Pub Date : 2019-01-01DOI: 10.21608/mjeer.2019.62751
M. Arafa, Mohamed Elwekeil, M. Dessouky
This paper presents a proposed approach for enhancing both the spectral efficiency of spatial modulation and symbol error rate. The main idea is to exploiting repeated long zeros and ones sequences in the transmitted data, and mapping them into the signal constellation of Three Dimension (3-D) spatial constellation of spatial modulation. The obtained results indicate that the symbol error rate (SER) performance of the proposed algorithm is better as compared to traditional spatial modulation (SM), at a certain number of modulated-symbol selecting bits. The performance enhancement is affirmed by Monte Carlo simulations that show a significant improvement in SER in favor of the proposed approach compared to traditional SM. In addition, the proposed approach provides more improvement of SER performance, especially, when the number of receiving antennas is increased. Furthermore, it provides an improvement of spectral efficiency as compared to traditional spatial modulation.
{"title":"In-Sequence Zeros-Ones Patterns Exploiting Approach for Spatial Modulation Performance Enhancement","authors":"M. Arafa, Mohamed Elwekeil, M. Dessouky","doi":"10.21608/mjeer.2019.62751","DOIUrl":"https://doi.org/10.21608/mjeer.2019.62751","url":null,"abstract":"This paper presents a proposed approach for enhancing both the spectral efficiency of spatial modulation and symbol error rate. The main idea is to exploiting repeated long zeros and ones sequences in the transmitted data, and mapping them into the signal constellation of Three Dimension (3-D) spatial constellation of spatial modulation. The obtained results indicate that the symbol error rate (SER) performance of the proposed algorithm is better as compared to traditional spatial modulation (SM), at a certain number of modulated-symbol selecting bits. The performance enhancement is affirmed by Monte Carlo simulations that show a significant improvement in SER in favor of the proposed approach compared to traditional SM. In addition, the proposed approach provides more improvement of SER performance, especially, when the number of receiving antennas is increased. Furthermore, it provides an improvement of spectral efficiency as compared to traditional spatial modulation.","PeriodicalId":218019,"journal":{"name":"Menoufia Journal of Electronic Engineering Research","volume":"74 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125991178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.21608/mjeer.2019.62662
Ramadan Gad, A. El-Sayed, N. El-Fishawy, M. Zorkany
Internet of Things (IoT) is growing vastly and survive technology.So; it needs authentication solutions (as iris recognition) to bringsafety, and convenience in data and network sharing in the internetof things era. Iris segmentation is most critical stage in the irisrecognition system. Some challenges to localize iris such asocclusion by eyelids, eyelashes, and corneal or specular reflection.This paper proposes, a modified algorithm based on maskingtechnique; to localize iris. It solves the limitation of the iris data lossand inconsistencies factors, for capturing conditions and differentresolution images. This method gives satisfactory results in factorsof accuracy and execution time to be used over IoT. Thesegmentation success rate is more than 99.545(%), and executiontime in worst case 0.758 (sec).The obtained results improve theefficiency of the proposed iris recognition method and improve IoTsecurity and authentication.
{"title":"Iris Template Localization over Internet of Things (IoT)","authors":"Ramadan Gad, A. El-Sayed, N. El-Fishawy, M. Zorkany","doi":"10.21608/mjeer.2019.62662","DOIUrl":"https://doi.org/10.21608/mjeer.2019.62662","url":null,"abstract":"Internet of Things (IoT) is growing vastly and survive technology.So; it needs authentication solutions (as iris recognition) to bringsafety, and convenience in data and network sharing in the internetof things era. Iris segmentation is most critical stage in the irisrecognition system. Some challenges to localize iris such asocclusion by eyelids, eyelashes, and corneal or specular reflection.This paper proposes, a modified algorithm based on maskingtechnique; to localize iris. It solves the limitation of the iris data lossand inconsistencies factors, for capturing conditions and differentresolution images. This method gives satisfactory results in factorsof accuracy and execution time to be used over IoT. Thesegmentation success rate is more than 99.545(%), and executiontime in worst case 0.758 (sec).The obtained results improve theefficiency of the proposed iris recognition method and improve IoTsecurity and authentication.","PeriodicalId":218019,"journal":{"name":"Menoufia Journal of Electronic Engineering Research","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133103671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.21608/mjeer.2019.62757
C. Ghandour, A. Zekry, Nazmi A. Mohammed, S. El-Rabaie
Visible light communication (VLC) is considered as a promisingtechnique for the wireless technology of the 21st century. UtilizingLight Emitting Diode (LED) technology adds a wide area ofapplications for VLC. Most important one is that VLC can provideillumination/communication jointly. To achieve efficientcommercial VLC communication/illumination system one needsto profit from dimming schemes/flicker. Availability of suitablesystem designs and enhancing system's power requirements arekey advantages for using dimming schemes. Effective dimmingschemes/flicker are mainly achieved through several VLC basedon modulation techniques. In last few years many kinds ofliterature discussed independently wide range of modulationschemes to address the effectively previous issue. However, fewsurveys for these works are presented in the field. This paperprovides an in-depth survey of VLC based dimming scheme.Therefore, the kinds of modulation and coding techniques arecollected and categorized of more than 60 papers extending frompioneering papers to the state of the art in the field. In addition,research and current issues are discussed especially in whichtrends in VLC based dimming/flicker.
