Pub Date : 2019-03-01DOI: 10.1109/PICECE.2019.8747208
A. Masri, Muhannad Al-Jabi
Due to the increasing demand for energy in our everyday life, there is an increasing interest in the clean and renewable energy resources. this increasing interest motivates investors and stakeholders to increase the investment in this sector due to its long term cost effectiveness and due to its negligible pollution on the climate. Moreover, due to the growth of population and lack of enough resources specially in the outlying areas, engaging multiple energy resources will play a vital role in the urbanization sustainability and population distribution. Such that, on site energy generation will encourage people and facilities to leave the crowded large cities to other areas which in turn will increase the geographical space utilization. Therefore, solar and wind energy are considered the most useful sources of clean and renewable energy. In addition, simulation and parameters study for such systems has a great importance in the design and implementation processes. In this paper we will present a novel methodology that deeply analyze and simulate the design for windfarm to serve an important region in Palestine. And the results show the effectiveness of our system from both the technical side and from the financial side as well.
{"title":"Development of energy through wind simulation and design: a case study of Hebron Wind Farm in Palestine","authors":"A. Masri, Muhannad Al-Jabi","doi":"10.1109/PICECE.2019.8747208","DOIUrl":"https://doi.org/10.1109/PICECE.2019.8747208","url":null,"abstract":"Due to the increasing demand for energy in our everyday life, there is an increasing interest in the clean and renewable energy resources. this increasing interest motivates investors and stakeholders to increase the investment in this sector due to its long term cost effectiveness and due to its negligible pollution on the climate. Moreover, due to the growth of population and lack of enough resources specially in the outlying areas, engaging multiple energy resources will play a vital role in the urbanization sustainability and population distribution. Such that, on site energy generation will encourage people and facilities to leave the crowded large cities to other areas which in turn will increase the geographical space utilization. Therefore, solar and wind energy are considered the most useful sources of clean and renewable energy. In addition, simulation and parameters study for such systems has a great importance in the design and implementation processes. In this paper we will present a novel methodology that deeply analyze and simulate the design for windfarm to serve an important region in Palestine. And the results show the effectiveness of our system from both the technical side and from the financial side as well.","PeriodicalId":375980,"journal":{"name":"2019 IEEE 7th Palestinian International Conference on Electrical and Computer Engineering (PICECE)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115344249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/PICECE.2019.8747181
Mohamed Abdelati
Battery chargers are widely used in the Gaza Strip as part of common energy backup systems. Locally manufactured chargers are based on bulk iron-core transformers and likely to be a single stage, which has no control on the charging current. State of art chargers operate in switched mode utilizing ferrite-core transformers and able to control the charging current and voltage. In this work, an attempt to introduce this technology to beginners through designing and implementing a professional and viable 15A charger for 12V batteries. PIC18F4550 microcontroller controls the device functions and it has an excellent degree of protection. The implemented prototype is on duty for several months and it is planned to be incorporated within a hybrid battery charger.
{"title":"A Switched-Mode 3-Stage Battery Charger","authors":"Mohamed Abdelati","doi":"10.1109/PICECE.2019.8747181","DOIUrl":"https://doi.org/10.1109/PICECE.2019.8747181","url":null,"abstract":"Battery chargers are widely used in the Gaza Strip as part of common energy backup systems. Locally manufactured chargers are based on bulk iron-core transformers and likely to be a single stage, which has no control on the charging current. State of art chargers operate in switched mode utilizing ferrite-core transformers and able to control the charging current and voltage. In this work, an attempt to introduce this technology to beginners through designing and implementing a professional and viable 15A charger for 12V batteries. PIC18F4550 microcontroller controls the device functions and it has an excellent degree of protection. The implemented prototype is on duty for several months and it is planned to be incorporated within a hybrid battery charger.","PeriodicalId":375980,"journal":{"name":"2019 IEEE 7th Palestinian International Conference on Electrical and Computer Engineering (PICECE)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114588005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/PICECE.2019.8747177
M. Shabat, D. El-Amassi, Kh. Abushaar, D. Schaadt
Solar cells have rapidly attracted research and industry due to increasing demand of energy over worldwide. Solar cell is a device converting effectively and directly the sun light into electrical power. The main problem facing the design and manufacturing of solar cells is the relatively low efficient of absorption of solar light. The concept of solar cell is based on getting higher light transmission and lower light reflection through the solar cell structure. A composite four-layer solar cell structure containing SiN-Au nanoparticles and Si has been designed and investigated. The transmission, reflection and absorption of the incident light are derived by matrix method for different physical parameters of the structure and the numerical results are obtained by Maple program software. We found that Au-nanoparticles on the proposed anti-reflective (AR) structure has effectively enhanced the transmission and improved the light efficiency.
