HV3 packets, respectively.

65

Page 66: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

By the proposed approach of transmitting the audio signals over the ACL link, we can use DH or AM packets for audio signal transmission, and enables the transmission of up to 30 bytes in each time slot. Bit level interleavers are suggested for this paper with the proposed implementation to reduce channel effects. Simulation experiments reveal the superiority of the proposed implementation for audio signal transmission over Bluetooth systems.

C29Lecture Theatre

6

Session Chairs: Prof. Hassan El-KamshouchiProf. Ahmed El-SherbienyProf. Abd-El-Aziem Sobeih

March 18, 201009.00:10.30

Analysis and Simulation for Alamouti Coded OFDM System over Time Variant Channel

Bassant A. M. Ahmed1, Mirette M. Sadek2, Salwa H. El Ramly3

Dept. of Electronics and communication, Faculty of Engineering, Ain Shams University, Cairo, Egypt

1 [email protected], 2 [email protected] , 3 [email protected],

Abstract

In this paper, we investigate different receiver designs for Alamouti coded OFDM system over time varying Rayleigh channels. In Alamouti coded OFDM systems, the simple Alamouti decoding at the receiver side relies on the assumption that the channels don’t change over two consecutive OFDM symbols. Unfortunately, when the channel is time varying, this assumption is not valid and degrades the system performance. To handle the rapid variations of the channel

66

Page 67: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

within a transmission of Alamouti block on OFDM system, two new algorithms are proposed for signal decoding to recover the signal again at the receiver side. The performance of these algorithms is compared with conventional Alamouti’s scheme via simulation.

C30Lecture Theatre

6

Session Chairs: Prof. Hassan El-KamshouchiProf. Ahmed El-SherbienyProf. Abd-El-Aziem Sobeih

March 18, 201009.00:10.30

A Cooperative Multi-Rate Algorithm Based on Decode-and-Forward Transmission and Variable Length Complete

Complementary Codes

Noha O. El-Ganainy2, Student Member IEEE, Said E. El-Khamy1, Life Fellow IEEE, Ahmed K. Aboul Seoud1, Senior

Member IEEE, and Mohamed A. Mokhtar1, Member IEEE

1E.E. Department, Faculty of Engineering, Alexandria University. Alexandria, Egypt. e-mail: [email protected]. Dept., Alexandria Institute of Eng. and Technology, Alexandria, Egypt. e-mail: [email protected].

AbstractThis paper introduces a realistic model of a decode-and-forward cooperative algorithm capable to support multi-rate transmissions. This model relies on the use of variable spreading factor complementary code sets for the spreading operation to provide the users’ different rate requirements. These code sets are characterized by a cross correlation sum along the set size that vanishes for all shifts for codes of different lengths as well as an impulsive

67

Page 68: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

autocorrelation sum among each set. The proposed transmission is performed using a multi-band direct-sequence code-division multiple-access (DS/CDMA) basis. The performance of the proposed multi-rate algorithm is evaluated against the rate matching non-cooperative algorithm for different transmission conditions. A remarkable performance enhancement is observed using the proposed multi-rate cooperative algorithm compared to the use of the rate matching transmission for both low rate and high rate user.

C31Lecture Theatre

6

Session Chairs: Prof. Hassan El-KamshouchiProf. Ahmed El-SherbienyProf. Abd-El-Aziem Sobeih

March 18, 201009.00:10.30

Proposed Design of DC Low Voltage Acceleration SystemM. M. Abdelrahman and S.G. Zachary

Accelerators Department, Nuclear Research Center, Cairo Egypt

AbstractA novel approach given by both beam simulation (using SIMION computer program) and analytical treatment are useful tools for designing of constant gradient acceleration system. Ray trace calculations have been performed for the acceleration system and an analytical treatment of these calculations has also been achieved. The tracing of the beam line inside the gap shows a decrease of the output radius with the increase of the accelerating voltage ratio up to the optimal value. Beyond this optimal value the beam line makes cross over with the axis of the accelerating tube. A series of simulation studies were made in order to determine optimum conditions for acceleration of space-charge-dominated argon gas with different

68

Page 69: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

incident energies at constant gradient acceleration system. Beam simulation is carried out to reveal the influence of the space charge effect and incident beam energy on the beam emittance and beam radius. The influence of the voltage ratio and inner accelerating tube diameter has the same influence on the output beam emittance. From the beam simulation, the appropriate voltage ratio is 3 and inner accelerating tube diameter is 15 mm. Both analytical and simulation studies have a good agreement results.

69

Page 70: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

D1Lecture Theatre

5

Session Chairs: Prof. Hadia El-HennawyProf. Esmat Abdallah Prof. Mohamed Ibrahim

March 16, 201012.30:15.00

Design and Characterization of an mm-Wave Low Noise Amplifier in 4G Broadband Packet Radio Access Systems

M. Al-Azab, Ph. D

Laboratory for Integrated Circuits and Systems,Department of Electrical and Computer Engineering,

Higher Technological Institute, 10th of Ramadan, Egypt

Abstract: A 35 GHz mm-wave low noise amplifier ( LNA) is designed and characterized in a 90nm digital CMOS process. The LNA adopts two stages of cascade architecture and proposed active metamaterial transmission lines to the higher achievable Z0 and low loss. The gain of 20 dB and minimum noise figure ( NF)

70

Page 71: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

of 2.3 dB are simulated over the specified band, while consuming 12.45 mW of power from a 1 V supply voltage. The amplifier has a simulated linearity of IIP3= -7.5 dBm.

