Download CV

Contact Information

Google Scholar

Mr. Sliman Khalifa Ali Yaklaf

  • َQualifications: Master degree
  • Academic Rank: Assistant Professor
  • School of Engineering - Azzaytuna University

Biography

Sliman Yaklaf is one of the staff members at the department of الهندسة الكهربائية والالكترونية faculty of 3. He is working as a since 2013-09-01. He teaches several subjects in his major and has several puplications in the field of his interest.

Qualifications

7 ,2000

Master degree

Communication Engineering
University Putra Malaysia Faculty of Engineering

5 ,1981

Bachelor Degree

Communication Engineering
University Putra Malaysia

Experiences

1997 - 2000

-

1979 - 1981

-

Publications

Multi-Carrier Modulation Techniques for Light Fidelity Technology

The Light-Fidelity(Li-Fi) is very new technology It is a new solution for multiple users. and the modulation techniques for this technology are reviewed in this paper. Li-Fi uses light as a carrier it is a type of wireless communication systems. Li-Fi can be used in sensitive areas without causing interference. Single carrier modulation (SCM) techniques are used in Li-Fi. Multicarrier modulation (MCM) techniques offer power, spectral and efficiency for Li-Fi. Li-Fi solves insufficiency of radio frequency bandwidth, provides security, low implementation, and cannot penetrate human body. Modulation techniques for Li-Fi technology are reviewed in this paper.)
Khaled S. Tarmissi, (3-2019)
Publisher's website


Security Routing Protocols in Ad Hoc Networks: Challenges and Solutions

Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. This paper analyzes security challenges in ad hoc networks and summarizes key issues that should be solved for achieving the ad hoc security. It also gives an overview of the current state of solutions on such key issues in Mobile Ad Hoc Networks (MANETs). To develop suitable security solutions for such new environments, we must first understand how MANETs can be attacked. Then we discuss various proactive and reactive solutions proposed for MANETs. We outline secure routing solutions to avoid some attacks against the routing protocols based on cooperation between nodes.
Abdurrezagh S. Elmezughi, Adel A. M. Abosdel, (12-2016)
Publisher's website


Simulation of Global System for Mobile Planning and Optimization with MATLAB

This paper introduces a certain set of algorithms that were implemented in a specific environment (MATLAB) to calculate the Global System for Mobile (GSM) planning parameters, which address the functionality of the coverage and capacity in GSM. Moreover, these key planning parameters are divided into two major parts first; Network parameters, which includes (Signal to interference ratio, Grade of Service, Cluster size, Number of channels per cell) and the second is Cell parameters and this includes, (Power budget, Propagation model ). In this paper the first part will be simulated.
Meftah M. .Almrabet, , (12-2013)
Publisher's website


A Comparison of Dynamic Bandwidth Allocation and Costs for EPON and GPON Technologies

Dynamic bandwidth allocation in passive optical networks presents a key issue for providing efficient and fair utilization of the PON upstream bandwidth while supporting the QoS requirements of different traffic classes. In this paper we compare the typical characteristics of DBA, such as bandwidth utilization, delay, and jitter at different traffic loads, within the two major standards for PONs, Ethernet PON and gigabit PON. We illustrate these differences between EPON and GPON. Industry standards for Passive Optical Network (PON) technology have enabled the initial deployment of Fiber to the Premise (FTTP) services. The ITU-T BPON standard has been embraced in North America while the IEEE 802.3ah based EPON has been chosen as the next step in Japan after close to 2 million BPON, subscribers have been deployed. Regardless of any technology merits, the lowest cost solution will be preferred. With this in mind, this paper also makes a simple costs comparison between EPON and the emerging ITU-T GPON for a given FTTP network.
Omar Abusaeeda, , (1-2015)
Publisher's website


Nonlinearity Amplifier Effects on QPSK Technique

In this paper, signal compression due to the nonlinearity of RF Amplifier in Quadratuer-Phase Shift Keying (QPSK) is examined for a specific power amplifier (PA) nonlinearity model, by using simulation. One of the most important aspects in the future radio communication services is the use of spectrally efficient modulation schemes to increase the system capacity. Modulation schemes such as QPSK with an appropriate pulse shaping is spectrally efficient, but this type of modulation presents variations in amplitude and phase due to filtering. A matched Root Raised Cosine (RRC) filtering and an ideal Additive White Gaussian Noise (AWGN) channel are used in baseband equivalent simulation model, in order to isolate the effects in Solid Stat power Amplifier.
Nasar Aldian Ambark Shashoa, Said A. Elgandus , (3-2014)
Publisher's website


