Pub Date : 2018-07-01DOI: 10.21608/mjeer.2018.63182
M. Youssef, Hala M. Abd El Qader, Khaled Ahmed
The synthetic aperture radar (SAR) can be used on either anaircraft or a LEO satellite for high resolution imaging on the earth’s surface. The transmitted pulse is to be shaped and modulated before transmission. A matched filter is used to construct a compressed time domain echo pulsed signal in the receiver. The main lobe level represents the desired target in the received echo compressed pulse to be detected. The sidelobe levels represent a false alarm (undesirable detection). This paper presents different optimization algorithms to reduce the sidelobe levels. These optimization algorithms are particle swarm optimization (PSO) algorithm, pattern search (PS) algorithm and Multi-Objective Genetic Algorithm (MOGA). The algorithms will be applied on different higher orders of polynomial instantaneous frequency modulation signals. A comparison study for these different optimization algorithms for reduction the sidelode levels is presented.
{"title":"Synthetic Aperture Radar Sidelobe Reduction Using Different Optimization Techniques","authors":"M. Youssef, Hala M. Abd El Qader, Khaled Ahmed","doi":"10.21608/mjeer.2018.63182","DOIUrl":"https://doi.org/10.21608/mjeer.2018.63182","url":null,"abstract":"The synthetic aperture radar (SAR) can be used on either anaircraft or a LEO satellite for high resolution imaging on the earth’s surface. The transmitted pulse is to be shaped and modulated before transmission. A matched filter is used to construct a compressed time domain echo pulsed signal in the receiver. The main lobe level represents the desired target in the received echo compressed pulse to be detected. The sidelobe levels represent a false alarm (undesirable detection). This paper presents different optimization algorithms to reduce the sidelobe levels. These optimization algorithms are particle swarm optimization (PSO) algorithm, pattern search (PS) algorithm and Multi-Objective Genetic Algorithm (MOGA). The algorithms will be applied on different higher orders of polynomial instantaneous frequency modulation signals. A comparison study for these different optimization algorithms for reduction the sidelode levels is presented.","PeriodicalId":218019,"journal":{"name":"Menoufia Journal of Electronic Engineering Research","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129456756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.21608/mjeer.2018.63181
Zeinab Z. El kareh, Essam E. El madbouly, G. Banby, F. Abdelsamie
This paper presents a hybrid approach for medical image fusion based on the Discrete Wavelet Transform (DWT) and Principal Component Analysis (PCA). The main idea of the approach is to select between two fusion methods; DWT and PCA based on the local variance estimated at each position in the fusion results. Simulation results on multi-modality images are presented in this paper. The two modalities adopted are Magnetic Resonance (MR) images and Computed Tomography (CT) images. Evaluation metrics such as entropy, edge intensity, contrast, and average gradient have been adopted for performance evaluation of the proposed method. The obtained results confirm that the proposed method is superior in performance to the DWT and PCA methods individually.
{"title":"A hybrid approach for Medical Image Fusion Based on Wavelet Transform and Principal Component Analysis","authors":"Zeinab Z. El kareh, Essam E. El madbouly, G. Banby, F. Abdelsamie","doi":"10.21608/mjeer.2018.63181","DOIUrl":"https://doi.org/10.21608/mjeer.2018.63181","url":null,"abstract":"This paper presents a hybrid approach for medical image fusion based on the Discrete Wavelet Transform (DWT) and Principal Component Analysis (PCA). The main idea of the approach is to select between two fusion methods; DWT and PCA based on the local variance estimated at each position in the fusion results. Simulation results on multi-modality images are presented in this paper. The two modalities adopted are Magnetic Resonance (MR) images and Computed Tomography (CT) images. Evaluation metrics such as entropy, edge intensity, contrast, and average gradient have been adopted for performance evaluation of the proposed method. The obtained results confirm that the proposed method is superior in performance to the DWT and PCA methods individually.","PeriodicalId":218019,"journal":{"name":"Menoufia Journal of Electronic Engineering Research","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123855752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.21608/mjeer.2018.63187
F. G. Hashad, El-Sayed M. El-Rabaie, Ibrahim F. El Ashry, F. El-Samie, O. Zahran
This paper presents two chaotic image encryption plans combined with Discrete Wavelet Transform (DWT) to encrypt unique fingerprint. In the first proposal, the fingerprint which has few details (low entropy) is fused with another image which is rich in details (high entropy) using the Discrete Wavelet Transform (DWT) prior to encryption. The fusion process is a pre-processing step to alter the homogeneity of flat areas in the few-details fingerprint image. Then, the technique of the Chaotic Baker map randomization is applied on the output fused image. In the second proposal, the fingerprint is fused with an image encrypted with RC6 block cipher algorithm prior to encryption. Several metrics are used in this paper for performance evaluation of the proposed encryption scheme including, visual inspection, histogram analysis, encryption quality analysis, and diffusion analysis. The outcomes demonstrate that the proposed image encryption schemes give a proficient and secure path for unique fingerprint encryption.