D2Lecture Theatre

5

Session Chairs: Prof. Hadia El-HennawyProf. Esmat Abdallah Prof. Mohamed Ibrahim

March 16, 201012.30:15.00

A New Approach for FET Small Signal Modeling Based on Cepstral Coefficients and Discrete

TransformsR. R. Elsharkawy1, S. El-Rabie2, M. Hindy1

, M. I. Dessouky2

1 Institute of Electronics Research , Cairo, Egypt.2 Faculty of Electronic Engineering, Menouf, Egypt.

E-mails: [email protected], [email protected], [email protected], [email protected]

Abstract In this paper, a new technique is proposed for field effect transistor (FET) small-signal modeling using neural networks. This technique is based on the combination of the Mel-frequency Cepstral Coefficients (MFCCs) with the different discrete transforms such as the discrete cosine transform (DCT), the discrete sine transform (DST), and the discrete wavelet transform (DWT) of the inputs to the neural networks. The input data sets to traditional neural systems for FET small-signal

71

Page 72: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

modeling are the scattering parameters and the corresponding frequencies in a certain band, and the outputs are the circuit elements. In the proposed approach, these data sets are considered as forming random signals. The MFCCs of the random signals are used to generate a small number of features characterizing the signals. In addition, other vectors are calculated from the DCT, the DST, or the DWT of the random signals and appended to the MFCCs vectors calculated from the signals. The new feature vectors are used to train the neural networks. The objective of using these new vectors is to characterize the random input sequences with much more features to be robust against measurement errors. There are two benefits for these approaches; a reduction in the number of neural networks inputs, and hence a faster convergence of the neural training algorithm and robustness against measurement errors in the testing phase. Experimental results show that the techniques based on the discrete transforms are less sensitive to measurement errors than using the traditional and MFCCs methods.

D3Lecture Theatre

5

Session Chairs: Prof. Hadia El-HennawyProf. Esmat Abdallah Prof. Mohamed Ibrahim

March 16, 201012.30:15.00

Voltage-Mode Class-D 2.4-GHz 130-nm CMOS RF Power Amplifier for Mobile

Communication system

Hafez Fouad and, Abdel-halim Zekry Electronics Research Institute, [email protected]

Ain Shams University, [email protected]

Abstract

72

Page 73: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

Voltage-mode Class-D switching amplifiers have the potential to maintain high efficiency when the driving signals are non periodic. Most of switched-mode Class-D Power Amplifier (PA) use discrete components in most applications. But the integrated Class-D PA operates only at audio frequency. So our innovated design of Class-D PA operates at higher frequency of 2.4GHz. Simulations of Proposed Class-D RF Power Amplifier Using 130nm CMOS Technology are performed using cadence tools and the results are comparable with the state-of-the-art of RF Power Amplifier. Simulations results demonstrate 26.77 dBm output power from 5 V power supply at 2.4 GHz with the PAE of 24.4%.

D4Lecture Theatre

5

Session Chairs: Prof. Ibrahim El-DokanyProf. Adel El-HennawyProf. Kamel Hassan

March 17, 201009.00:10.30

An Enhanced Vision System for Sorting Ceramic Plates Based on Hybrid Algorithm and USB Interfacing

Circuitry

Farid A. Tolbaha, Ahmed M. Alya and Waleed A. El-Badryb

a. Faculty of Engineering, Ain Shams University, Cairo (Egypt)b. College of Engineering, Misr University for Science & Technology, 6 October City (Egypt)

73

Page 74: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

Abstract:

The paper discusses the research carried out to design and implement a vision system based on a hybrid fuzzy logic and fuzzy clustering algorithm for sorting garnished wall plates. The system doesn’t only detect colour defects, but also checks for pattern validity in terms of geometry, angle and orientation with respect to predetermined axis and colour matching rules. The algorithm is divided into two phases, the learning phase which is an offline process, and inspection phase which is carried out online.

D5Lecture Theatre

5

Session Chairs: Prof. Ibrahim El-DokanyProf. Adel El-HennawyProf. Kamel Hassan

March 17, 201009.00:10.30

A VHDL-AMS Model of a Controlled Chua CircuitM. R. M Rizk #1, A. A. A. Nasser *2, E. A. Bakr#3

#1 senior member IEEE Alexandria University, Egypt*2Arab Academy for Science and Technology & Maritime Transport

Alexandria, Egypt#3 Alexandria Higher Institute of Engineering and Technology, (AIET)

Alexandria, Egypt

[email protected][email protected]

74

Page 75: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

[email protected]

Abstract

In this paper, A VHDL_AMS model of Chua circuit is given, different types of qualitative behaviours are obtained. A thresholding mechanism namely the ring configuration is simulated and proved adequacy. The advantage behind using VHDL in chaotic synchronization is that we can exploit the VHDL synthesis in VLSI fabrication technology.

