Gerges M. salama - Academia.edu (original) (raw)
Papers by Gerges M. salama
Journal of Advanced Engineering Trends (JAET)/Journal of Advanced Engineering Trends (JAET), Jan 22, 2024
Physica Scripta, Dec 26, 2023
Известия высших учебных заведений России. Радиоэлектроника, 2011
2020 3rd International Conference on Computer Applications & Information Security (ICCAIS), 2020
Cognitive radio is development of wireless communication and mobile computing. Spectrum is a limi... more Cognitive radio is development of wireless communication and mobile computing. Spectrum is a limited source. The licensed spectrum is proposed to be used only by the spectrum owners. Cognitive radio is a new view of the recycle licensed spectrum in an unlicensed manner. The main condition of the cognitive radio network is sensing the spectrum hole. Cognitive radio can be detect unused spectrum. It shares this with no interference to the licensed spectrum. It can be a sense signals. It makes viable communication in the middle of multiple users through co-operation in a self-organized manner. The energy detector method is unseen signal detector because it reject the data of the signal.In this paper, has implemented Simulink Energy Detection of spectrum sensing cognitive radio in a MATLAB Simulink to Exploit spectrum holes and avoid damaging interference to licensed spectrum and unlicensed spectrum. The hidden primary user problem will happened because fading or shadowing. Ithappens when cognitive radio could not be detected by primer users because of its location. Cooperative sensing spectrum sensing is the best-proposed method to solve the hidden problem.
2016 IEEE Student Conference on Research and Development (SCOReD), 2016
This paper describes in details the IPTV (Internet Protocol Television) system. Also, measurement... more This paper describes in details the IPTV (Internet Protocol Television) system. Also, measurement methods of the QoS parameters are analyzed, debating a practical application for evaluation of IPTV traffic parameters. QoS (Quality of Service) parameters such as IP Packet Transfer Delay (IPTD), IP Packet Delay Variation (IPDV) and packet loss Ratio (IPLR). The recent Internet is working under TCP/IP (Transmission Control Protocol/Internet Protocol) protocol stack and is based on two main fundamentals, which are: network offers only one class of service named best effort service, and network resources are overprovisioned as possible in order to minimize packet losses and packet delays. The Internet providers aim to provide packet transfer to users as fast as possible, However they are far from guaranteeing, so called, rigid quality of service (QoS) that is measured by the maximum allowable values of such parameters as IPTD, IPDV and IPLR. Furthermore, network abilities of packet transfer determine the range of applications which users may use with appropriate satisfaction these applications such as IPTV. ANYLOGIC Professional6 software was used to analysis the QoS parameters for IPTV and our results help in critically analyzing QOS parameters for IPTV applications.
International Transactions on Electrical Energy Systems, Dec 27, 2018
In this paper, an energy management strategy of direct current (DC) microgrids (MGs) is presented... more In this paper, an energy management strategy of direct current (DC) microgrids (MGs) is presented. The proposed MG consists of fuel cells, batteries, and supercapacitors, along with associated DC/DC and DC/AC converters. Coordination between different sources of MG is implemented using a multi-agent system. Multi-agent algorithm is implemented using an open source agent building toolkit, Java Agent Development framework (JADE). The energy source components are modeled and implemented using MatLab/Simulink (power system library). The proposed energy management strategy is designed using proportional-integral (PI) controllers, which is implemented using the JADE. Interface between MatLab/Simulink and multi-agent system (JADE) is done with the help of MACSimJX. The proposed multi-agent framework is presented and the interface between the JADE and MatLab/Simulink is described in details. Then, the design and implementation steps of the PI controller using JADE are presented. Simulation work is carried out, and the results show that the proposed multi-agent-based controller effectively coordinated with variable loads in MG.
