Pub Date : 1900-01-01DOI: 10.21608/mjeer.2021.195521
Neven Hassan, A. El-Fishawy, W. El-shafai, F. El-Sayed
This paper introduces three cancelable speaker identification techniques based on the spectrogram estimation of speech signals subjected to either chaotic encryption process, or RSA algorithm in addition to Radon transform to produce cancelable templates instead of the original speech signals. The resulting transformed versions of the voice biometrics are stored in the server instead of the original biometrics. Therefore, the users' privacy can be protected well. It is evident from the obtained results that the proposed techniques are secure, reliable and practical. They have good encryption and ability to generate cancelable templates. These characteristics lead to good performance. The proposed cancelable speaker identification techniques are evaluated under the influence of Additive White Gaussian Noise (AWGN) with different strengths. This makes them more accurate in identifying the users and also more resistant to attack attempts. In addition, security is enhanced through maintaining the confidentiality of the processed data. In the experimental results, evaluation metrics such as Equal Error Rate (EER), False Rejection Rate (FRR), and False Acceptance Rate (FAR) are used to assess the performance of the proposed techniques. In addition, the genuine, impostor distributions, Receiver Operating Characteristic (ROC) curve and area under the ROC curve for the proposed techniques are estimated for better evaluation and comparison.
{"title":"Efficient Implementation of Radon Transform and Encryption Techniques for Cancelable Speaker Identification","authors":"Neven Hassan, A. El-Fishawy, W. El-shafai, F. El-Sayed","doi":"10.21608/mjeer.2021.195521","DOIUrl":"https://doi.org/10.21608/mjeer.2021.195521","url":null,"abstract":"This paper introduces three cancelable speaker identification techniques based on the spectrogram estimation of speech signals subjected to either chaotic encryption process, or RSA algorithm in addition to Radon transform to produce cancelable templates instead of the original speech signals. The resulting transformed versions of the voice biometrics are stored in the server instead of the original biometrics. Therefore, the users' privacy can be protected well. It is evident from the obtained results that the proposed techniques are secure, reliable and practical. They have good encryption and ability to generate cancelable templates. These characteristics lead to good performance. The proposed cancelable speaker identification techniques are evaluated under the influence of Additive White Gaussian Noise (AWGN) with different strengths. This makes them more accurate in identifying the users and also more resistant to attack attempts. In addition, security is enhanced through maintaining the confidentiality of the processed data. In the experimental results, evaluation metrics such as Equal Error Rate (EER), False Rejection Rate (FRR), and False Acceptance Rate (FAR) are used to assess the performance of the proposed techniques. In addition, the genuine, impostor distributions, Receiver Operating Characteristic (ROC) curve and area under the ROC curve for the proposed techniques are estimated for better evaluation and comparison.","PeriodicalId":218019,"journal":{"name":"Menoufia Journal of Electronic Engineering Research","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129026297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21608/mjeer.2019.62758
Mahmoud A. Hasabelnaby, H. Selmy, M. Dessouky
New innovation approach called -centralized radio access network(Cloud-RAN or C-RAN) - architecture is developed to meet theexplosive growth in mobile traffic in the 5th generation (5G) mobilenetworks especially in the need of high-speed, high capacity, realtimedata, and high-reliability. In C-RAN architecture, fronthaulnetworks connect between the radio units called -Remote RadioHeads (RRHs)- and the processing unit called -Base BandProcessing Unit (BBU)-. Recently, hybrid free space optics (FSO)and millimeter waves (mmW) network is considered to be apromising solution that can match with the requirements of 5Gfronthaul networks. In this paper, hybrid FSO/mmW links at eachRRH is proposed to enhance the performance of C-RAN fronthaulnetwork at various weather conditions. The performance of hybridFSO/mmW technology as a fronthaul network is evaluated atdifferent weather conditions and compared to other technologies.The numerical results reveal that improvements are obtained innetwork reliability using hybrid FSO/mmW fronthaul network,especially at severe weather conditions.
