Papers by Magdy El-soudani
2019 31st International Conference on Microelectronics (ICM)
Nowadays, smart cities are progressively established for increasing governments operational effic... more Nowadays, smart cities are progressively established for increasing governments operational efficiency and for citizens satisfaction. This research proposes a novel network architecture for smart cities integrating several functionalities such as traffic jam monitoring, water quality control and security. The architecture is based on three types of nodes: central node (sink), sensing node (bouquet of sensors) and actuating node. Both the sink and the sensing node are based on FPGAs for their high computation capability and for protection of investment. The Sink is responsible for the collection of data from the sensing nodes and performing Fog computing. Each bouquet of sensors also performs Dew computing. Video analytics are used for several purposes in the system. The architecture is verified by Riverbed Network Modeler and it is shown that there is no packet loss. To increase the reliability of the system, fault-tolerant sensor nodes are implemented using a proposed analog voting technique.
Bookmarks Related papers MentionsView impact
2021 16th International Conference on Computer Engineering and Systems (ICCES), 2021
The utilization of Third-party modules is very common nowadays. Hence, combating Hardware Trojans... more The utilization of Third-party modules is very common nowadays. Hence, combating Hardware Trojans affecting the applications' functionality and data security becomes inevitably essential. This paper focuses on the detection/masking of Hardware Trojans' undesirable effects concerned with spying and information leakage due to the growing care about applications' data confidentiality. It is assumed here that the Trojan-infected system consists mainly of a Microprocessor module (MP) followed by an encryption module and then a Medium Access Control (MAC) module. Also, the system can be application-specific integrated circuit (ASIC) based or Field Programmable Gate Arrays (FPGA) based. A general solution, including encryption, CRC encoder/decoder, and zero padding modules, is presented to handle such Trojans. Special cases are then discussed carefully to prove that Trojans will be detected/masked with a corresponding overhead that depends on the Trojan's location, and the system's need for encryption. An implementation of the CRC encoder along with the zero padding module is carried out on an Altera Cyclone IV E FPGA to illustrate the extra resource utilization required by such a system, given that it is already using encryption.
Bookmarks Related papers MentionsView impact
Frequenz, 2016
In cognitive radio systems, the random nature of primary users’ activities heavily influences the... more In cognitive radio systems, the random nature of primary users’ activities heavily influences the performance of spectrum sensing techniques. Considering both of the primary user random arrival and departure in one model is essential for mitigating the performance degradation in spectrum sensing. In this paper, we apply the probability based weighting energy detector (ED) to overcome the effect of random arrival and departure of primary user (PU), on a single carrier-frequency division multiple access (SC-FDMA) signal used in LTE uplink physical channel. Then compare the performance of weighted ED to the second order Cyclostationarity detector with/without the random arrival and departure of primary user signal during the secondary user’s sensing period. The simulation shows that the weighting ED approaches the performance of Cyclostationarity detector in the normal case, where there are no random activities of primary user signals during the secondary user’s sensing period, with le...
Bookmarks Related papers MentionsView impact
IEEE EUROCON 2015 - International Conference on Computer as a Tool (EUROCON), 2015
Spectrum Sensing is a crucial issue in Cognitive radio so that the secondary users are able to ac... more Spectrum Sensing is a crucial issue in Cognitive radio so that the secondary users are able to access the un-allocated, or temporarily available spectrum holes without interfering with the Primary user. Energy detection (ED) is one of common spectrum sensing techniques in Cognitive Radio. In this paper, an analytical forms are derived for both the detection and false alarm probabilities, using the Bayesian-based ED scheme. The derivations were carried assuming random arrival and departure of the primary user signal during the secondary user's sensing period. An optimal threshold is suggested to minimize the total detection error rate. The performance gain of the Bayesian-based ED scheme with/without using the optimal threshold is compared to the conventional ED.
Bookmarks Related papers MentionsView impact
International Zurich Seminar on Digital Communications, Electronic Circuits and Systems for Communications.
The problem of evaluating the performance of M-ary continuous-phase frequency shift keying (CPFSK... more The problem of evaluating the performance of M-ary continuous-phase frequency shift keying (CPFSK) signals transmitted through an arbitrary bandpass nonlinearity (BPNL) in the presence of additive Gaussian noise (AGN) and cochannel interference (CCI) is considered. The proposed nonlinear channels are two-link satellite channels. The satellite system consists of a ground transmitter, a satellite repeater, and a ground receiver. The system
Bookmarks Related papers MentionsView impact
2013 International Conference on Computer Applications Technology (ICCAT), 2013
Mobile Ad-hoc Network (MANET) has become an indivisible part for communication for mobile devices... more Mobile Ad-hoc Network (MANET) has become an indivisible part for communication for mobile devices. In this paper we have discussed some basic MANET routing protocols like Ad-hoc On Demand distance Vector (AODV), Dynamic Source routing (DSR), Optimized Link state Routing (OLSR), and Temporally Ordered Routing Algorithm (TORA). Main objective of this paper is to address some basic security concerns in MANET, operation of malicious node and its effect on these routing protocols.
Bookmarks Related papers MentionsView impact
Frequenz, 2007
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Cognitive radio (CR) is one of the emerging technologies for 4G/5G applications. Cooperative rela... more Cognitive radio (CR) is one of the emerging technologies for 4G/5G applications. Cooperative relay communications and network coding are some techniques that helped in enhancing the CR applications. This paper considers a primary broadcasting system for multimedia video streaming applications that broadcasts data to the primary users and to an aiding cooperative relay CR secondary system. The cooperative overlay secondary system can use many error control coding techniques for point-to-point data retransmissions such as channel coding, network coding, and combined coding techniques to enhance the system performance under variable channel conditions. This work proposes a novel adaptive combined channel network coding (AC2NC) technique for data retransmissions. The new AC2NC first analyses the channel feedback information and then selects the best retransmission coding technique based on the targeted bandwidth or transmission time optimization. This is instead of using a single static...