{"title":"A Proposed Fingerprint Image Encryption Scheme Based on Wavelet Fusion","authors":"F. G. Hashad, El-Sayed M. El-Rabaie, Ibrahim F. El Ashry, F. El-Samie, O. Zahran","doi":"10.21608/mjeer.2018.63187","DOIUrl":"https://doi.org/10.21608/mjeer.2018.63187","url":null,"abstract":"This paper presents two chaotic image encryption plans combined with Discrete Wavelet Transform (DWT) to encrypt unique fingerprint. In the first proposal, the fingerprint which has few details (low entropy) is fused with another image which is rich in details (high entropy) using the Discrete Wavelet Transform (DWT) prior to encryption. The fusion process is a pre-processing step to alter the homogeneity of flat areas in the few-details fingerprint image. Then, the technique of the Chaotic Baker map randomization is applied on the output fused image. In the second proposal, the fingerprint is fused with an image encrypted with RC6 block cipher algorithm prior to encryption. Several metrics are used in this paper for performance evaluation of the proposed encryption scheme including, visual inspection, histogram analysis, encryption quality analysis, and diffusion analysis. The outcomes demonstrate that the proposed image encryption schemes give a proficient and secure path for unique fingerprint encryption.","PeriodicalId":218019,"journal":{"name":"Menoufia Journal of Electronic Engineering Research","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121970075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.21608/mjeer.2018.63268
E. Elshazly, Safey A. S. Abdel Wahab, R. Fikry, O. Zahran, S. Elaraby, M. El-Kordy
Steganography is one of the most efficient data hiding techniques,where a secret message is embedded in a cover image in such away that only the cover image is visible and at the receiver, thehidden message is extracted from the stego-image. In this paper, amodified Least Significant Bit (LSB) technique is proposed andapplied to different grayscale cover images in a spatial domain.Furthermore, the proposed algorithm is implemented using FPGA,which provides a least embedding time, a faster programmable andcommercial hardware solution for secure communication. Theobtained results prove that, the proposed algorithm has lowcomputational complexity, high embedding speed and the capabilityof embedding a large payload capacity compared to otheralgorithms that implemented in low cost embedded systemapplications.
{"title":"FPGA Implementation of Image Steganography Algorithm using Modified LSB Technique","authors":"E. Elshazly, Safey A. S. Abdel Wahab, R. Fikry, O. Zahran, S. Elaraby, M. El-Kordy","doi":"10.21608/mjeer.2018.63268","DOIUrl":"https://doi.org/10.21608/mjeer.2018.63268","url":null,"abstract":"Steganography is one of the most efficient data hiding techniques,where a secret message is embedded in a cover image in such away that only the cover image is visible and at the receiver, thehidden message is extracted from the stego-image. In this paper, amodified Least Significant Bit (LSB) technique is proposed andapplied to different grayscale cover images in a spatial domain.Furthermore, the proposed algorithm is implemented using FPGA,which provides a least embedding time, a faster programmable andcommercial hardware solution for secure communication. Theobtained results prove that, the proposed algorithm has lowcomputational complexity, high embedding speed and the capabilityof embedding a large payload capacity compared to otheralgorithms that implemented in low cost embedded systemapplications.","PeriodicalId":218019,"journal":{"name":"Menoufia Journal of Electronic Engineering Research","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124094653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.21608/mjeer.2018.63189
Hayam A. Abd El-Hameed, S. El-Dolil, M. Dessouky, E. Hassan, Ibrahim M. Eldokany, F. E. El-Samie
This paper presents multi-level security scheme for imagestransmission, by applying signature with encryption schemes.Signature is based on Discrete Cosine Transform (DCT) andEncodingusing Double Random Phase Encoding (DRPE). Theproposed multi-level scheme exploits the benefit of signature andencryption, which give strong images against image processingattacks. Several experiments are executed to test the performanceof the scheme. The proposed scheme increases the level ofsecurity for transmitting images and it has better immunity tonoise.
{"title":"Multi-level Security System for Image Transmission with Confidence Guarantee","authors":"Hayam A. Abd El-Hameed, S. El-Dolil, M. Dessouky, E. Hassan, Ibrahim M. Eldokany, F. E. El-Samie","doi":"10.21608/mjeer.2018.63189","DOIUrl":"https://doi.org/10.21608/mjeer.2018.63189","url":null,"abstract":"This paper presents multi-level security scheme for imagestransmission, by applying signature with encryption schemes.Signature is based on Discrete Cosine Transform (DCT) andEncodingusing Double Random Phase Encoding (DRPE). Theproposed multi-level scheme exploits the benefit of signature andencryption, which give strong images against image processingattacks. Several experiments are executed to test the performanceof the scheme. The proposed scheme increases the level ofsecurity for transmitting images and it has better immunity tonoise.","PeriodicalId":218019,"journal":{"name":"Menoufia Journal of Electronic Engineering Research","volume":"47 22","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133784746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.21608/mjeer.2018.63173
Shimaa S. Ali, M. Shokair, M. Dessouky, N. Messiha
Spectrum handoff in cognitive radio networks is to have a seamless switch between channels consequently, a high quality of service for the secondary users. This paper proposes three techniques for spectrum handoff. The first proposed one based on the low priority user leaves the channel to another channel. The second proposed model based on the low priority user stays on the same channel with resuming its transmission when the high priority user finished its transmission. Finally, the third proposed model based on the low priority user stays on the same channel with restarting its transmission when the high priority user finished its transmission. The obtained results indicate that the three proposed system models give different queuing delay performances for each user. The techniques of the models and the obtained results are important for evaluating the total system time, service time and queuing delay for secondary users. Consequently, the quality of service for the secondary users and hence the useful for cognitive radio network design and optimization will be obtained.