{"title":"Network Availability of Hybrid FSO/mmW 5G Fronthaul Network in C-RAN Architecture","authors":"Mahmoud A. Hasabelnaby, H. Selmy, M. Dessouky","doi":"10.21608/mjeer.2019.62758","DOIUrl":"https://doi.org/10.21608/mjeer.2019.62758","url":null,"abstract":"New innovation approach called -centralized radio access network(Cloud-RAN or C-RAN) - architecture is developed to meet theexplosive growth in mobile traffic in the 5th generation (5G) mobilenetworks especially in the need of high-speed, high capacity, realtimedata, and high-reliability. In C-RAN architecture, fronthaulnetworks connect between the radio units called -Remote RadioHeads (RRHs)- and the processing unit called -Base BandProcessing Unit (BBU)-. Recently, hybrid free space optics (FSO)and millimeter waves (mmW) network is considered to be apromising solution that can match with the requirements of 5Gfronthaul networks. In this paper, hybrid FSO/mmW links at eachRRH is proposed to enhance the performance of C-RAN fronthaulnetwork at various weather conditions. The performance of hybridFSO/mmW technology as a fronthaul network is evaluated atdifferent weather conditions and compared to other technologies.The numerical results reveal that improvements are obtained innetwork reliability using hybrid FSO/mmW fronthaul network,especially at severe weather conditions.","PeriodicalId":218019,"journal":{"name":"Menoufia Journal of Electronic Engineering Research","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123116807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21608/mjeer.2019.62756
W. El-Ganaini, M. Markos
In this paper a computational technique is presented for the numerical solution of a certain potential-type singular Fredholm integral equation of the first kind with singular unknown density function, and a weakly singular logarithmic kernel. This equation is equivalent to the solution of the Dirichlet boundary value problem for Laplace equation for an open contour in the plane. The parameterization of the open contour facilitates the treatment of the density function’s singularity in the neighborhood of the end-points of the contour, and the kernel’s singularity. The unknown density function is replaced by a product of two functions; the first explicitly expresses the bad behavior of the density function, while the second is a regular unknown function, which will be interpolated using Newton interpolation in a matrix form. The singularity of the parameterized kernel is treated by expanding the two argument parametric functions into Taylor polynomial of the first degree about the singular parameter. Moreover, two asymptote formulas are used for the approximation of the kernel. In addition, an adaptive Gauss–Legendre formula, is applied for the computations of the obtained convergent integrals. Thus the required numerical solution is found to be equivalent to the solution of a system of algebraic equations. The numerical solution of the illustrated example is closer to the exact solution; which ensures the high accuracy of the presented computational technique.
{"title":"Numerical solution of singular Fredholm integral equations of the first kind using Newton interpolation","authors":"W. El-Ganaini, M. Markos","doi":"10.21608/mjeer.2019.62756","DOIUrl":"https://doi.org/10.21608/mjeer.2019.62756","url":null,"abstract":"In this paper a computational technique is presented for the numerical solution of a certain potential-type singular Fredholm integral equation of the first kind with singular unknown density function, and a weakly singular logarithmic kernel. This equation is equivalent to the solution of the Dirichlet boundary value problem for Laplace equation for an open contour in the plane. The parameterization of the open contour facilitates the treatment of the density function’s singularity in the neighborhood of the end-points of the contour, and the kernel’s singularity. The unknown density function is replaced by a product of two functions; the first explicitly expresses the bad behavior of the density function, while the second is a regular unknown function, which will be interpolated using Newton interpolation in a matrix form. The singularity of the parameterized kernel is treated by expanding the two argument parametric functions into Taylor polynomial of the first degree about the singular parameter. Moreover, two asymptote formulas are used for the approximation of the kernel. In addition, an adaptive Gauss–Legendre formula, is applied for the computations of the obtained convergent integrals. Thus the required numerical solution is found to be equivalent to the solution of a system of algebraic equations. The numerical solution of the illustrated example is closer to the exact solution; which ensures the high accuracy of the presented computational technique.","PeriodicalId":218019,"journal":{"name":"Menoufia Journal of Electronic Engineering Research","volume":"250 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115589532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21608/mjeer.2019.62749
Mohamed A. Elaskily, H. Aslan, M. Dessouky, F. El-Samie, O. Faragallah, Osama A. Elshakankiry
Image forgeries are applied to give the digital images othermeanings or to deceive the viewers. Image forgeries appear inmany cases such as judges in courts, cybercrimes, military andintelligence deception, or defamation of important characters.There are many different types of image forgeries such as copymove forgery, image retouching, image splicing, image morphing,and image resampling. Copy move forgery is the widest type andeasy to apply between all digital image forgeries. Scale InvariantFeatures Transform (SIFT) algorithm is used strongly to detectcopy move forgeries due to its efficiency in digital image analysis.SIFT algorithm is extracting image features, which are invariant togeometrical transformations such as scaling, translation, androtation. These features are used in performing the matchingbetween different views of a scene or an object. This paperenhances the efficiency of using SIFT algorithm in detecting copymove forgery by two ways. Firstly, it enhances the image itself byapplying different types of digital filters to reinforce the imagefeatures giving the ability to detect forgeries. Butterworth low-passfilter, a high-pass filter, and the combination of them are appliedto this task. Secondly, the matching strategy is adapted based ona new thresholding approach to increase the true positive rateand decrease the false positive rate. Experimental results showthat the proposed approach gives better results compared withtraditional copy-move detection approaches. In addition, it gives better stability and reliability to different copy-move forgery conditions.
