ibrahim Tarrad - Independent Researcher (original) (raw)

Papers by ibrahim Tarrad

Research paper thumbnail of Performance Evaluation of Hybrid PTS-SLM Techniques Versus Conventional PTS

Performance Evaluation of Hybrid PTS-SLM Techniques Versus Conventional PTS

International journal of intelligent computing and information sciences, 2014

Research paper thumbnail of Non-destructive Detection for Irradiated Apple using Image Processing

International journal of computer applications, Sep 18, 2021

This paper proposes a nondestructive method for detecting irradiated apple rather than the previo... more This paper proposes a nondestructive method for detecting irradiated apple rather than the previous destructive method known before such as analytical methods; Chemical, Physical and Biological methods. Image processing technique was applied for rapid and nondestructive detection of irradiated apples. Color intensities, smoothness and uniformities were extracted and analyzed to correlate these color features of apple samples with its values before radiation. ANOVA analysis showed significant differences between both irradiated and un-irradiated apples sample. Linear discriminant analysis (LDA) was utilized for HSV data analysis. Results indicated that it was possible to detect irradiated food with good accuracy using imaging processing technique with an overall success rate of approximately 85%. The proposed method is cheap and less complicated which in turn saves time and effort. Consequently, it overcome the disadvantages of other analytical methods that are complex, costly and destructing the samples.

Research paper thumbnail of Multi-Channel Preemptive Priority Model for Spectrum Mobility in Cognitive Radio Networks

International Journal of Electrical and Computer Engineering (IJECE), 2018

Cognitive Radio techniques have been proposed for improving utilization of the spectrum by exploi... more Cognitive Radio techniques have been proposed for improving utilization of the spectrum by exploiting the unoccupied bands of the licensed spectrum. This paper proposes a preemptive multi-channel access model for prioritized cognitive radio networks using an iterative method of queuing theory to solve the spectrum scarcity problem. The proposed model formulates accurate closed form of an expected waiting time in the queue, an expected number of users in the queue, an expected waiting time in the system, and an expected number of users in the system. The results compared to the basic model (without preemptive priority) show that, the waiting time in queue and the waiting time in the system compared to the basic model will be improved by 92.99% and 33.15% respectively for class one secondary user. The results also show that, the waiting time in queue and the waiting time in the system will be improved by 43.25% and 15.42% respectively for class two secondary users. The proposed model ...

Research paper thumbnail of Performance analysis of wireless sensor networks using queuing networks

Annals of Operations Research, 2013

Wireless Sensor Networks (WSNs) are autonomous wireless systems consists of a variety of collabor... more Wireless Sensor Networks (WSNs) are autonomous wireless systems consists of a variety of collaborative sensor nodes forming a self-configuring network with or without any pre-defined infrastructure. The common challenges of a WSN are network connectivity, node mobility, energy consumption, data computation and aggregation at sensor nodes. In this paper we focus on intermittency in network connectivity due to mobility of sensor nodes. We propose a new mathematical model to capture a given entire WSN as is with intermittency introduced between the communication links due to mobility. The model involves open GI/G/1/N queuing networks whereby intermittency durations in communication links are captured in terms of mobility models. The analytical formulas for the performance measures such as average end-to-end delay, packet loss probability, throughput, and average number of hops are derived using the queuing network analyzer and expansion method for models with infinite-and finite-buffer nodes, respectively. For models with 2-state intermittency, we analyze the performance measures by classifying these models into three types: namely, model with intermittent reception, model with intermittent transmission and/or reception, and model with intermittent transmission. We extend the analysis to multi-state intermittency models. We demonstrate the gained insight of WSNs through extensive numerical results.

Research paper thumbnail of ICI Reduction by Parallel Concatenated Encoder Using Wavelet Transforms

ICI Reduction by Parallel Concatenated Encoder Using Wavelet Transforms

Information and Communication Technology for Sustainable Development, 2019

This paper proposed a new channel encoder technique by parallel concatenated encoders which use H... more This paper proposed a new channel encoder technique by parallel concatenated encoders which use Hamming parallel with convolutional to reduce the “intercarrier interference” (ICI) by using the discrete wavelet DWT. The Hamming encoder is simple, and convolutional encoder gives low BER and robust against the burst error. Simulation the two encoder parallel via interleaver reduces the code rate and improves the performance. The simulation results measure the BER after applying the self-cancellation (SC) technique and appear reduction in BER in the results which enhance the system performance.

Research paper thumbnail of Security Analysis of NFC Technology Compared with other Mobile Wireless Technologies

Security Analysis of NFC Technology Compared with other Mobile Wireless Technologies

Volume 4, Issue 6, November – December 2015 Page 122 ABSTRACT There are a many popular ways for m... more Volume 4, Issue 6, November – December 2015 Page 122 ABSTRACT There are a many popular ways for mobile devices to connect wirelessly. This connectiongives users the ability to transfer data between two or more devices in additionto control a device remotely. Therefore, the security of such functions is insufficient for widespread use of these wireless technologies. However, in the near future,Near Field Communication (NFC) technology willbecome widespread for users, so its security weakness which can be dangerous to the privacy of the user’s confidential information should be evaluated and handled accurately. The security issues of NFC are anactive area of research for the coming years. This paper gives a detailed comprehensive analysis of security with respect to NFC, Bluetooth and infrared.Finally, the paper puts the most important recommendations for future security improvement that can bedeveloped in NFC and other wireless technologies.

