Sami H. O. Salih, Mamoun M. A. Suliman, A. Mohammed
{"title":"A novel spectrum sensing scheduler algorithm for Cognitive Radio Networks","authors":"Sami H. O. Salih, Mamoun M. A. Suliman, A. Mohammed","doi":"10.1109/ICCEEE.2013.6633961","DOIUrl":"https://doi.org/10.1109/ICCEEE.2013.6633961","url":null,"abstract":"Cognitive Radios' is recognized as a novel approach to improve the utilization of a precious wireless communication natural resource; the radio frequency spectrum. Historically, telecom regulators assigned fixed spectrum bands to the licensee wireless network operators, this spectrum management approach is guarantee interference free environment, except of some configurations faults or illegal usage. However, with the increasing demand for more bandwidth in the finite radio spectrum, the concept of secondary operator's was emerged, but with emphases to not influence licensed operators. Consequently, Cognitive Radio Networks (CRN) architecture enters the market as an intelligent solution to these issues, with concentration on the spectrum sensing procedures to achieve the regulatory constraint. The most successful sensing algorithms is those applying cooperation and scheduling to have better scanning information, however those algorithms are developed base on the primary network activities which is good in terms of reducing the expected interference, but it lay more computational loads on the CRN. In this paper, a novel sensing scheduler algorithm is proposed, the idea is to utilize the CRN by fairly distribute the sensing task among the sensors, then utilizing the radio spectrum shared with the primary networks.","PeriodicalId":256793,"journal":{"name":"2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126770119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multicasting in network mobility using multicast anchor agent","authors":"R. Saeed, Abdelmoez A. Adam Eisa","doi":"10.1109/ICCEEE.2013.6633975","DOIUrl":"https://doi.org/10.1109/ICCEEE.2013.6633975","url":null,"abstract":"This paper discusses the cost functions of the three multicast schemes Bi-directional Tunneling, Remote Subscription and Agent Based. To developed from a probability model of engagement between any mobile network nodes in multicast group to a home agent. So the performance parameters required taken under continuous session duration constraints, taken in account the effects of nesting topology of Network mobility system and movement of it NEMO cluster. The cost functions of providing multicast among BT, RS and AB are compared. Then we used the probabilities of multicast anchor agent forwarding data to their destinations, to formulate the multicast path function as a 0-1 knapsack problem_1 to show the selected items (multicast paths) according to the mentioned optimization selection conditions. It was shown that the performance of AB multicast schemes is better than BT and RS.","PeriodicalId":256793,"journal":{"name":"2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133919316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. A. M. Elhag, M. A. Elshaikh, Radziah Mohamed, M. Babar
{"title":"Problems and future trends of software process improvement in some Sudanese software organizations","authors":"A. A. M. Elhag, M. A. Elshaikh, Radziah Mohamed, M. Babar","doi":"10.1109/ICCEEE.2013.6633945","DOIUrl":"https://doi.org/10.1109/ICCEEE.2013.6633945","url":null,"abstract":"The software process improvement is initiated to achieve the quality of the software processes which lead to quality of final software products. Software processes are improved by implementing software process standards. These standards are often called software process improvement frameworks or standards. Software process improvement is necessary to increase the efficiency and productivity of software companies and enhance the final software products. However, most of the Sudanese software companies do not follow any software process improvement standards. For this reason, normally these companies produce the software without high quality. Furthermore, the low quality may be the cause of some problems such as unreliable software and high maintenance. Some of the Sudanese software organizations were visited, to interview software experts and observe how these organizations can improve their software process. Furthermore, the results of these interviews have been used to design a questionnaire in order to show the relationship between Sudanese software organizations and software process improvement standards. This study has identified the problems faced by these organizations during the implementation of software process improvement standards and shows the ability of these organizations to implement the software process improvement standards. Moreover, this work can be used as a first step towards to produce software process improvement standard for the Sudanese software industry.","PeriodicalId":256793,"journal":{"name":"2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE)","volume":"103 