D6Lecture Theatre

5

Session Chairs: Prof. Ibrahim El-DokanyProf. Adel El-HennawyProf. Kamel Hassan

March 17, 201009.00:10.30

ERROR SENSETIVITY IN THE FFT INVERSIONMETHOD FOR TWO LAYER MODELS

Dr. Essam A. Hashish(*)

Abstract

Electromagnetic inversion of multilayer dielectric models has found wide applications in different areas. Methods of inversion can be

(*) Faculty of Engineering, Cairo University.

75

Page 76: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

mainly classified to model methods and layer stripping techniques. The layer stripping techniques have the advantage of being much faster than the model methods. However, they have lower stabilities during the inversion process. In fact, the stability of layer stripping techniques requires more detailed studies in order to improve their performance.

In this paper, an analysis is presented for the stability of the FFT inversion method which is classified as one of the layer stripping techniques. A two layer model is considered and a study of errors encountered in the inversion process of the first layer and its effect on the inversion of the second layer is presented. It is concluded that the errors resulting in indicating the height of the first layer are much more effective than the errors resulting from the calculation of its permittivity.

D7Lecture Theatre

5

Session Chairs: Prof. Ahmed Khairy Abo-ElsoudProf. Diaa-Eldeen KhaleilProf. Mohamed El-Kordy

March 17, 201012.30:14.00

Optimum Conditions for a High Bit Rate RZ Soliton Train in EDFA with Nonadiabatic Amplification

Mohamed F. Hassan1 ([email protected]), Hossam Zoweil2([email protected]), Moustafa H. Aly3 ([email protected]) and Ahmed E.El-Samahy1([email protected])

1 Faculty of Science, University of Alexandria, Alexandria, Egypt.2 Advanced Technology and New Materials Research Institute, Mubarak

City for Scientific Research and Technology Applications, Alexandria, Egypt.

3 College of Engineering and Technology, Arab Academy for Science, Technology and Maritime Transport Alexandria, Egypt, Member of OSA.

76

Page 77: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

Abstract In this paper, the optimum conditions to propagate RZ-train of solitons down EDFA amplifier at high bit rate and gain are studied. The suggested model is based on the wave equation of the carrier envelope. The two energy level system is used to study the evolution of train of solitons through the erbium doped fiber amplifier (EDFA). The polarization induced term representing the effect of doping atoms on the propagating electric field is obtained by solving Maxwell-Bloch equations [1]. By adding the induced polarization to the nonlinear Schrödinger equation (NSE), the split-step Fourier method is used to solve NSE in the EDFA. The higher doping level used makes the dopants respond not so fast that the induced polarization follows the optical field nonadiabatically. Trains of different soliton width, time slot and doping level are used to obtain the optimum conditions for maximum bit rate and EDFA gain.

D8Lecture Theatre

5

Session Chairs: Prof. Ahmed Khairy Abo-ElsoudProf. Diaa-Eldeen KhaleilProf. Mohamed El-Kordy

March 17, 201012.30:14.00

Unequal Load Balance Routing for OBS Networks Based on Optical Parameters Dependent Metric

Mohamed M. Ali1 ([email protected]), Wael Hosny1([email protected]),El-Sayed A. El-Badawy2*([email protected]) and Moustafa H. Aly1* ([email protected])

1 College of Engineering and Technology, Arab Academy for Science, Technology and Maritime Transport Alexandria, Egypt

2 Faculty of Engineering, University of Alexandria, Alexandria, Egypt.

77

Page 78: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

* Member of OSA.

Abstract

Based on a detailed simulation analysis in optical burst switching (OBS) networks, a proposed new routing protocol metric is driven based on the Burst loss ratio (BLR). It takes into account many optical parameters in its dependency as number of channels, load and link bandwidth. Depending on this new metric, an unequal load balance routing technique is proposed. It is shown that, in some examples, more than 50 % of the drop rate is avoided when using load balance routing rather than single best path routing.

D9Lecture Theatre

5

Session Chairs: Prof. Ahmed Khairy Abo-ElsoudProf. Diaa-Eldeen KhaleilProf. Mohamed El-Kordy

March 17, 201012.30:14.00

Backward Pumped Distributed Fiber Raman Amplifiers

Nihal M. Anwar ([email protected]) and Moustafa H. Aly*

([email protected])

College of Engineering and Technology, Arab Academy for Science, Technology and Maritime Transport Alexandria, Egypt* Member of OSA.

78

Page 79: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

Abstract

This paper investigates Raman gain for backward pumping using three different fiber types. The rate and propagation equations characterizing fiber Raman amplifiers (FRAs) are numerically solved. In this way, the gain is simulated for the given FRA parameters or the required fiber parameters and signal/pump power values could be optimized for a desired FRA gain. Gain is obtained as a function of fiber length and pump power. According to the obtained results, gain is strongly dependent on the fiber length and pumping power.