{"title":"An In-depth Survey of Viisiiblle Liight Communiicatiion Modullatiing and Codiing schemes for Diimmiing/Flliicker Avoiidance Technollogiies","authors":"C. Ghandour, A. Zekry, Nazmi A. Mohammed, S. El-Rabaie","doi":"10.21608/mjeer.2019.62757","DOIUrl":"https://doi.org/10.21608/mjeer.2019.62757","url":null,"abstract":"Visible light communication (VLC) is considered as a promisingtechnique for the wireless technology of the 21st century. UtilizingLight Emitting Diode (LED) technology adds a wide area ofapplications for VLC. Most important one is that VLC can provideillumination/communication jointly. To achieve efficientcommercial VLC communication/illumination system one needsto profit from dimming schemes/flicker. Availability of suitablesystem designs and enhancing system's power requirements arekey advantages for using dimming schemes. Effective dimmingschemes/flicker are mainly achieved through several VLC basedon modulation techniques. In last few years many kinds ofliterature discussed independently wide range of modulationschemes to address the effectively previous issue. However, fewsurveys for these works are presented in the field. This paperprovides an in-depth survey of VLC based dimming scheme.Therefore, the kinds of modulation and coding techniques arecollected and categorized of more than 60 papers extending frompioneering papers to the state of the art in the field. In addition,research and current issues are discussed especially in whichtrends in VLC based dimming/flicker.","PeriodicalId":218019,"journal":{"name":"Menoufia Journal of Electronic Engineering Research","volume":"20 3-5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132497894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.21608/mjeer.2019.62727
Ahmed A. Naguib, W. Saad, M. Shokair
{"title":"Proposed Energy Effiiciient Mulltii-Layer MAC Protocoll for Massiive MTC over LTE Wiirelless Network","authors":"Ahmed A. Naguib, W. Saad, M. Shokair","doi":"10.21608/mjeer.2019.62727","DOIUrl":"https://doi.org/10.21608/mjeer.2019.62727","url":null,"abstract":"","PeriodicalId":218019,"journal":{"name":"Menoufia Journal of Electronic Engineering Research","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126034172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.21608/mjeer.2019.62728
T. El-Sayed, M. Badawy, A. El-Sayed
Hadoop is an open-source framework written by java and used for bigdata processing. It consists of two main components: HadoopDistributed File System (HDFS) and MapReduce. HDFS is used tostore data while MapReduce is used to distribute and process anapplication tasks in a distributed processing form. Recently, severalresearchers employ Hadoop for processing big data. The resultsindicate that Hadoop performs well with Large Files (files larger thanData Node block size). Nevertheless, Hadoop performance decreaseswith small files that are less than its block size. This is because, smallfiles consume the memory of both the DataNode and the NameNode,and increases the execution time of the applications (i.e. decreasesMapReduce performance). In this paper, the problem of the small filesin Hadoop is defined and the existing approaches to solve this problemare classified and discussed. In addition, some open points that mustbe considered when thinking of a better approach to improve theHadoop performance when processing the small files.