{"title":"Performance Study of Queuing Delay in CRN Using Different Proposed Spectrum Handoff Approaches","authors":"Shimaa S. Ali, M. Shokair, M. Dessouky, N. Messiha","doi":"10.21608/mjeer.2018.63173","DOIUrl":"https://doi.org/10.21608/mjeer.2018.63173","url":null,"abstract":"Spectrum handoff in cognitive radio networks is to have a seamless switch between channels consequently, a high quality of service for the secondary users. This paper proposes three techniques for spectrum handoff. The first proposed one based on the low priority user leaves the channel to another channel. The second proposed model based on the low priority user stays on the same channel with resuming its transmission when the high priority user finished its transmission. Finally, the third proposed model based on the low priority user stays on the same channel with restarting its transmission when the high priority user finished its transmission. The obtained results indicate that the three proposed system models give different queuing delay performances for each user. The techniques of the models and the obtained results are important for evaluating the total system time, service time and queuing delay for secondary users. Consequently, the quality of service for the secondary users and hence the useful for cognitive radio network design and optimization will be obtained.","PeriodicalId":218019,"journal":{"name":"Menoufia Journal of Electronic Engineering Research","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129529892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.21608/mjeer.2018.63263
M. S. ELTokh, A. A. E. Tawab, Kamel S. Gerges, I. Mahmoud, B. Abozalam, Galal A. M. Atlam
{"title":"Signals Overlapping Detection and its Retrieval using Artificial Neural Network for Digital Gamma Ray Spectroscopy","authors":"M. S. ELTokh, A. A. E. Tawab, Kamel S. Gerges, I. Mahmoud, B. Abozalam, Galal A. M. Atlam","doi":"10.21608/mjeer.2018.63263","DOIUrl":"https://doi.org/10.21608/mjeer.2018.63263","url":null,"abstract":"","PeriodicalId":218019,"journal":{"name":"Menoufia Journal of Electronic Engineering Research","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114759522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-01DOI: 10.21608/mjeer.2019.63614
Amina El-taweel, S. A. El-atty, S. El-Rabaie
{"title":"Efficient Molecular Communication Protocol based on Mobile Ad-hoc Nanonetwork","authors":"Amina El-taweel, S. A. El-atty, S. El-Rabaie","doi":"10.21608/mjeer.2019.63614","DOIUrl":"https://doi.org/10.21608/mjeer.2019.63614","url":null,"abstract":"","PeriodicalId":218019,"journal":{"name":"Menoufia Journal of Electronic Engineering Research","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131801640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21608/mjeer.2019.62719
M. El-Hossainy, R. Shalaby, B. Abo-Zalam
{"title":"Modified PDOS-based LQG Controller for Inverted Pendulum","authors":"M. El-Hossainy, R. Shalaby, B. Abo-Zalam","doi":"10.21608/mjeer.2019.62719","DOIUrl":"https://doi.org/10.21608/mjeer.2019.62719","url":null,"abstract":"","PeriodicalId":218019,"journal":{"name":"Menoufia Journal of Electronic Engineering Research","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125201705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21608/mjeer.2019.62746
A. Mohammed, A. El-Eraki, Marwa M. S. Azar
High speed optical interconnection networks are further more integrated for modern computing systems and parallel computing. Optical multistage interconnection network (OMIN) is a popular dynamic network schemes that are used in switching and communication of high speed optical interconnection network applications. However, OMINs introduce crosstalk which results from coupling two signals within one Switching Element. This paper highlights the breakthroughs in the area of scheduling methods and crosstalk free routing in optical interconnection networks, and proposes new timely conflict free routing algorithms.
{"title":"Crosstalk Free Routing Algorithm for High Speed Optical Multistage Interconnection Network","authors":"A. Mohammed, A. El-Eraki, Marwa M. S. Azar","doi":"10.21608/mjeer.2019.62746","DOIUrl":"https://doi.org/10.21608/mjeer.2019.62746","url":null,"abstract":"High speed optical interconnection networks are further more integrated for modern computing systems and parallel computing. Optical multistage interconnection network (OMIN) is a popular dynamic network schemes that are used in switching and communication of high speed optical interconnection network applications. However, OMINs introduce crosstalk which results from coupling two signals within one Switching Element. This paper highlights the breakthroughs in the area of scheduling methods and crosstalk free routing in optical interconnection networks, and proposes new timely conflict free routing algorithms.","PeriodicalId":218019,"journal":{"name":"Menoufia Journal of Electronic Engineering Research","volume":"13 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128944022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}