Abstract Book - Sudan University of Science and...
Transcript of Abstract Book - Sudan University of Science and...
![Page 1: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/1.jpg)
![Page 2: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/2.jpg)
Abstract Book
2013 1st INTERNATIONAL CONFERENCE
on COMPUTING, ELECTRICAL and ELECTRONIC
ENGINEERING
(ICCEEE 2013)
‘Research Makes a Difference’
Corinthia Hotel, Khartoum, Sudan 26th
and 28th August 2013
http://icceee13.org/
![Page 3: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/3.jpg)
Jointly Technical Sponsored by
Sudan University of Science and Technology
&
University of Khartoum
Patrons
Ministry of Science and Communications
National Telecommunications Corporation
University of Gezira
Samsung Sudan
Co- organized by IEEE region 8
Organized by IEEE Sudan Subsection
![Page 4: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/4.jpg)
ICCEEE 2013
iii
Organizing Committee
General Chair
Sharief Fadul Babikir University of Khartoum
General Co-Chairs
Amir Abdelfattah A. Eisa Sudan University of Science & Technology
Jacqueline J. George Sudan University of Science & Technology
Secretaries
Tarig Mohamed Khalid University of Khartoum
Mussab Mustafa Hassan IEEE Sudan Subsection
Treasurers
Amir Abdelfattah A. Eisa Sudan University of Science & Technology
Tariq Faysal Kamil
Publication Chairs
Azza Elsiddig Eltraify IEEE Sudan Subsection
Sara Alabbas Doka IEEE Sudan Subsection
![Page 5: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/5.jpg)
ICCEEE 2013
iv
Technical Programme Committee
Chair
Rashid A. Saeed Sudan University of Science & Technology
Co-Chair
Bazara Barry University of Khartoum
Electrical Engineering Track Chair
Abdelrahman Ali Karrar University of Khartoum
Members
Kamal Ramadan University of Khartoum
Alfadil Zakaria Sudan University of Science & Technology
Sheroz Khan International Islamic University Malaysia
Electronic Engineering Track Chair
Ghassan Taha University of Khartoum
Members
Saad Bashir International Islamic University Malaysia
Eugene Golovins University of Pretoria
Neco Ventura University of Cape Town
Mohammed Ali Abbas University of Khartoum
Iman Abuel Maaly University of Khartoum
Computing Track Chair
Rania Mokhtar Sudan University of Science & Technology
Members
Mohamed Sidahmed Upstream Technology R&D, BP, UK
Mohamed A. Elhindi University of Wisconsin-La Crosse, USA
Mohsen Mahroos Cairo University, Egypt
Alla'Ddin Awooda Sudan University of Science & Technology
Ashraf Abdelhafiz Osman Intel Corporation, USA
Mohammed Mustafa Sudan University of Science & Technology
Mechatronic Engineering Track Chair
Musaab Zaroug Sudan University of Science & Technology
Members
Al-Khawad Ali Elfaki Ahmed Sudan University of Science & Technology
Asan G. A. Muthalif International Islamic University (Malaysia)
Nassereldeen Kabashi International Islamic University (Malaysia)
Biomedical Engineering Track Chair
Magdi B. M. Amien University of Gezira
Members
Moawia Amed Hassan Sudan University of Science & Technology
Omer Elfaroug Hussien University of Gezira
Fregoon Mohamed Ahmed Sudan University of Science & Technology
Khalid Ibrahim Hussien University of Gezira
Yasser Mostafa Ibrahim Kadah Cairo Universiy
Qingguo Xie Huazhong University of Science & Technology
![Page 6: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/6.jpg)
ICCEEE 2013
v
International Advisory Board
Sami M Sharif, Sudan
Mohamed Shambool Adlan, Sudan
Izzeldin Mohammed Osman, Sudan
Izzeldin Kamil Amin, Sudan
Yahia Abdalla Hamad, Sudan
Jaafar MH Elmirghani, UK
H. Anthony Chan, USA
Omer Mahmoud, Canada
Ibrahim Mohammed Elamin, Saudi Arabia
Johnson Agbinya, Australia
Borhanuddin Mohd Ali, Malaysia
Othman O. Khalifa, Malaysia
Omer Mohammed Nor, Sweden
Samir Ibrahim Shaheen, Egypt
Peter Stavroulakis, Greece
![Page 7: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/7.jpg)
ICCEEE 2013
vi
Welcome Remark
Dr. Shareif F. Babikir
General Chair of ICCEEE Organizing Committee
On behalf of the Organising Committee of ICCEEE-2013, the IEEE-Sudan Subsection, The sponsors of the conference and the Patrons, I am pleased to welcome you our wonderful city of Khartoum. I would like to thank everybody who made this conference a success. Holding such a conference in Sudan has been a dream since the establishment of the IEEE Subsection in Sudan. This has been a result of a huge effort and collaboration between leading Sudanese Universities, Governmental agencies together with a large number of volunteers.
We hope this long awaited meeting would bring experts, academics, professionals and students together in one forum to discuss on various topics of Computing, Electrical and Electronic Engineering ranging from their state-of-the-art aspects, industrial applications to prospects and possible breakthroughs in the future.
We hope that our students would benefit greatly from this conference. Meeting experts and academics would create a research culture among the young generations and inspire these young brains to be the inventors and leaders of tomorrow.
It is our dream that the ICCEEE-2013, been our first conference sponsored by IEEE-Sudan, will be the first of many more specialised conferences to be organised by academic institutions and Sudanese research and development bodies to create a solid research culture and cement professionalism among our engineers and researchers.
We wish you a nice stay in our lovely city and hope that you benefit and enjoy the academic sessions and other events of the conference.
Dr. Sharief F. Babiker General Chair, ICCEEE-13
![Page 8: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/8.jpg)
ICCEEE 2013
vii
Welcome Remark
Dr. Rashid A. Saeed
Technical Programme Committee Chair
On behalf of the technical committee of 1st ICCEEE 2013, I would like to welcome you all to our first ever IEEE conference in Sudan, which organized by IEEE Sudan Subsection with support of IEEE region 8. The main aim of this conference is to enrich the research culture among our research community; this stated in our motto “Research makes a difference”.
We have received 321 paper submissions from 29 countries. In five different tracks Computing, Electrical, Electronics, Biomedical, and Mechatronics Engineering. All papers were carefully peer-reviewed by 448 reviewers, with each paper reviewed by at least 2 reviewers. Only 138 papers were accepted for presentation. I feel proud of the papers quality we have accepted and published in IEEEXplore and I would like to express my deep gratitude to the TPC members and reviewers for their unlimited support and hard times to catch the deadlines we have committed. The reject rate was about 48%. We believe that many good manuscripts were rejected, this due to maintain the high quality.
The conference is arranged in 29 technical sessions and 3 parallel tracks. The papers are categorized under some of the current topic of interests such as artificial intelligence, fuzzy logic, pattern recognition, security, wireless sensor, RF and antennae, wireless communication and many more.
Maybe I can share with you some of the interesting statistics, which about 70% of the submissions were come from computing and electronics communities. This gives indication of how these two groups are contributing to our research pool. However in the meantime, we should put more efforts on biomedical, mechatronics and electrical researches.
Finally, I hope you will enjoy the keynotes, tutorials and technical sessions hosted in the five stars Corinthia Hotel from 26 to 28 August 2013 from 9am to 7 pm. And once again welcome in Khartoum where the two Niles meet in an unforgettable scene.
Dr. Rashid A. Saeed Technical Committee Chair, ICCEEE-13
![Page 9: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/9.jpg)
ICCEEE 2013
viii
Conference Programme
8.00 - 9.00AM 9.00 - 10.AM 10.00-11.00 11.00-
12.00
12.00-
13.20
13.20 -
14.20
14.40 -
16.00
16.00 -
16.20
16.20 -
17.40 18.00 - 20.00
Day 1
(26/8/13) Registration Opening Ceremony
Refre
shm
ent &
Bre
ak
TS11,
TS12 and
TS13
Pra
yer
Tim
e (Zu
hr) &
Lu
nch
TS14,
TS15 and
TS16
Pra
yer
Tim
e (Asr)
TS17,
TS18 and
TS19
Interactive Session
Day 2
(27/8/13) Networking
Keynote Speech
I
Keynote
Speech II
TS21,
TS22 and
TS23
TS24,
TS25 and
TS26
TS27,
TS28 and
TS29
Interactive Session
Day 3
(28/8/013) Networking
Keynote Speech
III Refreshment
& Break
Tutorials
I, II &III
TS31,
TS32 and
TS33
TS34, and
TS35 Social Activities
General Remarks
Language of presentation: English
Presentation time : 13 minutes
Presentation method: Slide presentation
Upload presentation before start of session
Fill up presenter biodata form before start of session (Biodata form will be supplied during conference)
COLOUR CODE:
Keynote Speeches & Tutorials
Computing
Communications
Electronics, Electrical, Biomedical and Mechatronics
![Page 10: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/10.jpg)
ICCEEE 2013
ix
Keynote Speeches
Keynote Speaker I: Professor Narayan Chandra Debnath
SOFTWARE ENGINEERING MODELS, METRICS AND TOOLS RESEARCH – CHALLENGES AND OPPORTUNITIES
Day 2 27 August 2013
09.00 – 10.00AM
Chairperson: Prof. Dr. Ibrahim El-Amin
Keynote Speaker II: Dr. Fanny Klett
THE WAR FOR TALENT -
CHALLENGES AND OPPORTUNITIES FOR ICT AND INNOVATION
Day 2 27 August 2013
10.00 – 11.00AM
Chairperson: Prof. Dr. Mustafa Nawari
Keynote Speaker III: Prof. Dr. Hinghung Anthony Chan
DISTRIBUTED MOBILITY FOR FUTURE MOBILE INTERNET
Day 3 28 August 2013
09.00 – 10.00AM
Chairperson: Dr. Bazara Barry
Tutorials
Tutorial I: Professor Ibrahim El-Amin
INTRODUCTION TO POWER QUALITY
Day 3 28 August 2013
11.00AM – 12.00Noon
Chairperson: Dr. Abderahman Karrar
Tutorial II: Dr. Hassan Hamdoun
AN INTERNET DIFFUSION, ASSOCIATED ENERGY CONSUMPTION AND WEB LITERACYDay 3
28 August 2013
11.00AM – 12.00Noon
Chairperson: Dr. Rania A. Mokhtar
Tutorial III: Prof. Dr. Mustafa Nawari, Eng.Yousif Hussin, Eng. Hind Mohamed
PKI TECHNOLOGY: THE SECURITY INFRASTRUCTURE FOR SUDAN'S E-GOVERNMENT
Day 3 28 August 2013
11.00AM – 12.00Noon
Dr. Amir Abdelfatah Eisa
![Page 11: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/11.jpg)
ICCEEE 2013
x
Paper Presentations
Day ONE: 26 August 2013
Technical Session ICCEEE 2013 (TS 11)
12.00-13.20pm (Room I)
TECHNICAL SESSION 1A: Text and Speech Processing Chairpersons: Prof. Dr. Othman O. Khalifa & Dr. Alla Adin Awooda
204 Semantic Web services for Nubian language
Ahmed Yousri Salama Mohammed,
105 Differential Evolution Cluster-based Text Summarization Methods
Albaraa Abuobieda, Naomie Salim, Mohammed S. Binwahlan and Ahmed H. Osman,.
145 Segmentation Approach for Online Arabic Handwriting
Hozeifa A. Abd Alshafy and Mohamed A. Mustafa,
181 ETAOSD: Static Dictionary-Based Transformation Method for Text Compression
Fadlelmoula M. Baloul, Mohsin H. Abdullah and Elsadig A. Babikir,
213 Segmentation Algorithm for Arabic Handwritten Text
Yusra Osman,
238 Acoustic Approach to Spoken Arabic Language Detection
Mohammed Elfahal and Mohammed Elhafiz,
Technical Session ICCEEE 2013 (TS 12)
12.00-13.20pm (Room II)
TECHNICAL SESSION 1B: Networking
Chairpersons: Prof. Dr. Aisha A. Hassan & Dr. Abuagla Babikir
269 Network Coding for hybrid Satellite-terrestrial Networks over non-identical Fading Channels
M. Awais Jadoon, Zainab A.Khan, Imran Khan, Ahmad Shah and Othman O. Khalifa
249 Localization for Wireless Sensor Networks Osman M. Elfadil,
8 Routing Protocols in ad-hoc Networks Performance of Standardized
Tariq Al-Ahdal and Saida Mohammad,
186
Multihoming Based Mobility Management Scheme in NEMO: A Qualitative and Quantitative
Analysis
Shayla Islam, Aisha Hassan Abdalla Hashim Hashim, Mohamed Hadi Habaebi Habaebi, M.K. Hasan
Hasan, Suhaimi Latif and Rashid Saeed,
202 Multicasting in Network mobility using Multicast Anchor Agent
Abdemuizz Adam,
102 A Multi-Layer Network Defense System using Artificial Immune System Mohamed M. K. Elhaj, Mamoun M. Suliman and Hussam Hamrawi.
Technical Session ICCEEE 2013 (TS 13)
12.00-13.20pm (Room III)
TECHNICAL SESSION 5B: Grid and Energy
Chairpersons: Prof. Dr. Ibrahim M. El-Amin & Dr. Ashraf Osman
43 A novel Control Method of Grid Connected Doubly Fed Induction Generator under Variable
Wind Speed Zakieldeen Elhassan, Li Yang and Tang Yi.
294 Method of Computing Maximum Loadability using Continuation Power Flow,Case Study Sudan
National Grid
Elfadil Zakaria, Kamal Ramadan and Dalia Eltigani.
215 Insights into Sustainable Energy-Capacity Trends towards Bridging the Digital Divide
Hassan Hamdoun, Solomon Mangeni and Yogesh Dwivedi
28 Optimization of Nuclear Energy Generation
Dryan Marende.
136 Jatropha Curcas: A Viable Alternative Source of Clean Energy to Meet Sudan’s Growing Energy
Demand
Hazir Farouk Abdelraheem, Andrew Lang and Mohammed Elhadi Ahmed.
46 Power Quality Indices :A Saudi Steel Mills Case Study
Ibrahim Elamin, Abdullah Al-Elyani and Abdelrahman Shuaib.
![Page 12: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/12.jpg)
ICCEEE 2013
xi
Technical Session ICCEEE 2013 (TS 14)
14.40 - 16.00pm (Room I)
TECHNICAL SESSION 4B: Data Mining
Chairpersons: Dr. Mohamed Elhafiz Mustafa & Dr. Nisreen Beshir
160 Extended Abstract: Mining Lexico-syntactic Patterns to Extract Chemical Entities with their
Associated Properties
Safaa Eltyeb and Naomie Salim,
180 Credit Scoring Using Data Mining Techniques
Eiman Kambal, Izzeldin Osman, Noon Mohammed, Sara Mohammed and Methag Taha,
103 Modeling Customer Relationship Management using Data Mining
Amira Kamil Ibrahim and Ajith Abraham.
287 Verifying Abstract Data Types: A Hybrid Approach
Nahid Ahmed Ali,
98 Specifying Abstract Data Types: A Behavioral Model, An Axiomatic Representation
Abdelrasoul Yahya.
280 Multi Document Summarization Based On Cross-Document Relation Using Voting Technique
Yogan J. Kumar, Naomie Salim, Albaraa Abuobieda and Ameer Tawfik,
Technical Session ICCEEE 2013 (TS 15)
14.40 - 16.00pm (Room II)
TECHNICAL SESSION 5A: Wireless Communication
Chairpersons: Dr. Hinghung Anthony Chan & Dr. Sami H.O. Salih
149 Performance Evaluation of DS-WCDMA
Khalid Bilal, Ibrahim Khider and Amin Abdelnabi
59 Efficient Design of Dual Digital Up Converter for WCDMA and CDMA2000 Using System
Generator
Mohamed Omara
245 Evaluation of Gateway Placement Approaches in Wireless Mesh Network
Awadallah Ahmed and Aisha Abdalla,
115 Synchronization Wireless Algorithm Based On Message Digest (Swamd) For Mobile Database
Taqwa Ahmed, Mariam Taha and Faiza Alim,
291 An Analysis of Resource Sharing Scheme in Heterogeneous Wireless Campus Network
Mosharrof H. Masud, Suhaimi A. Latif, Farhat Anwar and Md K. Alam,
38 Adaptive Joint Call Admission Control to Support QoS in Heterogeneous 4G Wireless Networks
Jacqueline J. George and Nada M. Adalla.
Technical Session ICCEEE 2013 (TS 16)
14.40 - 16.00pm (Room III)
TECHNICAL SESSION 5B: Biomedical (Instrumentation)
Chairpersons: Dr. Magdi Baker & Dr. Ashraf Osman
182 Motion Estimation in Ultrasound Image Using Dynamic Multi-Shape Search Alia M. A. Siddig, Razaz Kh. Yousif and Muhanned Al Anwer Awaad,
152 Multiple Measurements Vectors Compressed Sensing for Doppler Ultrasound Signal
Reconstruction
Sulieman M. S. Zobly and Yasir M. Kadah,
187 Detecting and Tracking ASD using New Block Flow in Ultrasound
Muhanned Al Anwer Awaad, Razaz Kh . Yousif and Alia M. A. Siddig
263 Comparison Between Gold Nanoparticles and Conductive Polymer Nanoparticles Used in
Photothermal Therapy
Nada Osman,
282 Evaluation of linear filter kernel developed from Ultrasound phantom image
Alwaleed Abdelrahman and Omer Hamid.
244 Design of Digital Apodization Technique For Medical Ultrasound Imaging
Mawia Hassan, Shaza Gaib Alla, Ilaf Sarour and Mohammed Alfadny.
![Page 13: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/13.jpg)
ICCEEE 2013
xii
Technical Session ICCEEE 2013 (TS 17)
16.20 - 17.40pm (Room I)
TECHNICAL SESSION 5B: Software Engineering
Chairpersons: Prof. Narayan Chandra Debnath & Dr. Hisham Abushama
74 Popular Agile Approaches in Software Development: Review and Analysis
Amani Alnimir and Hisham Abushama.
118 A Study of Software Process Improvement for Some Sudanese Organizations
Arafat Abdulgader, Mohamed A. Elshaikh and Radziah Mohamed,
314 Upgrading Distributed Agile Development
Aisha Hamid,
240 Enabling Use Case Function point on Service-oriented Architecture
Nusiba Abdalrhman Ahmed and Abdelgaffar Hamed,
214 Service Discovery using Perdurant Ontology
Afaf Mohamed and Robert Colomb.
125 A Validated Model for the Quality in Use of Mobile Government Systems
Nisreen B. Osman and Izzedin M. Osman.
Technical Session ICCEEE 2013 (TS 18)
16.20 - 17.40pm (Room II)
TECHNICAL SESSION 5A: Communication I (Wireless)
Chairpersons: Dr. S.M.A Motakabber & Dr. Sara Eljack
77 Design and Test of a USB/Bluetooth/IP Self-adaptive Connector for Sensor Network Application
Yousif Elhadi Elsideeg Ahmed, Basem Ahmed M. Hassan, Salim Omer Abdallah Alzubaidi, Yassin
Mahmod M. Ibraheem and Mustafa G. Hadi Khamisi, Sudan
50 Energy Aware Routing Protocol for Low Energy Sensor
Adel Gaafar.