Bookmarks Related papers MentionsView impact
2010 17th International Conference on Telecommunications, 2010
AbstractIn this paper, a powerful class of irregular low-density parity check (LDPC) codes based... more AbstractIn this paper, a powerful class of irregular low-density parity check (LDPC) codes based on random construction techniques is presented. The resultant codes have accurate profile with the additional features of making them suitable for incremental redundancy systems. The ...
Bookmarks Related papers MentionsView impact
IEEE Access, 2020
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Abstract Most of the error correcting capabilities rely on the concept of iterative decoding. How... more Abstract Most of the error correcting capabilities rely on the concept of iterative decoding. However, the iterative decoding needs a" soft-in/soft-out" component decoders. Such decoders can be realized either by using maximum a posteriori (MAP) symbol by symbol ...
Bookmarks Related papers MentionsView impact
2018 13th International Conference on Computer Engineering and Systems (ICCES), 2018
To overcome the interference problem in LTE/ LTE-A networks and in cellular networks in general, ... more To overcome the interference problem in LTE/ LTE-A networks and in cellular networks in general, the frequency reuse technique is adopted. Interference is a common and big problem in cellular networks, especially in LTE-A due to the use of heterogeneous networks. Different frequency reuse methods such as soft frequency reuse, fractional frequency reuse and Reuse 3 are examples of the frequency reuse technique. In this paper, the NHFR (New Hybrid Frequency Reuse) method is used to mitigate interference in heterogeneous networks and furthermore the performance of such networks is investigated. Analytical solutions are obtained and different performance metrics are calculated. Also, simulations are performed by using the Vienna simulator and comparison with other methods is done. Both analytical and simulation results show that the NHFR method outperforms all the other methods.
Bookmarks Related papers MentionsView impact
ArXiv, 2009
— In this paper, we are concerned of a particularly severe security attack that affects the ad ho... more — In this paper, we are concerned of a particularly severe security attack that affects the ad hoc networks routing protocols, it is called the wormhole attack. We can think of wormhole attack as a two phase process launched by one or several malicious nodes. In the first phase, these malicious nodes, called wormhole nodes, try to lure legitimate nodes to send data to other nodes via them. In the second phase, wormhole nodes could exploit the data in variety of ways. We will introduce the wormhole attack modes and classes, and point to its impact and threat on ad hoc networks. We also analyze the wormhole attack modes from an attacker’s perspective and suggest new improvements to this type of attacks. We finally summarize and conclude this paper. Keywords-attacks; ad hoc network; security; tunneling; wormhole I. I NTRODUCTION With the rapid development in wireless technology, ad hoc networks have emerged in many forms. These networks operate in the license free frequency band and do...
Bookmarks Related papers MentionsView impact
2021 13th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)
Device to Device (D2D) application is one of most important applications that enables the wireles... more Device to Device (D2D) application is one of most important applications that enables the wireless devices to communicate without passing their data through the core network. It reduces the complexity at the enodeB (the base station of the mobile network) and consequently enhances the overall performance of the system. The beginning of D2D application was on 4G mobile networks and nowadays, it is one of the important applications in 5G mobile networks. D2D can allocate different spectrum access such as In-band underlay, In-band overlay and Out-band. In this paper, the In-band underlay will be discussed in which the D2D users share the same frequency band allocated by the Cellular Users (CUs) to increase the spectrum efficiency. But, sharing the same frequency bands of the CUs makes the interference between the different users a big problem. In this paper, the interference will be investigated for D2D application in 5G mobile networks. Different methods will be introduced in this paper to reduce the effects of different types of interference such as the New Hybrid Frequency Reuse (NHFR) with Almost Blank Sub-frame (ABS) method, the closed mode D2D method and the combined method which is hybrid of the previous two methods. System performance using such methods will be investigated using a generic expression for Signal to Interference and Noise Ratio (SINR).
Bookmarks Related papers MentionsView impact
The use of robotics in Search and Rescue operations is a topic that is gaining momentum in the sc... more The use of robotics in Search and Rescue operations is a topic that is gaining momentum in the scientific community. One aspect of such operations that has yet to be explored is that of wireless communication between the various robotic elements operating in the disaster area. This paper presents a model consisting of 15 Unmanned Ground Vehicles (UGVs), two Unmanned Aerial Vehicles (UAVs) and one Cell On Wheels (COW). This configuration explores the nature of such communication in the form of a network with payloads of sensor data, video data and telemetry bursts being sent from the UGVs via the UAV to the COW, and with telecommands being sent via the downlink. Another issue explored is that of horizontal handover that occurs when one UGV moves out of its home UAV’s coverage and moves into another UAV’s coverage. The results of the paper show that the network is fully functional with benchmark compliant video latency and jitter. Moreover, it is shown that the handover that occurs be...
Bookmarks Related papers MentionsView impact
… and Networks, 2009. …, 2009
... [9] Saad Ahmed Munir, Biao Ren ... [10] George F. Zaki, Hany M. Elsayed, Hassanein H. Amer an... more ... [9] Saad Ahmed Munir, Biao Ren ... [10] George F. Zaki, Hany M. Elsayed, Hassanein H. Amer and MS El-Soudani, Energy-Efficient Hybrid Wireless Sensor Networks in Urban Areas, International Journal of Factory Automation, Robotics and Soft Computing, April 2008, pp. ...
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Journal of Advanced Research, 2016
Bookmarks Related papers MentionsView impact
Uploads
Papers by Magdy El-soudani