D10Lecture Theatre

5

Session Chairs: Prof. Ahmed Khairy Abo-ElsoudProf. Diaa-Eldeen KhaleilProf. Mohamed El-Kordy

March 17, 201012.30:14.00

Modeling of Semiconductor Nanocrystal Quantum Dot Based Microcavity Light Emitting Diode

Ahmed E. Morra a,1, Wageh S. a,2 and Atef Abou El-Azm a,3a Faculty of Electronic Engineering, Menufiya University, Menouf 32952, Egypt

1 E-mail: [email protected] 2 E-mail: [email protected]

3 E-mail: [email protected]

79

Page 80: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

Abstract

The detailed analysis and computations of the emitted radiation spectrum of nanocrystal quantum dots (NQDs) microcavity light-emitting diode as a function of different parameters is presented in this paper. The parameters are: the position of the light emitting layer, the choice of cathode, hole transport layer (HTL) material, nanocrystal diameter and thickness of electron transport layer (ETL), HTL and emission layer (EML) (NQD layer). The influence of the incoherent transparent substrate (1 mm glass substrate) is also shown. Silver (Ag) and aluminum (Al) elements are used as bottom and top mirrors respectively. In this paper ITO is used as anode layer. The optical model that was used in this paper does not include exciton quenching in the vicinity of the metal cathode, and in order to avoid unrealistic results we excluded in our design placing of the emissive layer near the cathode. Finally, experimental and calculated emission spectra were compared and fairly good agreement between the two results was observed.

80

Page 81: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

K1Lecture Theatre

6

Session Chairs Prof. Mohamed Abdel-Aziz Prof. Fatma Abo-Shady Prof. Taha Elsayed

March 16, 201012.30:15.00

Genomic Sequences Differential Compression Model

H. Afify 1, M. Islam 2, M. Abdel Wahed 3, Y. M. Kadah 4

Systems and Biomedical Engineering Department, Cairo University, Egypt,1 [email protected]@[email protected]

81

Page 82: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

Abstract

In this paper, we exploit the differential compression model based on alignment of two similarity sequences or more, which compress one sequence comparing with another sequence and the renewal entropy estimation to improve the compression ratio. We determine the representative sequence from set of sequences. On the other hand, through our investigation we have found that the use of differential compression model of the genomic sequences could open new frontiers in quickly identifying unknown sequence related to set of sequences.

K2Lecture Theatre

6

Session Chairs Prof. Mohamed Abdel-Aziz Prof. Fatma Abo-Shady Prof. Taha Elsayed

March 16, 201012.30:15.00

Performance Comparison of the Structure Learning Bayesian Network Algorithms Using

Gene Expression Data

Fadhl M. Al-Akwaa1,2, Nahed H. Solouma2, Yasser M. Kadah2

1Biomedical Eng. Dept., Univ. of Science & Technology, Sana’a, Yemen ([email protected])

2 Biomedical Engineering Department, Cairo University, Giza, Egypt

82

Page 83: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

AbstractUnderstanding gene interactions in complex living systems can be seen as the ultimate goal of the systems biology revolution. Hence, to fully understand disease ontology and to reduce the cost of drug development, gene regulatory networks (GRN) have to be constructed. During the last decade, many GRN inference algorithms like ‘Bayesian network’ that are based on genome-wide data have been developed to unravel the complexity of gene regulation. Recently, many of structure learning algorithms were used to learn Bayesian network that have shown promise in gene regulatory network reconstruction. In this paper we apply different structure learning algorithms on actual micro-array data to obtain a better understanding of their relative strengths and weaknesses on the system biology community and we evaluate their outputs from different perspectives.

K3Lecture Theatre

6

Session Chairs Prof. Mohamed Abdel-Aziz Prof. Fatma Abo-Shady Prof. Taha Elsayed

March 16, 201012.30:15.00

A New Software to Construct Gene Regulatory Networks From Microarrays Data

Fadhl M. Al-Akwaa1,2, Nahed H. Solouma2, Yasser M. Kadah2

83

Page 84: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

1Biomedical Eng. Dept., Univ. of Science & Technology, Sana’a, Yemen (E-mail [email protected])

2 Biomedical Engineering Department, Cairo University, Giza, Egypt

AbstractAs basic building blocks of life, genes, as well as their products (proteins), do not work independently. Instead, in order for a cell to function properly, they interact with each other and form a complicated network. Recently, many researchers agree that most of biological ambiguous questions might be easily being answered if a sophisticated modeling of the gene regulatory network (GRN) was constructed. Also, GRN was used to help understanding disease ontology and reducing the cost of drug development. During the last decade, many GRN inference algorithms that are based on microarrays data have been developed to unravel the complexity of gene regulation. One of the major problems with microarrays is that a dataset consists of relatively few time points with respect to a large number of genes. The dimensionality and high degree of noise are interesting problems in GRN modeling. In this paper we proposed a new integrated algorithm to overcome these problems. Our software show good performance comparable to previous methods and many of produced edges have evidence in the literature data. The proposed method was applied to time series gene expression data of Saccharomyces Cerevisiae and could potentially be applied to other networks in yeast as well as higher organisms.