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114188012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel control method of grid connected doubly fed induction generator under variable wind speed","authors":"Zakieldeen M. E. Elhassan, Tang Yia, Li Yang","doi":"10.1109/ICCEEE.2013.6633913","DOIUrl":"https://doi.org/10.1109/ICCEEE.2013.6633913","url":null,"abstract":"This paper has presented a novel control method of DFIG connected to the grid under variable wind speed and dynamic mode during the system operation. The control method is deeply done in the DFIG converter's control. The parameter controls which applied in grid side control are electromagnetic torque and DC link voltage, whereas in the rotor side, the converter uses DFIG rotor speed and reactive power. The electromagnetic torque has been used as an essential part in the GSC control instead of grid reactive power. Both GSC and RSC are used back to back converters with two-level IGBT devices which the pulses are generated from the PWM. The simulation carried out using PSCAD/EMTDC program. The results show that, this method is a suitable to apply in DFIG with variable wind speed in dynamic operation and steady state. And also the validation of the method reliability has been demonstrated.","PeriodicalId":256793,"journal":{"name":"2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116676561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Verifying abstract data types a hybrid approach","authors":"N. Ahmed","doi":"10.1109/ICCEEE.2013.6634014","DOIUrl":"https://doi.org/10.1109/ICCEEE.2013.6634014","url":null,"abstract":"At a time when software products are taking on increasingly critical functions, and are growing increasingly large and complex, the need to ensure their quality also increases significantly. Yet, despite several decades of research, the verification of software products of industrial size and complexity remains an unfulfilled challenge. In this paper, we discuss a hybrid approach to the verification of abstract data types against axiomatic specifications, which consists in deploying static techniques and dynamic techniques in a complementary manner, avoiding the drawbacks of each technique used in isolation.","PeriodicalId":256793,"journal":{"name":"2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE)","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122057585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mazin Ahmed Elhag, A. Yassin, Mahmoud Esawi Babiker, Elhussein Abd Elrahman Abd Elmageed
{"title":"The unscented Kalman filter applied to satellite orbit determination using only publically available two-line element sets","authors":"Mazin Ahmed Elhag, A. Yassin, Mahmoud Esawi Babiker, Elhussein Abd Elrahman Abd Elmageed","doi":"10.1109/ICCEEE.2013.6633983","DOIUrl":"https://doi.org/10.1109/ICCEEE.2013.6633983","url":null,"abstract":"Satellite Orbit Determination (OD) is the process to estimate the position and velocity (the state vector, state, or ephemeris) of an orbiting object. Any satellite in its orbit faces many perturbation forces that affect its position in its orbit and therefore affect the tracking system. This leads to search for a method to correct these drifts. The nonlinear problem of tracking and predicting where a satellite will be over some time is one of OD early challenges. This report shows the design and implementation of an unscented Kalman filter for nonlinear estimation applied to satellite orbit determination, the way it was embedded and the effects of adding it on the tracking results to get more accurate orbital estimation, by correcting the tracking data (from Two-Line Element, TLE, data sets) itself rather than using any external source of measurement for comparison and correction (GPSs, optical sensors, radars...etc.).","PeriodicalId":256793,"journal":{"name":"2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125344413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive multifunction filter for radar signal processing","authors":"Moutaman Mirghani Daffalla","doi":"10.1109/ICCEEE.2013.6633904","DOIUrl":"https://doi.org/10.1109/ICCEEE.2013.6633904","url":null,"abstract":"Filtering of radar signals frequently takes place to realize a certain task, such as interference reduction or Doppler processing to remove clutter. However, in this paper a digital filter is proposed to be designed as a multifunction processor, achieving several sorts of signal processing within the same module. Processing is easily done in the baseband rather than in passband, for a moderately slow DSP processor. Hence, a lowpass filter will perform the task of rejection of the out-of-band interference. Higher SNR can be obtained to enhance the detection of targets inside noise if that filter is matched to the expected radar signal, even if it caused signal distortion. Doppler processing makes use of digital filters to cancel signals from fixed and slow targets. The proposed filter would be designed as an adaptive filter to follow