Research paper thumbnail of Performance analysis of different opportunistic access based on secondary users priority using licensed channels in Cognitive radio networks

Performance analysis of different opportunistic access based on secondary users priority using licensed channels in Cognitive radio networks

2017 34th National Radio Science Conference (NRSC), 2017

In Cognitive radio network, the efficiency of spectrum utilization can be improved using dynamic ... more In Cognitive radio network, the efficiency of spectrum utilization can be improved using dynamic spectrum access. In this paper three dimension markov model with finite primary users and infinite secondary users is proposed through two different classical channel access techniques: the random channel scheme and the reservation channel scheme assignment to evaluate the impact of changing the arrival rate and service rate of the priority-based SUs on SUs blocking probability, dropping probability and hand off probability. The proposed schemes classify SUs to two classes of priority. The analytical results demonstrate that the new scheme can enhance the radio system performance.

Research paper thumbnail of Wireless Real Time Universal Interface for the Biomedical System: Design and Realization

Utilizing Wireless Sensor Network (WSN) in the real time applications offers a wide area of the r... more Utilizing Wireless Sensor Network (WSN) in the real time applications offers a wide area of the remotely system automation. The monitoring of vital sign and biomedical signals covers a wide spectrum of applications in different contexts nowadays and has been a research topic during the last decade. In his work the real time measurement of the temperature using Zigbit module with full optimized Graphical User Interface (GUI) application. A moderate-cost elements and Atmel's IEEE 802.15.4 protocol named Atmel ATZB-24-A2 is used for the wireless communications. The algorithm of the digital temperature measurement is full field by using the PIC18f46k20 microcontroller. The system reading, monitoring and adapting the targeted environmental parameters such as the temperature in our case. This is either locally (on the Coordinator) or remotely (on the Router) of the proposed system by using both the ZigBee module and smart GUI. According the desired Set Point and the measured temperature value of the patient or incubator, the system provides four different states (flags). These flags can be used for driving the adequate actuators. The proposed interactive system provides a simple and an easy deal with patient or the incubators. Smart algorithm is implemented for the system data acquisition.

Research paper thumbnail of Surge Detection

Surge Detection

Problem: The turbo compressor Surge is an unstable operating mode of compression system that occu... more Problem: The turbo compressor Surge is an unstable operating mode of compression system that occurs at mass flows below the so-called surge line. The instability is characterized by large limit cycle oscillations in compressor flow and pressure rise that reduce compressor performance and endanger safe operation. Approach: The attempt to find a simple model structure which can capture in some appropriate sense the key of the dynamical properties of the physical plant, we study the application possibilities of the anti-surge detection system to protect the turbo compressor from surge by using Neural fuzzy. Results: By simulating new Neural-Fuzzy system which has been made for demonstrate the validity of proposed control scheme, the results shown that the fuzzy system can be a good anti-surge detection system compared by used system. Conclusion: The proposed fuzzy system successfully performed the surge detection like the active detection system of a centrifugal compressor.

Research paper thumbnail of Exploiting Incremental Classifiers for the Training of an Adaptive Intrusion Detection Model

Int. J. Netw. Secur., 2019

Due to the fact that network data is dynamic in nature, the demand for adaptive Intrusion Detecti... more Due to the fact that network data is dynamic in nature, the demand for adaptive Intrusion Detection System (IDS) has increased for smart analysis of network data stream. An intrusion detection system is a component of the information security and its main aim is to detect abnormal activities of the network and tries to prevent suspicious data streams that might lead to network security breach. However, most IDS poverty to the capability to detect zero-day or previously unknown attacks. As such, two types of IDS have been contemplated for detecting network threats, namely, signature-based IDS and anomaly detection system. The former depends on stored signatures in a database (thus, its name) to detect intrusions, whereas the latter develops a model based on normal system or network behavior, with the aim of detecting both recognized and novel attacks. The two types of intrusion detection systems confront many problems comprehensive; continuous learning, scalability, a high rate of fa...

Research paper thumbnail of A Comprehensive Survey on Various ICIC Schemes and Proposed 3G RF Interference Mitigation Techniques for OFDM Downlink on Cellular Networks

Inter Cell Interference (ICI) still poses a real challenge that limits the Orthogonal Frequency D... more Inter Cell Interference (ICI) still poses a real challenge that limits the Orthogonal Frequency Division Multiplexing Access (OFDMA) system performance, especially for users located at the cell edge. A common Inter Cell Interference Coordination (ICIC) technique is interference avoidance in which the allocation of the various system resources (e.g., time, frequency, and power) to users is controlled to ensure that the ICI remains within acceptable limits. This paper surveys the various ICIC avoidance schemes in the downlink of OFDMA based cellular networks and makes use of these classifications to categorize and review various static (frequency reuse (FR) -based) and dynamic (cell coordination-based) ICIC schemes. A comprehensive survey that investigate such wide range in the area of ICIC as an attempt to resolve ambiguity by providing precise classification in the research community is presented. A proposed 3G RF interference mitigation techniques is provided as well. For next gene...