Calculate Path Loss in Transmitter in Global System Mobile By By Using Hata Model and Walkfisch Ikegami

In this paper ,will be calculate the path loss the transmitter in gsm, in free space and within urban using two main techniques Hata Model and Walkfisch Ikegami with the use of values imposed of frequencies ,distances and tower high ,finaly will use the Matlab to comparison of results and represented graphically in two techniques
Essam Ayiad Ashebany, , (6-2013)
Publisher's website


Simulation of Location Management Strategies of Timer, Location Area, and Movement Based Update/Paging for Wireless Networks

This paper studies the problems related to the location management strategies, i.e., Location Area Based, Movement Based, and Timer Based for Wireless network s . The simulation models are based on user motion and call arrival is based on Poisson arrival process. The Timer - based Location Management strategy is one in which the user updates its location periodically after an interval of time. This time is based upo n the user’s mobility. The scheme seeks to minimize the average signaling cost for individual mobile users for both paging and registration. In the adaptive Location Area Based strategy, the user updates its location on each Location Area (LA) call boundar y crossing. In this case the LA size is adaptive changing according to the user’s mobility characteristics. In the Movement Based Location strategy, the user keeps track of the number of LA calls boundary and updates when the number exceeds a predefined va lue.
Mou s sa Ali Hamdan, (5-2013)
Publisher's website


Forward Error Correction Scheme for Wireless Networks

The end to end transfer of data from a transmitting application to receiving application involves many steps, each subject to error, with adequate error control, we can be confident that the transmitted and received data are identical , errors can occur at both the bits and packet levels. error control is the process of detecting and correcting both bit and packet errors. In this paper we show combination codes of error control schemes using forward error correction, which keeping an efficient use of the limited bandwidth. we use a Hamming (7,4) code and (12,8) code, in which three checks bits are combined with four information bits to produce a block of data of length n=7 for (7,4) code, and which four checks bits are combined with eight information bits to produce a block of data of length n=12 for (12,8) code. A block of data of length 12 is to short to be appropriate for practical data communications system, but the mathematics involved in longer blocks would become tedious.
Sliman Khalifa Ali Yaklaf, (6-2013)
Publisher's website


Simulation of Internet Connectivity for Mobile Ad Hoc Networks in Network Simulator-2

Ad Hoc networking allows portable devices to establish communication independent of a central infrastructure. The issue of routing in a mobile ad hoc network becomes a challenging task since the mobile nodes are free to move randomly. There are several ad hoc routing protocols, such as Ad hoc On-Demand Distance Vector (AODV), Dynamic Source Routing (DSR), Optimized Link State Routing (OLSR) and Zone Routing Protocol (ZRP), which propose solution for routing within a mobile ad hoc network. In this paper the ad hoc routing protocol AODV is used and modified to examine the interconnection between a mobile ad hoc network and the Internet, for this purpose Network Simulator 2 (NS-2) has been used. Moreover, three proposed approaches for gateway discovery are simulated.
Ismail Shrena, , (10-2013)
Publisher's website


INVESTIGATION AND SIMULATION OF CODE DIVISION MULTIPLE ACCESS NETWORK

Technological convergence and the ever increasing demand for faster data transfer, internet access and value added multimedia services, needs frequent evaluation of Code Division Multiple Access (CDMA) network design. Design and deployment of an efficient CDMA network system is necessary for delivery of quality service. The present study evaluated capacity improvements as the main reason for using CDMA spread spectrum processes for different types of telecommunication systems such as Third Generation (3G) cellular services and many other services. A large number of researchers and professionals in this field have been carrying out extensive work on this point of capacity, but still not all the factors that are operational in this regard have been identified. The central theme of the present study is management of interference as technology gradually shifts from Second Generation (2G) to advanced 3G networks. An accurate simulation model using MATLAB has been proposed as a suitable tool in analysis of CDMA system capacity for purposes of control and management of reverse link interference in WideCDMA systems. Important variables investigated include performance of CDMA network in terms of user coverage and admission challenges and possible solution to the network system. Consequently, a more in-depth study is needed to offer required data for increasing bandwidth capability and network range.
Mohamed K. Jalboub, , (12-2013)
Publisher's website


