2019 6th International Conference on Advanced Control Circuits and Systems (ACCS) & 2019 5th International Conference on New Paradigms in Electronics & information Technology (PEIT), 2019
Being faster, larger and more reliable, today's trains have permeated the other means of tran... more Being faster, larger and more reliable, today's trains have permeated the other means of transportation as the prime mode between several countries. However, railroad-related ac-cidents are also more perilous in damage and loss of lives. Therefore, in common railway security systems, more strivings are required for strengthening the safety. Moreover, manual observing of the tracks is actually impracticable and unreliable. Thus, to avoid collisions and allow a better communication between train, central control headquarters, and passengers, this paper, being focused in establishing an automated railway security prototype model using advanced electronic circuits, a communication module, and the proposed mobile interfaces. It is established on an Arduino UNO embedded platform to introduce automatic control crossing gates, switching train tracks and detecting line cracks with the aid of electronic sensors like IR sharp sensor, ultrasonic sensor, and gyroscopes. Moreover, by employing the web camera, the operator of the control room could get real status updating and have a continuous behavior monitoring during the train journey. Thus, the railway gate could be highly controlled so the road traffic will be wholly prophesied. Especially on dangerous trips, the train is supported by the developed dummy car which can detect and monitor any causes of risks on the railway lines and send that fault to the concerned authority. To offer different services for drivers and passengers, the proposed Android applications are responsible for obtaining the sensed data through the Bluetooth module and broadcasting urgent data to the control room. As the accuracy of automated operations is usually more accurate than manual operations, fatal errors due to human mistakes could be easily limited. Thus, compared to related systems, the proposed automatic railway security system which is cost-effective will be robust enough to facilitate much safety standards to Egypt railways.
International Journal of Computer Applications, 2017
Nowadays, various types of attacks are imposed to multimedia during transmission. Also in many ap... more Nowadays, various types of attacks are imposed to multimedia during transmission. Also in many applications the security of information is very important. So the information encryption has become an important issue. Many encryption techniques have been proposed to achieve high robustness against different types of attacks and to save information from hackers. In this paper, a new chaotic based optical encryption that depends on Discrete Wavelet Transform (DWT) for image transformation will be introduced for color image encryption. Nine chaotic maps have been used in the proposed technique; eight of them were traditional and one is a new proposed map. As a result of extensive simulation results depending on various performance metrics it has been found that the proposed technique has given better robustness comparing to traditional algorithm.
International Journal of Computer Applications, 2019
Over the years, large amount of transferred information has been attacked by hackers; so it has b... more Over the years, large amount of transferred information has been attacked by hackers; so it has been considerable to make all effort for securing data and encrypting the information. Color images represent a very vital and important type of multimedia; so many encryption techniques have been proposed to protect the color image against different types of attacks. In this paper two proposed techniques will be introduced which have had high robustness against complex composite form of attacks. Discrete Wavelet Transform (DWT) has been applied for image transformation in one method and Discrete Cosine Transform (DCT) has been applied in the other one. Six various chaotic maps have been used with different parameters to introduce the needed encryption keys for the proposed approaches. After many extensive comparisons with other traditional techniques it has been found that the proposed algorithms have given better performance against both friendly and hard forms of complex composite attacks.
Nowadays, increasing use and distribution of the digital images through multimedia and communicat... more Nowadays, increasing use and distribution of the digital images through multimedia and communication system have been increased. Therefore, the transmitted data can be attacked by unauthorized people. The main considerable challenge in the digital world is maintaining information security. The traditional techniques are unsuitable for the image encryption. Therefore it is necessary to develop the techniques that be able to secure the color images. This paper introduce a hybrid encryption and watermarking for digital color image against the composite attacks. The discrete cosines transform (DCT) and discrete wavelet transform (DWT) transforms have been extensively used in many digital signal processing applications, so DCT and DWT have been applied for image transformation by two methods. Six chaotic maps have been used with different parameters to establish a relation between the data encryption key and watermark. After extensive studies it has been found that the proposed technique...
The actual and next communication schemes tend to use OFDM systems in order to provide high baud ... more The actual and next communication schemes tend to use OFDM systems in order to provide high baud rates, less intercarrier interference, and less intersymbol interference. OFDM has become the core of most 4G communication systems as fixed Wi-Fi system (IEEE802.11a standard), mobile Wi-Fi system (IEEE802.11b standard), fixed WiMAX system (IEEE802.16a standard), mobile WiMAX system (IEEE802.16e standard), and Long Term Evolution (LTE) system. In this paper the detailed simulation of different OFDM systems with different constellation mapping schemes will be obtained using MATLAB-2011 program to study the effect of various design parameters on the system performance. Noise Ratio (SNR).
