A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
El-Rabaie, S.
- A Proposed Constant Amplitude Modulator in OFDM Systems
Authors
1 Dep. of Electronic and Communication Eng., Minoufiya University, EG
2 Dep. of Computer Science Eng., Minoufiya University, EG
Source
Wireless Communication, Vol 4, No 8 (2012), Pagination: 455-465Abstract
The Orthogonal Frequency Division Multiplexing(OFDM) technique has recently recieved considerable attention for wireless networks.Despite its advantages,it has a major drawback of its high Peak-To-Average Power Ratio(PAPR)value which affects the system efficiency and the cost.In this paper, a proposed system is discussed to achieve 0 db PAPR value.it depends on a proposed block,called Constant Amplitude(CA)modulation.It consists of three sub-blocks(inserting zero,inserting samples,and comparing samples).The whole mathematical analysis is presented for the proposal system.Additionaly the complexity evolution is explained.Only four simple adders,two simple subtractors,and two simple comparators are needed for the proposed CA modulator.Therefore,it is simple and applicable block.Afterwards,many MATLAB simulation programs are executed.Time and frequency domain behaviors are presented.Furthermore, in-band distortion introduced by the Proposed CA modulation is calculated in terms of Error Vector Magnitude(EVM).Moreover,the proposed system outperforms the conventional one when compared in terms of PAPR,equalization,and BER under Additive White Gaussion Noise(AWGN)channel and multipath fading channels.In addition,the impact of the proposed scheme design parameter(the number of inserted samples) is studied.The more inserted samples are added,the more accurates results are obtained,the less EVM values are achieved,the less transmission throughput values are occured.Keywords
OFDM, Multipath Fading Channels, PAPR, BER, Equalizer and EVM.- Underwater Wireless Sensor Networks (UWSN), Architecture, Routing Protocols, Simulation and Modeling Tools, Localization, Security Issues and Some Novel Trends
Authors
1 Dept. of Communication Engineering, 32952 Menouf, EG
2 Egyptian Radio & Television Union (ERTU), Cairo, EG
Source
Networking and Communication Engineering, Vol 7, No 8 (2015), Pagination: 335-354Abstract
Underwater wireless sensor networks (UWSNs) are becoming popular everyday due to their important role in different applications, such as offshore search and underwater monitoring. Underwater wireless sensor networks face unique conditions. Therefore, particular routing protocols are needed to route the packets from a source to a destination. Moreover, numerous UWSN’s applications require deploying the security issue; which routing protocols don’t take in consideration. A survey on UWSN architectural view and the routing protocols used for UWSNs are given in this paper. The routing protocols studied and compared with respect to packet delivery ratio, packet delay, energy consumption. Priority and drawbacks of each routing protocol are listed. In addition, a survey of the security issue for UWSNs is presented, and the security requirements in order to secure communication medium in this environment are listed.
Keywords
WSN, UWSN, Application, Design, Geographical Routing, Security.- Efficient Compressed Video Communication
Authors
1 Department of Electronics and Electrical Communications, Menoufia University, Menouf 32952, EG
2 University of Liverpool, GB
3 Electronics and Communications Eng., Menoufia University, EG
4 Menoufia University, EG
Source
Networking and Communication Engineering, Vol 6, No 6 (2014), Pagination: 219-226Abstract
This paper presents a chaotic interleaving approach for efficient video transmission with orthogonal frequency division multiplexing (OFDM) with equalization over fading channels. The SPIHT compressed video is converted to luminance and chrominance approach and converted to binary data. The binary data is interleaved with the proposed approach prior to the modulation step. The chaotic Baker map is used in the proposed interleaving approach. In addition to reducing the channel effects on the transmitted data, the proposed chaotic interleaving approach adds a degree of encryption to the transmitted data. The performance of the proposed approach is tested by the transmission of SPIHT compressed video frames over Rayleigh fading channels with chaotic interleaving. Experimental results show that video frames are received with higher peak signal-to-noise ratios (PSNRs) if chaotic interleaving is applied. We also propose an efficient technique to reduce the effects of both multiple access interference (MAI) and intersymbol interference (ISI) in wireless OFDM systems. A hybrid scheme comprising randomization of SPIHT video frames at the transmitter and a regularized equalizer at the receiver unit is suggested and studied. Then, the regularized equalizer is used to reduce the effect of ISI and provide a better estimate of the data. The performance of the proposed scheme is studied and compared with traditional schemes. Our simulation results show a noticeable performance improvement by using the proposed scheme.Keywords