International Journal of Electrical Power & Energy Systems, Dec 1, 2013
ABSTRACT This paper presents an improved direct power control (DPC) strategy of a wind turbine dr... more ABSTRACT This paper presents an improved direct power control (DPC) strategy of a wind turbine driven doubly fed induction generators (DFIGs) connected to distorted grid voltage conditions. A coordinate control strategy of the grid side converter (GSC) and rotor side converter (RSC) of the DFIG is designed to improve the overall scheme performance. The RSC is controlled based on a DPC principle to eliminate the electromagnetic torque and stator reactive power oscillations. The total active and reactive power oscillations are compensated by the GSC control to achieve constant active and reactive powers from the overall DFIG system. A current control scheme consisting of a proportional integral controller and a resonant compensator tuned at six the grid frequency is proposed to provide accurate control of the GSC current. The proposed control scheme removes rotor current regulators and the decomposition process of the rotor and GSC currents. In addition, the proposed scheme preserves the advantages of the classical DPC. The feasibility of the proposed DPC scheme is validated by simulation studies on a 1.5 MWwind power generation system under harmonically distorted grid voltage conditions. The performance of the proposed and conventional DPC schemes is compared under the same operating conditions. The proposed scheme results show significant improvements in the scheme performance.
Journal of Energy Storage
The authors have requested that this preprint be removed from Research Square.
Optics Express, Nov 29, 2022
Iran Journal of Computer Science
Optics Express
The security issue is essential in the Internet-of-Things (IoT) environment. Biometrics play an i... more The security issue is essential in the Internet-of-Things (IoT) environment. Biometrics play an important role in securing the emerging IoT devices, especially IoT robots. Biometric identification is an interesting candidate to improve IoT usability and security. To access and control sensitive environments like IoT, passwords are not recommended for high security levels. Biometrics can be used instead, but more protection is needed to store original biometrics away from invaders. This paper presents a cancelable multimodal biometric recognition system based on encryption algorithms and watermarking. Both voice-print and facial images are used as individual biometrics. Double Random Phase Encoding (DRPE) and chaotic Baker map are utilized as encryption algorithms. Verification is performed by estimating the correlation between registered and tested models in their cancelable format. Simulation results give Equal Error Rate (EER) values close to zero and Area under the Receiver Opera...
Transactions on Emerging Telecommunications Technologies
This article focuses on automatic modulation classification (AMC) in wireless communication syste... more This article focuses on automatic modulation classification (AMC) in wireless communication systems. A convolutional neural network (CNN) with three layers is introduced for the AMC process. Over degraded channels, it is assumed that the constellation diagrams of received signals do not show sharp points as in the case of pure signals. Instead, the points spread to constitute circle‐shaped objects. With more deterioration in channel conditions, these circle‐shaped objects begin to show overlapping. This behavior motivates us to use object detection, when dealing with the modulation classification task. The selection of the adopted transforms in this article is made from the object detection perspective. Different 2D transforms are considered on the constellation diagrams and compared for better classification performance. These transforms are the Radon transform (RT), the curvelet transform, and the phase congruency (PC). They are applied on the 2D constellation diagrams prior to th...
