Hamza H.S.,Cairo University |
Proceedings of the International Conference on Software Engineering and Knowledge Engineering, SEKE | Year: 2013
There are several studies in the literature to assess the properties of a class diagram without taking into consideration the added complexity due to using object constraint language (OCL). This paper presents integrated frameworks that consider class diagram augmented with rules and constraints embedded in the problem domain and encoded using OCL to investigate the benefit and/or impact of using OCL. The proposed framework is theoretically and empirically validated. Copyright © 2013 by Knowledge Systems Institute Graduate School.
Hussien H.,AAST |
International Conference on Computer Applications Technology, ICCAT 2013 | Year: 2013
E-voting systems are becoming popular with the widespread use of computers and embedded systems. Security is the vital issue should be considered in such systems. This paper proposes a new e-voting system that fulfills the security requirements of e-voting. It is based on homomorphic property and blind signature scheme. The proposed system is implemented on an embedded system which serves as a voting machine. The system employes RFID to store all conditions that comply with the rule of the government to check voter eligibility. © 2013 IEEE.
Habbak H.,AAST |
International Conference on Engineering and Technology, ICET 2012 - Conference Booklet | Year: 2012
The key management in remote sensing satellites is the most critical and important part in the security scheme in general and especially in case of multi ground stations. These ground stations may be under official contract to receive the data from the satellite for particular period of time. The problem with the schemes is if any ground station leaks the key information to the other ground station whose official contract is expired the encryption schemes fails. Further if the satellite service provider leaks the key information to the intruder, the symmetric key schemes fails. This paper solves the key management problem of encryption scheme in remote sensing satellite. The solution is a new key management protocol uses both traditional security verification methods and new orbital parameter verification method. © 2012 IEEE.
Ibrahim H.E.A.,Arab Academy for Science and Technology |
World Academy of Science, Engineering and Technology | Year: 2011
In this paper, Novel method, Particle Swarm Optimization (PSO) algorithm, based technique is proposed to estimate and analyze the steady state performance of self-excited induction generator (SEIG). In this novel method the tedious job of deriving the complex coefficients of a polynomial equation and solving it, as in previous methods, is not required. By comparing the simulation results obtained by the proposed method with those obtained by the well known mathematical methods, a good agreement between these results is obtained. The comparison validates the effectiveness of the proposed technique.
Elsayed K.G.,AAST |
Elessawy N.A.,AAST |
Proceedings of the 2015 International Conference on High Performance Computing and Simulation, HPCS 2015 | Year: 2015
This paper propose a Simulink model for Wireless Power transfer to emulate the effect of air gap and the distance, misalignment, noise and harmonic. This model is based on practical neural Network weight matrix where it read the value of output voltage from the transmitter coil and then calculates the voltage produced in the received coil with taken in consideration the circuit configuration variable as capacitor, inductor, and number of turns. The frequency in the receiver part is controlled by an adaptive filter where the band width of operating frequency is very large and contains a lot of noise otherwise known it is very important for the accuracy of neural network. The system is tested in simulation and the hardware set up and showed acceptable performance illustrated by presented experiments. © 2015 IEEE.