Video Processing, SPIHT Video Compression, OFDM, and Chaotic Map.- Robust Verification Method for Video Communication
Authors
1 Department of Electronics and Electrical Communications, Menoufia University, 32952, Menouf, EG
2 University of Liverpool, GB
3 Menoufia University, EG
4 Electrical Communications, Menoufia University, EG
Source
Digital Image Processing, Vol 6, No 6 (2014), Pagination: 251-253Abstract
Video is compressed to move the redundancies for efficient communication. In this paper, we use a steganography method for verification of the video content at the receiver side. The main idea of the proposed steganography method is based on the Discrete Cosine Transform (DCT). It is based on creating a signature for each block of the DCT of the compressed video sequence to be embedded in another block. This is attributed to the fact that most DCT coefficients of the compressed video sequence are either zero or close to zero. Simulation results reveal the robustness of the suggested steganography method.
Keywords
Video Compression, Data Hiding, Steganography.- Robust Verification Method for Video Communication
Authors
1 Department of Electronics and Electrical Communications Engineering, Menoufia University, Menouf-32952, EG
2 Department of Electronics and Electrical Communications Engineering, Menoufia University, Menouf-32952, EG
3 Department of Electronics and Electrical Communications Engineering, Menoufia University, Menouf-32952, EG
Source
Digital Image Processing, Vol 6, No 5 (2014), Pagination: 215-221Abstract
The videois compressed to move the redundancies for reducing the number of bits whichneed to show the video for reducing the size of video to reduce the band width. We embed the hiding data in redundancies of the video frame withoutvisibility manner using Steganography technique. In our research we focus in increasing the improvement of compressed video frame through using steganography. In our research we use two mixed techniques to compress the video, the first is digital steganography and the second is data compression. Hence, the suggested scheme is mixed the algorithm ofthe steganography algorithm with the DCT compressionvideo frame.The suggested scheme in our study compression of data is made in two steps. In the first step,redundant data isminimized by compaction of energy using video. In the second step, with using steganography bit blocks isembedded in its blocks which call subsequent of the same video frame. Theadvantage of thebits which it is embedded isdecrease the size of the file and increase thesize of the file of the compressed video frame, but also decrease the file size further more. Theresults of simulation results explainthat,the suggestedschemehave more potential in coding of the frame of the video.
Keywords
Video, Data Hiding and Compression and Steganography, DCT Compression.- Wavelet Transform for Performance Enhancement of Discrete Multi-Tone Systems
Authors
1 Jazan University, SA
2 Helwan University, Cairo, EG
3 Menoufia University, Menou, EG
4 Menoufia University, EG
5 Dept. Electronics and Electrical Communications, Menoufia University, EG
6 Menoufia University, Menouf, EG
Source
Digital Signal Processing, Vol 5, No 12 (2013), Pagination: 393-403Abstract
This paper presents a new implementation of Discrete Multi-Tone (DMT) systems based on the Discrete Wavelet Transform (DWT) and time-domain equalization to maximize the bit rate. The objective of the proposed DWT-DMT system is to make use of the sub-band decomposition property of the DWT to reduce the channel effects on the transmitted signals. The mathematical model of the Time-domain Equalizer (TEQ) utilized in this paper is presented. This equalizer is tested in the Fast Fourier Transform Discrete Multi-Tone (FFT-DMT) system, and in the proposed DWT-DMT system for comparison. Simulation experiments shows that the performance of the proposed DWT-DMT system with the TEQ filter bank is better than that of the FFT-DMT system with the TEQ filter bank over the eight standard Carrier Serving Area (CSA) loops. The results show that employing the TEQ filter bank in the proposed DWT-DMT system can achieve high bit rates ranging from 2.899 Mbps to 5.369 Mbps.