Process Integration and Optimization for Sustainability
Computer Systems Science and Engineering
Biometric authentication is a rapidly growing trend that is gaining increasing attention in the l... more Biometric authentication is a rapidly growing trend that is gaining increasing attention in the last decades. It achieves safe access to systems using biometrics instead of the traditional passwords. The utilization of a biometric in its original format makes it usable only once. Therefore, a cancelable biometric template should be used, so that it can be replaced when it is attacked. Cancelable biometrics aims to enhance the security and privacy of biometric authentication. Digital encryption is an efficient technique to be used in order to generate cancelable biometric templates. In this paper, a highly-secure encryption algorithm is proposed to ensure secure biometric data in verification systems. The considered biometric in this paper is the speech signal. The speech signal is transformed into its spectrogram. Then, the spectrogram is encrypted using two cascaded optical encryption algorithms. The first algorithm is the Optical Scanning Holography (OSH) for its efficiency as an encryption tool. The OSH encrypted spectrogram is encrypted using Double Random Phase Encoding (DRPE) by implementing two Random Phase Masks (RPMs). After the two cascaded optical encryption algorithms, the cancelable template is obtained. The verification is implemented through correlation estimation between enrolled and test templates in their encrypted format. If the correlation value is larger than a threshold value, the user is authorized. The threshold value can be determined from the genuine and imposter correlation distribution curves as the midpoint between the two curves. The implementation of optical encryption is adopted using its software rather than the optical setup. The efficiency of the proposed cancelable biometric algorithm is illustrated by the simulation results. It can improve the biometric data security without deteriorating the recognition accuracy. Simulation results give close-to-zero This work is licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Journal of Ambient Intelligence and Humanized Computing
Convolutional Neural Networks (CNNs) are efficient tools for pattern recognition applications. Th... more Convolutional Neural Networks (CNNs) are efficient tools for pattern recognition applications. They have found applications in wireless communication systems such as modulation classification from constellation diagrams. Unfortunately, noisy channels may render the constellation points deformed and scattered, which makes the classification a difficult task. This paper presents an efficient modulation classification algorithm based on CNNs. Constellation diagrams are generated for each modulation type and used for training and testing of the CNNs. The proposed work depends on the application of Radon Transform (RT) to generate more representative patterns for the constellation diagrams to be used for training and testing. The RT has a good ability to represent discrete points in the spatial domain as curved lines. Several pre-trained networks including AlexNet, VGG-16, and VGG-19 are used as classifiers for modulation type from the spatial-domain constellation diagrams or their RTs. ...
Journal of Advanced Engineering Trends, 2022
Many intelligent transportation systems, such as advanced driver assistance systems (ADAS), have ... more Many intelligent transportation systems, such as advanced driver assistance systems (ADAS), have been being developed to increase traffic safety. ADAS have the potential to save lives and reduce crashes by eliminating the human error in the driving process. The Lane detection system is designed to identify and estimate the position of lane boundaries in front of the ego-vehicle. Thus, it serves as a crucial and fundamental component in various ADAS, for instance, lane keeping assistance and lane departure warning assistance systems. In this paper, a proposed method of visionbased lane detection in urban roads is presented. First, we define a region of interest to exclude the misleading parts of the road image, then a bird's-eye view of the road in front of the ego-vehicle is obtained by employing the inverse perspective mapping. Second, we utilize the distinct colors of lane markings to achieve robust lane markings candidate detection. Finally, the estimated lane boundaries are represented by quadratic models whose parameters are estimated from the detected lane pixels using the RANSAC algorithm. Furthermore, we present a thorough evaluation of the detection performance of the proposed method using the ground-truth data of the Caltech dataset and a comparative analysis between the quadratic model used in the proposed method and other models presented in the literature. Detection results show the effectiveness of the proposed method in detecting lane boundaries in different conditions in urban roads, including curved lanes, shadows, illumination variations and presence of street writings. Moreover, the overall process takes an average time of 30.63 milliseconds per frame.
2019 21st International Middle East Power Systems Conference (MEPCON), 2019
The load frequency control (LFC) foremost goal is to afford a suitable value of electrical capaci... more The load frequency control (LFC) foremost goal is to afford a suitable value of electrical capacity within a prearranged boundary of frequency deviation to the users. To achieve precisely this ultimate objective, this paper merely proposes possible coordination of LFC and using correctly an innovative finest PID controller-built on water cycle algorithm (WCA) in Egyptian Power System (EPS) or Egyptian load (E-load). The conventionally EPS scheme is divided into three plants; reheat, non-reheat, and hydro power system. Adequately considering a nuclear power generation system (NPGS) in El Dabaa site as EPS future development. In this study, an efficient method is projected for recompense the EPS change in frequency. To adequately demonstrate the strength and efficiency of the projected control approach, the Nuclear Egyptian load (NU-E-load) was established by the SIMULINK/MATLAB simulation. The practical results typically expose that the greater robustness of the proposed co-ordination versus different load profiles up to 3% perturbation, and compared to other optimization techniques in MATLAB/APPS/Toolbox like PID tuned, Genetic algorithm (GA) and Particle Swarm optimization technique (PSO).