{"title":"Design of Solar Cell Structure Based on Au Nanoparticles","authors":"M. Shabat, D. El-Amassi, Kh. Abushaar, D. Schaadt","doi":"10.1109/PICECE.2019.8747177","DOIUrl":"https://doi.org/10.1109/PICECE.2019.8747177","url":null,"abstract":"Solar cells have rapidly attracted research and industry due to increasing demand of energy over worldwide. Solar cell is a device converting effectively and directly the sun light into electrical power. The main problem facing the design and manufacturing of solar cells is the relatively low efficient of absorption of solar light. The concept of solar cell is based on getting higher light transmission and lower light reflection through the solar cell structure. A composite four-layer solar cell structure containing SiN-Au nanoparticles and Si has been designed and investigated. The transmission, reflection and absorption of the incident light are derived by matrix method for different physical parameters of the structure and the numerical results are obtained by Maple program software. We found that Au-nanoparticles on the proposed anti-reflective (AR) structure has effectively enhanced the transmission and improved the light efficiency.","PeriodicalId":375980,"journal":{"name":"2019 IEEE 7th Palestinian International Conference on Electrical and Computer Engineering (PICECE)","volume":"175 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133614510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/PICECE.2019.8747175
Mahmoud R. Alfarra, Abdalfattah M. Alfarra, Ahmed Salahedden
Surprisingly, there are more than 1,500,000 articles found by google scholar search engine on keyphrase extraction (KE) have been published recently, 21,000 of them only in current year. This large number implies that researchers need to find more accurate and better performing models for KE from text as a subtask of text mining and summarization. This paper presents a novel design of KE. The model is composed of Graph-based Representation, sentence clustering and ranking based on Density peaks for KE in single or multi-documents (GDREK) which can be used further in text extractive summarization. The principle of GDREK is using graph model to represent text and then group and rank the sentences in a mutuality manner. In this model, sentence grouping and ranking proceeds by discovering the main topics of text and finding central sentences of each topic incrementally. In this incremental step, as the sentences are grouped based on the Graph-based Growing Self-Organizing Map (G-GSOM), they are ranked using Density Peaks (DP) concept according to a measure of similarity between sentences. Our similarity measure is based on shared phrases and Cosine function. Sentences are scored under the assumption that when a sentence has more similar sentences, it is considered more important (higher density) and more representative. Finally, the most frequent words or phrases in the sentences are selected as key phrases of the text. Experimental results show that our innovative technique extracts the most key phrases and words of two datasets and yields over 75% accuracy and from most sub-topics of text.
{"title":"Graph-based Density Peaks Ranking Approach for Extracting KeyPhrases (GDREK)","authors":"Mahmoud R. Alfarra, Abdalfattah M. Alfarra, Ahmed Salahedden","doi":"10.1109/PICECE.2019.8747175","DOIUrl":"https://doi.org/10.1109/PICECE.2019.8747175","url":null,"abstract":"Surprisingly, there are more than 1,500,000 articles found by google scholar search engine on keyphrase extraction (KE) have been published recently, 21,000 of them only in current year. This large number implies that researchers need to find more accurate and better performing models for KE from text as a subtask of text mining and summarization. This paper presents a novel design of KE. The model is composed of Graph-based Representation, sentence clustering and ranking based on Density peaks for KE in single or multi-documents (GDREK) which can be used further in text extractive summarization. The principle of GDREK is using graph model to represent text and then group and rank the sentences in a mutuality manner. In this model, sentence grouping and ranking proceeds by discovering the main topics of text and finding central sentences of each topic incrementally. In this incremental step, as the sentences are grouped based on the Graph-based Growing Self-Organizing Map (G-GSOM), they are ranked using Density Peaks (DP) concept according to a measure of similarity between sentences. Our similarity measure is based on shared phrases and Cosine function. Sentences are scored under the assumption that when a sentence has more similar sentences, it is considered more important (higher density) and more representative. Finally, the most frequent words or phrases in the sentences are selected as key phrases of the text. Experimental results show that our innovative technique extracts the most key phrases and words of two datasets and yields over 75% accuracy and from most sub-topics of text.","PeriodicalId":375980,"journal":{"name":"2019 IEEE 7th Palestinian International Conference on Electrical and Computer Engineering (PICECE)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115254311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/PICECE.2019.8747239
Maher A. El-Hallaq