101 Lightweight Inter-cluster Synchronization Scheme for Femtocell Network
Omnia Ahmed, Rashid A.Saeed and Mohammed Kamrul Hasan.
167 Implementation of Adaptive Modulation for Broadband Wireless Access Networks using
Cognitive Radio Approaches
Sami Salih, Mamoun Suliman, Abbas Mohamed and Ali Al-Refai.
15 Multifunction Filter for The Processing of Radar Signals
Moutaman Mirghani Daffalla.
319 A GPS Based Traffic Light Pre-emption Control System for Emergency Vehicles
Abubakr Eltayeb, Halla Almubarak and Tahani Attia.
Technical Session ICCEEE 2013 (TS 19)
16.20 - 17.40pm (Room III)
TECHNICAL SESSION 5B: Biomedical (UltraSonic)
Chairpersons: Dr. Magdi Baker & Dr. Rashidah F. Olanrewaju
91 Design of Non-Invasive Glucose Measuring Device
Ola Abdalsalam, Al-Khanssa Osman, Roua Abd-Alhadi and Saad Alshmaa,
154 Detection of Volatile Compounds in Urine Using an Electronic Nose Instrument
Thowiba Sabeel, Fauzan Che Harun and Solima Sabeel,
162 Heart Disease Diagnostic Graphical User Interface Using Fractal Dimension
Jacqueline J. George and Eman Mohammed Saeed Mohammed,
200 Discrimination of Four Classes in Brain-Computer Interface Based on Motor Imagery
Tasneem Mahmoud and Dr. Omer Elfarouk Hamed.
207 Measurement of Weight Distribution in The Foot
Safa Abdalziz, Shahd Tariq, Haifa Basher and Fragoon Ahmed.
229 Architecture and Circuit Design Balance between Integrated and Photon counting mode for X-
Ray Pixel Array Detector Read-out Electronics
Suliman Abdalla, Maha Abdelaziz and Amin Babiker.
![Page 14: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/14.jpg)
ICCEEE 2013
xiii
Day TWO: 27 August 2013
Technical Session ICCEEE 2013 (TS 21)
12.00-13.20pm (Room I)
TECHNICAL SESSION 3A: Security and Encryption
Chairpersons: Dr. Mohamed Fadlalla Elhag & Dr. Abuagla Babikir
57 A Hybrid Approach to Secure Transmitted Messages Using Advanced Encryption Standard
(AES) and Word Shift Coding Protocol
Abdelrahman Altigani and Bazara Barry,
305 Evaluating the Impact of AES Encryption Algorithm on Voice over Internet Protocol (VoIP)
Systems
Sulafa Khaled Talha and Bazara I. A. Barry,
84 Binary LU Encryption
Abdelhaliem Abbas,
285 Developing a Security Model to Protect Websites from Cross-site Scripting Attacks
Yousra Gad and Bazara Barry,
137 Measuring the Cybersecurity of Cloud Computing
Nahla Murtada.
86 A Parallel Computer System for the Detection and Classification of Breast Masses
Soha Yousuf and Sahar Mohammed.
Technical Session ICCEEE 2013 (TS 22)
12.00-13.20pm (Room II)
TECHNICAL SESSION 5A: Communication II (Wireless)
Chairpersons: Dr. Jacqueline John George Dr. Sara Eljack
61 Sparse Channel Estimation Using Adaptive Filtering and Compressed Sampling
Mohamed Khalifa, Abubakr Abdelhafiz and Azzedine Zerguine.
85 Inter-cell Interference Coordination in LTE-A HetNets: A Survey on self organizing approaches
Mohammad Kamrul Hasan,
302 Impulsive Noise Mitigation in Haar DWT Based OFDM Systems
Moaaz Mahdi, Khaizuran Abdullah and Mohammad Umar Siddiqi.
1 An Enhanced HWMP (E-HWMP) Protocol for Multihop Vehicular Communications
Amal Eltahir and Rashid Saeed.
168 A Novel Spectrum Sensing Scheduler Algorithm for Cognitive Radio Networks
Sami Salih, Mamoun Suliman and Abbas Mohamed.
321 Development of a Position Detection Technique for Chipless RFID Tagged Object
S. M. A. Motakabber, Muhammad Ibn Ibrahimy and A. H. M. Zahirul.
Technical Session ICCEEE 2013 (TS 23)
12.00-13.20pm (Room III)
TECHNICAL SESSION 5B: Mechatronics
Chairpersons: Dr. Musaab Hassan Zaroog & Dr. Alla Eldin Awooda
239 Design and Implementation of Robotic System to Transport Disabled People
Amal Elawad, Braa Hagadam, Rabah Hamed and Eltaher Hussein.
36 Carbon Nanotubes: Challenges and Opportunities
Gehad Hamdan, Saad Suliman and Al Khawad Elfaki.
165 Modeling Of Electrostatically Actuated Temperature Sensor
Ammar Atia, Moayad Mamoon Ibrahim, Omer Abd Algbar Mohamed and Musaab Hassan.
42 The Potential of Establishing Computer_Aided_Design (CAD) Industry in Africa: Sudan Case-
Study
Ashraf Osman, Amin Nabi and Ismail El-Azhary.
320 Performance Analysis of Different Techniques for Brain Computer Interfacing
Mohammad R. Hasan, Muhammad Ibn Ibrahimy and S.M.A. Motakabber.
252 Navigation Algorithm for Mobile Robots using WSNs
Osman Mudathir Elfadil.
![Page 15: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/15.jpg)
ICCEEE 2013
xiv
Technical Session ICCEEE 2013 (TS 24)
14.40 - 16.00pm (Room I)
TECHNICAL SESSION 1B: Pattern Recognition
Chairpersons: Dr. Hanan Adlan & Dr. Jacqueline John George
53 Speech Scrambling Based on Chaotic Maps and One Time Pad
Samah M. H. Alwahbani and Eihab B. M. Bashier
270 Face Recognition Using Local Graph Theory (LGT)
Eimad Abusham and Housam Basheir
227 On Password Strength Measurements: Password Entropy and Password Quality
Ala E.Moktar,Azza H.Salim, Settana M.Abdullah, Mariam M.Taha and Taqwa A.Alhaj
286 Feature Selection and Similarity Coefficient Based Method for Email Spam Filtering
Ali Ahmed, Ammar E. Elhadi, Hamza A. Hamza and Naser Elmisbah
288 An Improved Semantic Plagiarism Detection Scheme Based on Chi-squared Automatic
Interaction Detection
Ahmed Osman and Naomie Salim
262 A Tree-based Conceptual Matching For Plagiarism Detection
Ahmed Osman, Naomie Salim and Ammar E. Elhadi
Technical Session ICCEEE 2013 (TS 25)
14.40 - 16.00pm (Room II)
TECHNICAL SESSION 5B: RF and Antenna
Chairpersons: Prof. Dr. Saad O. Bashir & Sami H.O. Salih
141 New Fields Expressions of a Traveling Wave Circular Loop Antenna
Sameir Ali Hamed and Saad Bashir.
3 Near-Fields of an Array of Circular-Loop Antennas
Sameir Ali Hamed, Abdulwaheed Musa and Saad Bashir.
33 Reconfigurable Dual Band Antenna for 2.4 and 3.5GHz using Single PIN Diode
Alaa A. Yassin and Rashid A. Saeed.
35 Angle of arrival estimation in smart antenna by using MUSIC method for wideband wireless
communications
Nihad A. A. Elhag, Isam M. Osman, Alaa A. Yassin and Tsneem B. Ahmed.
171 Optimizing the Performance of Branch-line Couplers Using Open Ended Stubs
Siddig Gomha, Abdel Aziz T. Shalaby and El-Sayed M. El-Rabaie.
281 Analysis Of Aerodynamic Torques Affecting Dust Particle Orientation As Input To Microwave
Cross Polarization
Abdulwaheed Musa, Saad Bashir and Sameir Ali Hamed.
Technical Session ICCEEE 2013 (TS 26)
14.40 - 16.00pm (Room III)
TECHNICAL SESSION 5A: Electrical engineering I
Chairpersons: Dr. Kamal Ramadan & Dr. Amir Abdelfatah Eisa
208 Abinitio Method Study of Ionic Conductor CaF2
Nahid Osman, Gamar Mansour, Nodar Khalifa, Karlo Kuacgor Mathang and Alwaleed Adllan.
148 Mechanism for Charge Sharing Suppression in Single Photon Processing Pixel Array
Suliman Abdalla, Amin Babiker and Farouq Habbani.
195 Improvement of Voltage Stability Index Using Distributed Generation for Northern Nigeria Sub-
Transmission Region
Haruna Musa, Binta Usman and Sanusi Sani Adamu.
257 Compensation Technique and Power Quality Improvement in Multiphase Distribution System
Shashank Srivastava and Nitin Singh.
311 Design and implementation of Dual axis solar tracker based on solar maps Sara Elagib and Nada Osman.
6 On the Steady-State Error Covariance Matrix of Kalman Filtering with Intermittent
Observations in the Presence of Correlated Noises at the Same Time
Khalid Hag El Amin and Mirghani Fath Elrahman.
![Page 16: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/16.jpg)
ICCEEE 2013
xv
Technical Session ICCEEE 2013 (TS 27)
16.20 - 17.40pm (Room I)
TECHNICAL SESSION 4A: Security and Authentication
Chairpersons: Dr. Prof. Mustafa Nawari & Dr. Anwar Dafa-Alla
95 A Multi-Layer of Multi Factors Authentication Model for Online Banking Services Mahmoud Musa and Muna Ahmed.
309 Enhancement of Hardware Modular Multiplier Radix-4 Algorithm for Fast RSA Cryptosystem
Kauther Mahdi, Sami Sharif and Ahmed Ashur,
119 Authenticated Key Agreement protocol for Virtual Private Network based on Certicateless
Cryptography Abeer Eldewahi and Eihab Bashier,
218 Enhancement model for PKI certificate validation in the Mobile Banking Majda Omer and Eihab Bashir,
29 K-Nearest Neighbor classifier for Signature Verification System
Ahmed Abdelrahaman and Ahmed Abdallah,
199 Extracting Knowledge from Web Server Logs Using Classification Technique
Mirghani Eltahir and Anwar Dafa-Alla,
Technical Session ICCEEE 2013 (TS 28)
16.20 - 17.40pm (Room II)
TECHNICAL SESSION 5A: Electrical (Systems)
Chairpersons: Dr. Abderahman Karrar & Dr. Amir Abdelfatah Eisa
217 The Unscented Kalman Filter Applied to Satellite Orbit Determination
Ahmed Yassin, Elhussein Abd Elmageed, Mazin Hamad and Mahmoud Osman.
295 Prepaid Energy Meter Network via Power System Communication
Kamal Ramadan, Elfadil Zakaria and Dalia Eltigani.
221 Mathematical Modeling of Growth Conditions and Interpretation of Phase Diagram for InxGa1-
xN Epitaxial Layer
Md. Rafiqul Islam, Md. Soyaeb Hasan and Apurba Kumar Saha.
289 Sudan HF Model based on University of Khartoum Ionospheric Shells and their Mathematical
Derivations
Mohamed Yousif and Sami Sharif.
79 Development of a Lightning Risk Assessment Software in Accordance with IEC 62305-2
Mariana M Mounir, Aya E Hamid and Abdelrahman A Karrar.
Technical Session ICCEEE 2013 (TS 29)
16.20 - 17.40pm (Room III)
TECHNICAL SESSION 3B: Computing
Chairpersons: Dr. Hassan Hamdoun & Dr. Mohammed Abdalla Khaleel
220 On the Cache Performance of Information Centric Network
Suhaidi Hassan, Zeeshan Aziz and Kashif Nisar,
64 Development of Computer Aided Tools for UAV Flight Control
Abdelmoniem Idris, Abdelraheem Satti, Ahmed Imam and Moutaman Mirghani,
301 Cloud Computing for Rural ICT Development: Opportunities and Challenges
Mohamed Firdhous, Osman Ghazali and Suhaidi Hassan,
210 Extreme Programming Applied in a Large-Scale Distributed System
Elmuntasir A. Eltom and Eltigani Bashir,
169 Designing Low Cost Digital Dose Reminder System
Mohammed Nabri, Ahmed Hassan and Tasneem Mahmoud
278 Solving Problems of Computer Networks' Planning Using Elastic Networks Method
Samer Mohamed Kannan Mahmoud and Saeed A. Al-Ghamdi.
![Page 17: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/17.jpg)
ICCEEE 2013
xvi
Day Three: 28 August 2013
Technical Session ICCEEE 2013 (TS 31):
12.00-13.20pm (Room I)
TECHNICAL SESSION 5A: Artificial Systems
Chairpersons: Dr. Alfadil Zakaria & Dr. Anwar Dafa-Alla
315 Human Skin Color Recognition (identification): Case study
Alwaleed Abdelrahman, Hassan Yasser, Maram Mahir and Fatma Mohammed.
232 Enhancing Haptic Representation for 2D Objects
Abdelkareem Bedri and William Harwin.
298 Oil Price Prediction using Ensemble Machine Learning
Lubna Gabralla, Rania Jammazi and Ajith Abraham.
108 Hybrid Conceptual Framework for Artificial Immune System
Muna Elsadig Mohamed Ahmed Elsheik.
16 Human Posture Recognition and Classification
Othman O. Khalifa.
268 Quasi Fields Based S-Box Implementation
Eltayeb Abuelyaman.
Technical Session ICCEEE 2013 (TS 32)
12.00-13.20pm (Room II)
TECHNICAL SESSION 5A: Communication III (Protocols)
Chairpersons: Dr. Rania A. Mokhtar & Dr. Hassan Hamdoun
258 Effect of the Interior Gateway Routing Protocols in the Multiprotocol Label Switching Networks
Sara Eljack and Suhail Ahmed.
226 Investigation of Nested Nemo Schemes in Mobile Network Environment Mohammed Babiker, Aisha H. Abdalla and Ismail El-Azhary.
67 A Review in Interference Analysis and Management between Hierarchical and Flat Architectures
Communications
Abeer Zakaria and Rashid A. Saeed.
233 Performance Enhancement of the CAN Protocol Using Reed-Solomon Codes
Haitham Shabour, Moutaman Mirghani and Omer Sharif.
47 Accurate Modeling of PMSM for Differential Mode current and Differential Torque Calculation
Ali Ahmed Adam.
25 Design and Analysis of Novel AFSK Modem Using Microcontrollers Moutaman Mirghani.
Technical Session ICCEEE 2013 (TS 33)
12.00-13.20pm (Room III)
TECHNICAL SESSION 5B: Neural Network
Chairpersons: Dr. Huwaida Elshoush & Dr. Abdelraheem Satti
112 MRI Brain Image Classification Using Neural Networks
Walaa Ahmed, Ahmed Abdel-Rahma, Yusra Ibrahim and Magdi B. M. Amien.
317 Modeling Consumer Loan Default Prediction Using Ensemble Neural Networks
Amira Kamil Ibrahim and Ajith Abraham.
176 An evaluation on Offline Signature Verification using Artificial Neural Network Approach
Othman O. Khalifa, Md Khorshed Alam and Aisha-Hassan Abdulla.
313 Neural Networks Forecasting Architectures for Rainfall in the rain-fed Sectors in Sudan
Isam Basheir, Adil Khidir and Hanan Adlan.
52 Driving a Novel Phasors Formula for a Digital MHO Relay Algorithm for High Voltage
Transmission Line Based on Neural Networks
Auday Mohamad and Ali Ibrahim.
293 Implementation of Transient Stability Assessment using Artificial Neural Networks
Dalia Eltigani, Kamal Ramadan and Elfadil Zakaria.
![Page 18: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/18.jpg)
ICCEEE 2013
xvii
Technical Session ICCEEE 2013 (TS 34)
14.40 - 16.00pm (Room I)
TECHNICAL SESSION 5A: Computer Science
Chairpersons: Dr. Mohammed Abdalla Khaleel & Dr. Mohamed Elhafiz Mustafa
11 Benefit Cost Analysis in Appraisal and Planning Projects of Higher Learning Institutions
Muhammad Salim Javed, Ahmad Kamil Bin Mahmood and Suziah Bt. Sulaiman
156 Policy Cycle Analysis to Avoid Policy Conflict in Policy-based Management Systems
Abdelhamid Mansor, Wan M.N. Wan-Kadir and Toni Anwar.
80 Crossing Over Under the Root CA
Mustafa Nawari and Asma Abdalrahman.
88 Reliable Attributes Selection Technique for Predicting the Performance Measures of a DSM
Multiprocessor Architecture
Rasheed Zayid and Mehmet Fatih Akay.
135 Smart Phones As System Integration Development Tools (Android SCL Simulation Environment
as Prototype)
Khalid Elhussein and Mohammed Elobaid.
192 A Method for Mapping State Machine Behavior Models In MDA Issues and Challenges
Rihab Eltayeb, Robert Colomb and Abdelgaffar Hamed
Technical Session ICCEEE 2013 (TS 35)
14.40 - 16.00pm (Room II)
TECHNICAL SESSION 2A: Fuzzy Logic
Chairpersons: Dr. Abdelraheem Satti & Dr. Huwaida Elshoush
222 An Agent-based Proxy Cache Cleanup Model using Fuzzy Logic
Hiba Nasir, Yahia Abdalla Hamad and Amir Eisa,
51 Adaptive Median Filter Background Subtraction Technique Using Fuzzy Logic
Auday Mohamad and Mohammed Osman,
235 Intelligent System for Selecting Optimum (INST) Based on Fuzzy Logic to Develop a Courseware
(ISSIDC) Mohamed Fadlalla Elhag,
177 Fuzzy Academic Advising System for on Probation Students in Colleges of Applied Sciences -
Sultanate of Oman
Fadlelmoula M. Baloul and Prince Williams
78 Fuzzy Logic Control in Temperature Control System
Mohammed Elnour and Waleed Kannan,
82 Neuro-Fuzzy Inference System based Controller in 6 DoF in Puma 560
Zeinab Mahmoud Omer Yousif and Mergani Fathalrahman,
![Page 19: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/19.jpg)
ICCEEE 2013
xviii
Table of Contents
Welcome Remark vi
General Chair of ICCEEE Organizing Committee vi
Technical Programme Committee Chair vii
Conference Programme Error! Bookmark not defined.
Table of Contents xviii
Keynote Speakers 1
Prof. Narayan C. Debnath 1
Software Engineering Models, Metrics and Tools Research - Challenges and Opportunities 1
Dr. H. Anthony Chan, 3
Distributed Mobility for Future Mobile Internet 3
Dr. Fanny Klett, 5
The War for Talent - Challenges and Opportunities for ICT and Innovation 5
Tutorial/Industry Workshops 7
Introduction to Power Quality 7
Internet Diffusion, Associated Energy Consumption and Web Literacy 7
PKI Technology: The Security Infrastructure for Sudan's E-Government Error! Bookmark not defined.