{"title":"Enhanced Fiilltterr-based SIFT Apprroach fforr Copy-Move Forrgerry Dettecttiion","authors":"Mohamed A. Elaskily, H. Aslan, M. Dessouky, F. El-Samie, O. Faragallah, Osama A. Elshakankiry","doi":"10.21608/mjeer.2019.62749","DOIUrl":"https://doi.org/10.21608/mjeer.2019.62749","url":null,"abstract":"Image forgeries are applied to give the digital images othermeanings or to deceive the viewers. Image forgeries appear inmany cases such as judges in courts, cybercrimes, military andintelligence deception, or defamation of important characters.There are many different types of image forgeries such as copymove forgery, image retouching, image splicing, image morphing,and image resampling. Copy move forgery is the widest type andeasy to apply between all digital image forgeries. Scale InvariantFeatures Transform (SIFT) algorithm is used strongly to detectcopy move forgeries due to its efficiency in digital image analysis.SIFT algorithm is extracting image features, which are invariant togeometrical transformations such as scaling, translation, androtation. These features are used in performing the matchingbetween different views of a scene or an object. This paperenhances the efficiency of using SIFT algorithm in detecting copymove forgery by two ways. Firstly, it enhances the image itself byapplying different types of digital filters to reinforce the imagefeatures giving the ability to detect forgeries. Butterworth low-passfilter, a high-pass filter, and the combination of them are appliedto this task. Secondly, the matching strategy is adapted based ona new thresholding approach to increase the true positive rateand decrease the false positive rate. Experimental results showthat the proposed approach gives better results compared withtraditional copy-move detection approaches. In addition, it gives better stability and reliability to different copy-move forgery conditions.","PeriodicalId":218019,"journal":{"name":"Menoufia Journal of Electronic Engineering Research","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127048095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21608/mjeer.2021.193082
Fatma. Allah, N. Soliman, M. Abdalla, F. A. Abd El-Samie
This paper studies the transmission of watermarked images on wireless SC-FDMA systems. Different watermarking schemes are provided in this frame work for security and authentication purposes.SC-FDMA is accomplished for broadband wireless communications, for its advantages of low PAPR and low sensitivity to carrier frequency offsets. The SC-FDMA system is used for communication as it is the uplink standard in coefficient mobile communication system. In this paper, two types of equalizers(MMSE and ZF) is used to mitigate the effect of channel fading and noise at different subcarriers mapping schemes(localized and distributed).Watermark extraction is performed at the receiver and an evaluation process for the quality of extracted watermarks is performed. Simulation experiments were established in MATLAB program R2014a version. Simulation results approved that the interleaved system provides better performance than that of the localized systems. In addition the system performance has better enhancement when using the ZF equalizer than the MMSE equalizer. The quality of the received of extracted watermarks is investigated with different metrics like PSNR, correlation coefficient (Cr) , SSIM and the histogram . Simulation results also demonstrate an efficient of image clarity at extraction process. Keywords— SC-FDMA, Image Water marking, DCT, DWT.