K4Lecture Theatre

Session Chairs Prof. Mohamed Abdel-Aziz March 16, 2010

84

Page 85: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

6 Prof. Fatma Abo-Shady Prof. Taha Elsayed 12.30:15.00

The Influence of Pre-processing and Gene Rank Aggregation on Microarray Data Analysis

Vidan Fathi Ghoniem1, Nahed H. Souluma2, Yasser M. Kadah3

1 Biomedical Engineering Department, Misr University for Science and Technology, Egypt 2 Engineering Applications Department, NILES, Cairo University, Giza, Egypt 3 Systems and Biomedical Engineering Department, Cairo University, Giza, Egypt

Abstract

Preprocessing of microarray data might influence the precision of any further calculations based on these raw data. Important procedures should be considered, concerning preprocessing microarray data. This involves background correction, normalization, and detection of faulty spots from microarray data prior to analysis. In this study various methods for normalization and background correction were applied to a set of twenty samples presenting thyroid papillary cancer tissues versus patient-matched adjacent non-tumor thyroid tissues, in a trial to stand over the impact of preprocessing on the analysis results. To assess our results, we employed classification techniques to analyze the data after being preprocessed. This emphasizes the impact of preprocessing microarray data on gene expression analysis. Another challenge is to combine lists coming from different sources and platforms, for example different microarray chips, which may or may not be directly comparable otherwise. This is one of the major strengths of rank-based aggregation. Work is under way in this study to use genetic algorithm in the context of meta-analysis of several microarray cancer studies on liver where the goal is to determine the combined set of genes indicative of the cancer status. Genetic algorithm is applied to a set of sixty one samples presenting hepatitis C, another set of ten normal liver tissue samples, and a set of twenty seven liver cancer (primary tumor), in an attempt to predict biomarkers for progression towards hepatocellular carcinoma (liver cancer) in hepatitis C virus patients.

K5Lecture Session Chairs March 16, 2010

85

Page 86: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

Theatre 6

Prof. Mohamed Abdel-Aziz Prof. Fatma Abo-Shady Prof. Taha Elsayed 12.30:15.00

Identifying Candidate Informative Genes for Biomarker Prediction of Liver Cancer

Nagwan M. Abdel Samee, Nahed H. Solouma, Mahmoud Elhefnawy, Abdalla S. Ahmed,and Yasser M. Kadah

1Computer Engineering Dept, Misr University for Science and Technology, Egypt 2Engineering Applications Department, NILES, Cairo University, Giza, Egypt 3Informatics and System Department, NRC, Giza, Egypt 4,5Systems and Biomedical Engineering Department, Cairo University, Giza, Egypt

Abstract

Biomarker determination is a very important issue in medical research. Knowing the biomarker, better prognosis and diagnosis could be reached. Experimental prediction of biomarkers is lengthy and very costly. Recently, many studies have been conducted in the area of bioinformatics for Insilco prediction of biomarkers. This is assumed to save a lot of money while enabling us to explore many genetic issues. In this paper we provide a method to extract the most likely genes that could be considered as informative genes in microarrays of Hepatocellular Carcinoma. The used dataset is composed of fifty samples (19 normal and 31 tumor samples). We extracted the informative genes as those having the highest entropy. Those genes were considered as candidate biomarkers. The genes that have the highest mutual information with the well-known tumor biomarker Alpha fetoprotein gene were considered as candidate biomarkers. The results were validated by examining the presence of

86

Page 87: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

the experimentally known biomarkers among the extracted ones to get a confidence level.

K6Lecture Theatre

6

Session Chairs Prof. Mohamed Abdel-Aziz Prof. Fatma Abo-Shady Prof. Taha Elsayed

March 16, 201012.30:15.00

Estimation Of The Correlation Between Protein Sub-Function Categories Based On Overlapping Proteins

Khaled S. Ahmed1,2, Nahed H. Solouma3, Yasser M. Kadah2

1 Department of Biomedical Engineering, MTI University for Technology and Science, Katamia , Egypt [email protected]

2 Dept of Biomedical Engineering, Cairo University, Giza. [email protected] NILES, Cairo University [email protected]

AbstractUnknown protein function prediction is a hot and recent area of research. Protein functions may be predicted from sequences, gene expression, protein domains, protein localizations, protein structure and protein-protein interactions. In most cases, the researchers are interested in estimating the individual protein functions but not the relations between these functions. Obtaining some information about the relations between different functions is of great importance, since this would increase the certainty of protein function prediction. In this paper, we provide a new method for protein function prediction based on the relations between the functions of other interacted proteins. We tried to estimate a value representing the relation between each function and the other functions within the same category, depending on the number of overlapping proteins. The proposed method was applied to the yeast proteome and the results were promising. To increase the degree of certainty, the proposed method could be integrated with the PPI-based function prediction methods. Both integrated algorithms of protein-

87

Page 88: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

protein interactions and function relations are used to increase the accuracy of protein function prediction.

K7Lecture Theatre

6

Session Chairs:Prof. Mohamed El-Fouly Prof. Waleed FakhrProf. Abd Elaziz Ibrahim

March 17, 201009.00:10.30

Application of Rough Set Approach for Skin Lesions Segmentation

N. A. Masood (1), H. M. Mashali (2), Abdalla S. A. Mohamed (3)

1Department of Medical Engineering, Faculty of Engineering, Menia Universitye-mail: [email protected]

2Department of Dermatology, Faculty of Medicine, Cairo Universitye-mail: [email protected]

3Dept of Systems &Biomedical Eng., Faculty of Engineering, Cairo Universitye-mail: [email protected]

Abstract

This paper addresses differential diagnosis of skin lesions diseases which is a real problem in dermatology. Comparison is made between different techniques to diagnose the skin lesions quantitatively. However, noise is a main problem for image processing and pattern recognition. The method for skin lesion segmentation will influence the efficiency of skin diseases classification and diagnosis. Attribute reduction based on discernibility function in rough set can be used in data classification. This paper introduces color segmentation procedure using rough set approach applied to one of skin diseases named Atopic Dermatitis. Results of the proposed algorithm prove its success as the manual segmentation with expertise and also prove its

88

Page 89: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

success over segmentation using watershed technique, and k-means clustering technique for the same group of images.