ICCEEE’13 Papers 9
Computing 9
Tariq Al-Ahdal and Saida Mohammad. Performance of Standardized Routing Protocols in ad-hoc
Networks 9
Muhammad Salim Javed, Ahmad Kamil Bin Mahmood and Suziah Bt. Sulaiman. Benefit Cost Analysis in
Appraisal and Planning Projects of Higher Learning Institutions 9
Othman O. Khalifa. Human Posture recognition and Classification 9
Ahmed Abdelrahaman and Ahmed Abdallah. K-Nearest Neighbor classifier for Signature Verification
System 10
Auday Mohamad and Mohammed Osman. Adaptive Median Filter Background Subtraction Technique
Using Fuzzy Logic 10
Samah M. H. Alwahbani and Eihab B. M. Bashier. Speech Scrambling Based on Chaotic Maps and One
Time Pad 10
Abdelrahman Altigani and Bazara Barry. A Hybrid Approach to Secure Transmitted Messages Using
Advanced Encryption Standard (AES) and Word Shift Coding Protocol 11
Abdelmoniem Idris, Abdelraheem Satti, Ahmed Imam and Moutaman Mirghani. Development of
Computer Aided Tools for UAV Flight Control 11
Amani Alnimir and Hisham Abushama. Popular Agile Approaches in Software Development: Review and
Analysis 11
Mustafa Nawari and Asma Abdalrahman. Crossing Over Under the Root CA 12
Abdelhaliem Abbas. Binary LU Encryption 12
Rasheed Zayid and Mehmet Fatih Akay. Reliable Attributes Selection Technique for Predicting the
Performance Measures of a DSM Multiprocessor Architecture 12
Mahmoud Musa and Muna Ahmed. A Multi-Layer of Multi Factors Authentication Model for Online
Banking Services 13
Abdelrasoul Yahya. Specifying Abstract Data Types : A Behavioral Model, An Axiomatic Representation 13
![Page 20: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/20.jpg)
ICCEEE 2013
xix
Mohamed M. K. Elhaj, Mamoun M. A. Suliman and Dr. Hussam Hamrawi. A Multi-Layer Network
Defense System Using Artificial Immune System 13
Amira Kamil Ibrahim and Ajith Abraham. Modeling Customer Relationship Management Using Data
Mining 14
Albaraa Abuobieda, Naomie Salim, Mohammed Salem Binwahlan and Ahmed H.Osman. Differential
Evolution Cluster-based Text Summarization Methods 14
Muna Elsadig Mohamed Ahmed Elsheik. Hybrid Conceptual Framework for Artificial Immune System 14
Taqwa Ahmed, Mariam Taha and Faiza Alim. Synchronization Wireless Algorithm based on Message
Digest (SWAMD) for Mobile Database 15
Arafat Abdulgader, Mohamed Awad Elshaikh and Radziah Mohamed. A Study of Software Process
Improvement for Some Sudanese Organizations 15
Abeer Eldewahi and Eihab Bashier. Authenticated Key Agreement protocol for Virtual Private Network
based on Certicateless Cryptography 15
Nisreen Beshir Osman and Izzedin Mohammed Osman. A Validated Model for the Quality in Use of
Mobile Government Systems 16
Nahla Murtada. Measuring the Cybersecurity of Cloud Computing 16
Hozeifa Adam Abd Alshafy and Dr. Mohamed Alhafiz Mustafa. Segmentation Approach for Online
Arabic Handwriting 16
Abdelhamid Mansor, Wan M.N. Wan-Kadir and Toni Anwar. Policy Cycle Analysis to Avoid Policy
Conflict in Policy-based Management Systems 17
Safaa Eltyeb and Naomie Salim. Mining Lexico-syntactic Patterns to Extract Chemical Entities with their
Associated Properties 17
Othman O. Khalifa, Md Khorshed Alam and Aisha-Hassan Abdulla. An evaluation on Offline Signature
Verification using Artificial Neural Network Approach 17
Fadlelmoula Mohamed Baloul and Prince Williams. Fuzzy Academic Advising System for on Probation
Students in Colleges of Applied Sciences - Sultanate of Oman 18
Eiman Kambal, Izzeldin Osman, Noon Mohammed, Sara Mohammed and Methag Taha. Credit Scoring
Using Data Mining Techniques 18
Fadlelmoula Mohamed Baloul, Mohsin Hassan Abdullah and Elsadig Ahmed Babikir. ETAOSD: Static
Dictionary-Based Transformation Method for Text Compression 18
Rihab Eltayeb, Robert Colomb and Abdelgaffar Hamed. A Method for Mapping State Machine Behavior
Models In MDA Issues and Challenges 19
Mirghani Eltahir and Anwar Dafa-Alla. Extracting knowledge from web server logs using classification
technique 19
Ahmed Yousri Salama Mohammed. Semantic Web services for Nubian language 19
Elmuntasir Abdullah Hag Eltom and Eltigani Bashir. Extreme Programming Applied in a Large-Scale
Distributed System 20
Yusra Osman. Segmentation Algorithm for Arabic Handwritten Text 20
Afaf Mohamed and Robert Colomb. Service Discovery using perdurant ontology 20
Majda Omer and Eihab Bashir. Enhancement model for PKI certificate validation in the Mobile Banking 21
Suhaidi Hassan, Zeeshan Aziz and Kashif Nisar. On the Cache Performance of Information Centric
Network 21
Hiba Nasir, Yahia Abdalla Hamad and Amir Eisa. An Agent-based Proxy Cache Cleanup Model using
Fuzzy Logic2 22
Mohammed Babiker, Aisha H. Abdalla and Ismail El-Azhary. Investigation of Nested Nemo Schemes in
Mobile Network Environment 22
Mariam Taha, Taqwa Alhaj, Ala Moktar, Azza Salim and Settana Abdullah. On Password Strength
Measurements: Password Entropy and Password Quality 22
![Page 21: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/21.jpg)
ICCEEE 2013
xx
Mohamed Fadlalla Elhag. Intelligent System for Selecting Optimum (INST) Based on Fuzzy Logic to
Develop a Courseware (ISSIDC). 23
Mohammed Elfahal and Mohammed Elhafiz. Acoustic Approach to Spoken Arabic Language Detection 23
Nusiba Abdalrhman Ahmed and Abdelgaffar Hamed. Enabling Use Case Function point on Service-
oriented Architecture 23
Awadallah Ahmed and Aisha Abdalla. Evaluation of Gateway placement approaches in Wireless Mesh
Network 24
Osman Mudathir Elfadil. Localization for Wireless Sensor Networks 24
Osman Mudathir Elfadil. Navigation Algorithm for Mobile Robots using WSNs 24
Sara Eljack and Suhail Ahmed. Effect of the Interior Gateway Routing Protocols in the Multiprotocol
Label Switching Networks 25
Ahmed Osman, Naomie Salim and Ammar Ahmed E. Elhadi. A Tree-based Conceptual Matching for
Plagiarism Detection 25
Eltayeb Abuelyaman. Quasi Fields Based S-Box Implementation 25
Muhammad Awais Jadoon, Ahmad Shah, Othman O. Khalifa, Zainab Ali Khan and Imran Khan. Network
Coding for hybrid Satellite-terrestrial Networks over non-identical Fading Channels 26
Eimad Abusham and Housam Basheir. Face Recognition Using Local Graph Theory (LGT) 26
Samer Mohamed Kannan Mahmoud and Saeed A. Al-Ghamdi. Solving Problems of Computer Networks'
Planning using Elastic Networks Method 26
Yogan Jaya Kumar, Naomie Salim, Albaraa Abuobieda and Ameer Tawfik. Automatic Multi Document
Summarization Using Voting Technique 27
Yousra Gad and Bazara Barry. Developing a Security Model to Protect Websites from Cross-site
Scripting Attacks 27
Ali Ahmed, Ammar Ahmed Eltaeb Elhadi, Hamza Awad Elkarim Hamza Ibrahim and Naser Elmisbah.
Feature Selection and Similarity Coefficient Based Method for Email Spam Filtering 27
Nahid Ahmed Ali. Verifying Abstract Data Types: A Hybrid Approach 27
Ahmed Osman and Naomie Salim. An Improved Semantic Plagiarism Detection Scheme Based on Chi-
squared Automatic Interaction Detection 28
Mohamed Yousif and Sami Sharif. Sudan HF Model based on University of Khartoum Ionospheric Shells
and their Mathematical Derivations 28
Mosharrof Hussain Masud, Suhaimi Abd Latif, Farhat Anwar and Md Khorshed Alam. An Analysis of
Resource Sharing Scheme in Heterogeneous Wireless Campus Network 28
Lubna Gabralla, Rania Jammazi and Ajith Abraham. Oil Price Prediction Using Ensemble Machine
Learning 29
Mohamed Firdhous, Osman Ghazali and Suhaidi Hassan. Cloud Computing for Rural ICT Development:
Opportunities and Challenges 29
Sulafa Khaled Talha and Bazara I. A. Barry. Evaluating the Impact of AES Encryption Algorithm on
Voice over Internet Protocol (VoIP) Systems 29
Isam Basheir, Adil Khidir and Hanan Adlan. Neural Networks Forecasting Architectures for Rainfall in
the rain-fed Sectors in Sudan 30
Aisha Hamid. Upgrading Distributed Agile Development 30
Amira Kamil Ibrahim and Ajith Abraham. Modeling Consumer Loan Default Prediction Using Ensemble
Neural Networks 30
Electronics Engineering 31
Ama Eltahir and Rashid Saeed. An Enhanced HWMP (E-HWMP) Protocol for Multihop Vehicular
Communications 31
Sameir Ali Hamed, Abdulwaheed Musa and Saad Bashir. Near-Fields of an Array of Circular-Loop
Antennas 31
![Page 22: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/22.jpg)
ICCEEE 2013
xxi
Moutaman Mirghani Daffalla. Adaptive Multifunction Filter for Radar Signal Processing 31
Moutaman Mirghani. Design and Analysis of Low Baudrate Modem Using Microcontrollers 32
Alaa A. Yassin and Rashid A. Saeed. Reconfigurable Dual Band Antenna for 2.4 and3.5GHz using Single
PIN Diode 32
Nihad A. A. Elhag, Isam M. Osman, Alaa A. Yassin and Tsneem B. Ahmed. Angle of arrival estimation
in smart antenna by using MUSIC method for wideband wireless communications 33
Jacqueline J.George and Nada Mustafa Adalla. Adaptive Joint Call Admission Control to Support QoS in
Heterogeneous 4G Wireless Networks 33
Ashraf Osman, Amin Nabi and Ismail El-Azhary. The Potential of Establishing Computer_Aided_Design
(CAD) Industry in Africa – Sudan Case-Study 33
Adel Gaafar. Energy Aware Routing Protocol for Low Energy Sensor 34
Mohamed Omara. Efficient Design of Dual Digital Up Converter for WCDMA and CDMA2000 Using
System Generator 34
Abeer Abdalla Zakaria and Rashid A. Saeed. A Review in Interference Analysis and Management
between Hierarchical and Flat Architectures Communications 34
Mohammed Elnour and Waleed Kannan. PID and Fuzzy Logic in Temperature Control System 35
Omnia Ahmed, Rashid A.Saeed and Mohammed Kamrul Hasan. Lightweight Inter-cluster
Synchronization Scheme for Femtocell Network 35
Sameir Ali Hamed and Saad Bashir. New Fields Expressions of a Traveling Wave Circular Loop Antenna 35
Suliman Abdalla, Amin Babiker and Farouq Habbani. Mechanism for Charge Sharing Suppression in
Single Photon Processing Pixel Array 36
Khalid Bilal, Ibrahim Khider and Amin Abdelnabi. Performance Evaluation of DS-WCDMA 36
Sami Salih, Mamoun Suliman, Abbas Mohamed and Ali Al-Refai. Implementation of Adaptive
Modulation for Broadband Wireless Access Networks using Cognitive Radio Approaches 36
Sami Salih, Mamoun Suliman and Abbas Mohamed. A Novel Spectrum Sensing Scheduler Algorithm for
Cognitive Radio Networks 36
Mohammed Nabri, Ahmed Hassan and Tasneem Mahmoud. Designing Low Cost Digital Dose Reminder
System 37
Siddig Gomha, Abdel Aziz T. Shalaby and El-Sayed M. El-Rabaie. Optimizing the Performance of
Branch-line Couplers Using Open Ended Stubs 37
Abdelmuizz Adam and Rashid A Saeed. Multicasting in Network Mobility using Multicast Anchor Agent 37
Nahid Osman, Gamar Mansour, Nodar Khalifa, Karlo Kuacgor Mathang and Alwaleed Adllan. Abinitio
Method Study of Ionic Conductor CaF2 38
Ahmed Yassin, Elhussein Abd Elmageed, Mazin Hamad and Mahmoud Osman. The Unscented Kalman
Filter Applied to Satellite Orbit Determination 38
Md. Rafiqul Islam, Md. Soyaeb Hasan and Apurba Kumar Saha. Mathematical Modeling of Growth
Conditions and Interpretation of Phase Diagram for InxGa1-xN Epitaxial Layer 38
Abdelkareem Bedri and William Harwin. Enhancing Haptic Representation for 2D Objects 38
Haitham Shabour, Moutaman Mirghani and Omer Sharif. Performance Enhancement of the CAN
Protocol Using Reed-Solomon Codes 39
Abubakr Eltayeb, Halla Almubarak and Tahani Attia. A GPS Based Traffic Light Pre-emption Control
System for Emergency Vehicles 39
Mohammad Rubaiyat Hasan, Muhammad Ibn Ibrahimy and S.M.A. Motakabber. Performance Analysis
of Different Techniques for Brain Computer Interfacing 39
S. M. A. Motakabber, Muhammad Ibn Ibrahimy and A. H. M. Zahirul. Development of a Position
Detection Technique for Chipless RFID Tagged Object 40
![Page 23: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/23.jpg)
ICCEEE 2013
xxii
Electrical Engineering 41
Khalid Hag El Amin and Mirghani Fath Elrahman. On the Steady-State Error Covariance Matrix of
Kalman Filtering with Intermittent Observations in the Presence of Correlated Noises at the Same Time 41
Dryan Marende. Optimization of Nuclear Energy Generation 41
Zakieldeen Elhassan, Li Yang and Tang Yi. A novel control method of grid connected doubly fed
induction generator under variable wind speed 42
Ibrahim Elamin, Abdullah Al-Elyani and Abdelrahman Shuaib. Power Quality Indices: A Saudi Steel
Mills Case Study 42
Ali Ahmed Adam. Accurate Modeling of PMSM for Differential Mode current and Differential Torque
Calculation 43
Auday Mohamad and Ali Ibrahim. Driving a Novel Phasors Formula for a Digital MHO Relay Algorithm
for High Voltage Transmission Line Based on Neural Networks 43
Mohamed Khalifa, Abubakr Abdelhafiz and Azzedine Zerguine. Sparse Channel Estimation Using
Adaptive Filtering and Compressed Sampling 43
Mariana M Mounir, Aya E Hamid and Abdelrahman A Karrar. Development of Lightning Risk
Assessment Software in Accordance with IEC 62305-2 44
Mohammad Kamrul Hasan, Ahmad Fadzil Ismail, Aisha Hassan Abdallah Hashim, Khaizuran Abdullah,
Rashid Saeed, Huda Adiba Moh Ramli and Shayla Islam. Inter-cell Interference Coordination in LTE-A
HetNets: A Survey on self organizing approaches 44
Hazir Farouk Abdelraheem, Andrew Lang and Mohammed Elhadi Ahmed Elsayed. Jatropha Curcas: A
Viable Alternative Source of Clean Energy to Meet Sudan’s Growing Energy Demand 45
Shayla Islam, Aisha Hassan Abdalla Hashim Hashim, Mohamed Hadi Habaebi Habaebi, M.K. Hasan
Hasan, Suhaimi Latif and Rashid Saeed. Multihoming Based Mobility Management Scheme in NEMO: A
Qualitative and Quantitative Analysis 45
Haruna Musa, Binta Usman and Sanusi Sani Adamu. Improvement of Voltage Stability Index Using
Distributed Generation for Northern Nigeria Sub-Transmission Region 46
Hassan Hamdoun, Solomon Mangeni and Yogesh Dwivedi. Insights into Sustainable Energy-Capacity
Trends towards Bridging the Digital Divide 46
Shashank Srivastava and Nitin Singh. Compensation Technique and Power Quality Improvement in
Multiphase Distribution System 46
Abdulwaheed Musa, Saad Bashir and Sameir Ali Hamed. Analysis of Aerodynamic Torques Affecting
Dust Particle Orientation as Input to Microwave Cross Polarization 46
Dalia Eltigani, Kamal Ramadan and Elfadil Zakaria. Implementation of Transient Stability Assessment
using Artificial Neural Networks 47
Elfadil Zakaria, Kamal Ramadan and Dalia Eltigani. Method of Computing Maximum Loadability Using
Continuation Power Flow: Case Study Sudan National Grid 47
Kamal Ramadan, Elfadil Zakaria and Dalia Eltigani. Prepaid Energy Meter Network via Power System
Communication 48
Moaaz Mahdi, Khaizuran Abdullah and Mohammad Umar Siddiqi. Impulsive Noise Mitigation in Haar
DWT Based OFDM Systems 48
Kauther Mahdi, Sami Sharif and Ahmed Ashur. Enhancement of Hardware Modular Multiplier Radix-4
Algorithm for Fast RSA Cryptosystem 48
Sara Elagib and Nada Osman. Design and implementation of Dual axis solar tracker based on solar maps 49
Biomedical Engineering 50
Yousif Elhadi Elsideeg Ahmed, Basem Ahmed M. Hassan, Salim Omer Abdallah Alzubaidi, Yassin
Mahmod M. Ibraheem and Mustafa G. Hadi Khamisi. Design and Test of a USB/Bluetooth/IP Self-
adaptive Connector for Sensor Network Application 50
Soha Yousuf and Sahar Mohammed. A Parallel Computer System for the Detection and Classification of
Breast Masses 50
![Page 24: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/24.jpg)
ICCEEE 2013
xxiii
Ola Abdalsalam, Al-Khanssa Osman, Roua Abd-Alhadi and Saad Alshmaa. Design of Non-Invasive
Glucose Measuring Device 50
Walaa Ahmed, Ahmed Osman, Yusra Ibrahim and Magdi B. M. Amien. MRI Brain Image Classification
Using Neural Networks 51
Sulieman M. S. Zobly and Yasir M. Kadah. Multiple Measurements Vectors Compressed Sensing for
Doppler Ultrasound Signal Reconstruction 51
Thowiba Sabeel, Fauzan Che Harun and Solima Sabeel. Detection of Volatile Compounds In Urine Using
An Electronic Nose Instrument 51
Jacqueline J.George and Eman Mohammed Saeed Mohammed. Heart Disease Diagnostic Graphical
User Interface Using Fractal Dimension 52
Alia M. A. Siddig, Razaz Kh. Yousif and Muhanned Al Anwer Awaad. Motion Estimation in Ultrasound
Image Using Dynamic Multi-Shape Search 52
Muhanned Al Anwer Awaad, Razaz Kh . Yousif and Alia M. A. Siddig. Detecting and Tracking ASD
using New Block Flow in Ultrasound 53
Tasneem Mahmoud and Omer Elfarouk Hamed. Discrimination of Four Classes in Brain-Computer
Interface Based on Motor Imagery 53
Safa Abdalziz, Shahd Tariq, Haifa Basher and Fragoon Ahmed. Measurement of Weight Distribution in
the Foot 54
Suliman Abdalla, Maha Abdelaziz and Amin Babiker. Architecture and Circuit Design Balance between
Integrated and Photon counting mode for X-Ray Pixel Array Detector Read-out Electronics 54
Amal Elawad, Braa Hagadam, Rabah Hamed and Eltaher Hussein. Design and Implementation of Robotic
System to Transport Disabled People 54
Mawia Hassan, Shaza Gaib Alla, Ilaf Sarour and Mohammed Alfadny. Design of Digital Apodization
Technique for Medical Ultrasound Imaging 55
Nada Osman. Comparison between Gold Nanoparticles and Conductive Polymer Nanoparticles Used in
Photothermal Therapy 55
Alwaleed Abdelrahman and Omer Hamid. Evaluation of linear filter kernel developed from Ultrasound
phantom image 55
Alwaleed Abdelrahman, Hassan Yasser, Maram Mahir and Fatma Mohammed. Human Skin Color
Recognition (identification): A case study 56
Mechatronics Engineering 57
Gehad Hamdan, Saad Suliman and Al Khawad Elfaki. Carbon Nanotubes: Challenges and Opportunities 57
Zeinab Mahmoud Omer Yousif and Mergani Fathalrahman. Neuro-Fuzzy Inference System based
Controller in 6 DoF in Puma 560 57
Khalid Elhussein and Mohammed Elobaid. Smart Phones as System Integration Development Tools
(Android SCL Simulation Environment as Prototype) 57
Ammar Atia, Moayad Mamoon Ibrahim, Omer Abd Algbar Mohamed and Musaab Hassan. Modeling of
Electrostatically Actuated Temperature Sensor 58
![Page 25: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/25.jpg)
ICCEEE 2013
1
Keynote Speakers
Prof. Narayan C. Debnath
Winona State University, Winona, USA
President
International Society for Computers and Their Applications (ISCA)
Dr. Narayan C. Debnath has been a Full Professor of Computer Science since 1989 and currently the Chairman
of Computer Science at Winona State University, Minnesota, USA. He is also serving as the President of the
International Society for Computers and Their Applications (ISCA). Dr. Debnath is a recipient of a Doctorate
degree in Computer Science and a Doctorate degree in Applied Physics (Electrical Engineering). In the past, he
served as the President, Vice President, and Conference Coordinator of the International Society for Computers
and Their Applications (ISCA), and has been a member of the ISCA Board of Directors since 2001. He served
as the Acting Chairman of the Department of Computer Science at Winona State University and received
numerous Honors and Awards. During 1986-1989, Dr. Debnath was a faculty of Computer Science at the
University of Wisconsin-River Falls, USA, where he was nominated for the National Science Foundation
Presidential Young Investigator Award in 1989.