Fault Detection Based on Two-Stage Recursive Least Squares Parameter Estimation

This paper proposes a two-stage recursive least squares algorithm for output error models. systems are considered multiple-input single-output, which is represented by autoregressive models. The first step of the proposed algorithm is to identify algorithm model. Second one is to implement these identification methods at thermal power plant, whose nominal power output is 320 MW. The water level measurements are estimated by two-stage recursive least squares parameter estimation. To validate the model, autocorrelation function of measurement residuals and crosscorrelation function between input signals and residuals are analyzed. next, the determination of residual and the mean value of the residual divided to the standard deviation of the residual of two-stage are used for fault detection. Comparison between the conventional model recursive least squares algorithm and two-stage recursive least squares algorithm is finally presented.
Sulaiman Khalifa Yakhle, , (12-2013)
Publisher's website


A QQ-Plot and its Application to Adaptive Recursive System Parameter Estimation

Because of the presence of sporadic high-intensity measurement noise (outliers),an adaptive algorithm for the robust estimation of parameters of linear dynamic discrete-time systems is proposed in this paper. first, the sorted data versus the normal quantiles is plotted, called QQ-plot. next the ε-contaminated normal distribution of noise is adopted. Then, a data classification procedure based on the QQ-plot approachcombined with the robustified data winsorization technique, is developed, the estimation of the unknown noise statistical parameters is solved. Moreover, an iterative procedure for estimating the contamination degree  , which originated from an ML classification, is also proposed. Thus, an ε- contaminated noise distribution is estimated and, the suboptimal maximum likelihood criterion is defined, and the system-parameter estimation problem is solved robustly, using the proposed recursive robust parameter estimation scheme.
Sulaiman Khalifa Yakhlef, Mahmoud. Elfandi, (3-2014)
Publisher's website


Simulation of Routing in NAT, PAT and Inter_VLAN Networks

Several techniques can make the size of the routing table manageable and a couple of these will be briefly considered in this paper. Next-hop: routing technique reduces the contents of the routing table, the table holds only the information that leads to the next hop instead of holding information about the complete route. Network specific routing technique reduces the routing table and simplifies the searching process. Instead of having an entry for every host connected to the same physical network, only one entry is used to define the address of the network itself. All hosts connected to the same network are treated as one entity. In this paper three types of routing protocols were simulated, Network Addressing Translation (NAT), Port Address Translation (PAT) and Inter-VLAN routing.
Ahmed Altaher Alhamdy, Ismail Shrena, (3-2014)
Publisher's website


Robust Fault Detection Using QQ-Plot

Because of the presence of sporadic high-intensity measurement noise (outliers), an adaptive algorithm for the robust estimation of parameters of linear dynamic discrete-time systems is proposed in this paper. First, the sorted data versus the normal quantiles is plotted, called QQ-plot. Next, the ε-contaminated normal distribution of noise is adopted. Then, a data classification procedure based on the QQ-plot approach, combined with the robustified data winsorization technique, is developed; the estimation of the unknown noise statistical parameters is solved. Moreover, an iterative procedure for estimating the contamination degree , which originated from an ML classification, is also proposed. Thus, an ε-contaminated noise distribution is estimated and, the suboptimal maximum likelihood criterion is defined, and the system-parameter estimation problem is solved robustly, using the proposed recursive robust parameter estimation scheme. Finally, these parameters are used to estimate water level in the steam drum and residual of the steam-drum water level sensor.
Sulaiman Khalifa Yakhlef, Nasser Bashir Ekreem, (2-2014)
Publisher's website


Machine-to-Machine Communications: Technologies Standardization Activities, and Challenges

Machine-to-Machine (M2M) communication refers to technology that enables machines to be networked so data can be freely exchanged among these assets. It is a form of data communication that involves one or more entities that do not necessarily require human interaction or intervention in the process of communication. M2M communications emerge to autonomously operate to link interactions between Internet cyber world and physical systems. We present the technological scenario of M2M communications consisting of wireless infrastructure to cloud, and machine swarm of tremendous devices. Related technologies toward practical realization are explored to complete fundamental understanding and engineering knowledge of this new communication and networking technology front.
Nasaraldian Ambark Shashoa, Ismail sherina, (3-2015)
Publisher's website


Onboard Digital Receiver Architecture and Design of the Phase Radio-Navigation System for Aircraft Blind Landing