Research paper thumbnail of Assessment and Comparison of Commonly used Wireless Technologies from Mobile payment Systems Perspective

Assessment and Comparison of Commonly used Wireless Technologies from Mobile payment Systems Perspective

Mobile and Wireless Information Systems received considerable interest in research and developmen... more Mobile and Wireless Information Systems received considerable interest in research and development communities. As a result, significant advances were made, which will affect our life both as users and researchers of mobile and wireless technologies. Wireless technologies provide a new channel for implementation of mobile payments systems. In this paper, we discuss mobile wireless technologies characteristics which required to be used by mobile payment systems. A complete comparison between the commonly used technologies like: Bluetooth, Infrared data association (IrDA), Radio Frequency Identification (RFID) and Near Field Communications (NFC) according to the most common factors which affect the quality of mobile payment systems is presented. In this paper evaluations of the advantages and issues involved with using these technologies are presented. We address wireless technologies characteristics, security and challenges.

Research paper thumbnail of Ffect of W Eight F Actor on the P Erformance of G . 729 a S Peech C Oder

G.729A (CS-ACELP Annex A) is a high quality low bandwidth codec at 8 kbit/s with low complexity. ... more G.729A (CS-ACELP Annex A) is a high quality low bandwidth codec at 8 kbit/s with low complexity. G.729A is a bit stream interoperable with G.729; i.e., speech coded with G.729A can be decoded with G.729, and vice versa. Several algorithmic changes have been introduced into G.729 which resulted in 50% drop in its complexity. The Aim of this paper is to study the effect of weight factor on the performance of G.729A coder synthesized speech. This coder is implemented in MATLAB with many different values of weight factor. The effect of weight factor on the recovered speech quality has been investigated and studied. Objective analysis on weighted speech has been carried out in order to observe its overall performance. The performance measures prove that at certain values of weight factor, the speech quality is better than at the value listed in the standard.

Research paper thumbnail of Surge Detection System for Centrifugal Compressor

Problem: The turbo compressor Surge is an unstable operating mode of compression system that occu... more Problem: The turbo compressor Surge is an unstable operating mode of compression system that occurs at mass flows below the so-called surge line. The instability is characterized by large limit cycle oscillations in compressor flow and pressure rise that reduce compressor performance and endanger safe operation. Approach: The attempt to find a simple model structure which can capture in some appropriate sense the key of the dynamical properties of the physical plant , we study the application possibilities of the anti-surge detection system to protect the turbo compressor from surge by using Neural fuzzy. Results: By simulating new Neural-Fuzzy system which has been made for demonstrate the validity of proposed control scheme, the results shown that the fuzzy system can be a good anti-surge detection system compared by used system. Conclusion: The proposed fuzzy system successfully performed the surge detection like the active detection system of a centrifugal compressor.

Research paper thumbnail of Hybrid SLM-PTS for PAPR Reduction in MIMO-OFDM

Multiple-Input Multiple-Output Orthogonal Frequency Division Multiplexing (MIMO-OFDM) is a promis... more Multiple-Input Multiple-Output Orthogonal Frequency Division Multiplexing (MIMO-OFDM) is a promising candidate for 4G broadband wireless communications. However, MIMO-OFDM inherited the problem of high Peak-to-Average Power Ratio (PAPR) from OFDM. Many PAPR reduction techniques were developed in last two decades to reduce the PAPR of OFDM, among them Partial Transmit Sequence (PTS) and Selected Mapping (SLM) show a highly successful PAPR reduction performance. In literature there are three well known approaches for extending SLM and PTS to MIMO-OFDM namely ordinary (oSLM/oPTS), simplified (sSLM/sPTS), and directed (dSLM/dPTS). Hybrid SLM-PTS techniques combine SLM and PTS in four different ways to reduce the required computational complexity lower than both SLM and PTS. Here, we will show the performance of applying ordinary and simplified approaches on the Hybrid SLM-PTS techniques in MIMO-OFDM system. Also, we will investigate the possibility of applying directed approach to Hybri...

Research paper thumbnail of A new design of Mobile Payment system based on NFC Technology

Mobile Payment researches has increased rapidly in recent years. A most recent researchers are fo... more Mobile Payment researches has increased rapidly in recent years. A most recent researchers are focusing on contactless mobile payment systems that uses mobile phones wireless technologies to achieve payment system success factors like availability, simplicity, security, and privacy of payment transaction. Moreover, Mobile technologies has a number of security risks. This paper proposes a new secured design of mobile payment system using a Near Field Communication (NFC) technology. The proposed system uses the features of NFC system to achieve an efficient and complete payment cycle. Furthermore, a solution to the relay attack is proposed. Also the proposed design satisfies the three most important security measures, Confidentiality, integrity and availability. Index Term-Mobile Payment Privacy protection; Secured Payment System; NFC Payment System.

