Nihad A. A. Elhag, Isam M. Osman, Alaa A. Yassin, Tsneem B. Ahmed
{"title":"Angle of arrival estimation in smart antenna using MUSIC method for wideband wireless communication","authors":"Nihad A. A. Elhag, Isam M. Osman, Alaa A. Yassin, Tsneem B. Ahmed","doi":"10.1109/ICCEEE.2013.6633909","DOIUrl":"https://doi.org/10.1109/ICCEEE.2013.6633909","url":null,"abstract":"Smart antenna technology in mobile communication is one of the most promising techniques enhance the capacity of communications networks. One of the problematic issues in smart antenna is the detection of arrival signal in different angles in multipath Rayleigh fading channel. In this paper a new smart antenna signal processing method for estimating the signal angle of arrival (AoA) is proposed, by using MUSIC method for wideband wireless communications. The simulation is conducted under different random signal arrivals and space between array elements. The achieved results show that the proposed method determined exact angle of arrival of more than 90% of the received signals Rayleigh fading channel.","PeriodicalId":256793,"journal":{"name":"2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131030763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Segmentation algorithm for Arabic handwritten text based on contour analysis","authors":"Yusra Osman","doi":"10.1109/ICCEEE.2013.6633980","DOIUrl":"https://doi.org/10.1109/ICCEEE.2013.6633980","url":null,"abstract":"Segmentation is the process of dividing the binary image into useful regions according to certain conditions. It is the most important phase in any optical character recognition (OCR) system and its accuracy affects significantly the recognition rate of that system. In cursive nature languages such as Arabic, the segmentation procedure is complicated especially in handwritten documents because writers' styles differs as well as the special cases of characters overlapping and ligatures. Hence, the design of the segmentation algorithms must be based on general descriptors that most writers follow. In this paper, a segmentation algorithm for Arabic handwriting has been developed. The main idea of the algorithm is to divide the selected image into lines and sub-words. Then, for each subword, the contour of each sub-word is traced. After that, the algorithm detects the exact points where the contour changes its state from a horizontal line to another state of vertical or curved line. Finally, the coordinates of these points are considered as the segmentation points. The algorithm was tested over the IFN/ENIT database words. Over 537 tested words containing 3222 character; the algorithm achieved 89.4% of correct character segmentation points.","PeriodicalId":256793,"journal":{"name":"2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132594687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Human posture recognition and classification","authors":"Othman Omran Khalifa, K. K. Htike","doi":"10.1109/ICCEEE.2013.6633905","DOIUrl":"https://doi.org/10.1109/ICCEEE.2013.6633905","url":null,"abstract":"Human posture recognition is gaining increasing attention in the field of computer vision due to its promising applications in the areas of personal health care, environmental awareness, human-computer-interaction and surveillance systems. Human posture recognition in video sequences is a challenging task which is part of the more general problem of video sequence interpretation. This paper presents a novel an intelligent human posture recognition system for video surveillance using a single static camera. The training and testing were performed using four different classifiers. The recognition rates (accuracies) of those classifiers were then compared and results indicate that MLP gives the highest recognition rate. Moreover, results show that supervised learning classifiers tend to perform better than unsupervised classifiers for the case of human posture recognition. Furthermore, for each individual classifier, the recognition rate has been found to be proportional to the number of postures trained and evaluated. Performance comparisons between the proposed systems and existing systems were also carried out.","PeriodicalId":256793,"journal":{"name":"2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120858069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. H. Masud, S. A. Latif, F. Anwar, A. Abdalla, M. K. Alam
{"title":"An analysis of resource sharing scheme in heterogeneous wireless campus network","authors":"M. H. Masud, S. A. Latif, F. Anwar, A. Abdalla, M. K. Alam","doi":"10.1109/ICCEEE.2013.6634017","DOIUrl":"https://doi.org/10.1109/ICCEEE.2013.6634017","url":null,"abstract":"The next generation wireless technology systems are being devised with the vision of heterogeneity where a Multimode Device (MD) would be connected with multiple wireless networks like GSM, WiFi, and WiMAX. Bandwidth is one of the main resources of these technologies which is operated independently that need to be aggregated among these technologies in Heterogeneous Wireless Network (HWN). This paper aims to investigate the issues of campus based heterogeneous wireless network, its benefits and challenges. It has been found that an efficient scheduling model for packet reordering and an appropriate interface selection mechanism are important for HWN. Besides its benefits, this paper also addresses the schemes including genetic algorithm, fuzzy logic technique and game theory those have been using for bandwidth allocation. Finally, this paper proposes a mechanism for bandwidth allocation in a HWN environment.","PeriodicalId":256793,"journal":{"name":"2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE)","volume":"164 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124598094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Prepaid energy meters network via power system communication","authors":"K. Ramadan, E. Zakaria, Dalia M. Eltigani","doi":"10.1109/ICCEEE.2013.6634020","DOIUrl":"https://doi.org/10.1109/ICCEEE.2013.6634020","url":null,"abstract":"This paper presents a new idea of designing a prepaid energy meters that has the ability of being connected to a unified centre (Energy Company). The process of connecting the meters to a unified centre can facilitate the security, control and maintenance purposes. The mentioned network is economical because it is established using the existing power lines instead of constructing a new wired or wireless network. The data are transmitted over this network using Power Line Communication (PLC) technology. A special device is used to inject the data to the network and captures them from the network; this device is the power line communication modem. A simple design of the network is done using two computers and two modems (PLM) plus a program code. By using a modem the program can take the measured data from the meter then send them to the computer server