{"title":"Efficient Transmission of Watermarked Images with SC-FDMA","authors":"Fatma. Allah, N. Soliman, M. Abdalla, F. A. Abd El-Samie","doi":"10.21608/mjeer.2021.193082","DOIUrl":"https://doi.org/10.21608/mjeer.2021.193082","url":null,"abstract":"This paper studies the transmission of watermarked images on wireless SC-FDMA systems. Different watermarking schemes are provided in this frame work for security and authentication purposes.SC-FDMA is accomplished for broadband wireless communications, for its advantages of low PAPR and low sensitivity to carrier frequency offsets. The SC-FDMA system is used for communication as it is the uplink standard in coefficient mobile communication system. In this paper, two types of equalizers(MMSE and ZF) is used to mitigate the effect of channel fading and noise at different subcarriers mapping schemes(localized and distributed).Watermark extraction is performed at the receiver and an evaluation process for the quality of extracted watermarks is performed. Simulation experiments were established in MATLAB program R2014a version. Simulation results approved that the interleaved system provides better performance than that of the localized systems. In addition the system performance has better enhancement when using the ZF equalizer than the MMSE equalizer. The quality of the received of extracted watermarks is investigated with different metrics like PSNR, correlation coefficient (Cr) , SSIM and the histogram . Simulation results also demonstrate an efficient of image clarity at extraction process. Keywords— SC-FDMA, Image Water marking, DCT, DWT.","PeriodicalId":218019,"journal":{"name":"Menoufia Journal of Electronic Engineering Research","volume":"63 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123315107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21608/mjeer.2021.193086
Hatem Abd El-kader., Nirmeen A. El-Bahnasawy, A. El-daly, Aida A. Nasr
blockchain is a new direction for data platform are very limited, IOT needs special protecting. The main idea behind using blockchain techniques for data confidentiality. Traditional technology for hidden data is dividing data into small security approach are not suitable for IOT platform, parts and store each part in block. The data block is because they need high powered resources. related to the previous by hash code which makes the chain. Blockchain techniques are suitable for large and small amount of data. Since sensors collect much data all the time and send to receivers over edge Blockchain technology is based on dividing data and make relation between the generated parts before applying any encryption or protection algorithm. This reduces time complexity and does not need high computing devices, which have limited resources, researchers start to use blockchain as a light technique specifications. Thus, blockchain is used on IOT platform. for protecting data transmission over the internet. Sensor communication over the internet platform called internet of things platform. In this paper we show some previous work of blockchain techniques based IOT platform. In addition challenges and future direction will be discussed.
{"title":"Securing Data Transmission Using Blockchain Technology For IOT Platform: A Survey","authors":"Hatem Abd El-kader., Nirmeen A. El-Bahnasawy, A. El-daly, Aida A. Nasr","doi":"10.21608/mjeer.2021.193086","DOIUrl":"https://doi.org/10.21608/mjeer.2021.193086","url":null,"abstract":"blockchain is a new direction for data platform are very limited, IOT needs special protecting. The main idea behind using blockchain techniques for data confidentiality. Traditional technology for hidden data is dividing data into small security approach are not suitable for IOT platform, parts and store each part in block. The data block is because they need high powered resources. related to the previous by hash code which makes the chain. Blockchain techniques are suitable for large and small amount of data. Since sensors collect much data all the time and send to receivers over edge Blockchain technology is based on dividing data and make relation between the generated parts before applying any encryption or protection algorithm. This reduces time complexity and does not need high computing devices, which have limited resources, researchers start to use blockchain as a light technique specifications. Thus, blockchain is used on IOT platform. for protecting data transmission over the internet. Sensor communication over the internet platform called internet of things platform. In this paper we show some previous work of blockchain techniques based IOT platform. In addition challenges and future direction will be discussed.","PeriodicalId":218019,"journal":{"name":"Menoufia Journal of Electronic Engineering Research","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130693619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21608/mjeer.2019.62724
Ayman E. A. Abdelaal, Fathi E. Abdel-Samie, M. Dessouki
High bandwidth Internet connections and applications demands aregrowing so rapidly because of the Internet arising usages either onbusiness or entertainment. Adding new links to cover the extrademand is the simplest solution but it always comes with financialissues due to the extra cost it adds. That’s why researchers andleading companies should search for smarter alternatives. InternetService Providers (ISPs) should improve their networks inperspective of the utilization of the bandwidth and the managementof their resources. Two techniques have been introduced separatelyto support in addressing the bandwidth utilization problems in theISPs networks, the Multi-Protocol Label Switching – TrafficEngineering (MPLS-TE) and the DiffServ Quality of Service (QoS).Inthis paper, the two techniques are used together to get the highestperformance, the best resources management and an efficientbandwidth utilization. Multiple experiments have been held indifferent variations using one or more of the Diffserv-aware MPLSTE, Low Latency Queuing (LLQ), Russian Dolls Model (RDM) andMaximum Allocation Model (MAM) model. The best results for bothIPv4 and IPv6 were obtained using Diffserv-aware TE in RDM modelin conjunction with LLQ.