Journal of Advanced Engineering Trends (JAET)/Journal of Advanced Engineering Trends (JAET), Jan 22, 2024
Physica Scripta, Dec 26, 2023
Известия высших учебных заведений России. Радиоэлектроника, 2011
2020 3rd International Conference on Computer Applications & Information Security (ICCAIS), 2020
Cognitive radio is development of wireless communication and mobile computing. Spectrum is a limi... more Cognitive radio is development of wireless communication and mobile computing. Spectrum is a limited source. The licensed spectrum is proposed to be used only by the spectrum owners. Cognitive radio is a new view of the recycle licensed spectrum in an unlicensed manner. The main condition of the cognitive radio network is sensing the spectrum hole. Cognitive radio can be detect unused spectrum. It shares this with no interference to the licensed spectrum. It can be a sense signals. It makes viable communication in the middle of multiple users through co-operation in a self-organized manner. The energy detector method is unseen signal detector because it reject the data of the signal.In this paper, has implemented Simulink Energy Detection of spectrum sensing cognitive radio in a MATLAB Simulink to Exploit spectrum holes and avoid damaging interference to licensed spectrum and unlicensed spectrum. The hidden primary user problem will happened because fading or shadowing. Ithappens when cognitive radio could not be detected by primer users because of its location. Cooperative sensing spectrum sensing is the best-proposed method to solve the hidden problem.
2016 IEEE Student Conference on Research and Development (SCOReD), 2016
This paper describes in details the IPTV (Internet Protocol Television) system. Also, measurement... more This paper describes in details the IPTV (Internet Protocol Television) system. Also, measurement methods of the QoS parameters are analyzed, debating a practical application for evaluation of IPTV traffic parameters. QoS (Quality of Service) parameters such as IP Packet Transfer Delay (IPTD), IP Packet Delay Variation (IPDV) and packet loss Ratio (IPLR). The recent Internet is working under TCP/IP (Transmission Control Protocol/Internet Protocol) protocol stack and is based on two main fundamentals, which are: network offers only one class of service named best effort service, and network resources are overprovisioned as possible in order to minimize packet losses and packet delays. The Internet providers aim to provide packet transfer to users as fast as possible, However they are far from guaranteeing, so called, rigid quality of service (QoS) that is measured by the maximum allowable values of such parameters as IPTD, IPDV and IPLR. Furthermore, network abilities of packet transfer determine the range of applications which users may use with appropriate satisfaction these applications such as IPTV. ANYLOGIC Professional6 software was used to analysis the QoS parameters for IPTV and our results help in critically analyzing QOS parameters for IPTV applications.
International Transactions on Electrical Energy Systems, Dec 27, 2018
In this paper, an energy management strategy of direct current (DC) microgrids (MGs) is presented... more In this paper, an energy management strategy of direct current (DC) microgrids (MGs) is presented. The proposed MG consists of fuel cells, batteries, and supercapacitors, along with associated DC/DC and DC/AC converters. Coordination between different sources of MG is implemented using a multi-agent system. Multi-agent algorithm is implemented using an open source agent building toolkit, Java Agent Development framework (JADE). The energy source components are modeled and implemented using MatLab/Simulink (power system library). The proposed energy management strategy is designed using proportional-integral (PI) controllers, which is implemented using the JADE. Interface between MatLab/Simulink and multi-agent system (JADE) is done with the help of MACSimJX. The proposed multi-agent framework is presented and the interface between the JADE and MatLab/Simulink is described in details. Then, the design and implementation steps of the PI controller using JADE are presented. Simulation work is carried out, and the results show that the proposed multi-agent-based controller effectively coordinated with variable loads in MG.