In this research, we propose an architectural solution to implement file transfer service (FTP) i... more In this research, we propose an architectural solution to implement file transfer service (FTP) in IPv6 environment network. IPv6 is considered to be the next-generation Internet protocol. Thus, this study is to analyze the size of files transfer performance and to measure Quality of Service (QoS) delivered by IPv6 using best effort approach in comparison to IPv4. This study primarily focuses on file transfer speed quality of FTP. In the experiment, both host clients and routers utilize the same technical specification. In the same study also, network management system (NMS) is used to monitor and to capture the performance of file transfer in IPv6 and IPv4 environment. Based on the finding result, it shows that there is a slight but significant difference in file transfer performance between dual stack tunnelling IPv4 and IPv6 protocol. Small size file transfer will result in lower and same delay performance outcome for both IPv4 and IPv6, while large size file transfer over IPv6 will result in higher delay performance as compared to IPv4. In short, the significant result of IPv6 delay is slightly higher than IPv4. Hence, the quality of FTP might be decreased if dual stack tunnelling is implemented in IPv6 environment. Nevertheless, Link Efficiency and compression technique are able to lower the delay performance on file transfer over IPv6 environment.
Orthogonal Frequency Division Multiplexing (OFDM) transmissions are emerging as important modulat... more Orthogonal Frequency Division Multiplexing (OFDM) transmissions are emerging as important modulation technique because of its capacity of ensuring high level robustness against interference. OFDM is a modulation technique which is now widely used in various high speed mobile and wireless communication systems as; fixed Wi-Fi system (IEEE 802.11a standard), mobile Wi-Fi system (IEEE 802.11b standard), fixed WiMAX system (IEEE 802.16a standard), and mobile WiMAX system (IEEE 802.16e standard). In this paper the design and implementation of OFDM system will be illustrated as well as a detailed simulation of the OFDM system using MATLAB-2011 program to study the effect of various design parameters on the system performance, also the design and simulation results for some standards of OFDM using MATLAB will be observed as a practical system examples that uses OFDM as a modulation technique. OFDM transceiver will be implemented using FPGA Spartan 3A kit. All modules are designed using VHDL
OFDM is a modulation as well as multiplexing technique which is now widely used in various high s... more OFDM is a modulation as well as multiplexing technique which is now widely used in various high speed mobile and wireless communication systems because of its capacity of ensuring high level robustness against interference. In this paper the design and implementation of OFDM system will be illustrated as well as a detailed simulation of the OFDM system with 64-QAM to study the effect of various design parameters on the system performance. OFDM transceiver will be implemented using FPGA Spartan 3A kit. This adaptive system will be implemented using different digital modulation schemes as shown in the emulation results. All modules are designed using VHDL programming language. Noise Ratio (SNR).
2019 6th International Conference on Advanced Control Circuits and Systems (ACCS) & 2019 5th International Conference on New Paradigms in Electronics & information Technology (PEIT), 2019
Being faster, larger and more reliable, today's trains have permeated the other means of tran... more Being faster, larger and more reliable, today's trains have permeated the other means of transportation as the prime mode between several countries. However, railroad-related ac-cidents are also more perilous in damage and loss of lives. Therefore, in common railway security systems, more strivings are required for strengthening the safety. Moreover, manual observing of the tracks is actually impracticable and unreliable. Thus, to avoid collisions and allow a better communication between train, central control headquarters, and passengers, this paper, being focused in establishing an automated railway security prototype model using advanced electronic circuits, a communication module, and the proposed mobile interfaces. It is established on an Arduino UNO embedded platform to introduce automatic control crossing gates, switching train tracks and detecting line cracks with the aid of electronic sensors like IR sharp sensor, ultrasonic sensor, and gyroscopes. Moreover, by employing the web camera, the operator of the control room could get real status updating and have a continuous behavior monitoring during the train journey. Thus, the railway gate could be highly controlled so the road traffic will be wholly prophesied. Especially on dangerous trips, the train is supported by the developed dummy car which can detect and monitor any causes of risks on the railway lines and send that fault to the concerned authority. To offer different services for drivers and passengers, the proposed Android applications are responsible for obtaining the sensed data through the Bluetooth module and broadcasting urgent data to the control room. As the accuracy of automated operations is usually more accurate than manual operations, fatal errors due to human mistakes could be easily limited. Thus, compared to related systems, the proposed automatic railway security system which is cost-effective will be robust enough to facilitate much safety standards to Egypt railways.
International Journal of Computer Applications, 2017
Nowadays, various types of attacks are imposed to multimedia during transmission. Also in many ap... more Nowadays, various types of attacks are imposed to multimedia during transmission. Also in many applications the security of information is very important. So the information encryption has become an important issue. Many encryption techniques have been proposed to achieve high robustness against different types of attacks and to save information from hackers. In this paper, a new chaotic based optical encryption that depends on Discrete Wavelet Transform (DWT) for image transformation will be introduced for color image encryption. Nine chaotic maps have been used in the proposed technique; eight of them were traditional and one is a new proposed map. As a result of extensive simulation results depending on various performance metrics it has been found that the proposed technique has given better robustness comparing to traditional algorithm.