Research paper thumbnail of On the ICI Mitigation Techniques in High Mobility Mimo-OFDM Systems with Parallel ICI Cancellation Under Various Normalized Doppler Spreads

Global Journal of Research In Engineering, 2015

The signals of LF and VLF are rapidly alternated by the earth's surface; and there are variou... more The signals of LF and VLF are rapidly alternated by the earth's surface; and there are various propagation models currently used by the wireless industry for signal transmission within the frequency range 150-1800 MHz. Hata-Okumura two rays model are one of them. This paper addresses the problem of Inter Carrier Interference (ICI) arising from the Doppler shift caused by the high mobility in areas covered by OFDM based systems via High Altitude Platforms (HAPs). The proposed scheme presented in this paper is for Doppler assisted channel estimation with the parallel interference cancellation with decision statistical combining scheme (PIC-DSC) for high mobility MIMO-OFDM systems to improve the ICI cancellation which is essential in enhancing the BER performance which induces a large frequency offset error. The simulation results shows that the outperforms convergence characteristic of channel estimation with the PIC-DSC interference cancellation scheme - under various normalized ...

Research paper thumbnail of M2M in 5G Communication Networks

M2M in 5G Communication Networks

Advances in Systems Analysis, Software Engineering, and High Performance Computing, 2020

Machine type communication (MTC), additionally called machine-to-machine (M2M) communications, br... more Machine type communication (MTC), additionally called machine-to-machine (M2M) communications, broadly is referring to a number of cooperating machines exchange sensed data or information and make decisions with slight or zero human intervention. M2M technology will let a massive number of devices to be interconnected over the internet leading to a rapid development in recent time, which can be a promising enabling key for many areas, particularly for the internet of things (IoT) and 5th generation (5G) networks. This chapter presents a summary and state of art of M2M communications characteristics, taxonomy, applications, different technologies for deploying of M2M communications, and future challenges.

Research paper thumbnail of On the effectiveness of deliberate clipping PAPR reduction technique in OFDM systems

On the effectiveness of deliberate clipping PAPR reduction technique in OFDM systems

2017 Japan-Africa Conference on Electronics, Communications and Computers (JAC-ECC), 2017

Orthogonal Frequency Division Multiplexing (OFDM) is used in high data rate wireless applications... more Orthogonal Frequency Division Multiplexing (OFDM) is used in high data rate wireless applications due to its ability to cope with frequency selectivity. However, OFDM suffers from high Peak-to-Average Power Ratio (PAPR) problem. Signals with high PAPR require Power Amplifier (PA) to work with large Input-Back-Off (IBO), which reduces the PA efficiency. On the other hand small IBO degrade BER performance and increases out-of-band (OOB) radiation. In literature, there are various PAPR reduction techniques. Among them deliberate clipping is the simplest, that has high deterministic PAPR reduction gain. In this paper, it will be shown that deliberate clipping is worsen the problem and cannot be used without Iterative Clipping Noise Cancellation (ICNC) in the receiver. On the other hand, ICNC increases the computational complexity of the receiver than that of the transmitter, so it recommended to be used in uplinks (ULs).

Research paper thumbnail of Biomedical Handheld Embedded System

Journal of Al-Azhar University Engineering Sector, 2021

In recent times, most hospitals in the world are crowded and facing the problem of increasing num... more In recent times, most hospitals in the world are crowded and facing the problem of increasing numbers of patients, specifically with the spread of infectious viruses such as Covid-19 and other chronic diseases such as cardiac disease and Geriatrics diseases, therefore patients need continuous and accurate emergency care. The heart rhythm disturbances, unsaturated oxygen in the blood, and high-temperature may be a high risk to the life of the patient. Most hospitals and medical quarantines have a shortage of Intensive care units (ICU) rooms. This paper discusses the design and improvement of the Patient monitor device for converting it to a handheld device to be small in size (L145 x W85 x D45 mm), lite Wight (398 gm.), low-cost nearly (98USD), easy-to-use by touch screen, and secure connections to internet with (SSL) protocol[22]. The maximum errors of ECG HR is 1.408% , and SPO2 is 1.075% ,SPO2 HR is 1.408% , temperature is 0.549%, BP systolic is 2.439% , BP Diastolic is 3.448%,The patient can use the device anywhere by himself, in an easy way and safely. This device measures physiological parameters such as (blood pressure by using (MAP) method, the saturation of oxygen in the blood (SPO2) by photoplethysmograph (PPG), the electrical and muscle movement of the heart through 3Lead (ECG), temperature, and finally, Heartbeat rate by different three ways). All data are monitoring on Smart Touch TFT, and storing the Main information of patient for more than thirty days Continuously on SD. Also using (IoT) technology to transfer all patient information in real-time through ESP8266 to Android or Website to follow-up the patient directly and permanently by Doctor or Caretaker, The device gives some important Speech voice sentences and sound alerts to improve the health of the patient. to design and implement the system with low cost, we are using the traditional lowcost sensors, with changing the large bulker analog circuits to intelligent signal conditioning by using (CMRR) with Sallen-Key Active filter and low-cost successive approximation 12-bit ADC MCP3208, with DAC MCP4728 and improving the efficiency by DSP software Specifically FIR and Moving Average Filter. This paper not using any Platforms under (RTOS), but using embedded BASIC language with the wide-range microcontroller PIC18f46k22, to keep the program in small size of memory and low power consumption

