Entity

Time filter

Source Type

Cairo, Egypt

Hamza H.S.,Cairo University | Taha I.,AAST
Proceedings of the International Conference on Software Engineering and Knowledge Engineering, SEKE | Year: 2013

There are several studies in the literature to assess the properties of a class diagram without taking into consideration the added complexity due to using object constraint language (OCL). This paper presents integrated frameworks that consider class diagram augmented with rules and constraints embedded in the problem domain and encoded using OCL to investigate the benefit and/or impact of using OCL. The proposed framework is theoretically and empirically validated. Copyright © 2013 by Knowledge Systems Institute Graduate School. Source


Hussien H.,AAST | Aboelnaga H.,AAST
International Conference on Computer Applications Technology, ICCAT 2013 | Year: 2013

E-voting systems are becoming popular with the widespread use of computers and embedded systems. Security is the vital issue should be considered in such systems. This paper proposes a new e-voting system that fulfills the security requirements of e-voting. It is based on homomorphic property and blind signature scheme. The proposed system is implemented on an embedded system which serves as a voting machine. The system employes RFID to store all conditions that comply with the rule of the government to check voter eligibility. © 2013 IEEE. Source


Habbak H.,AAST | Hamdy N.,MIU
International Conference on Engineering and Technology, ICET 2012 - Conference Booklet | Year: 2012

The key management in remote sensing satellites is the most critical and important part in the security scheme in general and especially in case of multi ground stations. These ground stations may be under official contract to receive the data from the satellite for particular period of time. The problem with the schemes is if any ground station leaks the key information to the other ground station whose official contract is expired the encryption schemes fails. Further if the satellite service provider leaks the key information to the intruder, the symmetric key schemes fails. This paper solves the key management problem of encryption scheme in remote sensing satellite. The solution is a new key management protocol uses both traditional security verification methods and new orbital parameter verification method. © 2012 IEEE. Source


Ibrahim H.E.A.,Arab Academy for Science and Technology | Serag M.F.,AAST
World Academy of Science, Engineering and Technology | Year: 2011

In this paper, Novel method, Particle Swarm Optimization (PSO) algorithm, based technique is proposed to estimate and analyze the steady state performance of self-excited induction generator (SEIG). In this novel method the tedious job of deriving the complex coefficients of a polynomial equation and solving it, as in previous methods, is not required. By comparing the simulation results obtained by the proposed method with those obtained by the well known mathematical methods, a good agreement between these results is obtained. The comparison validates the effectiveness of the proposed technique. Source


Elsayed K.G.,AAST | Elessawy N.A.,AAST | Elshenawy A.K.,AAST
Proceedings of the 2015 International Conference on High Performance Computing and Simulation, HPCS 2015 | Year: 2015

This paper propose a Simulink model for Wireless Power transfer to emulate the effect of air gap and the distance, misalignment, noise and harmonic. This model is based on practical neural Network weight matrix where it read the value of output voltage from the transmitter coil and then calculates the voltage produced in the received coil with taken in consideration the circuit configuration variable as capacitor, inductor, and number of turns. The frequency in the receiver part is controlled by an adaptive filter where the band width of operating frequency is very large and contains a lot of noise otherwise known it is very important for the accuracy of neural network. The system is tested in simulation and the hardware set up and showed acceptable performance illustrated by presented experiments. © 2015 IEEE. Source

Discover hidden collaborations