Software Engineering Models, Metrics and Tools Research - Challenges and
Opportunities
Abstract: This keynote presentation will describe recent progress in software models, metrics and tools
research, and will outline potential future research directions, challenges and new opportunities.
Software Models and Metrics, an area of Software Engineering, plays an important role in the analysis and
measurement, evaluation and testing of software, and thus allows to effectively deal with the software
management, planning and maintenance issues in order to help enhance the maintenance phase of the software
life cycle.
In software models and metrics research, attention has been directed toward reducing software cost. To this end,
researchers have attempted to find relationships between the characteristics of programs and the difficulty of
performing tasks. The objective has been to develop abstract models and measures of software complexity that
can be used for cost projection, manpower allocation, and program and programmer evaluation. In the software
engineering models and metrics literature, a number of abstract models, essentially directed graph
representations, of imperative language software have been proposed and analyzed to derive useful properties
that may help understanding computer programs and thus allow better maintainability of software.
In this keynote presentation, a family of abstract models for representing imperative language software will be
described. The basic concepts, definitions, and some applications of these graph models will be presented. These
graphs may have wide range of applications in software engineering and technology. These graphs may serve as
![Page 26: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/26.jpg)
ICCEEE 2013
2
potential tools for (a) the study interconnection or integration complexity, an area that needs serious attention,
(b) the study of compiler optimization, a topic to help compiler design and code optimization, (c) the study and
analysis of concurrent programs, an area that may be useful to study the characteristics of concurrent programs,
(d) the study and research in expression and statement complexity, an important topic in metrics research and
may help to estimate program clarity, and (e) the study of the characteristics of software involving recursion, an
area that needs to be addressed to compute the complexity of recursive programs. Once these models are defined
with a sound theoretical basis and accurately validated, the entire family of graphs may serve as potential tools
for further study and research in mathematics, computer science, software engineering, and technology.
Moreover, these software models and related concepts may potentially lead to new research directions in
software models, metrics and Tools. The models can help develop automated software tools for a number of
applications in software engineering. They can be directly used for defining new software complexity metrics
and may potentially serve as software testing tools. They can be applied and/or redefined to study other
programming language paradigms including Object Oriented programming languages, applicative programming
languages, and concurrent programming languages.
![Page 27: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/27.jpg)
ICCEEE 2013
3
Dr. H. Anthony Chan, PhD, IEEE Fellow Member
Huawei Technologies, Dallas, USA
Chair
IEEE Standard 802.21c Task Group on Single Radio Handover Optimization
H. Anthony Chan received his PhD in physics at University of Maryland, College Park in 1982 and then
continued post-doctorate research there in basic science. After joining the former AT&T Bell Labs in 1986, his
work moved to industry-oriented research in areas of interconnection, electronic packaging, reliability, and
assembly in manufacturing, and then moved again to network management, network architecture and standards
for both wireless and wireline networks. He moved to academia as professor at University of Cape Town in
2004, and moved again to industry research as he joined Huawei Technologies in Dallas in 2007.
Dr. Chan is a Fellow of IEEE, chair of IEEE Standard 802.21c Task Group on Single Radio Handover
Optimization, Vice-chair of IEEE standard 802.21 Working Group on Media Independent Handover, and a
honorary professor at The University of Hong Kong. He has authored/co-authored over 200 conference and
journal papers, a research handbook, several book chapters. He is a Distinguished Lecturer/Speaker of IEEE
Communication Society and of IEEE Reliability Society, and had delivered 40 conference tutorials and short
courses and 6 keynotes.
Distributed Mobility for Future Mobile Internet
Abstract: The cellular networks, which are currently serving 6 billion cellular phones and mobile devices
globally, have employed centralized control with different network functions arranged in a hierarchy.
Standardization of Internet mobility management in the Internet Engineering Task Force (IETF) has been
primarily in centralized mobility management including Mobile IPv6 (MIPv6) and its extensions, and the
deployments have primarily been in a centralized manner for the hierarchical cellular networks. Yet there are
already numerous variants and extensions of MIPv6 including Proxy Mobile IPv6 (PMIPv6), Hierarchical
MIPv6 (HMIPv6), and Network Mobility (NEMO), which have been developed over the years owing to the
different needs that are found afterwards. Deployment of Internet mobility mechanisms can then become
complicated, especially when interoperability with different deployments is an issue.
The Internet has employed distributed control functions and is more flattened, i.e., less hierarchical. As the
cellular networks converge with the Internet and may become more flattened, the needed mobility management
functions are expected to be distributed rather than centralized. Despite the large amount of standards work in
Internet mobility in IETF primarily with centralized mobility, the deployment in the Internet is still slow. Such a
fundamental change to distributed mobility is needed in the mobile Internet.
Mobility management with centralized mobility anchoring in existing hierarchical mobile networks is quite
prone to suboptimal routing and issues related to scalability. Centralized functions present a single point of
![Page 28: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/28.jpg)
ICCEEE 2013
4
failure, and inevitably introduce longer delays and higher signaling loads for network operations related to
mobility management. To make matters worse, there are numerous variants of Mobile IP in addition to other
protocols standardized outside the IETF, making it much more difficult to create economical and interoperable
solutions.
The existing mobility management standards in IETF, the issues of mobility management for the future mobile
Internet, the trend of the mobile Internet and the proposed distributed mobility at IETF are explained. It will
provide a fundamental understanding of broad subject of mobility management but will be presented in terms of
easily understandable concepts for a diverse audience.
![Page 29: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/29.jpg)
ICCEEE 2013
5
Dr. Fanny Klett, PhD, IEEE Fellow Member
Waltershausen, GERMANY
Director
The German Workforce Advanced Distributed Learning Partnership Laboratory
Dr. Fanny Klett assumed the Directorship of the German Workforce Advanced Distributed Learning Partnership
Laboratory, which is run in cooperation with the US Government, in 2009. Prior to this position, she has been
with leading German research institutions in principal positions. Fanny Klett is regularly invited as Visiting
Professor and Distinguished Lecturer at universities across Europe and Asia. Her research and development
interests are on advanced ICT solutions in the areas of information, data and content management with regard to
competency and job performance management, assessment, knowledge management, technology-enhanced
learning, data fusion, data mining and interoperability.
Dr. Klett actively works in standardization bodies, such as IEEE Learning Technology Standards Committee,
US Advanced Distributed Learning Initiative, and ISO, and is CEN WS-LT LTSO expert. She chaired and
served on more than 20 conference planning and program committees of UNESCO, IEEE, APSCE, etc. Fanny
Klett is associated editor of IEEE publications and serves on the peer-reviewer board of the IEEE Transactions
on Education, and the IEEE Educational Technology and Society Journal. Recently, she has been invited to join
the Advisory Board of the Knowledge Management and E-Learning International Journal. In addition, she
assists various governmental and industrial research and development funding organizations Europe-wide, and
in the US, as an expert.
Dr. Klett is IEEE Fellow. She has been actively involved in many IEEE Boards and Committees by representing
also the IEEE Region 8 (Europe, Middle East, and Africa). Fanny Klett is Member of the Sponsor Executive
Committee and Secretary of the IEEE Learning Technology Standards Committee, and Member of the Council
and the Academic Board of the European Association for Education in Electrical and Information Engineering.
Dr. Klett has published more than 80 technical and invited papers, white papers and book chapters, and has
organized numerous Special Sessions and workshops on ICT research and standardization themes at leading
international conferences worldwide.
The War for Talent - Challenges and Opportunities for ICT and Innovation
Abstract: Rising competition obliges companies to seek for innovative ways of doing business, increase
effectiveness and efficiency of work, and productivity. Information and Communication Technologies (ICT)
help business achieve these aims whereas the pressure to keep on innovation grows. However, human capital
remains a key source of innovation and competitive improvement. Thus, skills development, talent identification
and management, and learning appear to become essential business aspects of innovation and competitive
advantage. In this scenario, the higher education system appears as a viable public catalyst for a quality
improvement of processes and educational products to respond to the needs of industry, and the community. A
key difficulty here is the proper matching of academic courses and curricula with the possible career pathways
![Page 30: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/30.jpg)
ICCEEE 2013
6
for students. Current and relevant career information becomes critical in helping to determine employment
routes and support carrier paths.
It seems like a paradox that recently we have been saying that we need the right content in the right context at
the right time. Now, the War for Talent is on, and one of the main challenges refers to having the right
employees with the right qualifications at the right time. Shifting from content management to human capital
management and talent identification involves the implementation of conventional and new technologies as well
as traditional and novel approaches to learning, assessment, performance, and quality management. Against this
background, a strong linkage between academia, industry and government is required to facilitate the
implementation of standardized technological solutions, and bridge education effort, skills development and
employment outcomes. In addition, the analysis and application of competencies into ICT based human
resources management systems increasingly represents a driving force for addressing the future human
performance potential and, simultaneously, it serves as a key source of maximizing the Return-On-Investment in
people and technology in academia and business.
This talk refers to recent technology and standardization trends toward skills development, and job performance
to answer the questions that is increasingly raised in our Knowledge Economy: Are graduates prepared for
industrial and market needs? Is higher education all set to fit into the society and demographic change
requirements, and can it deliver individuals ready for the market needs? How can ICT intertwine education
strategies and workforce performance? How can ICT deliver advanced technological solutions and facilitate
novel methodical approaches toward human capital management in terms of career development, assessment
and recruitment as a driver for innovation and sustainable competitive advantage for academia and business in
the changing conditions of the global employment market, and the War for Talent?
Finally, the talk reflects also the demand for quality education, promotion and recognition of education and
training products that goes together with the need for quality management standards and a holistic approach to
the management of education, competency, skills and assessment data. ICT based solutions toward mapping of
competency data, exchange of competency definitions and related standards help to leverage this central issue of
human capital management.
![Page 31: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/31.jpg)
ICCEEE 2013
7
Tutorial/Industry Workshops
Introduction to Power Quality
Professor Ibrahim El-Amin
Department of Electrical Engineering, the King Fahd University of Petroleum and Mineral
Abstract: One of the most essential requirements of continuous process industry is quality of power. On the
other hand, it is almost impossible to get power without any disturbance. It is necessary to define some of the
important terms to distinguish voltage sag/dip from similar terms used for power disturbances. The IEEE
defines power quality indicator which applies in most of the cases, however this studies are done for plants
having 1 second bus transfer scheme. Therefore definitions are slightly modified as under to suit the protection
scheme and override circuits. The tutorial provides an overview of the problems of power quality and its impact
on the industry and the power systems. Participants will be exposed to the sources of power quality problem,
international standards, and power quality indices. Monitoring and mitigation methods will also be discussed.
Internet Diffusion, Associated Energy Consumption and Web Literacy
Dr. Hassan Hamdoun,
Systems and Process Engineering Centre, College of Engineering, Swansea University, Singleton Park,
Abstract: An interactive tutorial of internet diffusion and web literacy in developing countries and giving
insights into the Open System Interconnection (OSI) networking model emphasizing the increasing research
interests in cross layer approaches and the need to reduce internet energy consumption . Participants will be
exposed to internet diffusion in developing countries, internet energy consumption , energy evaluation metrics
and models and the trends for the internet of things. One Initiative to improve internet diffusion and web literacy
in rural communities, the Mobile Internet Island (MII), will be given as an example.
PKI Technology: The Security Infrastructure for Sudan's E-Government
Professor Mustafa Nawari, Eng. Yousif Hussin, Eng. Hind Mohamed
Abstract: Cryptography, the black-art of hiding information, is the basis of securing the world of ICT today. It's
the science that enables our critical data-communication systems, including global financial systems, and
communication intelligence. PKI (Public Key Infrastructure) utilizes the concepts of Cryptography to provide
optimal security to make the Internet work as a trusted platform.
This session will briefly introduce the underlying concepts of PKI, and envision how the science of
Cryptography could change and integrate into our daily lives.
![Page 32: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/32.jpg)
ICCEEE 2013
8
In addition to that, this session will introduce the current progress of Sudan's national PKI project, in terms of
the pillars of the technology Software, Hardware and Policies, and how it can help to support the economy and
fight against corruption in government-to-citizen services through electronic means.
![Page 33: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/33.jpg)
ICCEEE 2013
9
ICCEEE’13 Papers
Computing
Tariq Al-Ahdal and Saida Mohammad. Performance of Standardized Routing Protocols in ad-hoc
Networks
Abstract: Mobile ad-hoc network (MANET) is a collection of mobile nodes that form dynamic and temporary
networks. The wireless links in this network are highly error prone and can go down frequently due to mobility
of nodes, interference, and less infrastructure. One of the challenges in the study of MANET routing protocols is
the dynamically changing topology. Hence, they establish an efficient communication path between the source
and destination nodes with minimum routing overhead and bandwidth consumption. The design problem of
such routing protocol is not straightforward since MANET environment introduces new challenges that are not
present in fixed networks. In this paper, we study and compare the performance of the following routing
protocols AODV, DSR, DSDV, RAODV, AOMDV, and TORA. Network Simulator (NS) version 2.34 is used
to study the relative performance of the routing protocols varying network traffic load and pause time. The
results show that AOMDV has better performance than RAODV and AODV in terms of average end-to-end
delay.
Muhammad Salim Javed, Ahmad Kamil Bin Mahmood and Suziah Bt. Sulaiman. Benefit Cost Analysis in
Appraisal and Planning Projects of Higher Learning Institutions
Abstract: Benefit Cost Analysis is a technique used for assessing the impacts of proposed actions in a project
planning process. Under available resource constraints, accurate Benefit Cost Analysis provides a better
economic choice among the projects. The main objective of the study is to address issues of Benefit Cost
Analysis in project planning processes. A case study of the higher learning institution project of Pakistan is
carried out wherein application and implications of Benefit Cost Analysis upon the project are evaluated and
discussed. This study highlighted the significance of the correct estimation of benefits and costs in project
appraisal and planning. For a more comprehensive appraisal and realistic outcomes, consideration should be
given to the determination of accurate benefits and costs of a project
Othman O. Khalifa. Human Posture Recognition and Classification
Abstract: Human posture recognition is gaining increasing attention in the field of computer vision due to its
promising applications in the areas of personal health care, environmental awareness, human-computer-
interaction and surveillance systems. Human posture recognition in video sequences is a challenging task which
is part of the more general problem of video sequence interpretation. This paper presents a novel an intelligent
human posture recognition system for video surveillance using a single static camera. The training and testing
were performed using four different classifiers. The recognition rates (accuracies) of those classifiers were then
compared and results indicate that MLP gives the highest recognition rate. Moreover, results show that
supervised learning classifiers tend to perform better than unsupervised classifiers for the case of human posture
recognition. Furthermore, for each individual classifier, the recognition rate has been found to be proportional to
![Page 34: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/34.jpg)
ICCEEE 2013
10
the number of postures trained and evaluated. Performance comparisons between the proposed systems and
existing systems were also carried out.
Ahmed Abdelrahaman and Ahmed Abdallah. K-Nearest Neighbor classifier for Signature Verification
System
Abstract: The paper presents an off-line signature verification system using k-NN classifier. Global features
from the signatures are extracted using Radon Transform. For each registered user in the system database a
number of reference signatures are enrolled and aligned for statistics information extraction about his signature.
Extreme points warping algorithm is used to align two signatures. During the k-NN classifier training, a number
of genuine and forged signatures are chosen. A test signature’s verification is established by first aligning it with
each reference signature for the claimed user. The signature is then classified as genuine or forgery, according to
the alignment scores which are normalized by reference statistics, using standard pattern classification
techniques. Using a database of 2250 signatures (genuine signatures and skilled forgeries) from 75 writers in the
proposed signature verification system, a performance of approximately 80% is achieved.
Auday Mohamad and Mohammed Osman. Adaptive Median Filter Background Subtraction Technique
Using Fuzzy Logic
Abstract: This paper is based on the median filter algorithm that is considered one of the most commonly used
algorithms in the field of background subtraction. In order to make the median filter algorithm adaptive with
sudden change in surrounding circumstances a fuzzy logic inference system has been developed to make the
parameters of Median Filter algorithm adaptive to the changes of sudden circumstances that surrounding the
moving object to detach it from the background. Experimental results demonstrate that the fuzzy inference
system is very efficient and robust.
Samah M. H. Alwahbani and Eihab B. M. Bashier. Speech Scrambling Based on Chaotic Maps and One
Time Pad
Abstract: Due to the rapid development in digital communications and networking technologies in the past two
decades, speech communications have become essential in several applications such as voice over IP, voice
conferencing, military and phone banking. But, such applications encounter many security threats such as the
unauthorized listening and illegal usage over networks. Therefore, it has become necessary to protect sensitive
speech signals from such a threat. Speech scrambling is a well known technique for the encryption of speech
streams that is used to scramble clear speech signals to unintelligible signals. Many researchers have proposed
methods to scramble speech streams, based on chaotic maps which have been successfully used for speech
scrambling, due to their good properties such as randomness, sensitivity to changes in initial conditions and
system parameters and aperiodicity. This paper uses two chaotic maps, circle map and logistic map for speech
confusion and diffusion, respectively. In the confusion stage, speech samples are divided into small segments.