K8Lecture Theatre

6

Session Chairs:Prof. Mohamed El-Fouly Prof. Waleed FakhrProf. Abd Elaziz Ibrahim

March 17, 201009.00:10.30

New Contrast Material to Enhance MRI Image of Brain

Yasser Mostafa Kadah1, Samir M. Badawi2, Wael Abou EL-wafa Ahmed3, and Hatem Sallam4

1PhD Professor of Biomedical Engineering,Cairo University ,E-mail: [email protected] of Electronic Engineering, Monoufia university,E-mail: [email protected]

3Assistant Teacher , Menia University , E-mail: [email protected]. of Diagnostic Radiology, Cairo University, E-mail: [email protected]

AbstractNew image enhancement technique is applied for MRI brain images. MRI couple group of images were taken over the same conditions and MRI protocol; before and after injection of the magnetized saline as contrast agents (CA).In this work a 40 years old 80kg male was injected with 250ml magnetized water. Expert eye inspections supported our visual detection that better image enhancement and evaluation of changes in the MRI image contrast. The focused study on MRI showed a significant difference in image intensities after injecting the magnetized saline compared to normal MRI image, Water contour of the white matter in T2 WIS is more obvious than before saline injection series. Leading to the result; magnetized saline

89

Page 90: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

injection affect signal intensity and enhance contrast in MRI brain images.

K9Lecture Theatre

6

Session Chairs:Prof. Mohamed El-Fouly Prof. Waleed FakhrProf. Abd Elaziz Ibrahim

March 17, 201009.00:10.30

Robust Three-Dimensional Model for Dentate Mandible with Temporomandibular Joint Based on Actual Computed

Tomography Data

Tamer M. Nassef1, Nahed H. Solouma2, Mona K. Marie3, Mohamed Elkhodary3, Abdullah S. Ahmed1, 4 and Yasser M. Kadah4

1Computer Engineering Department, Misr University for Science & Technology, 6th of October, Egypt, ([email protected])

2Laser in Engineering, NILES, Cairo University3Tissue Engineering center, Faculty of Dentistry, Alexandria University4Systems & Biomedical Engineering Department, Cairo University, Giza, Egypt

Abstract:

In this paper, numerical methods are used to build a three-dimensional (3D) model for human mandible with multi-objects from two-dimensional (2D) images captured by computed tomography (CT) scanner device. Three steps are used to evaluate realistic model; First step, segmentation techniques; are used to eliminate the undesired tissues, Second step, multi-object reconstruction technique; are used to evaluate both mandible bones and teeth, final step, texture models are generated. The output models are validated in comparison with the

90

Page 91: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

actual 3D model, which are generated by the CT scanner; they are meshed by tetrahedral elements to prepare the geometry for the finite elements analysis (FEA). Preliminary results are obtained for intensity measurements of teeth are presented.

K10Lecture Theatre

6

Session Chairs:Prof. Mohamed El-Fouly Prof. Waleed FakhrProf. Abd Elaziz Ibrahim

March 17, 201009.00:10.30

Signal Processing Methodologies for Digital Beamforming and Image Reconstruction in Ultrasound Imaging

Mawia A. Hassan1,2 , Ahmed S. Mohamed1, Abo-Bakr M. Youssef1, and Yasser M. Kadah 1

1 System & Biomedical Engineering Department, Cairo University, Giza, Egypt2 Biomedical Engineering Department, Sudan University of Science & Technology,

Khartoum, Sudan E-mail: [email protected]

ABSTRACTPC-based implementations for sophisticated medical imaging technologies have emerged where powerful multi-core computational ability replaces expensive embedded systems. As expand of our previous work-PC Based Modulator Digital Ultrasound Imaging system-we presented here the processing steps done on the PC side. Two type of array element was described: virtual and physical array elements to form N-channel beamformer. The results shown that virtual array elements was given good results in linear array image reconstruction than physical array elements, because it provides additional number of lines. However, physical array elements shown a good results in linear phase array reconstruction (steering) than virtual array elements, because the active elements number (Aperture) is less than in physical array elements. We applied three windowing functions (Hamming, Blackman, and Kaiser (β=4)) to reduce the side lobes. Moreover, the

91

Page 92: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

envelope detection was done and the data was compressed using log compression to a range used for display (8 bits), because the maximum dynamic range of the human eye is in the order of 30 dB. Finally we checked the quality of the image using quantitative entropy measured.