Research paper thumbnail of Performance Evaluation of Hybrid PTS-SLM Techniques Versus Conventional PTS

Performance Evaluation of Hybrid PTS-SLM Techniques Versus Conventional PTS

International journal of intelligent computing and information sciences, 2014

Research paper thumbnail of Non-destructive Detection for Irradiated Apple using Image Processing

International journal of computer applications, Sep 18, 2021

This paper proposes a nondestructive method for detecting irradiated apple rather than the previo... more This paper proposes a nondestructive method for detecting irradiated apple rather than the previous destructive method known before such as analytical methods; Chemical, Physical and Biological methods. Image processing technique was applied for rapid and nondestructive detection of irradiated apples. Color intensities, smoothness and uniformities were extracted and analyzed to correlate these color features of apple samples with its values before radiation. ANOVA analysis showed significant differences between both irradiated and un-irradiated apples sample. Linear discriminant analysis (LDA) was utilized for HSV data analysis. Results indicated that it was possible to detect irradiated food with good accuracy using imaging processing technique with an overall success rate of approximately 85%. The proposed method is cheap and less complicated which in turn saves time and effort. Consequently, it overcome the disadvantages of other analytical methods that are complex, costly and destructing the samples.

Research paper thumbnail of Multi-Channel Preemptive Priority Model for Spectrum Mobility in Cognitive Radio Networks

International Journal of Electrical and Computer Engineering (IJECE), 2018

Cognitive Radio techniques have been proposed for improving utilization of the spectrum by exploi... more Cognitive Radio techniques have been proposed for improving utilization of the spectrum by exploiting the unoccupied bands of the licensed spectrum. This paper proposes a preemptive multi-channel access model for prioritized cognitive radio networks using an iterative method of queuing theory to solve the spectrum scarcity problem. The proposed model formulates accurate closed form of an expected waiting time in the queue, an expected number of users in the queue, an expected waiting time in the system, and an expected number of users in the system. The results compared to the basic model (without preemptive priority) show that, the waiting time in queue and the waiting time in the system compared to the basic model will be improved by 92.99% and 33.15% respectively for class one secondary user. The results also show that, the waiting time in queue and the waiting time in the system will be improved by 43.25% and 15.42% respectively for class two secondary users. The proposed model ...

Research paper thumbnail of Performance analysis of wireless sensor networks using queuing networks

Annals of Operations Research, 2013

Wireless Sensor Networks (WSNs) are autonomous wireless systems consists of a variety of collabor... more Wireless Sensor Networks (WSNs) are autonomous wireless systems consists of a variety of collaborative sensor nodes forming a self-configuring network with or without any pre-defined infrastructure. The common challenges of a WSN are network connectivity, node mobility, energy consumption, data computation and aggregation at sensor nodes. In this paper we focus on intermittency in network connectivity due to mobility of sensor nodes. We propose a new mathematical model to capture a given entire WSN as is with intermittency introduced between the communication links due to mobility. The model involves open GI/G/1/N queuing networks whereby intermittency durations in communication links are captured in terms of mobility models. The analytical formulas for the performance measures such as average end-to-end delay, packet loss probability, throughput, and average number of hops are derived using the queuing network analyzer and expansion method for models with infinite-and finite-buffer nodes, respectively. For models with 2-state intermittency, we analyze the performance measures by classifying these models into three types: namely, model with intermittent reception, model with intermittent transmission and/or reception, and model with intermittent transmission. We extend the analysis to multi-state intermittency models. We demonstrate the gained insight of WSNs through extensive numerical results.

Research paper thumbnail of ICI Reduction by Parallel Concatenated Encoder Using Wavelet Transforms

ICI Reduction by Parallel Concatenated Encoder Using Wavelet Transforms

Information and Communication Technology for Sustainable Development, 2019

This paper proposed a new channel encoder technique by parallel concatenated encoders which use H... more This paper proposed a new channel encoder technique by parallel concatenated encoders which use Hamming parallel with convolutional to reduce the “intercarrier interference” (ICI) by using the discrete wavelet DWT. The Hamming encoder is simple, and convolutional encoder gives low BER and robust against the burst error. Simulation the two encoder parallel via interleaver reduces the code rate and improves the performance. The simulation results measure the BER after applying the self-cancellation (SC) technique and appear reduction in BER in the results which enhance the system performance.

Research paper thumbnail of Security Analysis of NFC Technology Compared with other Mobile Wireless Technologies

Security Analysis of NFC Technology Compared with other Mobile Wireless Technologies

Volume 4, Issue 6, November – December 2015 Page 122 ABSTRACT There are a many popular ways for m... more Volume 4, Issue 6, November – December 2015 Page 122 ABSTRACT There are a many popular ways for mobile devices to connect wirelessly. This connectiongives users the ability to transfer data between two or more devices in additionto control a device remotely. Therefore, the security of such functions is insufficient for widespread use of these wireless technologies. However, in the near future,Near Field Communication (NFC) technology willbecome widespread for users, so its security weakness which can be dangerous to the privacy of the user’s confidential information should be evaluated and handled accurately. The security issues of NFC are anactive area of research for the coming years. This paper gives a detailed comprehensive analysis of security with respect to NFC, Bluetooth and infrared.Finally, the paper puts the most important recommendations for future security improvement that can bedeveloped in NFC and other wireless technologies.