Then, indices of ordered generated sequence of circle map are used to shuffle the positions of the speech signal
segments. Then, a one-time pad generated by the logistic map is used for the diffusion stage. Furthermore,
feedbacks are used to make the decryption of any speech sample depends on all the previous samples and the
output of the logistic map. Several experimental results on speech scrambling and descrambling, key space, key
![Page 35: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/35.jpg)
ICCEEE 2013
11
sensitivity tests, chosen/known plain text attack, statistical analysis and time analysis show that the proposed
method for speech scrambling performs efficiently and can be applied for secure real time speech
communications.
Abdelrahman Altigani and Bazara Barry. A Hybrid Approach to Secure Transmitted Messages Using
Advanced Encryption Standard (AES) and Word Shift Coding Protocol
Abstract: The key idea behind this study is to propose a new approach that provides an additional layer of
protection to transmitted messages over a communication network. The approach combines the well known
symmetric encryption algorithm (AES) and the steganography protocol Word Shift Coding Protocol. The AES
is used to equip the “secret” data with initial confidentiality layer; then the encrypted data is represented in
binary, and hidden in a textual carrier. As will be discussed in the paper, the resulting model has a far better
impact on the confidentiality of the transmitted message and overall computational security of the system.
Abdelmoniem Idris, Abdelraheem Satti, Ahmed Imam and Moutaman Mirghani. Development of
Computer Aided Tools for UAV Flight Control
Abstract: Proper design of the flight controller of an unconventional Unmanned Aerial Vehicle (UAV) requires
highly stable performance, as well as reliable Computer Aided Tools (CAT). Such tools provide simulation
process that is based on classical control design. This paper describes development of flight control design and
simulation process, which can be applied to vehicles of wide range classes. The design process is based on
single input – single output (SISO) flight dynamics modeling and simulation using Matlab/Simulink, Visual C#
dot Net and Microsoft flight simulator on a local area network (LAN) environment. The proposed tool provides
solution of flight dynamics that can be used by designers of parameterized vehicle UAV models and offers
efficient simulation mean for specific use cases. SK1 flight simulator (SAHIL) is intended to be used for tuning
of the controller parameters in linear flight control. Thereby, it gives requirements for controller, simulation and
analysis as computational design criteria. It facilitates successful testing of the design via simulation process to
achieve high performance UAV. The use of flight simulation tools greatly reduces the risk as well as the
required amount of flight tests, particularly in complex and dense aerospace situation, which is a well-
recognized benefit of such approaches.
Amani Alnimir and Hisham Abushama. Popular Agile Approaches in Software Development: Review and
Analysis
Abstract: The selection of a software development methodology is vital activity in any software project. It has a
great impact on customer satisfaction and business welfare. Normally the selection is based on experience or in
some cases a rational. In third world countries and especially in Sudan, where this research is conducted, the
choice of a software methodology is always a struggle in software companies. Probably is because most of these
companies are whether are start-up or have humble resources such as small to medium enterprises (SMEs).
Currently the government of Sudan (main buyer of local software products) pushing the software industry to
produce quality products and to reduce risks of buying software products from foreign companies, therefore
quality products is real concern for these companies. Usually, start-up or SMEs software companies seeking for
rapid and agile way of development accompanied with plug & play engineering practices. Agile software
![Page 36: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/36.jpg)
ICCEEE 2013
12
development methodologies become lately the way forward quality assurance. Since the last decade, agile
methods increase popularity and usage among software industries. These methods came to tackles requirement
changes quickly, satisfy customers, support interaction, communication and produce high quality products.
There are a lot of debates in the literature about agile methods especially on the most newest and used ones.
However, academic research on the subject still limited as most of existing literature are written either by
practitioners or consultants. The aim of this paper is to begin filling this gap by systematically reviewing the
existing literature on the most popular agile software development methodologies. This paper has three
purposes: first, it proposes a definition and a classification of agile software development methods. Second it
analyses the most popular agile methods against the defined criteria. Third, it compares these methods and
highlights their similarities and differences. Based on this analysis, future research needs are identified and
discussed.
Mustafa Nawari and Asma Abdalrahman. Crossing Over Under the Root CA
Abstract: National level Public key infrastructure had faced a set of challenges, one of this is to make decision
about which is most appropriate TRUST MODEL to be adopted in Sudan and CAs Interoperability, and This is
due to the complexity of the government departments and their continuous changes and restructuring. Also the
relative expected traffic between these departments represents another challenge. For example, the Banking
system have most of their traffic is between banks. This paper considers these challenges and a solution is
proposed to make Interoperability smooth and robust
Abdelhaliem Abbas. Binary LU Encryption
Abstract: In this paper we introduce an encryption scheme using binary matrices as an encryption/decryption
keys. The scheme can be viewed as a binary version of the classical Hill Cipher with new method for generating
a random key-matrix and its inverse simultaneously using LU factorization method. We suggest a solution to the
known plain-text attack, which is the main weakness in the classical Hill Cipher. We used bitwise operations in
matrix multiplications, and the speed is comparable to AES.
Rasheed Zayid and Mehmet Fatih Akay. Reliable Attributes Selection Technique for Predicting the
Performance Measures of a DSM Multiprocessor Architecture
Abstract: In this study we develop a model for predicting the performance measures of a distributed shared
memory (DSM) multiprocessor architecture by using a reliable attribute selection method. The structure of a
DSM platform is interconnected by the Simultaneous Optical Multiprocessor Exchange Bus (SOME-Bus),
which is a low latency high bandwidth fiber-optic interconnection network. OPNET Modeler is used to simulate
the SOME-Bus multiprocessor architecture and to create the datasets. The input variables of the prediction
model include the ratio service time over packet transfer time (varies from 0.01 to 1), traffic patterns (uniform,
hot region, bit reverse and perfect shuffle), DSM protocol type, node number (varies to 16, 32and 64), thread
number (varies from 1 to 6). The attribute selection method examined using different machine learning tools.
These tools include: multilayer feed forward artificial neural network (FFANNs), support vector regression with
radial basis function (SVR-RBF) and multiple linear regression (MLR). Cross validation (CV) technique is
applied using 10 folds. The model predicts and benchmarks the outputs averages of: channel waiting time
![Page 37: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/37.jpg)
ICCEEE 2013
13
(CWT), channel utilization (CU), network response time (NRT), input waiting time (IWT) and processor
utilization (PU) on small numbers of processors nodes. The results show that FFANN-based model gives the
best results (i.e. SEE=11.1 and R = 0.998587 for CWT; SEE=18.96 and R = 0.997 for NRT; SEE=60.46 and
R=0.8638 for IWT; SEE=0.04795 and R = 0.9838 for PU; SEE=0.0348 and R=0.9990 for CU). Results of the
constructed new selected subset are compared with the original feature space and the findings prove the
accuracy and reliability of the model. It is concluded that FFANN models shortens the time quite a bit for
obtaining the performance measures of a DSM multiprocessor and can be used as an effective tool for this
purpose.
Mahmoud Musa and Muna Ahmed. A Multi-Layer of Multi Factors Authentication Model for Online
Banking Services
Abstract: The security risks of Internet banking have always been a concern to the service providers and users.
There has been a global trend to adopt authentication scheme to increase the security of Internet banking. There
is an unlimited range of variations of how a user can be authenticated to an internet web application with
different standards used in different countries. In this work, user authentication methods being used in various
online environments are analyzed. Moreover, the study covered the internet banking, electronic transactions and
financial services, to identify the characteristics and issues of such authentication methods in order to present a
user authentication level system model suitable for different online services. A new model of Internet banking
services authentication is introduced where Multi factor authentication methods are integrated with multi layer
authentication techniques in order to produce a standard layered multi factor authentication model suitable for
different internet banking services based on risk assessment criteria. The produced model consist of 5 level in
which each level contain a one or combination of authentication factors such as knowledge based, possession-
based or Biometric-based factors. The model then enhanced by adding control information factors, specifically
for levels (4, 5), in order to support layering needs. The proposed standard model tested using higher-amount
transaction schemes and it shows improvement and fulfillment of authentication and secure internet banking
services needs.
Abdelrasoul Yahya. Specifying Abstract Data Types: A Behavioral Model, an Axiomatic Representation
Abstract: Several decades after the emergence of software engineering as an engineering discipline, one of the
most enduring problems dogging this discipline remains the issue of specifying the requirements of a software
product in a complete, consistent, and minimal manner. Not only is the problem technically challenging, in light
of the size and complexity of today’s software products, but it also involves very high costs, due to the fact that
an error in the requirements phase can have a negative impact on all subsequent phases. In this paper, we present
a specification model for abstract data types, and discuss its properties as well as plans for its automation.
Mohamed M. K. Elhaj, Mamoun M. A. Suliman and Dr. Hussam Hamrawi. A Multi-Layer Network
Defense System Using Artificial Immune System
Abstract: Artificial immune systems are computational intelligent systems inspired by human biological
immune systems. The biological immune system can detect and defend the human body against different kinds
of intruders. These systems are distributed, adaptive and multilayered in nature, and the proposed artificial
![Page 38: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/38.jpg)
ICCEEE 2013
14
immune system incorporates these powerful and diverse set of characteristics in designing a network security
system. Recent advances in biological immune systems showed that the innate part of the system plays a greater
role than previously thought. In this paper, this recent development is the corner stone of the new multi-layer
model of artificial immune systems. We describe a work in progress to construct a multilayered defense system
composed of two main layers, innate and adaptive layers. This paper describes the multi-layered system layers
and components, gives a detailed justification and design considerations of the system components, and shows
first results from the innate layer of the system. The preliminary results show that about 70% of the traffic can
be dealt with before entering the adaptive layer of the immune system.
Amira Kamil Ibrahim and Ajith Abraham. Modeling Customer Relationship Management Using Data
Mining
Abstract: In this paper a loan default prediction model was constricted using two attribute detection functions,
resulting in two data-sets with reduced attributes and the original data-set. A supervised two-layer feed-forward
network, with sigmoid hidden neurons and output neurons is used to produce the prediction model. Back
propagation learning algorithm was used for the network. Furthermore three different training algorithms were
used to train the neural networks. The neural networks are trained using real world credit application cases from
the German bank datasets which has 1000 cases; each case with 24 numerical attributes; upon which the
decision is based. The aim of this paper was to compare between the resulting models produced from using
different training algorithms, scaled conjugate gradient backpropagation, Levenberg-Marquardt algorithm and
One-step secant backpropagation (SCG, LM and OSS). This study show that although there is no great
difference between LM and SCG but still LM gives better results. The attribute reduction function used helped
to produced models quickly and more accurately.
Albaraa Abuobieda, Naomie Salim, Mohammed Salem Binwahlan and Ahmed H. Osman. Differential
Evolution Cluster-based Text Summarization Methods
Abstract: In this paper, three similarity measures; Normalized Google Distance (NGD), Jaccard and Cosine
Similarity measure were employed and tested for textual based clustering problem. A robust evolutionary
algorithm called a Differential Evolution algorithm was also used to optimize the data clustering process and
increase the quality of the generated text summaries. The Recall Oriented Under Gisting Evaluation (ROUGE)
was used as an evaluation measure toolkit to assess the quality of the summaries. Experimental results showed
that all of our proposed methods are better than the benchmark methods. More importantly, a Jaccard-similarity
based method outperformed the other two proposed methods, namely, NGD and Cosine similarity measures.
Muna Elsadig Mohamed Ahmed Elsheik. Hybrid Conceptual Framework for Artificial Immune System
Abstract: Artificial immune system (AIS) has been used to solve many problems in different domains. In 1986,
the combination of immune system and machine learning was first introduced by the researchers, who initiated
the field of artificial immune system. Since then, AIS has been built for a wide range of applications with
successful implementation; they include data mining, neural network, fraud detection, document classification,
and intrusion detection and prevention systems. Frameworks for artificial immune system are presented by
Susan Stepeny et al in 2004 and 2005. The authors have suggested that bio inspired algorithms to be built and
![Page 39: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/39.jpg)
ICCEEE 2013
15
analyzed in the perspective of a multidisciplinary conceptual framework that presents biological models and
well-analyzed principles. Many researchers have made some great efforts to define a general AIS engineering
framework; In 2003 L.N.D. Castro and J.I. Timmis presented a general framework for engineering AISs. In this
work, we have integrated conceptual frameworks of AIS with layered framework for engineering AIS to
introduce a new hybrid conceptual framework to develop AIS systems
Taqwa Ahmed, Mariam Taha and Faiza Alim. Synchronization Wireless Algorithm based on Message
Digest (SWAMD) for Mobile Database
Abstract: This research paper presents the design of a proposed synchronization wireless algorithm based on
message digest (SWAMD) as an aid to assist data synchronization between the mobile database and the server-
side database via wireless connectivity. SWAMD proposes storing images from the server-side database and the
mobile database in a message digest table in order to easily compare two images and pinpoint the rows that need
to be synchronized. It follows a user synchronization policy which happens in the case of two different images
found in the message digest tables. SWAMD makes use of standard SQL functions for the synchronization
process. It does not produce timestamps and does not make use of stored procedures nor triggers. The SWAMD
techniques are not specific to a particular database vendor. This means that it can be used to just about any
combination of mobile database and server-side database platforms.
Arafat Abdulgader, Mohamed Awad Elshaikh and Radziah Mohamed. A Study of Software Process
Improvement for Some Sudanese Organizations
Abstract: The software process improvement is initiated to achieve the quality of the software processes which
lead to quality of final software products. Software processes are improved by implementing software process
standards. These standards are often called software process improvement frameworks or standards. Software
process improvement is necessary to increase the efficiency and productivity of software companies and
enhance the final software products. However, most of the Sudanese software companies do not follow any
software process improvement standards. For this reason, normally these companies produce the software
without high quality. Furthermore, the low quality may be the cause of some problems such as unreliable
software and high maintenance. Some of the Sudanese software organizations were visited, to interview
software experts and observe how these organizations can improve their software process. Furthermore, the
results of these interviews have been used to design a questionnaire in order to show the relationship between
Sudanese software organizations and software process improvement standards. This study has identified the
problems faced by these organizations during the implementation of software process improvement standards
and shows the ability of these organizations to implement the software process improvement standards.
Moreover, this work can be used as a first step towards to produce software process improvement standard for
the Sudanese software industry.
Abeer Eldewahi and Eihab Bashier. Authenticated Key Agreement protocol for Virtual Private Network
based on Certicateless Cryptography
Abstract: Virtual Private Networks have been efficient tools that provide inter-connectivity to exchange
information between different (remote) parties that belong to a specific network. A virtual private network
![Page 40: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/40.jpg)
ICCEEE 2013
16
possesses all the features of the private networks and are built upon existing network, but they suffer severe
security problems, particularly, the authentication problem. In this paper we propose a new model for the VPN
based on certificateless cryptography to authenticate users and establish a secure session between them. The
new model solves the PKI problems of the certificates management in the VPNs.
Nisreen Beshir Osman and Izzedin Mohammed Osman. A Validated Model for the Quality in Use of
Mobile Government Systems
Abstract: Mobile government systems have become a very important channel of government services delivery
to citizens, business, and other governmental organizations. However, the Quality in Use (QiU) of mobile
systems is one of the challenges that face the usage of these systems to the maximum potential. This paper
presents a proposed model for determining the QiU of mobile government systems. The model uses Usability,
user Acceptance to mobile systems, and User experience with the system as the attributes that determine the
QiU of these systems. The model was validated based on the objective and subjective measures of the attributes.
The data was collected from 75 subjects participated in experiments by performing 4 representative tasks on a
high fidelity prototype for a Mobile Civil Registry System. The results of the analysed data showed that
Usability of the MCRS is related significantly to the Acceptance to use the system. The results also showed that
User experience with the system was affected by the Usability and the Acceptance constructs. The results of the
study clearly point out the important roles of QiU of mobile information systems and that designers of such
systems need to focus the Usability, user Acceptance and User experience with the system in order to improve
the QiU of mobile system.
Nahla Murtada. Measuring the Cybersecurity of Cloud Computing
Abstract: After the era of mainframe computing (from the nineteen fifties to the nineteen seventies), and the era
of personal computing (from the nineteen eighties to the first decade of this millennium), we are now witnessing
the emergence of the era of could computing (starting from the second decade of this millennium). In the era of
cloud computing, end users of computing resources subscribe to service providers, and pay for services on the
basis of their level of use. This means that large numbers of users share computing and storage resources in a
context where they have little control over access privileges. This raises massive security concerns, which must
be addressed in order for the cloud computing paradigm to fulfill all its potential and deliver all its promise. In
this paper, we discuss an economic based measure of cyber security, and explore how it can be used to measure
the security of the cloud, from the standpoint of the various stakeholders.
Hozeifa Adam Abd Alshafy and Mohamed Alhafiz Mustafa. Segmentation Approach for Online Arabic
Handwriting
Abstract: This paper presents a new approach for online Arabic handwriting segmentation based on the
detection of character boundaries. The approach automatically detects the boundaries of characters within online
Arabic handwriting, thus it gives segments for the handwriting based on these boundaries. The implementation
results show a significant improvement toward the recognition of online Arabic handwriting.
![Page 41: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/41.jpg)
ICCEEE 2013
17
Abdelhamid Mansor, Wan M.N. Wan-Kadir and Toni Anwar. Policy Cycle Analysis to Avoid Policy
Conflict in Policy-based Management Systems
Abstract: A management policy evolves over time by addition, deletion and modifications of rules. Policies
authored by different administrators may be merged to form the final system management policy. These
operations cause various problems such as policy conflicts. Static and dynamic conflicts are considered as two
classes of conflict which need to be understood and independently managed. Furthermore, the distinction
between these two classed is important; as detecting and resolving of conflict can be computationally intensive,
time consuming and hence, costly. However, a dynamic conflict is quite unpredictable, in that it may, or may
not; proceed to a state of a realized conflict. In this paper we present static analyses to address the cycles cased
when there are two or more policies are enforced simultaneously. Moreover, the paper provides temporal
specification patterns to avoid each type of conflicts, and to ensure that policies are enforced correctly.
Safaa Eltyeb and Naomie Salim. Mining Lexico-syntactic Patterns to Extract Chemical Entities with their
Associated Properties
Abstract: Specific information on newly discovered compound is often difficult to be found in chemical
databases. The chemical and drug literature is very rich with the information resulted from new chemical
synthesis. This paper presents a survey on the types of information associated with chemical compounds
extracted from chemical and drug text and the approaches that have been used in the extraction process.
Thereafter, it gives a description for a novel pattern-based extraction method to be developed in the future
taking into account specific types of information associated with chemical compounds not explored before in the
automated extraction from a text. The paper focuses on the extraction of the properties that influence the
bioavailability of drug candidates’ compounds. The result of this study can help the database curators in
compiling the drug related chemical databases and the researchers to digest the huge amount of textual
information which is growing rapidly.
Othman O. Khalifa, Md Khorshed Alam and Aisha-Hassan Abdulla. An evaluation on Offline Signature
Verification using Artificial Neural Network Approach
Abstract: The signature verification is the oldest security technique to verify the identification of persons.