and vice versa. The designed network makes the energy company able to access any prepaid energy meter in the unified area and control the measurements of this meter; and as a result, stealing of electricity can be prevented. Also company can communicate with the consumer by sending text messages such as a serial number for recharging the energy or alarm the consumer before the whole amount of electricity is totally consumed. Moreover, this network offers the ability of controlling the supply of energy such as switch “On” or “Off” of the electricity supply.","PeriodicalId":256793,"journal":{"name":"2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129475236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of transient stability assessment using artificial neural networks","authors":"Dalia M. Eltigani, K. Ramadan, E. Zakaria","doi":"10.1109/ICCEEE.2013.6634018","DOIUrl":"https://doi.org/10.1109/ICCEEE.2013.6634018","url":null,"abstract":"This paper aims at verifying the accuracy of Artificial Neural Networks (ANN) in assessing the transient stability of a single machine infinite bus system. The fault critical clearing time obtained through ANN is compared to the results of the conventional equal area criterion method. The multilayer feedforward artificial neural network concept is applied to the system. The training of the ANN is achieved through the supervised learning; and the back propagation technique is used as a learning method in order to minimize the training error. The training data set is generated using two steps process. First, the equal area criterion is used to determine the critical angle. After that the swing equation is solved using the point-to-point method up to the critical angle to determine the critical clearing time. Then the stability of the system is verified. As a result we find that the critical clearing time is predicted with slightly less accuracy using ANN compared to the conventional methods for the same input data sets unless the ANN is well trained.","PeriodicalId":256793,"journal":{"name":"2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128463135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance of standardized routing protocols in ad-hoc networks","authors":"Tariq Alahdal, Saida Mohammad","doi":"10.1109/ICCEEE.2013.6633902","DOIUrl":"https://doi.org/10.1109/ICCEEE.2013.6633902","url":null,"abstract":"Mobile ad-hoc network (MANET) is a collection of mobile nodes that form dynamic and temporary networks. The wireless links in this network are highly error prone and can go down frequently due to mobility of nodes, interference, and less infrastructure. One of the challenges in the study of MANET routing protocols is the dynamically changing topology. Hence, they establish an efficient communication path between the source and destination nodes with minimum routing overhead and bandwidth consumption. The design problem of such routing protocol is not straightforward since MANET environment introduces new challenges that are not present in fixed networks. In this paper, we study and compare the performance of the following routing protocols AODV, DSR, DSDV, RAODV, AOMDV, and TORA. Network Simulator (NS) version 2.34 is used to study the relative performance of the routing protocols varying network traffic load and pause time. The results show that AOMDV has better performance than RAODV and AODV in terms of average end-to-end delay.","PeriodicalId":256793,"journal":{"name":"2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127118305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. M. Taha, T. A. Alhaj, Ala E. Moktar, Azza H. Salim, S. M. Abdullah
{"title":"On password strength measurements: Password entropy and password quality","authors":"M. M. Taha, T. A. Alhaj, Ala E. Moktar, Azza H. Salim, S. M. Abdullah","doi":"10.1109/ICCEEE.2013.6633989","DOIUrl":"https://doi.org/10.1109/ICCEEE.2013.6633989","url":null,"abstract":"In this paper, we propose a new algorithm to compute the strength of passwords based on two measurements, mainly: password entropy and password quality. The passwords considered by the algorithm consist of eight characters alpha numeric with special characters. For such passwords, the analysis phase identified the low/high entropy patterns and low/high quality passwords. The analysis yields two rules: high entropy passwords are also high quality passwords, and low quality passwords are low entropy passwords.","PeriodicalId":256793,"journal":{"name":"2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127414522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Method of computing maximum loadability, using continuation power flow, case study sudan national grid","authors":"E. Zakaria, K. Ramadan, Dalia M. Eltigani","doi":"10.1109/ICCEEE.2013.6634019","DOIUrl":"https://doi.org/10.1109/ICCEEE.2013.6634019","url":null,"abstract":"This work presents a method of finding a continuum of power flow solutions starting at some base load and leading to the steady state voltage stability limit (critical point). Continuation power flow calculation plays a key role to understand the limitation of power flow solutions in varying loads. It is a very useful for evaluation of the critical point of the PV curve in static voltage stability. P-V curves are constructed to calculate loadability margins and identify the weakest bus in the system. However, drawing the P-V curve is time consuming in large-scale power systems. As a result, the open source Power System Analysis Toolbox (PSAT) MATLAB software package is used for analysis. PSAT includes power flow, continuation power flow, optimal power flow, and small-signal stability analysis. In this work we used continuation power flow only. The proposed method is successfully applied to the National Grid. Our methods provided several results. The validity of results is investigated with the known IEEE 30-bus system as a bench mark.","PeriodicalId":256793,"journal":{"name":"2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132490378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Binary LU encryption","authors":"Abdelahaliem Abbas Othman","doi":"10.1109/ICCEEE.2013.6633931","DOIUrl":"https://doi.org/10.1109/ICCEEE.2013.6633931","url":null,"abstract":"In this paper, an encryption scheme using binary matrices as an encryption/decryption keys is presented. The scheme can be viewed as a binary version of the classical Hill Cipher with a new method for generating a random key-matrix and its inverse simultaneously using LU factorization method. The scheme is resistant to the known-plain-text attack, which is the main weakness in the classical Hill Cipher. Bitwise operations in matrix multiplications were used, and the speed is comparable to AES.","PeriodicalId":256793,"journal":{"name":"2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127855633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}