{"title":"A DIFFSERV-AWAREFORM OF MULTI-PROTOCOL LABEL SWITCHING TRAFFIC ENGINEERING OVER VIRTUAL PRIVATE NETWORKS","authors":"Ayman E. A. Abdelaal, Fathi E. Abdel-Samie, M. Dessouki","doi":"10.21608/mjeer.2019.62724","DOIUrl":"https://doi.org/10.21608/mjeer.2019.62724","url":null,"abstract":"High bandwidth Internet connections and applications demands aregrowing so rapidly because of the Internet arising usages either onbusiness or entertainment. Adding new links to cover the extrademand is the simplest solution but it always comes with financialissues due to the extra cost it adds. That’s why researchers andleading companies should search for smarter alternatives. InternetService Providers (ISPs) should improve their networks inperspective of the utilization of the bandwidth and the managementof their resources. Two techniques have been introduced separatelyto support in addressing the bandwidth utilization problems in theISPs networks, the Multi-Protocol Label Switching – TrafficEngineering (MPLS-TE) and the DiffServ Quality of Service (QoS).Inthis paper, the two techniques are used together to get the highestperformance, the best resources management and an efficientbandwidth utilization. Multiple experiments have been held indifferent variations using one or more of the Diffserv-aware MPLSTE, Low Latency Queuing (LLQ), Russian Dolls Model (RDM) andMaximum Allocation Model (MAM) model. The best results for bothIPv4 and IPv6 were obtained using Diffserv-aware TE in RDM modelin conjunction with LLQ.","PeriodicalId":218019,"journal":{"name":"Menoufia Journal of Electronic Engineering Research","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115231812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21608/mjeer.2019.62755
O. Younis, S. Essa, A. El-Sayed
{"title":"An Enhanced Grroup Key Managementt Scheme for MANET","authors":"O. Younis, S. Essa, A. El-Sayed","doi":"10.21608/mjeer.2019.62755","DOIUrl":"https://doi.org/10.21608/mjeer.2019.62755","url":null,"abstract":"","PeriodicalId":218019,"journal":{"name":"Menoufia Journal of Electronic Engineering Research","volume":"420 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126709128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21608/mjeer.2021.193085
Abeer Makkey
This paper provides the design, simulation and implementation of a very wide dynamic range and a low readout noise CMOS image sensor (CIS) with high sensitivity by using a diode connected transistors in parallel with floating diffusion node and sensor output. The sensor is simulated, designed and implemented in a 130 nm CMOS technology using cadence tool. The area of the proposed pixel reaches to 3 um x 3 um and consists of seven NMOS transistors and one capacitor. The readout circuit has the following parameters as very low output noise of 20 uVrms with a 5 MHz bandwidth for pixel circuitry. Power dissipation of 10 uW was achieved at an operation voltage of 1.6 V for pixel circuitry. The proposed sensor has good features of low noise and a 140 dB wide dynamic range due to the diode connected transistor configuration that has been used. This paper provides the effect of adding a diode connected transistors M7 and M8 on an increasing dynamic range of CMOS image sensor to 140 dB and reducing its readout noise to 20 uVrms. Also, this paper provides a mathematical simulation of noise model of CIS using Matlab and cadence. Keywords— CMOS image sensor (CIS), wide dynamic range (WDR), bandwidth, readout noise, diode connected transistor