interference and clutter changes, and eliminate blindness to some moving radar targets that arise in digital Doppler processing due to aliasing caused by targets of higher speeds. Matlab simulations are made to validate the idea and observe features and limitations of the proposed adaptive filter. Adaptive filter that is based on the least-mean-square algorithm is designed to achieve the best outcome.","PeriodicalId":256793,"journal":{"name":"2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125556119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A hybrid approach to secure transmitted messages using advanced encryption standard (AES) and Word Shift Coding Protocol","authors":"Abdelrahman Altigani, Bazara I. A. Barry","doi":"10.1109/ICCEEE.2013.6633920","DOIUrl":"https://doi.org/10.1109/ICCEEE.2013.6633920","url":null,"abstract":"The key idea behind this study is to propose a new approach that provides an additional layer of protection to transmitted messages over a communication network. The approach combines the well known symmetric encryption algorithm (AES) and the steganography protocol Word Shift Coding Protocol. The AES is used to equip the “secret” data with initial confidentiality layer; then the encrypted data are represented in binary, and hidden in a textual carrier. As will be discussed in the paper, the resulting model has a far better impact on the confidentiality of the transmitted message and overall computational security of the system.","PeriodicalId":256793,"journal":{"name":"2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE)","volume":"177 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125801973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling consumer loan default prediction using ensemble neural networks","authors":"Amira Kamil Ibrahim Hassan, A. Abraham","doi":"10.1109/ICCEEE.2013.6634029","DOIUrl":"https://doi.org/10.1109/ICCEEE.2013.6634029","url":null,"abstract":"In this paper, a loan default prediction model is constricted using three different training algorithms, to train a supervised two-layer feed-forward network to produce the prediction model. But first, two attribute filtering functions were used, resulting in two data sets with reduced attributes and the original data-set. Back propagation based learning algorithms was used for training the network. The neural networks are trained using real world credit application cases from a German bank datasets which has 1000 cases; each case with 24 numerical attributes; upon, which the decision is based. The aim of this paper was to compare between the resulting models produced from using different training algorithms, scaled conjugate gradient backpropagation, Levenberg-Marquardt algorithm, One-step secant backpropagation (SCG, LM and OSS) and an ensemble of SCG, LM and OSS. Empirical results indicate that training algorithms improve the design of a loan default prediction model and ensemble model works better than the individual models.","PeriodicalId":256793,"journal":{"name":"2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE)","volume":"51 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125867384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fadlelmoula Mohamed Baloul, Mohsin Hassan Abdullah, E. A. Babikir
{"title":"ETAOSD: Static dictionary-based transformation method for text compression","authors":"Fadlelmoula Mohamed Baloul, Mohsin Hassan Abdullah, E. A. Babikir","doi":"10.1109/ICCEEE.2013.6633967","DOIUrl":"https://doi.org/10.1109/ICCEEE.2013.6633967","url":null,"abstract":"The aim of this paper is to present a new static dictionary-based algorithm for text transformation to increase the data compression ratio when using standard compression tools. The basic idea of the new algorithm is to define a pattern for each word in a static dictionary by replacing all or most of the characters in the words of the dictionary by the most frequently used character in any text file. The proposed algorithm transforms any text file into another encrypted file with a size almost the same as that of the original text file but with different statistical properties. The new transformation method has been designed, implemented, and tested using Gutenburg Corpus. Generally, the output result has shown different levels of enhancements on different common standard data compression tools such as Arithmetic, Huffman, Bzip2, Gzip and WinZip. The compression performance of all common compression tools has been enhanced especially when the patterns of the transformed words passed through costless running length encoding (RLE) algorithm. On using Bzip2, the resultant output files produced about 76.75% as compression ratio with 1.88 as average code length. The final result is very promising and it could be enhanced more in case of applying dynamic dictionary-based text transformation technique.","PeriodicalId":256793,"journal":{"name":"2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130889254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}