K11Lecture Theatre

6

Session Chairs:Prof. Mohamed El-Fouly Prof. Waleed FakhrProf. Abd Elaziz Ibrahim

March 17, 201009.00:10.30

A New Genomic Signal Processing Method for Identifying Protein-Coding Regions in a DNA Sequence

Ashraf M. Aziz*, Member IEEE

* Assoc. Prof., Electrical Engineering Department, Military Technical College, Cairo, Egypt

Abstract

Signal processing theory, methods, and applications are becoming increasingly very important in the study of genes in the field of bioinformatics. In this paper, a new signal processing method for identifying the protein-coding regions in genes is proposed. Unlike the existing methods, which depend on the pronounced period three peaks observed in the Fourier transform of the coding regions in genes using binary indicator sequences and rectangular window, the proposed method relies on soft indicator sequences and a gradual window. The proposed method reveals period three peaks for coding regions and achieves better discrimination between the coding areas and non-coding regions based on experimental data of a number of genes,

92

Page 93: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

compared to the existing methods based on binary indicator sequences and rectangular window.

K12Lecture Theatre

6

Session Chairs:Prof. Mazhar Tayel Prof. Mohamed El_AdawyProf. Ali Hassan Mostafa

March 17, 201012.30:14.00

Human Identification using ECG Signal

Mohamed M. Tawfik, Hany Selim and Tarek Kamal

Electrical Engineering Department, Assiut University, Egypt

Email: [email protected]

Abstract

In this paper the possibility of using the ECG signal as a Biometrics feature for human identification is investigated. A test set of 550 lead I ECG traces recorded from 22 healthy people at different times are used to validate the system. The proposed system extracts special parts of the ECG signal starting from the QRS complex to the end of the T wave. Two different approaches were used to compensate for the change in the signal shape with the change in Heart Rate, By the first approach time domain normalization according to Framingham correction formula[1] is used. By the second approach the QT signal to a fixed length is applied. Finally the ability to use only the QRS complex for identification without any time domain manipulation has

93

Page 94: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

been investigated. Selected DCT coefficients obtained from the normalized signals were introduced to a Neural Network based classifier. Experiments show a very promising possibility of using ECG as a biometrics feature.

K13Lecture Theatre

6

Session Chairs:Prof. Mazhar Tayel Prof. Mohamed El_AdawyProf. Ali Hassan Mostafa

March 17, 201012.30:14.00

A Novel Method for ECG Signal Discrimination of Cardiac Arrhythmias Based on Pade’s Approximation Technique

Moustafa A. Bani-Hasan*, Yaser M. Kadah*, Mohamed E. M. Rasmy*, and Fatma M. El-Hefnawi **

*Biomedical Engineering Department, Cairo University,Egypt, ([email protected])

** Electronic Research institute, Dokki, Cairo, Egypt, ([email protected])

Abstract

This paper presents an electrocardiogram (ECG) beat classification scheme based on Pade’s approximation technique and neural networks for discriminating five ECG beat types. These are normal rhythm (NR), ventricular couplet (VC), ventricular tachycardia (VT), ventricular bigeminy (VB), and ventricular fibrillation (VF). ECG signal samples from MIT-BIH arrhythmia database are used to evaluate the proposed method. The ECG signal is modeled as a rational function of two polynomials of unknown coefficients using Pade’s approximation technique, where the model coefficients, poles of the denominator, are used as a feature for the ECG signals. The

94

Page 95: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

classification is performed using a multilayered perceptron (MLP) neural network. The experimental results demonstrate the efficiency of the proposed techniques for modeling and classifying the ECG beat types using Pade’s approximation technique and MLP neural network.

K14Lecture Theatre

6

Session Chairs:Prof. Mazhar Tayel Prof. Mohamed El_AdawyProf. Ali Hassan Mostafa

March 17, 201012.30:14.00

Implanting of an Ultra-wide Band Sensor in the Human Body

Mohamed A.A.Eldosoky1 and A.S.Omar2 Member IEEE,

1Dept of Biomedical Engineering Faculty of Engineering Helwan University Egypt2 Chair of Microwave and Communication Engineering, University of Magdeburg,

Germany

Abstract

The aim of this paper is to study the effect of the human body on the field distribution as the sensor is implanted under the skin as a tool for transmitting the vital signal to the outside controlling station. 3-D human model is used with its real dimension as a patient in the intensive care unit. The suitable position of the receiving ultra wide band sensor is proposed for improving the

95

Page 96: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

transmitting coefficient between the implanted and the outside antennas.

K15Lecture Theatre

6

Session Chairs:Prof. Mazhar Tayel Prof. Mohamed El_AdawyProf. Ali Hassan Mostafa

March 17, 201012.30:14.00

A Cheap proposed method for measuring the glucose concentration in the blood

Mohamed A.A. Eldosoky

Dept of Biomedical Eng, Faculty of Engineering, Helwan university e-mail: [email protected]

Abstract

In this paper, a new method was proposed for determining the concentration of the glucose in the blood. This method has depended on the surface acoustic wave sensor that can be used in many applications such as a delay line in the television circuits. By using this delay line as a sensor, the characteristic of the received signal had changed as changing the concentration of the glucose in the blood. The used blood samples from more than 40 persons had been

96

Page 97: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

measured by using a reference blood glucose device then it had been dropped between the interdigital transducers of the SAW sensor. The concentration of the glucose was determined without any chemical agent.

K16Lecture Theatre

6

Session Chairs:Prof. Mazhar Tayel Prof. Mohamed El_AdawyProf. Ali Hassan Mostafa

March 17, 201012.30:14.00

The Coding System of the Fingers Movements Detected by the Ultra-wide Band Radar

Mohamed A.A. Eldosoky

Dept of Biomedical Eng, Faculty of engineering. Helwan [email protected]

Abstract

The coding system of the fingers movements depends on the differences in the characteristics of the muscles responsible for these movements. The ability of the ultra wide band radar as a tool for identifying the movements of each finger is presented. This step will facilitate the ability of the ultra wide band radar in designing a coding system for the movements of the fingers within each hand.