International Journal of Electrical Power & Energy Systems, Dec 1, 2013
ABSTRACT This paper presents an improved direct power control (DPC) strategy of a wind turbine dr... more ABSTRACT This paper presents an improved direct power control (DPC) strategy of a wind turbine driven doubly fed induction generators (DFIGs) connected to distorted grid voltage conditions. A coordinate control strategy of the grid side converter (GSC) and rotor side converter (RSC) of the DFIG is designed to improve the overall scheme performance. The RSC is controlled based on a DPC principle to eliminate the electromagnetic torque and stator reactive power oscillations. The total active and reactive power oscillations are compensated by the GSC control to achieve constant active and reactive powers from the overall DFIG system. A current control scheme consisting of a proportional integral controller and a resonant compensator tuned at six the grid frequency is proposed to provide accurate control of the GSC current. The proposed control scheme removes rotor current regulators and the decomposition process of the rotor and GSC currents. In addition, the proposed scheme preserves the advantages of the classical DPC. The feasibility of the proposed DPC scheme is validated by simulation studies on a 1.5 MWwind power generation system under harmonically distorted grid voltage conditions. The performance of the proposed and conventional DPC schemes is compared under the same operating conditions. The proposed scheme results show significant improvements in the scheme performance.
Journal of Energy Storage
The authors have requested that this preprint be removed from Research Square.
Optics Express, Nov 29, 2022
Iran Journal of Computer Science
Optics Express
The security issue is essential in the Internet-of-Things (IoT) environment. Biometrics play an i... more The security issue is essential in the Internet-of-Things (IoT) environment. Biometrics play an important role in securing the emerging IoT devices, especially IoT robots. Biometric identification is an interesting candidate to improve IoT usability and security. To access and control sensitive environments like IoT, passwords are not recommended for high security levels. Biometrics can be used instead, but more protection is needed to store original biometrics away from invaders. This paper presents a cancelable multimodal biometric recognition system based on encryption algorithms and watermarking. Both voice-print and facial images are used as individual biometrics. Double Random Phase Encoding (DRPE) and chaotic Baker map are utilized as encryption algorithms. Verification is performed by estimating the correlation between registered and tested models in their cancelable format. Simulation results give Equal Error Rate (EER) values close to zero and Area under the Receiver Opera...
Transactions on Emerging Telecommunications Technologies
This article focuses on automatic modulation classification (AMC) in wireless communication syste... more This article focuses on automatic modulation classification (AMC) in wireless communication systems. A convolutional neural network (CNN) with three layers is introduced for the AMC process. Over degraded channels, it is assumed that the constellation diagrams of received signals do not show sharp points as in the case of pure signals. Instead, the points spread to constitute circle‐shaped objects. With more deterioration in channel conditions, these circle‐shaped objects begin to show overlapping. This behavior motivates us to use object detection, when dealing with the modulation classification task. The selection of the adopted transforms in this article is made from the object detection perspective. Different 2D transforms are considered on the constellation diagrams and compared for better classification performance. These transforms are the Radon transform (RT), the curvelet transform, and the phase congruency (PC). They are applied on the 2D constellation diagrams prior to th...