Recently, the signature recognition schemes are growing in the world of security technology. It offers two
different types of schemes those are offline and online method. The offline technique means to verify a
signature written on paper which is scanned to convert it into a digital image, whereas the online system
required an online device such as Tablet PC, touch screen monitor by a pressure sensitive pen to verify the
signature. In this paper discusses a review background of offline signature verification schemes which
considered as a highly secured technique to recognize the genuine person’s identity. It addresses the offline
signature verification technique using Artificial Neural Network (ANN) approach. It also explains the
fundamental characteristics of offline signature verification processes and highlights the various signature
recognition issues.
![Page 42: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/42.jpg)
ICCEEE 2013
18
Fadlelmoula Mohamed Baloul and Prince Williams. Fuzzy Academic Advising System for on Probation
Students in Colleges of Applied Sciences - Sultanate of Oman
Abstract: The aim of this paper is to investigate using the TOPSIS fuzzy model in the academic advising area
as an educational management system to advice on probation students to register appropriate number of credit
hours to minimize the risk. The most important criteria that could affect the academic advising process are
discussed. Accordingly a separate rating table of each alternative and separate weight table of each criterion are
described by linguistic terms and expressed by triangular fuzzy numbers. According to the concept of TOPSIS,
the closeness coefficients calculated to determine the best alternative that could minimize the risk by calculating
the distance to both the fuzzy positive ideal solution (FPIS) and the fuzzy negative ideal solution (FNIS) at same
time. Finally, a real case study is shown to highlight the proposed fuzzy system for ranking different alternatives
decisions in academic advising activity.
Eiman Kambal, Izzeldin Osman, Noon Mohammed, Sara Mohammed and Methag Taha. Credit Scoring
Using Data Mining Techniques
Abstract: One of the key success factors of lending organizations in general and banks in particular is the
assessment of borrower credit worthiness in advance during the credit evaluation process. Credit scoring models
have been applied by many researchers to improve the process of assessing credit worthiness by differentiating
between prospective loans on the basis of the likelihood of repayment. Thus, credit scoring is a very typical
Data Mining (DM) classification problem. Many traditional statistical and modern computational intelligence
techniques have been presented in the literature to tackle this problem. The main objective of this paper is to
describe an experiment of building suitable Credit Scoring Models (CSMs) for the Sudanese banks. Two
commonly discussed data mining classification techniques are chosen in this paper namely: Decision Tree (DT)
and Artificial Neural Networks (ANN). In addition Genetic Algorithms (GA) and Principal Component
Analysis (PCA) are also applied as feature selection techniques. In addition to a Sudanese credit dataset,
German credit dataset is also used to evaluate these techniques. The results reveal that ANN models outperform
DT models in most cases. Using GA as a feature selection is more effective than PCA technique. The highest
accuracy of German data set (80.67%) and Sudanese credit scoring models (69.74%) are achieved by a hybrid
GA-ANN model. Although DT and its hybrid models (PCA-DT, GA-DT) are outperformed by ANN and its
hybrid models (PCA-ANN, GA-ANN) in most cases, they produced interpretable loan granting decisions.
Fadlelmoula Mohamed Baloul, Mohsin Hassan Abdullah and Elsadig Ahmed Babikir. ETAOSD: Static
Dictionary-Based Transformation Method for Text Compression
Abstract: The aim of this paper is to present a new static dictionary-based algorithm for text transformation to
increase the data compression ratio when using standard compression tools. The basic idea of the new algorithm
is to define a pattern for each word in a static dictionary by replacing all or most of the characters in the words
of the dictionary by the most frequently used character in any text file. The proposed algorithm transforms any
text file into another encrypted file with a size almost same as that of the original text file but with different
statistical properties. The new transformation method has been designed, implemented and tested using a
standard data set. Generally, the output result has shown different levels of enhancements on different common
![Page 43: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/43.jpg)
ICCEEE 2013
19
standard data compression tools such as Arithmetic, Huffman, Bzip2, Gzip and WinZip. The compression
performance of all common compression tools has been enhanced especially when the patterns of the
transformed words passed through costless running length encoding (RLE) algorithm. On using Bzip2, the
resultant output files produced about 76.75% as compression ratio with 1.88 as average code length. The final
result is very promising and it could be enhanced more in case of applying dynamic dictionary-based text
transformation technique.
Rihab Eltayeb, Robert Colomb and Abdelgaffar Hamed. A Method for Mapping State Machine Behavior
Models In MDA Issues and Challenges
Abstract: Software development is a complex process and the information technology market is faced by many
challenges. Among the challenges is the effect of technology "platforms" change (languages, operating-systems,
interoperability solutions, architecture frameworks etc.). Model Driven Architecture (MDA) is a new
development method as a positive effort from the Object Management Group (OMG) to overcome software
development problems including but not limited to technology change. The philosophy of MDA regarding
technology change is the separation of concerns. In MDA, structures and behaviors based on the business
functions are abstracted and modeled in a Platform Independent Model (PIM). The implementation specific
structures and behaviors are modeled in a Platform Specific Model (PSM). The PIM is then realized into the
PSM through a mapping process to automatically generate the software. Current practice shows that MDA
approach works quite well but, in most cases, behavioral models are used for other purposes like documentation
rather than complementing the structural models to facilitate automatic software generation. This paper
examines the issues and challenges when mapping behavior models between different abstraction layers,
respectively PIM and PSM using state machine models. A general solution to one of those challenges is
discussed and outlined using a case study.
Mirghani Eltahir and Anwar Dafa-Alla. Extracting knowledge from web server logs using classification
technique
Abstract: The growth of internet is increasing rapidly and the use of websites and web based systems become
very common. main problem that faces any website admin or any web application system is data increasing per-
second, which is stored in different type and format in the server log file about users, learning about users,
expect or predict their needs in the future and maintaining structure and content of the website or web service
according to their previous data become importance. Web usage mining aims to discover useful information or
knowledge from usage data that registered in log file, based on the primary kinds of data used in the mining
process. By using one of web mining techniques, this paper used classification technique to discover knowledge
from web server logs, where all user navigation were registered and stored.
Ahmed Yousri Salama Mohammed. Semantic Web services for Nubian language
Abstract: A pilot study was conducted to test the ability of semantic web tools to design the Nubian Ontology
for Nubba civilization .An important objective of the pilot study was to investigate the capability of the tools
that help in developing semantic web services such as multilingual Dictionary and information retrieval (IR)
services to design Nubian Ontology. TobBraid composer was used as tool in this study to test if it supports
![Page 44: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/44.jpg)
ICCEEE 2013
20
Nubian letters .Also the pilot Ontology that had been designed consisted of 18 classes and 4 properties
represents the translation and pronunciation form/to Nubian ,Arabic and English languages. SKOS was used for
first time in semantic research to represent Arabic and Nubian letters .SKOS used in the developed pilot for
Nubian Ontology .The results indicate that TobBraid composer displays Nubian letter correctly and the
inference engine answers the simple and complex queries .Multilingual dictionary designed and tested with
simple query and complex query and the result was displayed correctly as plain text and as visual map.
Elmuntasir Abdullah Hag Eltom and Eltigani Bashir. Extreme Programming Applied in a Large-Scale
Distributed System
Abstract: This work shows how Extreme programming (XP) could enhance the development and
implementation of large -scale systems. A number of papers have been published in the past few years reporting
experiences with agile development and XP in particular. However information on the practical usage of XP in
large-scale systems is still considered limited. We have conducted this research to gain better understanding of
the impact of using XP process to the development effort of large-scale distributed systems while taking Sudan
Traffic Violations project as an example. It has been shown that adaptation of Extreme Programming practices
in the project has maximized the Human factor output, and helped in the generation of promising ideas
regarding complex design issues that the team used to approach the system overall conceptualization and
implementation as well as future extensions.
Yusra Osman. Segmentation Algorithm for Arabic Handwritten Text
Abstract: Segmentation is the process of dividing the binary image into useful regions according to certain
conditions. It is the most important phase in any optical character recognition (OCR) system and its accuracy
affects significantly the recognition rate of that system. In cursive nature languages such as Arabic, the
segmentation procedure is complicated especially in handwritten documents because writers’ styles differ as
well as the special cases of characters overlapping and ligatures. Hence, there is an urgent need to design and
implement segmentation algorithms using general descriptors and features that most writers follow. In this
paper, a segmentation algorithm for Arabic handwritten text is developed. The main idea of the algorithm is to
divide the selected image into lines and sub-words. Then, for each sub-word, the contour of each sub-word is
traced from a starting point. After that, the algorithm detects the exact points where the contour changes its state
from a horizontal line to another state of vertical or curved line. Finally, the coordinates of these points are
considered as the character segmentation points. The algorithm was tested using the words of IFN/ENIT
database. Over 537 tested words containing 3222 character; the algorithm achieved 89.4% of correct character
segmentation points.
Afaf Mohamed and Robert Colomb. Service Discovery using perdurant ontology
Abstract: Service discovery is a mechanism for finding services, the existing service discovery mechanisms
offer low retrieval precision and recall. The main reason of that is due to the limitations around search engines
and retrieving process. The service inventory provides a mechanism for organizing all of the services across the
enterprise. UDDI as an inventory is the main registry for publishing and finding web sevices. The current
problem with service inventories such as UDDI is the retrieval process which associated with the search engines
![Page 45: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/45.jpg)
ICCEEE 2013
21
that support only syntactic, keyword-Oriented search.Many researchers talked about that and some of them
introduce the use of semantic service discovery mechanisms to improve the quality of result. The key to
searching service inventories is to find ways to represent them in a way that can be exploited by one of the
standard methods like Google type search. In our work we introduce a review of ontolgies and mechanisms used
there. Endrant and perdurant ontologies are suggested as a new solution for enhancing the retrieving result. The
main concern is service inventories at design time by designing perdurant ontology and produce queries at run
time to specify how to access the services by using TripAdvisor website as a concreate case study.
Majda Omer and Eihab Bashir. Enhancement model for PKI certificate validation in the Mobile Banking
Abstract: The Mobile banking is a service that allows customers to do banking transactions on their mobile
phone by using many mobile device technologies like SMS, WAP, and J2ME applications. The bank
transactions, such as balance inquiry or transfer money and so on are usually contains and transmits critical
information. Therefore, such transactions are under risks to violation in confidentiality, integrity, and
authentication. The Public Key Infrastructure (PKI) system can used to provide the confidentiality, integrity, and
non-repudiation services, in particular the authentication service for mobile banking. However, the current
existent of PKI is not appropriate for mobile devices, because they have proven of suffering from resource
limitations. This paper propose enhancement model for efficient certificate validation in the PKI system, in
addition to choosing the proper public key cryptography algorithm, in regards to mutual authentication service
to be convenient with mobile banking. The model has been proposed by using two methods; firstly, the
NOVOMODO system to provide better efficiency for certificate revocation and validation. Secondly,NTRU
algorithm to generate public and private keys, data encryption/decryption, signing/verifying data and
certificates, because NTRU has better performance than other public key cryptographic algorithms, with the
same level of security. Finally, the using of the proposed solution model with mobile banking system can
support authentication service that fitting with this system, furthermore, it can provide others security services
like confidentiality and integrity services.
Suhaidi Hassan, Zeeshan Aziz and Kashif Nisar. On the Cache Performance of Information Centric
Network
Abstract: The current internet model has proved more sustainable then the provisioned capacity while at the
time of designing the architecture. The voluminous growth of traffic over the internet has brought challenges for
the exiting networking architecture. The information centric paradigm appears to give efficient solution towards
content dissemination model. This is a content focused networking paradigm rather than host to host
communication. Caching is one of the major components of information centric networks. This paper is
intended to explore the impact of cache on critical attributes of networks. We have made a comparative analysis
of in-network and edge network caching mechanism in simulation. The results proved that in-network caching
mechanism is far better than network edge caching with improved throughout, increase link capacity to avoid
congestion.
![Page 46: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/46.jpg)
ICCEEE 2013
22
Hiba Nasir, Yahia Abdalla Hamad and Amir Eisa. An Agent-based Proxy Cache Cleanup Model using
Fuzzy Logic2
Abstract: Proxy caching is one of the solutions to enhance the performance of Web traffic. Most of the existing
traditional proxy caching policies such as Size, Greedy Dual Size (GDS), Least Frequently Used (LFU), and
Least Recently Used (LRU), are not efficient in Proxy caching. Each policy has a limitation. Thus, there is a
need to find another approach to perform and manage the cache cleanup task in an efficient way. Today, proxy
cache cleanup task is usually performed manually by a human administrator. This work proposes an agent-
based model to automate the cache cleanup task. The cache cleanup task is performed proactively on both the
parent proxy and the child proxy caches based on the integration of the caching polices. Fuzzy logic is used to
integrate the LFU and LRU caching replacement techniques on the child cache side. Size, LFU, and LRU
techniques are used on the parent cache side. The agent chooses clean up priority to make an intelligent
decision. The paper reviews some of the existing intelligent web caching approaches and then describes the
proposed model.
Mohammed Babiker, Aisha H. Abdalla and Ismail El-Azhary. Investigation of Nested Nemo Schemes in
Mobile Network Environment
Abstract: Using of mobiles and wireless devices becomes very important in recent years , due to the increasing
of services and applications they provide Through which. The major issue is providing seamless mobility to
achieves better performance . The Internet Engineering Task Force has developed Mobile IP, which allows
Mobile node moving from Network to another using original IP address. The Internet Engineering Task Force
also developed Mobility Basic Support Protocol (BSP) for managing mobile networks as a single unit, when a
Mobile Router in mobile network attached to other Mobile Router in another mobile network, it makes a
hierarchical form known as Nested Mobile Network, which is suffer from major problems in multilevel of
nesting case, some issues such as tunneling overhead, packet losing and delay are affect directly Nested
Network Performance. This paper is to investigate the current approaches that are introducing Nested Nemo
Schemes in Mobile Network environment. It highlights the advantages and the limitations of these approaches.
Both the qualitative and the quantitative evolutions of these proposals are hereby presented.
Mariam Taha, Taqwa Alhaj, Ala Moktar, Azza Salim and Settana Abdullah. On Password Strength
Measurements: Password Entropy and Password Quality
Abstract: In this paper, we propose a new algorithm to compute the strength of passwords based on two
measurements, mainly: password entropy and password quality. The passwords considered by the algorithm
consist of eight characters alpha numerics with especial characters .For such passwords, the low/high entropy
patterns are identified in the analysis to be compared with the second measurement; the password quality.Two
general results obtained: high entropy passwords are also high quality password, and low quality passwords are
low entropy passwords.
![Page 47: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/47.jpg)
ICCEEE 2013
23
Mohamed Fadlalla Elhag. Intelligent System for Selecting Optimum (INST) Based on Fuzzy Logic to
Develop a Courseware (ISSIDC).
Abstract: Instructor’s teaching experience or instructional style (INST) is an essential factor in the knowledge
transfer for T-learning (SCHUNK,257), so in this paper I tried to cope (INST) in E-learning system as well.
Specifically, this paper proposed (Methodological approach based on Fuzzy logic to Select the Optimum
Instructional style(s) for Designing a Specific E-learning system” (MFSOI-DSE). The proposed (MFSOI-DSE)
extends the fuzzy logic concepts and techniques in E-learning field, explicitly, in selecting an optimum (INST)
for developing a specific courseware. In this paper I proposed a new procedure for representing the (INST) in
quantitative values instead of qualitative description, using Frame of cognition/knowledge. In this paper, a
conducted case study using the proposed procedure has met the selection of INST for developing a specific
courseware with an expertise decision. Moreover, the paper specified the best software tools for building an
automated system based on the above mentioned procedure in order to facilitate the (MFSOI-DSE).The topic of
this paper lies on a multidisciplinary area of research, so it needs a solid background in computer science,
Fuzzy logic and Instructional design field. Finally, I hope this paper will improve the quality of the E-learning
systems based on IQP (Instructional Quality Profile)
Mohammed Elfahal and Mohammed Elhafiz. Acoustic Approach to Spoken Arabic Language Detection
Abstract: Spoken Language detection is the process of either to accept or to reject a language identity from its
sample speech. The process is essential as it represents the first essential phase for developing a complete
multilingual-enabled speech processing applications. However, most efforts are focused on European languages
and the research is relatively few for other languages such as Arabic. This is mainly due to the lack of tools and
resources, e.g., speech corpora. This paper describes an ongoing research to develop a language independent
Modern Standard Arabic (MSA) detector which is a binary SVM classifier based on speech acoustic features. In
that context, the classifier is used to classify speech utterance into either classA, which represents the Arabic
language or classNA to denote non-Arabic languages. As most currently available speech corpora are license
restricted and their languages are selected based on population or geographical distribution, a new multilingual
speech corpus with six languages created is being created. Languages in this created corpus have some sort of
similarity with MSA, e.g., Arabic and Hebrew. This property adds another dimension of complexity to the
classification task. This is because one of the major goals of this research is to measure whether the efficiency of
the built model (classifier) for detecting MSA, when trained with this language, will be preserved on the same
level when tested with other languages that have some sort of relationship with MSA. This will be referred in
this paper as stability-against-similarity of the model.
Nusiba Abdalrhman Ahmed and Abdelgaffar Hamed. Enabling Use Case Function point on Service-
oriented Architecture
Abstract: Software complexity estimation is an important activity to software development life-cycle such as in
terms of effort, cost and size. A lot of estimation models were proposed in the literature but they do not consider
the new paradigm shift in software development service-oriented architecture (SOA). SOA is a new style of
software architecture that has six principles like standard interface (contract) which allows building technology-
![Page 48: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/48.jpg)
ICCEEE 2013
24
independent applications that can interoperate. Function Point (FP) metrics were designed to consider functional
requirements (complexity) instead of lines of code, which is enriched by Use Case Point (UCP),a software
estimation technique proposed to estimate the software size and effort for software development projects of
object-oriented systems. However, estimation techniques for Service-Oriented Architecture (SOA) are still not
investigated well. Generally the demanded is having global view by relating function point methods with SOA
design principles so this is an attempt to provide this view. As UML use case and activity models are widely
recognized for its easy of communication, this paper has adopted them for estimating service-based systems
complexity as a source of information for system under estimation in high level models. The proposed technique
is compatible to the design principles of SOA and provides a systematic and formal way for complexity
estimation. Courseware management service-based system is used as case study to evaluate the proposed
technique.
Awadallah Ahmed and Aisha Abdalla. Evaluation of Gateway placement approaches in Wireless Mesh
Network
Abstract: In this paper, Gateway placement approaches in Wireless Mesh Network are reviewed, and their
purposes are studied. According to the relevant researches in this area, there are many gateway placement
approaches in Wireless Mesh Network that have been founded. These approaches are designed to find an
optimal network throughput, cost minimization, quality of services and load balancing. In this paper these
approaches are classified depending on the mechanism of gateway selection/placement and their design
philosophy. This classification can helps in determining the optimal approaches by comparing and analyzing the
mechanism of each approach and then select the suitable approach that can be used depending on the aim of the
wireless mesh network.
Osman Mudathir Elfadil. Localization for Wireless Sensor Networks
Abstract: Localization is one of the fundamental problems in wireless sensor networks (WSNs), since locations
of the sensor nodes are critical to both network operations and to most of the application level tasks. There
exists an extensive body of paper that aims at obtaining locations as well as spatial relations of nodes in WSNs
without requiring specialized hardware and/or employing only a limited number of beacons that are aware of
their own locations.