Research paper thumbnail of Performance analysis of different opportunistic access based on secondary users priority using licensed channels in Cognitive radio networks

Performance analysis of different opportunistic access based on secondary users priority using licensed channels in Cognitive radio networks

2017 34th National Radio Science Conference (NRSC), 2017

In Cognitive radio network, the efficiency of spectrum utilization can be improved using dynamic ... more In Cognitive radio network, the efficiency of spectrum utilization can be improved using dynamic spectrum access. In this paper three dimension markov model with finite primary users and infinite secondary users is proposed through two different classical channel access techniques: the random channel scheme and the reservation channel scheme assignment to evaluate the impact of changing the arrival rate and service rate of the priority-based SUs on SUs blocking probability, dropping probability and hand off probability. The proposed schemes classify SUs to two classes of priority. The analytical results demonstrate that the new scheme can enhance the radio system performance.

Research paper thumbnail of Wireless Real Time Universal Interface for the Biomedical System: Design and Realization

Utilizing Wireless Sensor Network (WSN) in the real time applications offers a wide area of the r... more Utilizing Wireless Sensor Network (WSN) in the real time applications offers a wide area of the remotely system automation. The monitoring of vital sign and biomedical signals covers a wide spectrum of applications in different contexts nowadays and has been a research topic during the last decade. In his work the real time measurement of the temperature using Zigbit module with full optimized Graphical User Interface (GUI) application. A moderate-cost elements and Atmel's IEEE 802.15.4 protocol named Atmel ATZB-24-A2 is used for the wireless communications. The algorithm of the digital temperature measurement is full field by using the PIC18f46k20 microcontroller. The system reading, monitoring and adapting the targeted environmental parameters such as the temperature in our case. This is either locally (on the Coordinator) or remotely (on the Router) of the proposed system by using both the ZigBee module and smart GUI. According the desired Set Point and the measured temperature value of the patient or incubator, the system provides four different states (flags). These flags can be used for driving the adequate actuators. The proposed interactive system provides a simple and an easy deal with patient or the incubators. Smart algorithm is implemented for the system data acquisition.

Research paper thumbnail of Surge Detection

Surge Detection

Problem: The turbo compressor Surge is an unstable operating mode of compression system that occu... more Problem: The turbo compressor Surge is an unstable operating mode of compression system that occurs at mass flows below the so-called surge line. The instability is characterized by large limit cycle oscillations in compressor flow and pressure rise that reduce compressor performance and endanger safe operation. Approach: The attempt to find a simple model structure which can capture in some appropriate sense the key of the dynamical properties of the physical plant, we study the application possibilities of the anti-surge detection system to protect the turbo compressor from surge by using Neural fuzzy. Results: By simulating new Neural-Fuzzy system which has been made for demonstrate the validity of proposed control scheme, the results shown that the fuzzy system can be a good anti-surge detection system compared by used system. Conclusion: The proposed fuzzy system successfully performed the surge detection like the active detection system of a centrifugal compressor.

Research paper thumbnail of Exploiting Incremental Classifiers for the Training of an Adaptive Intrusion Detection Model

Int. J. Netw. Secur., 2019

Due to the fact that network data is dynamic in nature, the demand for adaptive Intrusion Detecti... more Due to the fact that network data is dynamic in nature, the demand for adaptive Intrusion Detection System (IDS) has increased for smart analysis of network data stream. An intrusion detection system is a component of the information security and its main aim is to detect abnormal activities of the network and tries to prevent suspicious data streams that might lead to network security breach. However, most IDS poverty to the capability to detect zero-day or previously unknown attacks. As such, two types of IDS have been contemplated for detecting network threats, namely, signature-based IDS and anomaly detection system. The former depends on stored signatures in a database (thus, its name) to detect intrusions, whereas the latter develops a model based on normal system or network behavior, with the aim of detecting both recognized and novel attacks. The two types of intrusion detection systems confront many problems comprehensive; continuous learning, scalability, a high rate of fa...

Research paper thumbnail of A Comprehensive Survey on Various ICIC Schemes and Proposed 3G RF Interference Mitigation Techniques for OFDM Downlink on Cellular Networks

Inter Cell Interference (ICI) still poses a real challenge that limits the Orthogonal Frequency D... more Inter Cell Interference (ICI) still poses a real challenge that limits the Orthogonal Frequency Division Multiplexing Access (OFDMA) system performance, especially for users located at the cell edge. A common Inter Cell Interference Coordination (ICIC) technique is interference avoidance in which the allocation of the various system resources (e.g., time, frequency, and power) to users is controlled to ensure that the ICI remains within acceptable limits. This paper surveys the various ICIC avoidance schemes in the downlink of OFDMA based cellular networks and makes use of these classifications to categorize and review various static (frequency reuse (FR) -based) and dynamic (cell coordination-based) ICIC schemes. A comprehensive survey that investigate such wide range in the area of ICIC as an attempt to resolve ambiguity by providing precise classification in the research community is presented. A proposed 3G RF interference mitigation techniques is provided as well. For next gene...