Automatic matching of people faces is a demanding issue which has recently received increased attention during the recent ages due to its various uses in different applications such as law implementation, security requirements and video indexing. Face images are exposed to a variety of important influences such as illumination variation, difference in looking view, facial expression, occlusion, age difference between compared face images and some individual changes in field settings. Most current face matching algorithms can be classified into two categories; either geometry feature based, or template image based. In this research, a suggested algorithm is developed based on normalized cross correlation algorithm in order to find the similarity measure between verified face images. Normalized correlation is considered one of the methods based on template matching that can be used for finding a presence of a pattern or a feature within an image. A Graphical User Interface (GUI) is prepared to perform all face matching tasks and is used to test face verification. This GUI has been examined by conducting many case studies. The concluded results indicate that the developed algorithm is so robust in face matching and shows good performance
{"title":"A Proposed Template Image Matching Algorithm for Face Recognition","authors":"Maher A. El-Hallaq","doi":"10.1109/PICECE.2019.8747239","DOIUrl":"https://doi.org/10.1109/PICECE.2019.8747239","url":null,"abstract":"Automatic matching of people faces is a demanding issue which has recently received increased attention during the recent ages due to its various uses in different applications such as law implementation, security requirements and video indexing. Face images are exposed to a variety of important influences such as illumination variation, difference in looking view, facial expression, occlusion, age difference between compared face images and some individual changes in field settings. Most current face matching algorithms can be classified into two categories; either geometry feature based, or template image based. In this research, a suggested algorithm is developed based on normalized cross correlation algorithm in order to find the similarity measure between verified face images. Normalized correlation is considered one of the methods based on template matching that can be used for finding a presence of a pattern or a feature within an image. A Graphical User Interface (GUI) is prepared to perform all face matching tasks and is used to test face verification. This GUI has been examined by conducting many case studies. The concluded results indicate that the developed algorithm is so robust in face matching and shows good performance","PeriodicalId":375980,"journal":{"name":"2019 IEEE 7th Palestinian International Conference on Electrical and Computer Engineering (PICECE)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122052891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/PICECE.2019.8747195
M. El Astal, A. H. Al Habbash, A. Abu-Hudrouss
Quadrature spatial modulation (QSM) has been recently proposed for MIMO communication systems. It comes to enhance the overall throughput over conventional spatial modulation (SM) techniques. This article investigates the using of this new SM technique in Multi-user MIMO networks, denoted here as MU-QSM. Unlike existing SM techniques, the QSM creates additional spatial constellation dimension, and hence higher overall throughput can be obtained. The performance of the system mentioned is numerically analyzed for a number of users and compared to point-to-point networks. In addition, the experienced interference and receiver-complexity are analyzed too.
{"title":"On Using Quadrature Spatial Modulation in Multi-User Networks","authors":"M. El Astal, A. H. Al Habbash, A. Abu-Hudrouss","doi":"10.1109/PICECE.2019.8747195","DOIUrl":"https://doi.org/10.1109/PICECE.2019.8747195","url":null,"abstract":"Quadrature spatial modulation (QSM) has been recently proposed for MIMO communication systems. It comes to enhance the overall throughput over conventional spatial modulation (SM) techniques. This article investigates the using of this new SM technique in Multi-user MIMO networks, denoted here as MU-QSM. Unlike existing SM techniques, the QSM creates additional spatial constellation dimension, and hence higher overall throughput can be obtained. The performance of the system mentioned is numerically analyzed for a number of users and compared to point-to-point networks. In addition, the experienced interference and receiver-complexity are analyzed too.","PeriodicalId":375980,"journal":{"name":"2019 IEEE 7th Palestinian International Conference on Electrical and Computer Engineering (PICECE)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121213335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/PICECE.2019.8747224
Aiman Ahmed Abu Samra, Hasan Qunoo, Fatma Al-Rubaie, Haneen El-Talli
Nowadays android is the most popular operating system. Android apps suffer from more and more malware attacks. So more and more research is done to get a reliable malware detection approaches. Android malware detection is mainly divided into dynamic approach and static approach. In this paper, we present a survey of the two major approaches of the static Android malware detection: the permission based Detection technique and the signature based detection technique. It is a comparative study, that should be helpful for researchers in this topic. Based on clear parameters the study illustrates the similarity and differences in addition to the accuracy in important published researches.