Osman Mudathir Elfadil. Navigation Algorithm for Mobile Robots using WSNs
Abstract: In this paper, a new navigation algorithm is proposed for mobile robots as one of the applications of
localization system for WSNs. In this navigation system, the robot can navigate autonomously with the aid of a
sensor network and additional entity such as middleware-server is not needed. So, this system can be
constructed at low cost, and high accuracy. Also if temperature sensors are mounted to nodes, it is also possible
for the robot to avoid danger (hot) regions by changing the routing path. In this algorithm, we have presented a
navigation algorithm that allows the mobile robot to navigate without the need for a map, compass, or GPS
while interacting with neighboring sensor nodes. One of the features of our navigation system is that it allows a
number of robots to navigate at the same time. In addition, this method is suitable for both indoor and outdoor
navigations. So that robot navigation is allowed with the localizations of the robot and sensor nodes, which
![Page 49: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/49.jpg)
ICCEEE 2013
25
greatly expands its application area. The algorithm using TDoA with ultrasonic sensors to measure distances can
be suitable in indoor environments and more accurate since the range of ultrasound is relatively short and in
case if it used for outdoor navigation, it is better to use a RSSI method to measure distances because RF signals
propagate more uniformly. All in all the wireless sensor network environments and navigation algorithm can apt
for low cost effective robot navigation and overcome the limitations of traditional navigation algorithms.
Sara Eljack and Suhail Ahmed. Effect of the Interior Gateway Routing Protocols in the Multiprotocol Label
Switching Networks
Abstract: Traditional IP based networks, Frame Relay and ATM networks have some drawbacks in the
management operation of large networks such as cost, security, scalability and flexibility. Therefore, to solve the
above mentioned weakness, the MPLS-based VPN networking is introduced to work with existing deployed
backbones and allow organizations to interconnect the dispersed sites and remote workers through secure links
by using public internet. This work aims to provide a better understanding of the operation of service providers’
large networks management, through focusing on the MPLS VPN technology. It offers a detailed description of
the major operation of the MPLS VPN networks to meet a customer requirement in the content delivery
mission. In addition, this work focuses on the effect of the interior gateway routing protocols on the MPLS VPN
networks, two famous protocols have been chosen to be investigated (OSPF and IS-IS) and two proposed
designs are introduced and simulated by using OPNET Modeler; then a deep network performance analysis is
provided.
Ahmed Osman, Naomie Salim and Ammar Ahmed E. Elhadi. A Tree-based Conceptual Matching for
Plagiarism Detection
Abstract: This paper discusses a new plagiarism detection method for text documents called Tree-based
Conceptual Matching. The proposed method not only represents the content of a text document as a tree, but it
also captured the underlying semantic meaning in terms of the relationships among its concepts. The method
was adopted to detect plagiarism in text documents. The tree-based played a very important role in this method.
It looked at the amount of detecting plagiarized sentences from the original documents. Experiments have been
carried out using the CS11 standard plagiarism detection corpus. The results were evaluated using information
retrieval measurements, which are Recall, Precision and F-measure. The results were compared with other
methods for plagiarism detection and we found our method outperforms the other methods for plagiarism
detection.
Eltayeb Abuelyaman. Quasi Fields Based S-Box Implementation
Abstract: The byte substitution table which is known as the S-Box is one of the major steps of the Advances
Encryption Standard (AES). Its entries are pre-computed and stored on lookup tables (ROMs) to avoid tedious
real time computations using Galois Field. However, in many situations, storing data weakens the overall
security as it gives a hacker a chance to put his foot at the door. To harden against such vulnerability, a modified
approach that avoids onerous Galois Field operations is necessary. To that end, two possible replacements are
compared in this paper. The first is based on the field of residues of prime numbers and the second is based on
the quasi-field of residues of powers of two. The first uses a reduced lookup table. The advantage of reduced
![Page 50: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/50.jpg)
ICCEEE 2013
26
lookup table over the complete table originally proposed for AES is demonstrated in this paper. The second
performs byte substitution on real-time bases. Each approach is evaluated and recommendations are given for
environments where each outperforms the other. The paper also justifies need for speeding up byte substitution.
Muhammad Awais Jadoon, Ahmad Shah, Othman O. Khalifa, Zainab Ali Khan and Imran Khan.
Network Coding for hybrid Satellite-terrestrial Networks over non-identical Fading Channels
Abstract: Satellite communication technology can well address for global communication system concern
along imperative features. Network coding techniques are implicit for future wireless communication network
demands in terms of throughput, security and robustness. Physical layer network coding (PNC) and Analog
network Coding (ANC), are considered as two of the most studied variants of the network coding. Analysis
revealed that similar performance augmentation can be made in satellite terrestrial networks with highly
unpredictable behavior. In this paper feasibility study focuses on a comparative analysis amongst PNC and ANC
in terrestrial land mobile satellite (LMS) networks in standings of their respective SER and outage probabilities.
Eimad Abusham and Housam Basheir. Face Recognition Using Local Graph Theory (LGT)
Abstract: The problem associated with Illumination variation is one of the major problems in image processing,
pattern recognition, medical image, etc; hence there is a need to handle and deal with such variations. This paper
presents a novel, simple, fast and efficient algorithm for face recognition call Local Graph Theory (LGT). LGT
features are derived from a general definition of texture of graph neighborhood. The experiments results on our
face database images demonstrated the effectiveness of the proposed method. The new method can be stabilized
more quickly and obtain higher correct rate. Finally, LGT can be easily applied in many real time fields, such as
image processing, pattern recognition, medical image as pre-processing.
Samer Mohamed Kannan Mahmoud and Saeed A. Al-Ghamdi. Solving Problems of Computer Networks'
Planning using Elastic Networks Method
Abstract: This part of research focuses on analysis and evaluation for synthesis problem of a computer network
heterogeneous structure. Where the core of the network has a ring topology, the network lower level-topology
tree, and this paper composed of two interrelated parts. Firstly, this part of presented herein addresses one of
problems concerned with planning of computer networks with heterogeneous structure associated with cost
effectiveness. However, the second part presents other side of the computer networks' structure problem
associated with optimality of network size. Specifically, at this first part focusing attention on the cost
effectiveness problem of networks' structural features using modified elastic net method. It adopted modified
method applied for reaching shortest path topology of computer network backbone structure via computing
method of weight coefficient values. That solution characterized by introducing additional synthesized weight
coefficients' values taking into account the amount of internal network nodes' demands/ traffic. Interestingly,
obtained solution results after simulated experiments proved to take the advantage of better cost effectiveness
(lower cost) of designed network structure, rather than other well known applicable solutions to date.
![Page 51: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/51.jpg)
ICCEEE 2013
27
Yogan Jaya Kumar, Naomie Salim, Albaraa Abuobieda and Ameer Tawfik. Automatic Multi Document
Summarization Using Voting Technique
Abstract: News articles which are available through online search often provide readers with large collection of
texts. Especially in the case of news story, different news sources reporting on the same event usually returns
multiple articles in response to a reader’s search. In this work, we first identify cross-document relations from
un-annotated texts using Genetic-CBR approach. Following that, we develop a new sentence scoring model
based on voting technique over the identified cross-document relations. Our experiments show that
incorporating the proposed methods in the summarization process yields substantial improvement over the
mainstream methods. The performances of all methods were evaluated using ROUGE: - a standard evaluation
metric used in text summarization.
Yousra Gad and Bazara Barry. Developing a Security Model to Protect Websites from Cross-site Scripting
Attacks
Abstract: The growth of the Internet in recent years has led to the spread of information crimes in renewed and
changing ways. This paper is focused on understanding the issues surrounding cross-site scripting attacks and
providing a simple and effective security model to protect websites from such attacks. The security model is
based on a sequence of levels and is built using a combination of tools. Tests against a set of cross-site scripting
attacks show the proposed model effectiveness and convenience.
Ali Ahmed, Ammar Ahmed Eltaeb Elhadi, Hamza Awad Elkarim Hamza Ibrahim and Naser Elmisbah.
Feature Selection and Similarity Coefficient Based Method for Email Spam Filtering
Abstract: Many threats in the real world can be related to activities of persons on the Internet. Spam is one of
the most pressing security problems online. Spam filters try to identify likely spam either manually or
automatically. Most of the spam datasets used in the spam filtering area of study deal with large amounts of data
containing irrelevant and/or redundant features. This redundant information has a negative impact on the
accuracy and detection rate of many methods that have been used for detection and filtering. In this study,
statistical feature selection approach combined with similarity coefficients are used to improve the accuracy and
detection rate for the spam detection and filtering. At the end, the study results based on email spam datasets
show that our proposed approach enhanced the detection rate, false alarm rate and the accuracy.
Nahid Ahmed Ali. Verifying Abstract Data Types: A Hybrid Approach
Abstract: At a time when software products are taking on increasingly critical functions, and are growing
increasingly large and complex, the need to ensure their quality also increases significantly. Yet, despite several
decades of research, the verification of software products of industrial size and complexity remains an
unfulfilled challenge. In this paper, we discuss a hybrid approach to the verification of abstract data types
against axiomatic specifications, which consists in deploying static techniques and dynamic techniques in a
complementary manner, avoiding the drawbacks of each technique used in isolation.
![Page 52: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/52.jpg)
ICCEEE 2013
28
Ahmed Osman and Naomie Salim. An Improved Semantic Plagiarism Detection Scheme Based on Chi-
squared Automatic Interaction Detection
Abstract: This paper introduces an improved semantic text plagiarism detection technique based on Chi-
squared Automatic Interaction Detection (CHAID). The proposed technique analyses and compares text based
on semantic allocation for each term inside the sentence. It also captures the underlying semantic meaning in
terms of the relationships between its concepts via Semantic Role Labeling (SRL). SRL offers significant
advantages when generating arguments for each sentence semantically. Voting for each argument generated by
the CHAID technique, in order to select important arguments, is a main feature of the proposed method. Only
the most important arguments selected by the CHAID method were used in the similarity calculation process.
Testing was done using the CS11 and PAN-PC-10 datasets. The results show that this proposed method
improves the SRL plagiarism detection method as well as exhibiting improved performance in terms of Recall,
Precision and F-Measure when compared to current methods of plagiarism detection.
Mohamed Yousif and Sami Sharif. Sudan HF Model based on University of Khartoum Ionospheric Shells
and their Mathematical Derivations
Abstract: Abstract: The effect of changing properties of F layer during day and night on the Sudanese
ionospheric links in terms of the optimum frequency is well discussed in this paper. The study is based on the
current solar conditions. The concept of UKIS is introduced and illustrated graphically and represented by
mathematical equations. Five cities have been chosen for this study: one is located in center (Khartoum) and the
others are (wadi halfa) in the north, (nimule) in the south (Kassala) and in the east, and (AlJunaynah) in the
west. The concept of twin ionospheric links is introduced and its relation to the UKIS is well illustrated. Contour
maps that represent the strength and death time of the UKIS for the country are attached to the paper. The study
is based on empirical ionospheric modeling and the statistics are computed using the international ionosphere
model ( IRI).
Mosharrof Hussain Masud, Suhaimi Abd Latif, Farhat Anwar and Md Khorshed Alam. An Analysis of
Resource Sharing Scheme in Heterogeneous Wireless Campus Network
Abstract: The next generation wireless technology systems are being devised with the vision of heterogeneity
where a Multimode Device (MD) would be connected with multiple wireless networks like GSM, WiFi, and
WiMAX. Bandwidth is one of the main resources of these technologies which is operated independently that
need to be aggregated among these technologies in Heterogeneous Wireless Network (HWN). This paper aims
to investigate the issues of campus based heterogeneous wireless network, its benefits and challenges. It has
found that an efficient scheduling model for packet reordering, an appropriate interface selection mechanism is
important for HWN. Besides its benefits, this paper also addresses the schemes including genetic algorithm,
fuzzy logic technique and game theory those have been using for bandwidth allocation. Finally, this paper
proposes a mechanism for bandwidth allocation in a HWN environment.
![Page 53: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/53.jpg)
ICCEEE 2013
29
Lubna Gabralla, Rania Jammazi and Ajith Abraham. Oil Price Prediction Using Ensemble Machine
Learning
Abstract: Crude oil price forecasting is a challenging task due to its complex nonlinear and chaotic behaviour.
During the last couple of decades, both academicians and practitioners devoted proactive knowledge to address
this issue. A strand of them has focused on some key factors that may influence the crude oil price prediction
accuracy. This paper extends this particular branch of recent works by considering a number of influential
features as inputs to test the forecasting performance of daily WTI crude oil price covering the period 4th
January 1999 through 10th October 2012. Empirical results indicate that the proposed methods are efficient and
warrant further research in this field.
Mohamed Firdhous, Osman Ghazali and Suhaidi Hassan. Cloud Computing for Rural ICT Development:
Opportunities and Challenges
Abstract: According to the United Nations, almost 50 percent of world population and more than 70 percent of
that of the developing countries are living in rural areas. Majority of this rural population live in poverty
especially in North and sub Saharan Africa where they live in less than $1 a day the absolute poverty line. Rural
population face unique problems compared to that of their urban counterparts with respect to access to
technologies, high unemployment, insufficient access to infrastructure, markets and social services. Experts
have identified ICT as the tool for managing the inefficiencies in traditional methods for the empowerment of
rural masses. In this paper, the authors study how cloud computing can be used to meet the ICT requirements for
rural development with special respect to the opportunities and challenges of implementing and using the new
technology.
Sulafa Khaled Talha and Bazara I. A. Barry. Evaluating the Impact of AES Encryption Algorithm on Voice
over Internet Protocol (VoIP) Systems
Abstract: Securing computer systems has become of vital importance especially with the sophistication and
advancement of attacking tools and techniques. Therefore, it is critical to apply security mechanisms that are
capable of protecting systems in a way that ensures and provides major security services. However, providing a
system with security services comes at the expense of system performance. The resource-intensive nature of
effective security mechanisms may have a negative impact on certain aspects of system performance. A major
security service that is required in computer networks and information systems is confidentiality which ensures
that transmitted data are protected from unauthorized disclosure. Encryption is the security mechanism that is
used to provide confidentiality. Prior to transmitting sensitive data over an information channel, encryption
algorithms transforms data into a form that is not readily intelligible. On the side of the receiver, a decryption
operation takes place to recover the original form of the sent data. Clearly, encryption and decryption operations
have their impact on the performance of the system. This study investigates the impact of providing
confidentiality services on the performance of systems. The study takes Voice over Internet Protocol (VoIP)
systems - which are used to make telephone calls over the Internet - as an example of systems that are greatly
affected by performance degradation. The study measures how key VoIP performance parameters are impacted
when certain encryption algorithms are implemented, and whether that impact falls within the tolerable levels.
![Page 54: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/54.jpg)
ICCEEE 2013
30
Isam Basheir, Adil Khidir and Hanan Adlan. Neural Networks Forecasting Architectures for Rainfall in
the rain-fed Sectors in Sudan
Abstract: Feedforward Multilayer Perceptron (MLP) are universal approximators. Weight adjustment of the
connectionist model is crucial to architecture, that model systems behavior. This paper developed a neural
network for hydrological purposes. Two architectures were developed, investigated, and tested for forecasting
rainfall in the rain-fed Sectors in Sudan. A monthly architecture and a decade architecture are developed with
backpropagation feedforward neural network. The two architectures are found to be efficient for forecasting
rainfall in these sectors.
Aisha Hamid. Upgrading Distributed Agile Development
Abstract: Agile software development teams are normally collocated a matter that enhances the implementation
of its principles. In the growing world of software industry it is better to get benefit of markets, skills and
reduced cost which are distributed all over the world. This can be achieved by upgrading the practices of agile
software development to be in harmony with distributed software development and keeping its intrinsic values
from being destroyed or even distorted in spite of geographical barriers, different cultures and different time
zones. This paper studies an approach based on sequential development of the software to help in dealing with
the challenges that face agile methodology when it is combined with distributed software development.
Amira Kamil Ibrahim and Ajith Abraham. Modeling Consumer Loan Default Prediction Using Ensemble
Neural Networks
Abstract: In this paper a loan default prediction model was constricted using three different training algorithms,
to train a supervised two-layer feed-forward network, with sigmoid hidden neurons and output neurons, to
produce the prediction model. But first, two attribute filtering functions were used, resulting in two data-sets
with reduced attributes and the original data-set. Back propagation learning algorithm was used for the network.
The neural networks are trained using real world credit application cases from a German bank datasets which
has 1000 cases; each case with 24 numerical attributes; upon which the decision is based. The aim of this paper
was to compare between the resulting models produced from using different training algorithms, scaled
conjugate gradient backpropagation, Levenberg-Marquardt algorithm, One-step secant backpropagation (SCG,
LM and OSS) and an ensemble of SCG, LM and OSS. Empirical results indicate that training algorithms
improve the design of a loan default prediction model.
![Page 55: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/55.jpg)
ICCEEE 2013
31
Electronics Engineering
Ama Eltahir and Rashid Saeed. An Enhanced HWMP (E-HWMP) Protocol for Multihop Vehicular
Communications
Abstract: Integration of Vehicular Ad-hoc Network (VANET) and Universal Mobile Telecommunication
System (UMTS) is promising architecture for future machine-to-machine applications. This integration help the
vehicles have steady Internet connection through UMTS network and at the same time can communicate with
other vehicles. However, the dead spot areas and unsuccessfully handoff processes due to the high speed of the
vehicles can disrupt the implementation of this kind of architecture. In this paper, a new Simplified Gateway
Selection (SGS) scheme for multi-hop relay in VANET-UMTS integration network is proposed. The main aim
of this research is to enhance the integration between VANET and UMTS network, and extend the coverage in
the area where there is no coverage, and reduce the amount of overhead, and reduce delay metrics, and
increasing the packet delivery ratio, and also to reduce the dead spot in VANET-UMTS network. An enhanced
version of HWMP with combination of IEEE802.11p and IEEE802.11s for multi-hop vehicular communications
is proposed. An integrated simulation environment combined of VanetMobiSim and NS2 is used to simulate and
evaluate the proposed scheme. The simulations results show that, E-HWMP protocol performed better than Ad-
hoc on demand Distance Vector (AODV) routing protocol. Furthermore, E-HWMP is compared with other
cluster-based gateway selection that used in the previous works; the result shows that our E-HWMP protocol
outperforms the other cluster based gateway selections schemes in term of connection delay, control packet
overhead, packet delivery ratio and overall throughput.
Sameir Ali Hamed, Abdulwaheed Musa and Saad Bashir. Near-Fields of an Array of Circular-Loop
Antennas
Abstract: In this paper an exact electromagnetic near-fields expressions for an array of circular loop antennas
(CLAs) are presented. The technique is based on the spherical Bessel functions (SBFs) and associated Legendre
polynomials (ALPs) expansion for the Green’s function. Fields of the uniform current CLAs array and that on
the axis of the array, as well as the fields of the so called gate antenna arrangement, are obtained from the
general expressions as special cases. The known far-field expressions for the array of CLAs are derived from the
general expressions which check the correctness of these general field expressions.