Research paper thumbnail of Assessment and Comparison of Commonly used Wireless Technologies from Mobile payment Systems Perspective

Assessment and Comparison of Commonly used Wireless Technologies from Mobile payment Systems Perspective

Mobile and Wireless Information Systems received considerable interest in research and developmen... more Mobile and Wireless Information Systems received considerable interest in research and development communities. As a result, significant advances were made, which will affect our life both as users and researchers of mobile and wireless technologies. Wireless technologies provide a new channel for implementation of mobile payments systems. In this paper, we discuss mobile wireless technologies characteristics which required to be used by mobile payment systems. A complete comparison between the commonly used technologies like: Bluetooth, Infrared data association (IrDA), Radio Frequency Identification (RFID) and Near Field Communications (NFC) according to the most common factors which affect the quality of mobile payment systems is presented. In this paper evaluations of the advantages and issues involved with using these technologies are presented. We address wireless technologies characteristics, security and challenges.

Research paper thumbnail of Ffect of W Eight F Actor on the P Erformance of G . 729 a S Peech C Oder

G.729A (CS-ACELP Annex A) is a high quality low bandwidth codec at 8 kbit/s with low complexity. ... more G.729A (CS-ACELP Annex A) is a high quality low bandwidth codec at 8 kbit/s with low complexity. G.729A is a bit stream interoperable with G.729; i.e., speech coded with G.729A can be decoded with G.729, and vice versa. Several algorithmic changes have been introduced into G.729 which resulted in 50% drop in its complexity. The Aim of this paper is to study the effect of weight factor on the performance of G.729A coder synthesized speech. This coder is implemented in MATLAB with many different values of weight factor. The effect of weight factor on the recovered speech quality has been investigated and studied. Objective analysis on weighted speech has been carried out in order to observe its overall performance. The performance measures prove that at certain values of weight factor, the speech quality is better than at the value listed in the standard.

Research paper thumbnail of Surge Detection System for Centrifugal Compressor

Problem: The turbo compressor Surge is an unstable operating mode of compression system that occu... more Problem: The turbo compressor Surge is an unstable operating mode of compression system that occurs at mass flows below the so-called surge line. The instability is characterized by large limit cycle oscillations in compressor flow and pressure rise that reduce compressor performance and endanger safe operation. Approach: The attempt to find a simple model structure which can capture in some appropriate sense the key of the dynamical properties of the physical plant , we study the application possibilities of the anti-surge detection system to protect the turbo compressor from surge by using Neural fuzzy. Results: By simulating new Neural-Fuzzy system which has been made for demonstrate the validity of proposed control scheme, the results shown that the fuzzy system can be a good anti-surge detection system compared by used system. Conclusion: The proposed fuzzy system successfully performed the surge detection like the active detection system of a centrifugal compressor.

Research paper thumbnail of Hybrid SLM-PTS for PAPR Reduction in MIMO-OFDM

Multiple-Input Multiple-Output Orthogonal Frequency Division Multiplexing (MIMO-OFDM) is a promis... more Multiple-Input Multiple-Output Orthogonal Frequency Division Multiplexing (MIMO-OFDM) is a promising candidate for 4G broadband wireless communications. However, MIMO-OFDM inherited the problem of high Peak-to-Average Power Ratio (PAPR) from OFDM. Many PAPR reduction techniques were developed in last two decades to reduce the PAPR of OFDM, among them Partial Transmit Sequence (PTS) and Selected Mapping (SLM) show a highly successful PAPR reduction performance. In literature there are three well known approaches for extending SLM and PTS to MIMO-OFDM namely ordinary (oSLM/oPTS), simplified (sSLM/sPTS), and directed (dSLM/dPTS). Hybrid SLM-PTS techniques combine SLM and PTS in four different ways to reduce the required computational complexity lower than both SLM and PTS. Here, we will show the performance of applying ordinary and simplified approaches on the Hybrid SLM-PTS techniques in MIMO-OFDM system. Also, we will investigate the possibility of applying directed approach to Hybri...

Research paper thumbnail of A new design of Mobile Payment system based on NFC Technology

Mobile Payment researches has increased rapidly in recent years. A most recent researchers are fo... more Mobile Payment researches has increased rapidly in recent years. A most recent researchers are focusing on contactless mobile payment systems that uses mobile phones wireless technologies to achieve payment system success factors like availability, simplicity, security, and privacy of payment transaction. Moreover, Mobile technologies has a number of security risks. This paper proposes a new secured design of mobile payment system using a Near Field Communication (NFC) technology. The proposed system uses the features of NFC system to achieve an efficient and complete payment cycle. Furthermore, a solution to the relay attack is proposed. Also the proposed design satisfies the three most important security measures, Confidentiality, integrity and availability. Index Term-Mobile Payment Privacy protection; Secured Payment System; NFC Payment System.

