المنشورات العلمية

Principal Component Analysis for Face Recognition

Abstract - Humans have used Biometric characteristics such as face, voice, and gait for thousands of years to recognize each other. Biometrics (also known as biometry) is defined as the identification of an individual based on biological traits, such as fingerprints, iris patterns, and facial features. The main objective of this paper is to implement face recognition system using Principle Component Analysis (PCA), where a model is trained for each user. This target can be mainly decomposed into image preprocessing, feature extraction and feature matching. The Euclidean distance and Chessboard distance classifiers were used. Finally, the comparisons between the two classifiers is reported.
Farag J Zbeda, (12-2008)

THE CELL COVERAGE PREDICTION MODELS FOR MOBILE CELLULAR ENVIRONMENT

For the simulation of mobile communication networks, it is necessary to model the radio channel accurately. The radio wave propagation modeling is the first estimate of the channel quality. This paper introduces an indoor and outdoor propagation-modeling tool that uses a comprehensive list of propagation models for mobile radio network environments. Then, these models can be used to examine the radio propagation, validate and predict the performance of mobile wireless network systems. The simulator is developed in MATLAB software to compute the propagation models. By modeling the various components and their integration, this simulation environment is able to accurately predict the performance of cellular network. Besides, the capability of tool to use precise models on various types of environments to predict all the variables that might influence the propagation of the radio signals. It is also equipped with main program interface that provides a good and useful system tool for cellular network developer to design and optimize the network structure with high accuracy.
Amer R. Zerek, , (5-2007)
موقع الناشر

Error Control Scheme for Transmission Impairments

In the wireless networks, one of the key issues is to guarantee various Quality of Service (QoS), under variable radio link behavior. In this paper, we show combination codes of error control schemes using forward error correction, while keeping an efficient use of the limited bandwidth. We use a Hamming (7,4) code and (12,8) code, in which three checks bits are combined with four information bits to produce a block of data of length n = 7 for (7,4) code, and in which four checks bits are combined with eight information bits to produce a block of data of length n=12 for (12,8) code. A block of data of length 12 is too short to be appropriate for a practical data communications system, but the mathematics involved in longer blocks would become tedious .
Amer R. Zerek, Mohamed Al-taiari, (5-2007)
موقع الناشر

SIMULATION CODES FOR TIMER AND LOCATION AREA BASED UPDATE/PAGING STRATEGIES FOR WATM

This paper studies the problems related to the location management strategies, i.e., Timer Based and Location Area Based for Wireless ATM network. The simulation models are based on user motion and call arrival is based on Poisson arrival process. The Timer-based Location Management strategy is one in which the user updates its location periodically after an interval of time. This time is based upon the user’s mobility. The scheme seeks to minimize the average signaling cost for individual mobile users for both paging and registration. In the adaptive Location Area Based strategy, the user updates its location on each Location Area (LA) call boundary crossing. In this case the LA size is adaptive changing according to the user’s mobility characteristics.
Amer R. Zerek, (5-2007)
موقع الناشر

Robust Fault Detection Using QQ-Plot

Abstract Because of the presence of sporadic high-intensity measurement noise (outliers), an adaptive algorithm for the robust estimation of parameters of linear dynamic discrete-time systems is proposed in this paper. First, the sorted data versus the normal quantiles is plotted, called QQ-plot. Next, the ε-contaminated normal distribution of noise is adopted. Then, a data classification procedure based on the QQ-plot approach, combined with the robustified data winsorization technique, is developed; the estimation of the unknown noise statistical parameters is solved. Moreover, an iterative procedure for estimating the contamination degree ε, which originated from an ML classification, is also proposed. Thus, a ε-contaminated noise distribution is estimated and, the suboptimal maximum likelihood criterion is defined, and the system-parameter estimation problem is solved robustly, using the proposed recursive robust parameter estimation scheme. Finally, these parameters are used to estimate water level in the steam drum and residual of the steam-drum water level sensor.
Nasar Aldian Ambark Shashoa, Sulaiman Khalifa Yakhlef, Mansour Ali W. Marei, Nasser Bashir Ekreem, (2-2004)

Data Link Control Layer Performance for Wireless ATM Networks

The growing demand for ATM-based technology and recent proliferation of wireless access technologies have motivated researchers to examine the feasibility of extending the ATM paradigm from the wireline to the wireless domain and create a new research area known as Wireless ATM (WATM) (Toh, 1997). Dealing with lossy wireless links, characterized by limited bandwidth and high, bursty error rates, breaks the main assumption of conventional ATM systems, which is that of using no errors per links. Therefore, WATM systems must provide a transparent mechanism to ensure reliable end-to-end data transmission over the wireless portion of the network. The identification of a wireless-specific data link control layer (W-DLC), sitting between the traditional ATM layer and a wireless-specific medium access control layer (WMAC), is the responsible entity for guaranteeing the quality of service (QOS) requested by individual ATM-based virtual connections. Thus the main focus is to investigate the performance of DLC protocol for ABR traffic over wireless ATM network. Retransmissions are only required for non-real time traffic and are implemented using a Go-Back-N and Selective Repeat (SR) ARQ (Lin et aI., 1984), (Schwartz, 1987). Wireless channels are usually time-varying and the channel bit error rates vary as the surrounding environment changes. Since these factors put in jeopardy the performance of the DLC protocol and higher layer end-to-end protocol at large, additional link-level mechanisms are added to provide reliability over impaired radio links. The DLC protocol implementation represents an attempt to achieve these goals under the strict constraints imposed by impaired wireless links. This thesis studies and compares the two Automatic Repeat Request (ARQ) protocols, i.e., Go-Back-N (GBN) and Selective Repeat (SR) ARQ and analyse them for variable packet size and fixed packet size (WATM packet) by using C programming for simulation. The results show that the performance of SR ARQ is better than the GBN ARQ for variable packet size. The results also show that SR ARQ protocol has better performance than GBN ARQ in terms of error detection for fixed WATM packet in the range of 50 -70 bytes, which is the WATM packet range (ATM Forum, 1997).
Sliman Khalifa Ali Yaklaf, (11-1999)
موقع الناشر

3- Hydrogen and Fuel Cells Towards a Sustainable Energy Future


adel A M abousadeel, (0-0)