97

Page 98: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

98

Page 99: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

P1Lecture Theatre

4

Session Chairs: Prof. Mohammed FokaireenProf. Magdi Kotb

March 18, 201012.30:13.30

PERFORMANCE EVALUATION OF OPTICAL CODE DIVISION MULTIPLE ACCESS (OCDMA) SYSTEMS WITH CHAOTIC SPREADING CODES BASED ON BAKER MAP

Gamal A. Hussein , Ibrahim M. Eldokany , Abdelnaser. A. Mohamed , Osama A. Oraby and Fathi E. Abd EL-Samie

Engineering Sector of Broadcast, Egyptian Radio and Television Union, Egypt**Department of Electronics and Electrical Communications, Faculty of Electronic Engineering, Menoufia University, Menouf, 32952, Egypt

Email: [email protected], [email protected]

Abstract

Of all kinds of multiple access techniques, OCDMA is considered the strongest candidate to challenge the rapid evolution of optical communication systems. However, multiple access interference (MAI), which is originated from simultaneous users, severely limits the capacity of the system. The effect of MAI can be mitigated by choosing appropriate spreading sequences with appropriate crosscorrelation properties. Chaotic spread spectrum privileged over conventional spread spectrum by the random-like behavior, the efficient utilization of bandwidth, the

99

Page 100: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

nonperiodicity and the difficult to predict the codes. In this paper, a new chaotic spreading code based on Baker map is presented to enhance the performance of the OCDMA system. A comparison between the performance of the conventional pseudo random (PN) codes and the proposed chaotic spreading code is presented in the paper. Numerical results reveal the superiority of the proposed chaotic spreading code to the conventional PN codes.

P2Lecture Theatre

4

Session Chairs: Prof. Mohammed FokaireenProf. Magdi Kotb

March 18, 201012.30:13.30

DSP Implementation Aspects for a Generic Frequency Hopped Transceiver

Hossam E. Ahmed †, A. A. Zekry ‡, Adel E.Elhennawy ‡, Ayman M. Hassan †

† Electrical Engineering Department-High Institute of technology-Benha University‡ Electronics and Communications Dept-Faculty of Eng.,-Ain Shams University

Abstract

Frequency hopping is a foremost type of spread spectrum technology that has many advantages. Particularly, frequency hopping is a well-known technique for combating narrow-band interference, jamming and multipath with inherent security and selective addressing capabilities. Therefore, it is increasingly utilized in the license-free Industrial, Scientific and Medical (ISM) band. Owing these enormous consequences of Frequency Hopping Spread Spectrum (FHSS), we develop a generic FHSS transceiver that can be employed in many applications such as Cellular Mobile, Bluetooth Personal Area Networks (PAN), Wireless Local Area Networks (WLAN), Code

100

Page 101: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

Division Multiple Access (CDMA) systems and Radar systems. In order to implement such generic transceiver we utilize one of the most powerful modern implementation techniques namely; the Digital Signal Processor (DSP). The performance of our proposed FHSS transceiver is evaluated via the BER calculation.

P3Lecture Theatre

4

Session Chairs: Prof. Mohammed FokaireenProf. Magdi Kotb

March 18, 201012.30:13.30

Simulation of Some Advanced Technologies inWireless Communication Systems

Mustafa Ahmed Abdel Hady and Mustafa Mohamed Abd Allah Meselhy

(Graduate Students ELE 685 Spread Spectrum Techniques Course‐ )Dept. of Electrical Engineering, Faculty of Engineering, Alexandria University, Alexandria 21544, Egypt. E-mails: [email protected], [email protected]

Under the Supervision ofProf. Dr. Said El-Khamy, Life Fellow [email protected] mail: E

AbstractAdvanced technologies like OFDM (Orthogonal Frequency Division Multiplexing) and MIMO (Multiple-Input, Multiple-Output) are the key digital communication technologies of the current decade. In this document, two MATLAB GUI-based simulators are introduced. The

101

Page 102: Prefacexa.yimg.com/kq/groups/22755670/178829141/name/prog&abs.doc · Web viewGeneration of Strong Cryptographic Keys Using Wavelet-Based Iris Codes Hassan Elkamchouchi, Wafaa Shouaib,

The 27th National Radio Science Conference, NRSC'2010

March 16-18, 2010

first simulator is a general OFDM-based system.The second simulator is for the Mobile WiMAX IEEE802.16e standards.The simulator plots the BER-SNR curves and calculates the data rate for the used parameters. Also, in the downlink, the multiple antenna systems are modeled like STC (Space Time Coding) and SM (Spatial Multiplexing). The simulator finds the SNR thresholds for switching from STC to SM for the different modulation schemes and code rates.

Thank You

The National Radio Science Committee, the Academy of Scientific Research and Technology, and the Faculty of Electronic Engineering would like to present their sincere gratitude and thanks to all who supported the 27th National Radio Science Conference (NRSC’ 2010).

102


Recommended