{"title":"Impact of Small Files on Hadoop Performance: Literature Survey and Open Points","authors":"T. El-Sayed, M. Badawy, A. El-Sayed","doi":"10.21608/mjeer.2019.62728","DOIUrl":"https://doi.org/10.21608/mjeer.2019.62728","url":null,"abstract":"Hadoop is an open-source framework written by java and used for bigdata processing. It consists of two main components: HadoopDistributed File System (HDFS) and MapReduce. HDFS is used tostore data while MapReduce is used to distribute and process anapplication tasks in a distributed processing form. Recently, severalresearchers employ Hadoop for processing big data. The resultsindicate that Hadoop performs well with Large Files (files larger thanData Node block size). Nevertheless, Hadoop performance decreaseswith small files that are less than its block size. This is because, smallfiles consume the memory of both the DataNode and the NameNode,and increases the execution time of the applications (i.e. decreasesMapReduce performance). In this paper, the problem of the small filesin Hadoop is defined and the existing approaches to solve this problemare classified and discussed. In addition, some open points that mustbe considered when thinking of a better approach to improve theHadoop performance when processing the small files.","PeriodicalId":218019,"journal":{"name":"Menoufia Journal of Electronic Engineering Research","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130058220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.21608/mjeer.2019.62747
Aida A. Nasr, Nirmeen A. El-Bahnasawy, G. Attiya, A. El-Sayed
This paper presents a new hybrid approach, called ACOSA, for cloudlets scheduling to enhance the scheduler behavior in Cloud computing (CC) environment and to overcome the results oscillation problem of the existing meta-heuristic scheduling algorithms. The proposed approach combines both the Ant Colony Optimization (ACO) and Simulated Annealing (SA) algorithm to improve both quality of solutions and time complexity of the scheduling algorithm. The proposed approach is evaluated by using the well-known CloudSim, and the results are compared with the ant colony and simulated annealing separately in terms of schedule length, load balancing, and time complexity. It decreases the schedule length by 29.75% with SA and 12.25% with ACO. The ACOSA provides higher load balancing degree. It improves the balancing degree ratio by 36.36% than SA and 12.13% than ACO algorithms.
{"title":"A Proposed Meta-Heuristic Approach for Cloudlets Scheduling in Cloud Computing Environment","authors":"Aida A. Nasr, Nirmeen A. El-Bahnasawy, G. Attiya, A. El-Sayed","doi":"10.21608/mjeer.2019.62747","DOIUrl":"https://doi.org/10.21608/mjeer.2019.62747","url":null,"abstract":"This paper presents a new hybrid approach, called ACOSA, for cloudlets scheduling to enhance the scheduler behavior in Cloud computing (CC) environment and to overcome the results oscillation problem of the existing meta-heuristic scheduling algorithms. The proposed approach combines both the Ant Colony Optimization (ACO) and Simulated Annealing (SA) algorithm to improve both quality of solutions and time complexity of the scheduling algorithm. The proposed approach is evaluated by using the well-known CloudSim, and the results are compared with the ant colony and simulated annealing separately in terms of schedule length, load balancing, and time complexity. It decreases the schedule length by 29.75% with SA and 12.25% with ACO. The ACOSA provides higher load balancing degree. It improves the balancing degree ratio by 36.36% than SA and 12.13% than ACO algorithms.","PeriodicalId":218019,"journal":{"name":"Menoufia Journal of Electronic Engineering Research","volume":"217 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121855995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.21608/mjeer.2019.62752
A. M. Dessouky, A. Eltholth, T. Taha, F. El-Samie
{"title":"Applying the Linear Spectral Estimation Techniques for both DNA Sequence Analysis and Exon Region Prediction","authors":"A. M. Dessouky, A. Eltholth, T. Taha, F. El-Samie","doi":"10.21608/mjeer.2019.62752","DOIUrl":"https://doi.org/10.21608/mjeer.2019.62752","url":null,"abstract":"","PeriodicalId":218019,"journal":{"name":"Menoufia Journal of Electronic Engineering Research","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122155618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.21608/mjeer.2019.62725
Rania A. Ghazy, El-Sayed M. El-Rabaie, M. Dessouky, N. El-Fishawy, F. E. El-Samie
Due to the sophisticated characteristics of auto-regressive (AR) modeling approach, it finds applications in most anomaly detection processes. This paper extends the concept of AR modeling to create models for the estimated auto-correlation between data and control planes packet counts of the network traffic. These models are fed with the anomaly traffic containing SYN flood attack. The estimated residuals in these scenarios are used as indicators for the attacks. Simulation results revealed the success of attack detection using the proposed approach.