Process Integration and Optimization for Sustainability
Computer Systems Science and Engineering
Biometric authentication is a rapidly growing trend that is gaining increasing attention in the l... more Biometric authentication is a rapidly growing trend that is gaining increasing attention in the last decades. It achieves safe access to systems using biometrics instead of the traditional passwords. The utilization of a biometric in its original format makes it usable only once. Therefore, a cancelable biometric template should be used, so that it can be replaced when it is attacked. Cancelable biometrics aims to enhance the security and privacy of biometric authentication. Digital encryption is an efficient technique to be used in order to generate cancelable biometric templates. In this paper, a highly-secure encryption algorithm is proposed to ensure secure biometric data in verification systems. The considered biometric in this paper is the speech signal. The speech signal is transformed into its spectrogram. Then, the spectrogram is encrypted using two cascaded optical encryption algorithms. The first algorithm is the Optical Scanning Holography (OSH) for its efficiency as an encryption tool. The OSH encrypted spectrogram is encrypted using Double Random Phase Encoding (DRPE) by implementing two Random Phase Masks (RPMs). After the two cascaded optical encryption algorithms, the cancelable template is obtained. The verification is implemented through correlation estimation between enrolled and test templates in their encrypted format. If the correlation value is larger than a threshold value, the user is authorized. The threshold value can be determined from the genuine and imposter correlation distribution curves as the midpoint between the two curves. The implementation of optical encryption is adopted using its software rather than the optical setup. The efficiency of the proposed cancelable biometric algorithm is illustrated by the simulation results. It can improve the biometric data security without deteriorating the recognition accuracy. Simulation results give close-to-zero This work is licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Journal of Ambient Intelligence and Humanized Computing
Convolutional Neural Networks (CNNs) are efficient tools for pattern recognition applications. Th... more Convolutional Neural Networks (CNNs) are efficient tools for pattern recognition applications. They have found applications in wireless communication systems such as modulation classification from constellation diagrams. Unfortunately, noisy channels may render the constellation points deformed and scattered, which makes the classification a difficult task. This paper presents an efficient modulation classification algorithm based on CNNs. Constellation diagrams are generated for each modulation type and used for training and testing of the CNNs. The proposed work depends on the application of Radon Transform (RT) to generate more representative patterns for the constellation diagrams to be used for training and testing. The RT has a good ability to represent discrete points in the spatial domain as curved lines. Several pre-trained networks including AlexNet, VGG-16, and VGG-19 are used as classifiers for modulation type from the spatial-domain constellation diagrams or their RTs. ...
Journal of Advanced Engineering Trends, 2022
Many intelligent transportation systems, such as advanced driver assistance systems (ADAS), have ... more Many intelligent transportation systems, such as advanced driver assistance systems (ADAS), have been being developed to increase traffic safety. ADAS have the potential to save lives and reduce crashes by eliminating the human error in the driving process. The Lane detection system is designed to identify and estimate the position of lane boundaries in front of the ego-vehicle. Thus, it serves as a crucial and fundamental component in various ADAS, for instance, lane keeping assistance and lane departure warning assistance systems. In this paper, a proposed method of visionbased lane detection in urban roads is presented. First, we define a region of interest to exclude the misleading parts of the road image, then a bird's-eye view of the road in front of the ego-vehicle is obtained by employing the inverse perspective mapping. Second, we utilize the distinct colors of lane markings to achieve robust lane markings candidate detection. Finally, the estimated lane boundaries are represented by quadratic models whose parameters are estimated from the detected lane pixels using the RANSAC algorithm. Furthermore, we present a thorough evaluation of the detection performance of the proposed method using the ground-truth data of the Caltech dataset and a comparative analysis between the quadratic model used in the proposed method and other models presented in the literature. Detection results show the effectiveness of the proposed method in detecting lane boundaries in different conditions in urban roads, including curved lanes, shadows, illumination variations and presence of street writings. Moreover, the overall process takes an average time of 30.63 milliseconds per frame.
2019 21st International Middle East Power Systems Conference (MEPCON), 2019
The load frequency control (LFC) foremost goal is to afford a suitable value of electrical capaci... more The load frequency control (LFC) foremost goal is to afford a suitable value of electrical capacity within a prearranged boundary of frequency deviation to the users. To achieve precisely this ultimate objective, this paper merely proposes possible coordination of LFC and using correctly an innovative finest PID controller-built on water cycle algorithm (WCA) in Egyptian Power System (EPS) or Egyptian load (E-load). The conventionally EPS scheme is divided into three plants; reheat, non-reheat, and hydro power system. Adequately considering a nuclear power generation system (NPGS) in El Dabaa site as EPS future development. In this study, an efficient method is projected for recompense the EPS change in frequency. To adequately demonstrate the strength and efficiency of the projected control approach, the Nuclear Egyptian load (NU-E-load) was established by the SIMULINK/MATLAB simulation. The practical results typically expose that the greater robustness of the proposed co-ordination versus different load profiles up to 3% perturbation, and compared to other optimization techniques in MATLAB/APPS/Toolbox like PID tuned, Genetic algorithm (GA) and Particle Swarm optimization technique (PSO).