Research paper thumbnail of On the ICI Mitigation Techniques in High Mobility Mimo-OFDM Systems with Parallel ICI Cancellation Under Various Normalized Doppler Spreads

Global Journal of Research In Engineering, 2015

The signals of LF and VLF are rapidly alternated by the earth's surface; and there are variou... more The signals of LF and VLF are rapidly alternated by the earth's surface; and there are various propagation models currently used by the wireless industry for signal transmission within the frequency range 150-1800 MHz. Hata-Okumura two rays model are one of them. This paper addresses the problem of Inter Carrier Interference (ICI) arising from the Doppler shift caused by the high mobility in areas covered by OFDM based systems via High Altitude Platforms (HAPs). The proposed scheme presented in this paper is for Doppler assisted channel estimation with the parallel interference cancellation with decision statistical combining scheme (PIC-DSC) for high mobility MIMO-OFDM systems to improve the ICI cancellation which is essential in enhancing the BER performance which induces a large frequency offset error. The simulation results shows that the outperforms convergence characteristic of channel estimation with the PIC-DSC interference cancellation scheme - under various normalized ...

Research paper thumbnail of M2M in 5G Communication Networks

M2M in 5G Communication Networks

Advances in Systems Analysis, Software Engineering, and High Performance Computing, 2020

Machine type communication (MTC), additionally called machine-to-machine (M2M) communications, br... more Machine type communication (MTC), additionally called machine-to-machine (M2M) communications, broadly is referring to a number of cooperating machines exchange sensed data or information and make decisions with slight or zero human intervention. M2M technology will let a massive number of devices to be interconnected over the internet leading to a rapid development in recent time, which can be a promising enabling key for many areas, particularly for the internet of things (IoT) and 5th generation (5G) networks. This chapter presents a summary and state of art of M2M communications characteristics, taxonomy, applications, different technologies for deploying of M2M communications, and future challenges.

Research paper thumbnail of On the effectiveness of deliberate clipping PAPR reduction technique in OFDM systems

On the effectiveness of deliberate clipping PAPR reduction technique in OFDM systems

2017 Japan-Africa Conference on Electronics, Communications and Computers (JAC-ECC), 2017

Orthogonal Frequency Division Multiplexing (OFDM) is used in high data rate wireless applications... more Orthogonal Frequency Division Multiplexing (OFDM) is used in high data rate wireless applications due to its ability to cope with frequency selectivity. However, OFDM suffers from high Peak-to-Average Power Ratio (PAPR) problem. Signals with high PAPR require Power Amplifier (PA) to work with large Input-Back-Off (IBO), which reduces the PA efficiency. On the other hand small IBO degrade BER performance and increases out-of-band (OOB) radiation. In literature, there are various PAPR reduction techniques. Among them deliberate clipping is the simplest, that has high deterministic PAPR reduction gain. In this paper, it will be shown that deliberate clipping is worsen the problem and cannot be used without Iterative Clipping Noise Cancellation (ICNC) in the receiver. On the other hand, ICNC increases the computational complexity of the receiver than that of the transmitter, so it recommended to be used in uplinks (ULs).

Research paper thumbnail of Biomedical Handheld Embedded System

Journal of Al-Azhar University Engineering Sector, 2021

In recent times, most hospitals in the world are crowded and facing the problem of increasing num... more In recent times, most hospitals in the world are crowded and facing the problem of increasing numbers of patients, specifically with the spread of infectious viruses such as Covid-19 and other chronic diseases such as cardiac disease and Geriatrics diseases, therefore patients need continuous and accurate emergency care. The heart rhythm disturbances, unsaturated oxygen in the blood, and high-temperature may be a high risk to the life of the patient. Most hospitals and medical quarantines have a shortage of Intensive care units (ICU) rooms. This paper discusses the design and improvement of the Patient monitor device for converting it to a handheld device to be small in size (L145 x W85 x D45 mm), lite Wight (398 gm.), low-cost nearly (98USD), easy-to-use by touch screen, and secure connections to internet with (SSL) protocol[22]. The maximum errors of ECG HR is 1.408% , and SPO2 is 1.075% ,SPO2 HR is 1.408% , temperature is 0.549%, BP systolic is 2.439% , BP Diastolic is 3.448%,The patient can use the device anywhere by himself, in an easy way and safely. This device measures physiological parameters such as (blood pressure by using (MAP) method, the saturation of oxygen in the blood (SPO2) by photoplethysmograph (PPG), the electrical and muscle movement of the heart through 3Lead (ECG), temperature, and finally, Heartbeat rate by different three ways). All data are monitoring on Smart Touch TFT, and storing the Main information of patient for more than thirty days Continuously on SD. Also using (IoT) technology to transfer all patient information in real-time through ESP8266 to Android or Website to follow-up the patient directly and permanently by Doctor or Caretaker, The device gives some important Speech voice sentences and sound alerts to improve the health of the patient. to design and implement the system with low cost, we are using the traditional lowcost sensors, with changing the large bulker analog circuits to intelligent signal conditioning by using (CMRR) with Sallen-Key Active filter and low-cost successive approximation 12-bit ADC MCP3208, with DAC MCP4728 and improving the efficiency by DSP software Specifically FIR and Moving Average Filter. This paper not using any Platforms under (RTOS), but using embedded BASIC language with the wide-range microcontroller PIC18f46k22, to keep the program in small size of memory and low power consumption