This work describes the architecture and design of an onboard digital receiver of the phase radio-navigation system for aircraft blind landing proposed in [1]. The proposed onboard digital receiver is a special case of a multi-channel narrowband digital receiver concept. The purpose of this receiver is to receive eight different RF frequencies (in four pairs) range from 960 MHz to 963.003749941 MHz, carry on them the required analogue and digital signal processing techniques to evaluate their phase shifts and then the difference phase shifts between each pair of them. The phase measurements lead to determination of the location of the aircraft with respect to the touch point on the runway with accuracy in millimetres.
Sulaiman Khalifa Yakhlef, , (4-2015)
Publisher's website


Measurement of GPRS Performance over Libyan GSM Networks - Experimental Results

The General Packet Radio Service (GPRS) is a new bearer service for GSM that greatly simplifies wireless access to packet data networks, such as the Internet, corporate LANs or to mobile portals. The aim of this work is the measurement of the quality of service (QoS) parameters of GPRS over the Libyan GSM networks, Libyana mobile phone and Al-Madar Al-Jadeed Company. The measured parameters of GPRS are the throughput, round trip-time, delay time, packet loss, packet duplicate, upload speed, and download speed. To evaluate these Parameters, End-to-End measurements are used. At one end is the client (mobile) and at the other end is the measurement server. This server is located with interne address. A special analysis algorithm was implemented.net and used for analysis the measured data. Finally, the measured values of quality of surface parameters of GPRS over the two Libyan mobile operators are illustrated and compared with the theoretical values that could be calculated beforehand.
Mohamed Aburkhiss, Abubaker Abushofa, (9-2015)
Publisher's website


Properties Evaluation of Proactive, Reactive, and Hybrid Protocols for Mobile ad-hoc Networks

Ad hoc networking allows portable devices to establish communication independent of a central infrastructure. However, the fact that there is no central infrastructure and that the devices can move randomly gives rise to various kind of problems, such as routing and security. In this paper the problem of routing is considered. Proactive routing protocol maintains routes to all nodes, including nodes to which no packets are sent. For that reason they require periodic control messages, which leads to scarce resources such as power and link bandwidth being used more frequently for control traffic as mobility increases. Reactive routing protocols, on the other hand, operate only when there is a need of communication between two nodes. Both proactive and reactive routing have specific advantages and disadvantages that make them suitable for certain types of scenarios. Combining the proactive and reactive approaches results in a hybrid routing protocol. A hybrid approach minimizes the disadvantages, but also the advantages of the two combined approaches.
Nasaraldian Ambark Shashoa, Omar Abusaeeda, (3-2015)
Publisher's website


A Survey On QoS Routing Protocols In Ad-Hoc Networks

Ad Hoc networking allows portable devices to establish communication independent of a central infrastructure. The issue of routing in a mobile ad hoc network becomes a challenging task since the mobile nodes are free to move randomly. Quality of Service (QoS) is the performance level of a service offered by the network to the user. Most of the multimedia applications have stringent QoS requirements that must be satisfied. The goal of QoS provisioning is to achieve a more deterministic network behavior, so that information carried by the network can be better delivered and network resources can be better utilized. A service can be characterized by a set of measurable pre-specified service requirements such as minimum bandwidth, maximum delay, maximum delay variance and maximum packet loss rate. However, many other metrics are also used to quantify QoS. This paper classifies QoS routing protocols based on topology, route discovery with QoS mechanism, interaction based between network and MAC layer, QoS metrics based, and type of QoS guarantee.
Abdurrezagh S. Elmezughi, Ismail shrena, , (11-2015)
Publisher's website


THE CELL COVERAGE PREDICTION MODELS FOR MOBILE CELLULAR ENVIRONMENT

For the simulation of mobile communication networks, it is necessary to model the radio channel accurately. The radio wave propagation modeling is the first estimate of the channel quality. This paper introduces an indoor and outdoor propagation-modeling tool that uses a comprehensive list of propagation models for mobile radio network environments. Then, these models can be used to examine the radio propagation, validate and predict the performance of mobile wireless network systems. The simulator is developed in MATLAB software to compute the propagation models. By modeling the various components and their integration, this simulation environment is able to accurately predict the performance of cellular network. Besides, the capability of tool to use precise models on various types of environments to predict all the variables that might influence the propagation of the radio signals. It is also equipped with main program interface that provides a good and useful system tool for cellular network developer to design and optimize the network structure with high accuracy.
Amer R. Zerek, , (5-2007)
Publisher's website