{"title":"SYN Flood Attack Detection Usiing AR Model","authors":"Rania A. Ghazy, El-Sayed M. El-Rabaie, M. Dessouky, N. El-Fishawy, F. E. El-Samie","doi":"10.21608/mjeer.2019.62725","DOIUrl":"https://doi.org/10.21608/mjeer.2019.62725","url":null,"abstract":"Due to the sophisticated characteristics of auto-regressive (AR) modeling approach, it finds applications in most anomaly detection processes. This paper extends the concept of AR modeling to create models for the estimated auto-correlation between data and control planes packet counts of the network traffic. These models are fed with the anomaly traffic containing SYN flood attack. The estimated residuals in these scenarios are used as indicators for the attacks. Simulation results revealed the success of attack detection using the proposed approach.","PeriodicalId":218019,"journal":{"name":"Menoufia Journal of Electronic Engineering Research","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133070788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.21608/mjeer.2019.62754
A. Rashed, A. Mohamed, Mohamed S. F. Tabbour, N. Saad
This paper studies the problem of data access at the receiver withlarge bit error rate and low quality factor. Due to this issue theinformation got inaccurately at the receiver side, the data shouldhave high quality factor and low bit error rate to be simple ofidentification at the receiver when using the gates. The nonlinearproperties of the semiconductor optical amplifier (SOA) are utilizedto accomplish the Boolean variable based math work, in whichAND, NAND, and OR gates potentially used to endorse theBoolean function. Through blend this gates together any Booleanfunction can be accomplished and utilized to perform optical signalprocessing. The quality factor and BER are measured by utilizingthe eye diagram analyzer, the state of the output bit and alsoshaped by the oscilloscope visualizer in Optiwave simulationprogram. These models can be used for wavelength converter,header recognition, parity checking, binary addition, packet-headermodification, encoding and encryption with pattern matching, anddata encryption with high speed and high quality factor.
{"title":"All Optical Switching Logic Gates Based on Nonlinear Semiconductor Optical Amplifiers Effects","authors":"A. Rashed, A. Mohamed, Mohamed S. F. Tabbour, N. Saad","doi":"10.21608/mjeer.2019.62754","DOIUrl":"https://doi.org/10.21608/mjeer.2019.62754","url":null,"abstract":"This paper studies the problem of data access at the receiver withlarge bit error rate and low quality factor. Due to this issue theinformation got inaccurately at the receiver side, the data shouldhave high quality factor and low bit error rate to be simple ofidentification at the receiver when using the gates. The nonlinearproperties of the semiconductor optical amplifier (SOA) are utilizedto accomplish the Boolean variable based math work, in whichAND, NAND, and OR gates potentially used to endorse theBoolean function. Through blend this gates together any Booleanfunction can be accomplished and utilized to perform optical signalprocessing. The quality factor and BER are measured by utilizingthe eye diagram analyzer, the state of the output bit and alsoshaped by the oscilloscope visualizer in Optiwave simulationprogram. These models can be used for wavelength converter,header recognition, parity checking, binary addition, packet-headermodification, encoding and encryption with pattern matching, anddata encryption with high speed and high quality factor.","PeriodicalId":218019,"journal":{"name":"Menoufia Journal of Electronic Engineering Research","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122523352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.21608/mjeer.2019.62722
Sahar Aboshosha, O. Zahran, M. El-Kordy, M. Dessouky, F. E. El-Samie
{"title":"Resolution and Quality Enhancement of Images Using Contrast Limit Adaptive Histogram Equalization","authors":"Sahar Aboshosha, O. Zahran, M. El-Kordy, M. Dessouky, F. E. El-Samie","doi":"10.21608/mjeer.2019.62722","DOIUrl":"https://doi.org/10.21608/mjeer.2019.62722","url":null,"abstract":"","PeriodicalId":218019,"journal":{"name":"Menoufia Journal of Electronic Engineering Research","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124684239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}