{"title":"Design and Simulation of 140 dB Dynamic Range and 20 uVrms Readout Noise CMOS Image Sensor","authors":"Abeer Makkey","doi":"10.21608/mjeer.2021.193085","DOIUrl":"https://doi.org/10.21608/mjeer.2021.193085","url":null,"abstract":"This paper provides the design, simulation and implementation of a very wide dynamic range and a low readout noise CMOS image sensor (CIS) with high sensitivity by using a diode connected transistors in parallel with floating diffusion node and sensor output. The sensor is simulated, designed and implemented in a 130 nm CMOS technology using cadence tool. The area of the proposed pixel reaches to 3 um x 3 um and consists of seven NMOS transistors and one capacitor. The readout circuit has the following parameters as very low output noise of 20 uVrms with a 5 MHz bandwidth for pixel circuitry. Power dissipation of 10 uW was achieved at an operation voltage of 1.6 V for pixel circuitry. The proposed sensor has good features of low noise and a 140 dB wide dynamic range due to the diode connected transistor configuration that has been used. This paper provides the effect of adding a diode connected transistors M7 and M8 on an increasing dynamic range of CMOS image sensor to 140 dB and reducing its readout noise to 20 uVrms. Also, this paper provides a mathematical simulation of noise model of CIS using Matlab and cadence. Keywords— CMOS image sensor (CIS), wide dynamic range (WDR), bandwidth, readout noise, diode connected transistor","PeriodicalId":218019,"journal":{"name":"Menoufia Journal of Electronic Engineering Research","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123649079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21608/mjeer.2021.192100
E. Mostafa, Ahmad M. El-Nagar, O. Elshazly, M. El-Bardini
In this paper, a fractional order sliding mode controller (FOSMC) is proposed for nonlinear coupled tank system. The proposed controller integrates the advantages of the fractional order control and sliding mode control. Fractional order controller has an extra flexibility to meet the specifications of the controller design and sliding mode control is a robust controller, which is able to respondtoexternal disturbances combined with nonlinear systems.The objective of the controller is to allow the system states to move to the sliding surface and remain on it so as to ensure the asymptotic stability of the closed-loop system. The stability analysis for the proposed controller is studied based on the Lyapunov stability theorem. Simulation results show the ability of the proposed controller to improve the system performance especially when the controlled system is exposed to external disturbances and variation of reference trajectory compared with the conventional proportionalintegral-derivative controller (PID) and conventional sliding mode controller (SMC), which is based on integer order derivatives. Keywords—Fractional control, Sliding mode control, Lyapunov function,Nonlinear systems.
{"title":"Fractional Order Sliding Mode Controller for Coupled Tank System","authors":"E. Mostafa, Ahmad M. El-Nagar, O. Elshazly, M. El-Bardini","doi":"10.21608/mjeer.2021.192100","DOIUrl":"https://doi.org/10.21608/mjeer.2021.192100","url":null,"abstract":"In this paper, a fractional order sliding mode controller (FOSMC) is proposed for nonlinear coupled tank system. The proposed controller integrates the advantages of the fractional order control and sliding mode control. Fractional order controller has an extra flexibility to meet the specifications of the controller design and sliding mode control is a robust controller, which is able to respondtoexternal disturbances combined with nonlinear systems.The objective of the controller is to allow the system states to move to the sliding surface and remain on it so as to ensure the asymptotic stability of the closed-loop system. The stability analysis for the proposed controller is studied based on the Lyapunov stability theorem. Simulation results show the ability of the proposed controller to improve the system performance especially when the controlled system is exposed to external disturbances and variation of reference trajectory compared with the conventional proportionalintegral-derivative controller (PID) and conventional sliding mode controller (SMC), which is based on integer order derivatives. Keywords—Fractional control, Sliding mode control, Lyapunov function,Nonlinear systems.","PeriodicalId":218019,"journal":{"name":"Menoufia Journal of Electronic Engineering Research","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129583727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}