Error Control Scheme for Transmission Impairments

In the wireless networks, one of the key issues is to guarantee various Quality of Service (QoS), under variable radio link behavior. In this paper, we show combination codes of error control schemes using forward error correction, while keeping an efficient use of the limited bandwidth. We use a Hamming (7,4) code and (12,8) code, in which three checks bits are combined with four information bits to produce a block of data of length n = 7 for (7,4) code, and in which four checks bits are combined with eight information bits to produce a block of data of length n=12 for (12,8) code. A block of data of length 12 is too short to be appropriate for a practical data communications system, but the mathematics involved in longer blocks would become tedious .
Amer R. Zerek, Mohamed Al-taiari, (5-2007)
Publisher's website


SIMULATION CODES FOR TIMER AND LOCATION AREA BASED UPDATE/PAGING STRATEGIES FOR WATM

This paper studies the problems related to the location management strategies, i.e., Timer Based and Location Area Based for Wireless ATM network. The simulation models are based on user motion and call arrival is based on Poisson arrival process. The Timer-based Location Management strategy is one in which the user updates its location periodically after an interval of time. This time is based upon the user’s mobility. The scheme seeks to minimize the average signaling cost for individual mobile users for both paging and registration. In the adaptive Location Area Based strategy, the user updates its location on each Location Area (LA) call boundary crossing. In this case the LA size is adaptive changing according to the user’s mobility characteristics.
Amer R. Zerek, (5-2007)
Publisher's website


Data Link Control Layer Performance for Wireless ATM Networks

The growing demand for ATM-based technology and recent proliferation of wireless access technologies have motivated researchers to examine the feasibility of extending the ATM paradigm from the wireline to the wireless domain and create a new research area known as Wireless ATM (WATM) (Toh, 1997). Dealing with lossy wireless links, characterized by limited bandwidth and high, bursty error rates, breaks the main assumption of conventional ATM systems, which is that of using no errors per links. Therefore, WATM systems must provide a transparent mechanism to ensure reliable end-to-end data transmission over the wireless portion of the network. The identification of a wireless-specific data link control layer (W-DLC), sitting between the traditional ATM layer and a wireless-specific medium access control layer (WMAC), is the responsible entity for guaranteeing the quality of service (QOS) requested by individual ATM-based virtual connections. Thus the main focus is to investigate the performance of DLC protocol for ABR traffic over wireless ATM network. Retransmissions are only required for non-real time traffic and are implemented using a Go-Back-N and Selective Repeat (SR) ARQ (Lin et aI., 1984), (Schwartz, 1987). Wireless channels are usually time-varying and the channel bit error rates vary as the surrounding environment changes. Since these factors put in jeopardy the performance of the DLC protocol and higher layer end-to-end protocol at large, additional link-level mechanisms are added to provide reliability over impaired radio links. The DLC protocol implementation represents an attempt to achieve these goals under the strict constraints imposed by impaired wireless links. This thesis studies and compares the two Automatic Repeat Request (ARQ) protocols, i.e., Go-Back-N (GBN) and Selective Repeat (SR) ARQ and analyse them for variable packet size and fixed packet size (WATM packet) by using C programming for simulation. The results show that the performance of SR ARQ is better than the GBN ARQ for variable packet size. The results also show that SR ARQ protocol has better performance than GBN ARQ in terms of error detection for fixed WATM packet in the range of 50 -70 bytes, which is the WATM packet range (ATM Forum, 1997).
Sliman Khalifa Ali Yaklaf, (11-1999)
Publisher's website


Security Routing Protocols in Ad Hoc Networks: Challenges and Solutions

Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. This paper analyzes security challenges in ad hoc networks and summarizes key issues that should be solved for achieving the ad hoc security. It also gives an overview of the current state of solutions on such key issues in Mobile Ad Hoc Networks (MANETs). To develop suitable security solutions for such new environments, we must first understand how MANETs can be attacked. Then we discuss various proactive and reactive solutions proposed for MANETs. We outline secure routing solutions to avoid some attacks against the routing protocols based on cooperation between nodes.
Sliman KA. A. Yaklaf, Abdurrezagh S. Elmezughi, Nasser Bashir Ekreem, Adel A. M. Abosdel, (12-2016)