{"title":"A survey of Static Android Malware Detection Techniques","authors":"Aiman Ahmed Abu Samra, Hasan Qunoo, Fatma Al-Rubaie, Haneen El-Talli","doi":"10.1109/PICECE.2019.8747224","DOIUrl":"https://doi.org/10.1109/PICECE.2019.8747224","url":null,"abstract":"Nowadays android is the most popular operating system. Android apps suffer from more and more malware attacks. So more and more research is done to get a reliable malware detection approaches. Android malware detection is mainly divided into dynamic approach and static approach. In this paper, we present a survey of the two major approaches of the static Android malware detection: the permission based Detection technique and the signature based detection technique. It is a comparative study, that should be helpful for researchers in this topic. Based on clear parameters the study illustrates the similarity and differences in addition to the accuracy in important published researches.","PeriodicalId":375980,"journal":{"name":"2019 IEEE 7th Palestinian International Conference on Electrical and Computer Engineering (PICECE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127431827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/PICECE.2019.8747205
M. Kouali, Noor Obead
Calculating the RCS (Radar Cross Section) of two 3D scatterers (target above a rough surface) needs to numerically solve a set of integral equations involving a large number of unknowns. Such large applications in remote sensing cannot be solved easily with a conventional Method of Moments (MoM) by using a direct LU inversion. Thus, hybridization between the E-PILE (Extended Propagation-Inside-Layer Expansion) and the Physical Optics approximation (PO) reduces significantly the memory requirements and CPU time. The resulting method called E-PILE + PO. In this work, we take advantage of the rank-deficient nature of the coupling matrices, corresponding to scatterer 1 and scatterer 2 interactions, to further reduce the complexity of the method by using the ACA (Adaptive Cross Approximation). The ACA algorithm permits to strongly compress the coupling matrices without a loss of accuracy and the memory requirement is then strongly reduced. The proposed method is then applied for a scenario of a square plate located above sea-like two-dimensional rough surface.
{"title":"The Hybrid EPILE + PO Combined with the Adaptive Cross Approximation to Study the Electromagnetic Scattering from two 3D Scatterers","authors":"M. Kouali, Noor Obead","doi":"10.1109/PICECE.2019.8747205","DOIUrl":"https://doi.org/10.1109/PICECE.2019.8747205","url":null,"abstract":"Calculating the RCS (Radar Cross Section) of two 3D scatterers (target above a rough surface) needs to numerically solve a set of integral equations involving a large number of unknowns. Such large applications in remote sensing cannot be solved easily with a conventional Method of Moments (MoM) by using a direct LU inversion. Thus, hybridization between the E-PILE (Extended Propagation-Inside-Layer Expansion) and the Physical Optics approximation (PO) reduces significantly the memory requirements and CPU time. The resulting method called E-PILE + PO. In this work, we take advantage of the rank-deficient nature of the coupling matrices, corresponding to scatterer 1 and scatterer 2 interactions, to further reduce the complexity of the method by using the ACA (Adaptive Cross Approximation). The ACA algorithm permits to strongly compress the coupling matrices without a loss of accuracy and the memory requirement is then strongly reduced. The proposed method is then applied for a scenario of a square plate located above sea-like two-dimensional rough surface.","PeriodicalId":375980,"journal":{"name":"2019 IEEE 7th Palestinian International Conference on Electrical and Computer Engineering (PICECE)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132806135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/PICECE.2019.8747237
Rushdi A. Hamamreh, Derar Khader
This paper proposes a new approach for TCP congestion control, which is called TCP DCM+. DCM is the previous version, which uses TCP Westwood method of estimating the available bandwidth. The aim of the new protocol is to improve the performance and stability of DCM through using the corrected algorithm in TCP Westwood+ to estimate the available bandwidth. DCM+ is rate-based end-to-end approach, which applies the modification in both phases (SS, CA) of the sender. The results of the simulations show a huge improvement of throughput, in addition to the resulting stability. The used topology is a simple wired 1-path topology. TCP DCM+ is designed to be applicable in wired, wireless and MANETs networks. The simulations executed here are done using ns-3 simulator [16].
{"title":"DCM+: a multi-purpose protocol for congestion control","authors":"Rushdi A. Hamamreh, Derar Khader","doi":"10.1109/PICECE.2019.8747237","DOIUrl":"https://doi.org/10.1109/PICECE.2019.8747237","url":null,"abstract":"This paper proposes a new approach for TCP congestion control, which is called TCP DCM+. DCM is the previous version, which uses TCP Westwood method of estimating the available bandwidth. The aim of the new protocol is to improve the performance and stability of DCM through using the corrected algorithm in TCP Westwood+ to estimate the available bandwidth. DCM+ is rate-based end-to-end approach, which applies the modification in both phases (SS, CA) of the sender. The results of the simulations show a huge improvement of throughput, in addition to the resulting stability. The used topology is a simple wired 1-path topology. TCP DCM+ is designed to be applicable in wired, wireless and MANETs networks. The simulations executed here are done using ns-3 simulator [16].","PeriodicalId":375980,"journal":{"name":"2019 IEEE 7th Palestinian International Conference on Electrical and Computer Engineering (PICECE)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132041483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}