International Journal of Computer Applications, 2019
Over the years, large amount of transferred information has been attacked by hackers; so it has b... more Over the years, large amount of transferred information has been attacked by hackers; so it has been considerable to make all effort for securing data and encrypting the information. Color images represent a very vital and important type of multimedia; so many encryption techniques have been proposed to protect the color image against different types of attacks. In this paper two proposed techniques will be introduced which have had high robustness against complex composite form of attacks. Discrete Wavelet Transform (DWT) has been applied for image transformation in one method and Discrete Cosine Transform (DCT) has been applied in the other one. Six various chaotic maps have been used with different parameters to introduce the needed encryption keys for the proposed approaches. After many extensive comparisons with other traditional techniques it has been found that the proposed algorithms have given better performance against both friendly and hard forms of complex composite attacks.
Nowadays, increasing use and distribution of the digital images through multimedia and communicat... more Nowadays, increasing use and distribution of the digital images through multimedia and communication system have been increased. Therefore, the transmitted data can be attacked by unauthorized people. The main considerable challenge in the digital world is maintaining information security. The traditional techniques are unsuitable for the image encryption. Therefore it is necessary to develop the techniques that be able to secure the color images. This paper introduce a hybrid encryption and watermarking for digital color image against the composite attacks. The discrete cosines transform (DCT) and discrete wavelet transform (DWT) transforms have been extensively used in many digital signal processing applications, so DCT and DWT have been applied for image transformation by two methods. Six chaotic maps have been used with different parameters to establish a relation between the data encryption key and watermark. After extensive studies it has been found that the proposed technique...
The actual and next communication schemes tend to use OFDM systems in order to provide high baud ... more The actual and next communication schemes tend to use OFDM systems in order to provide high baud rates, less intercarrier interference, and less intersymbol interference. OFDM has become the core of most 4G communication systems as fixed Wi-Fi system (IEEE802.11a standard), mobile Wi-Fi system (IEEE802.11b standard), fixed WiMAX system (IEEE802.16a standard), mobile WiMAX system (IEEE802.16e standard), and Long Term Evolution (LTE) system. In this paper the detailed simulation of different OFDM systems with different constellation mapping schemes will be obtained using MATLAB-2011 program to study the effect of various design parameters on the system performance. Noise Ratio (SNR).
In this research, we propose an architectural solution to implement file transfer service (FTP) i... more In this research, we propose an architectural solution to implement file transfer service (FTP) in IPv6 environment network. IPv6 is considered to be the next-generation Internet protocol. Thus, this study is to analyze the size of files transfer performance and to measure Quality of Service (QoS) delivered by IPv6 using best effort approach in comparison to IPv4. This study primarily focuses on file transfer speed quality of FTP. In the experiment, both host clients and routers utilize the same technical specification. In the same study also, network management system (NMS) is used to monitor and to capture the performance of file transfer in IPv6 and IPv4 environment. Based on the finding result, it shows that there is a slight but significant difference in file transfer performance between dual stack tunnelling IPv4 and IPv6 protocol. Small size file transfer will result in lower and same delay performance outcome for both IPv4 and IPv6, while large size file transfer over IPv6 will result in higher delay performance as compared to IPv4. In short, the significant result of IPv6 delay is slightly higher than IPv4. Hence, the quality of FTP might be decreased if dual stack tunnelling is implemented in IPv6 environment. Nevertheless, Link Efficiency and compression technique are able to lower the delay performance on file transfer over IPv6 environment.
Orthogonal Frequency Division Multiplexing (OFDM) transmissions are emerging as important modulat... more Orthogonal Frequency Division Multiplexing (OFDM) transmissions are emerging as important modulation technique because of its capacity of ensuring high level robustness against interference. OFDM is a modulation technique which is now widely used in various high speed mobile and wireless communication systems as; fixed Wi-Fi system (IEEE 802.11a standard), mobile Wi-Fi system (IEEE 802.11b standard), fixed WiMAX system (IEEE 802.16a standard), and mobile WiMAX system (IEEE 802.16e standard). In this paper the design and implementation of OFDM system will be illustrated as well as a detailed simulation of the OFDM system using MATLAB-2011 program to study the effect of various design parameters on the system performance, also the design and simulation results for some standards of OFDM using MATLAB will be observed as a practical system examples that uses OFDM as a modulation technique. OFDM transceiver will be implemented using FPGA Spartan 3A kit. All modules are designed using VHDL
OFDM is a modulation as well as multiplexing technique which is now widely used in various high s... more OFDM is a modulation as well as multiplexing technique which is now widely used in various high speed mobile and wireless communication systems because of its capacity of ensuring high level robustness against interference. In this paper the design and implementation of OFDM system will be illustrated as well as a detailed simulation of the OFDM system with 64-QAM to study the effect of various design parameters on the system performance. OFDM transceiver will be implemented using FPGA Spartan 3A kit. This adaptive system will be implemented using different digital modulation schemes as shown in the emulation results. All modules are designed using VHDL programming language. Noise Ratio (SNR).
Uploads
Papers by Mohamed Ismail