Moutaman Mirghani Daffalla. Adaptive Multifunction Filter for Radar Signal Processing
Abstract: Filtering of radar signals frequently takes place to realize a certain task, such as interference reduction
or Doppler processing to remove clutter. However, in this paper a digital filter is proposed to be designed as a
multifunction processor, achieving several sorts of signal processing within the same module. Processing is
easily done in the baseband rather than in passband, for a moderately slow DSP processor. Hence, a lowpass
filter will perform the task of rejection of the out-of-band interference. Higher SNR can be obtained to enhance
the detection of targets inside noise if that filter is matched to the expected radar signal, even if it caused signal
distortion. Doppler processing makes use of digital filters to cancel signals from fixed and slow targets. The
proposed filter would be designed as an adaptive filter to follow interference and clutter changes, and eliminate
![Page 56: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/56.jpg)
ICCEEE 2013
32
blindness to some moving radar targets that arise in digital Doppler processing due to aliasing caused by targets
of higher speeds. Matlab simulations are made to validate the idea and observe features and limitations of the
proposed adaptive filter. Adaptive filter that is based on the least-mean-square algorithm is designed to achieve
the best outcome.
Moutaman Mirghani. Design and Analysis of Low Baudrate Modem Using Microcontrollers
Abstract: Special technique is proposed for the design of soft modems that would be appropriate to transfer text
messages at up to 300 bauds. Modulation scheme used is audio frequency shift keying, which is suitable for
transport of text messages through the voice channel over HF and VHF radios. The soft modem is primarily
designed to be implemented using low cost microcontrollers, and without the need of analog circuits such as
active filters or a phase-locked loops. In addition to the physical layer, the proposed modem performs data link
layer tasks such as framing and error detection and automatic request. Though synchronous transmission could
be applied, asynchronous serial communication protocol is used to minimize design complexity, and be in
essence to asynchronous FSK demodulation. The FSK modulation technique used is continuous phase FSK to
eliminate phase jitters problem. Minimum shift keying can be applied, but with limitation for flexibility in
changing baudrate and carriers frequencies. Proposed FSK demodulation is not a synchronous nor a PLL or a
filter-based detector. Instead, a sort of frequency counter is proposed in this paper. Matlab simulations are made
to validate the algorithm and observe features and limitations, such as the bit error rate and maximum bitrate.
Later, the algorithm is examined by the aid of a code running on a virtual microcontroller, before being running
on a real one.
Alaa A. Yassin and Rashid A. Saeed. Reconfigurable Dual Band Antenna for 2.4 and3.5GHz using Single
PIN Diode
Abstract: Heterogeneous network tends to use multiple types of wireless access networks. In heterogeneous
wireless networks, different wireless access technologies are integrated to complement each other in terms of
coverage area, mobility support, bandwidth, and price. In this paper, dual radios, fixed-WiMAX (i.e. 802.16d) at
3.5 GHz and WLAN at 2.4 GHz are used. Dual band rectangular microstrip antenna with reconfigurable
capability is proposed, which has the advantage of simple structure, small size and easy fabrication. FR-4
substrate with dielectric constant ε_r=4.3 and thickness h=1.6mm parameters are employed for the proposed
design. This design shows excellent mechanical characteristics for the antenna. This study is concentrates on
effect of patch dimensions, width and length of microstrip feed line. Then reconfigurable antenna using
customized slots on different locations on the microstrip patch at dual band frequencies are considered. The
proposed antenna is switchable between two resonance frequencies by PIN diode. The simulation is
implemented by CST microwave studio simulator showed good performance. The return loss was -22 dB at
frequency 2.4GHz and -27 dB at 3.5GHz.The bandwidths were 65MHz at 2.4 and 50 MHz at 3.5GHz.
![Page 57: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/57.jpg)
ICCEEE 2013
33
Nihad A. A. Elhag, Isam M. Osman, Alaa A. Yassin and Tsneem B. Ahmed. Angle of arrival estimation in
smart antenna by using MUSIC method for wideband wireless communications
Abstract: Smart antenna technology in mobile communication is one of the most promising techniques enhance
the capacity of communications networks. One of the problematic issues in smart antenna is the detection of
arrival signal in different angles in multipath Rayleigh fading channel. In this paper a new smart antenna signal
processing method for estimating the signal angle of arrival (AoA) is proposed, by using MUSIC method for
wideband wireless communications. The simulation is conducted under different random signal arrivals and
space between array elements. The achieved results show that the proposed method determined exact angle of
arrival of more than 90% of the received signals Rayleigh fading channel.
Jacqueline J.George and Nada Mustafa Adalla. Adaptive Joint Call Admission Control to Support QoS in
Heterogeneous 4G Wireless Networks
Abstract: Call admission control (CAC) is one of the basic mechanisms for ensuring high quality of service
(QoS) offered to the user in Wireless Heterogeneous Networks (HetNet). Based on the available network
resources, it estimates the impact of accepting or blocking a new session request. Many CAC algorithms have
been proposed in the literature but they were all limited by the available bandwidth. This paper proposes a
bandwidth adaptation technique for the Adaptive Joint CAC (AJCAC) algorithm; it is proposed as a solution for
congestion; where the AJCAC algorithm degrades the bandwidth of some ongoing users to make room for new
incoming ones. A restoration process must take place when the network is underutilized; where the algorithm
restores the maximum bandwidth service to the degraded users. In this paper the bandwidth degradation process
was investigated and evaluated. The results showed that as the degradation in the bandwidth increases the
adaption required in the network increases. On the other hand, degradation in the QoS results in a decrease in
the blocking probability.
Ashraf Osman, Amin Nabi and Ismail El-Azhary. The Potential of Establishing Computer_Aided_Design
(CAD) Industry in Africa – Sudan Case-Study
Abstract: The VLSI electronic circuit designs have steadily grown in their capacity and complexity through the
years. The design automation has become an essential part of the design team to enable design completion and
verification. Responsibility of a design automation engineer includes setup, customization, integration of design
tools (EDA, and non EDA). In Africa, the higher education of the microelectronics focuses mainly on the
instruction of chip/circuit design. Virtually little or no emphasis is applied to grow design automation skill sets
of their graduates. This paper discusses the potential of African educational institutes of becoming the supplier
of qualified design automation engineers for future African IC industry and/or worldwide VLSI job market.
This paper will propose that African universities should start emphasizing more on design automation to
increase number of graduates in the Design automation field. The benefit of such effort will enable African
graduates to exploit the microelectronics job market and eventually help encourage industry to be established
within Africa for growth opportunities
![Page 58: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/58.jpg)
ICCEEE 2013
34
Adel Gaafar. Energy Aware Routing Protocol for Low Energy Sensor
Abstract: In this paper, we propose an energy efficient data forwarding protocol called Energy Aware
Geographic Routing Protocol (EAGRP) for wireless sensor networks to extend the life time of the network. In
EAGRP, both position information and energy are available at nodes used to route packets from sources to
destination. This will prolong the lifetime of the sensor nodes; hence the network life time and thus get higher
packet delivery ratio and minimal compromise of energy efficiency. The proposed protocol is an efficient and
energy conservative routing technique for multi-hop wireless sensor networks. The routing design of EAGRP is
based on two parameters: location and energy levels of nodes. Each node knows the location and energy level of
its neighbors. The performance measures have been analyzed with variable number of nodes. The simulations
are carried out for different number of nodes employing these algorithms considering the different metrics.
Simulation results have shown that the EAGRP performs competitively against the other routing protocol in
terms of packet delivery ratio, throughput, energy consumption, and delay. Consequently, it can be concluded
that EGARP can efficiently and effectively extend the network lifetime by increasing the successful data
delivery rate.
Mohamed Omara. Efficient Design of Dual Digital Up Converter for WCDMA and CDMA2000 Using
System Generator
Abstract: This paper presents an efficient method to design Dual Digital Up Converter (DUC) for WCDMA
and CDMA2000 for Software Defined Radios (SDRs). The proposed Design which includes a programmable
DDS, mixer and three cascaded stages of programmable digital filters has been simulated with Matlab, designed
with Xilinx system generator and synthesized with Xilinx Synthesis Tool (XST) targeting Spartan 3A based
xc3sd1800a FPGA. The Dual-mode feature is achieved by using a control unit which loads the filters
coefficients of each system from ROM to the programmable digital filters upon desired System. The
programmable DDS module is generated by Xilinx DDS Compiler and can operate at maximum frequency of
61.44MHz and provide the flexibility for multi-carrier base station. The results show that the system design flow
based on Xilinx System Generator is simple and feasible and meets the performance requirements for the
downlink transmit path for each system. The proposed design is consuming very less resources available on
target device to provide cost effective solution for SDR based wireless applications.
Abeer Abdalla Zakaria and Rashid A. Saeed. A Review in Interference Analysis and Management between
Hierarchical and Flat Architectures Communications
Abstract: Femtocells home base station, which are low power cellular base station that operate in licensed
spectrum, installed on the subscriber’s premises to provide cellular services within home, residences, apartment
complexes, business offices and outdoor hotspot scenarios connected with the internet and cellular operator
networks via digital subscriber line (DSL) router or cable modem, to improve coverage, provide, high data
throughput, better voice services. This paper surveys femtocell technology, describes the key challenges facing
femto network and it presents the future direction on applying planning and optimization to enhance femtocell
performance, a detailed discussion about the interference management between the legacy hierarchical and flat
![Page 59: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/59.jpg)
ICCEEE 2013
35
architectures, where cell planning processes used in microcell networks which are not scaled to support millions
of femtocells problem and its recent researches are discussed and reviewed.
Mohammed Elnour and Waleed Kannan. PID and Fuzzy Logic in Temperature Control System
Abstract: In this paper an artificial intelligent control method is proposed to design temperature controller
suitable for low temperature applications such as laboratory equipments (e.g. ovens and incubators). The
proposed design uses fuzzy logic control (FLC) as a control method that maintains the temperature of simulated
heater to the desired point. Microcontroller based circuit is built to acquire data from sensor, actuate heat
element and communicate with computer workstation. MATLAB fuzzy logic controller is designed, tested, and
tuned to control the circuit. The Fuzzy Logic Controller performance is evaluated in several situations by
comparing it with conventional Proportional Integral Derivative controller in terms of speed of response to the
desired setting value, overshoot in fixed set point and robustness against disturbance. FLC is fast in response to
the setting with compare to PID, and more stable against external disturbance. Both of FLC and PID have
neglect overshoot value and steady state error, but FLC has noticeable deviation in high set points.
Omnia Ahmed, Rashid A.Saeed and Mohammed Kamrul Hasan. Lightweight Inter-cluster
Synchronization Scheme for Femtocell Network
Abstract: Femtocell is a small sized indoor basestation to increase the coverage and capacity. Femtocell is
connected through broadband backhual to the IEEE1588 to synchronize and manage the network. Due to
limited/poor connectivity femtocell suffers by frequency misallignment and clock differencs. To overcome this
problem MS-Assisted Receiver-Receiver Time Synchronization Strategy has been proposed. But this strategy is
not fully covered in all situations if there has no Mobile Station for a long time in any of fBS network and make
network overhead by generating the message flooding for a big adjacent network. However, in this paper,
lightweight inter -cluster synchronization scheme is proposed which functions through intra-cluster and inter-
cluster synchronization scheme and added between them as enhancement intermediate nodes selection if the
Cluster Head cannot see neighbor CH and by using the Hybrid Wireless Mesh Protocol (HWMP) to select one
intermediate node, and so we get the best path to access neighboring CH to update clocks and synchronize the
clusters. The proposed scheme provides high scalability and works in a decentralized manner. The analytical
results show that synchronization accuracy can be achieved up to 60% higher than MS-Assisted Receiver-
Receiver time synchronization strategy for femtocells.
Sameir Ali Hamed and Saad Bashir. New Fields Expressions of a Traveling Wave Circular Loop Antenna
Abstract: A technique that is based on spherical wave functions expansion for the free space Green’s function
is used to derive an exact near and far electromagnetic fields of traveling wave current circular loop antennas
(TW-CLAs) with arbitrary phase change. The Known Far-fields for TW-CLA are obtained from the general
field expressions presented in this paper using large argument approximations for spherical Bessel functions. A
simplified expression for the magnetic fields on the axis of the antenna are obtained as an special case of the
general filed expressions.
![Page 60: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/60.jpg)
ICCEEE 2013
36
Suliman Abdalla, Amin Babiker and Farouq Habbani. Mechanism for Charge Sharing Suppression in
Single Photon Processing Pixel Array
Abstract: This paper proposes a mechanism for suppression of charge sharing in single photon processing pixel
array by introducing additional circuit. The idea of the proposed mechanism is that in each pixel only analog
part will introduced, the digital part is shared between each four pixels, this leads to reduce the number of
transistors (area). By having communication pixels, a decision that which one of the neighboring pixels shall
collect the distributed charges is taken. The functionality, which involves analog and digital behaviors, is
modeled in VHDL.
Khalid Bilal, Ibrahim Khider and Amin Abdelnabi. Performance Evaluation of DS-WCDMA
Abstract: The objectives of this paper are to study, analyze and evaluate the performance of Direct Sequence –
Wide Code Division Multiple Access (DS-WCDMA) systems in Mobile fading propagation channel. The
Parameters which are considered for the evaluation performance are Additive white Gaussian noise (AWGN),
the number of paths in the propagation fading channel and the Code sequence length. The evaluation of DS-
WCDMA was derived for different type of digital modulation using Mat lab simulation link. The results were
obtained in terms of bit error rates(BER)in graphical form.
Sami Salih, Mamoun Suliman, Abbas Mohamed and Ali Al-Refai. Implementation of Adaptive Modulation
for Broadband Wireless Access Networks using Cognitive Radio Approaches
Abstract: Broadband Wireless Access (BWA) has become the best way to meet escalating business demand for
rapid Internet connection and integrated "triple play" services. In addition, not only for topographic but also for
technological limitations, alternative wireless solutions have been found. These systems are designed based on
Cognitive Radio (CR) approaches, which can adjust its operation according to the environment and technical
variations. This tracking feature allows the communication system to deliver the Best Ever, compare to Best
Effort, services to the users. In this paper, an implementation of a cognitive engine for adaptive modulation and
coding (AMC) is presented. This engine will track the radio channel variations in terms of SNR and be able to
select a suitable modulation order among predefined Modulation and Coding Schemes (MCS) to maintain the
specified BER by the user requirements.
Sami Salih, Mamoun Suliman and Abbas Mohamed. A Novel Spectrum Sensing Scheduler Algorithm for
Cognitive Radio Networks
Abstract: Cognitive Radios’ is recognized as a novel approach to improve the utilization of a precious wireless
communication natural resource; the radio frequency spectrum. Historically, telecom regulators assigned fixed
spectrum bands to the licensee wireless network operators, this spectrum management approach is guarantee
interference free environment, except of some configurations faults or illegal usage. However, with the
increasing demand for more bandwidth in the finite radio spectrum, the concept of secondary operator’s was
emerged, but with emphases to not influence licensed operators. Consequently, Cognitive Radio Networks
(CRN) architecture enters the market as an intelligent solution to these issues, with concentration on the
spectrum sensing procedures to achieve the regulatory constraint. The most successful sensing algorithms is
![Page 61: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/61.jpg)
ICCEEE 2013
37
those applying cooperation and scheduling to have better scanning information, however those algorithms are
developed base on the primary network activities which is good in terms of reducing the expected interference,
but it lay more computational loads on the CRN. In this paper, a novel sensing scheduler algorithm is proposed,
the idea is to utilize the CRN by fairly distribute the sensing task among the sensors, then utilizing the radio
spectrum shared with the primary networks.
Mohammed Nabri, Ahmed Hassan and Tasneem Mahmoud. Designing Low Cost Digital Dose Reminder
System
Abstract: Patients often do not pay attention to the importance of taking their drugs with the exact dosage on
time, it has been noticed that this leads to malfunctioning and lowers the efficiency of their medication; a
prominent practical solution has been studied and provided here. Dose Reminder System, is a simple device
designed for home use, it can be easily programmed by the caregiver and used by the elderly. Time & dose
control proved to be very effective in illness management; therefore, it was essential to develop an effective
solution that solves this problem, which will increase accuracy and reduce amount of attention & cost needed
for caregiving. The prototype produced here was designed on low cost to make it within reach of the majority;
functions are fully working, also the model is mobile but the size is a bit larger than required. The design was
successfully implemented and tested; and despite of some problems that faced the design related to availability
of components and materials in local market, the recorded accuracy is approximately 90%.
Siddig Gomha, Abdel Aziz T. Shalaby and El-Sayed M. El-Rabaie. Optimizing the Performance of Branch-
line Couplers Using Open Ended Stubs
Abstract: Branch-Line Couplers (BLC) are one of the most popular passive circuits used for microwave and
millimeter-wave applications. They have dimensions of a quarter-wave length by quarter-wavelength at the
center frequency. Due to these large electrical lengths of the transmission-line elements, BLC occupy a
significant amount of circuit area. This problem worsens with decreasing frequency. There are several
techniques used to solve this problem, such as using lumped components in conjunction with high-impedance
transmission lines, meandering transmission-line, and using both short and open ended stubs to represent
distributed inductors and capacitors. In this paper we use open ended stub on transmission line to design
compact BLC by using planner microstrip technique. We will derive in detail the closed formulas for the BLC
design. The effect of changing the value of the number of open ended stubs on the coupler performance is
investigated. It has been shown that the number of open ended stubs used for optimum design depends mainly
on the center frequency range used. Also it has been shown that at frequency range (1-2 GHz) there is a big
difference on the design area of the coupler for both the conventional and open ended stubs. The paper presents
a clear comparative study between the performances of BLC using both open ended and conventional approach.
Abdelmuizz Adam and Rashid A Saeed. Multicasting in Network Mobility using Multicast Anchor Agent
Abstract: this paper discusses the cost functions of the three multicast schemes Bi-directional Tunneling,
Remote Subscription and Agent Based. To developed from a probability model of engagement between any
mobile network nodes in multicast group to a home agent. So the performance parameters required taken under
continuous session duration constraints, taken in account the effects of nesting topology of Network mobility
![Page 62: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/62.jpg)
ICCEEE 2013
38
system and movement of it NEMO cluster. The cost functions of providing multicast among BT, RS and AB are
compared. Then we used the probabilities of multicast anchor agent forwarding data to their destinations, to
formulate the multicast path function as a 0-1 knapsack problem to show the selected items (multicast paths)
according to the mentioned optimization selection conditions. It was shown that the performance of AB
multicast schemes is better than BT and RS.
Nahid Osman, Gamar Mansour, Nodar Khalifa, Karlo Kuacgor Mathang and Alwaleed Adllan. Abinitio
Method Study of Ionic Conductor CaF2
Abstract: CaF2, fluorite, is a prime candidate for solid state electrolytes used in batteries could replaced of
SiO2 in metal-oxide-semiconductor (MOS) technology. Using abinitio density functional theory (DFT) method
corrected by PAW and ultra soft pseudo potential, the structural, electronic, lattice constants, band gab, density
of states in addition to thermal and optical properties have been investigated. The results have a good agreement
with the experimental.
Ahmed Yassin, Elhussein Abd Elmageed, Mazin Hamad and Mahmoud Osman. The Unscented Kalman
Filter Applied to Satellite Orbit Determination
Abstract: Satellite Orbit Determination (OD) is the process to estimate the position and velocity (the state
vector, state, or ephemeris) of an orbiting object. Any satellite in its orbit faces many perturbation forces that
affect its position in its orbit and therefore affect the tracking system. This leads to search for a method to
correct these drifts. The nonlinear problem of tracking and predicting where a satellite will be over some time is
one of OD early challenges. This report shows the design and implementation of an unscented Kalman filter for
nonlinear estimation applied to satellite orbit determination, the way it was embedded and the effects of adding
it on the tracking results to get more accurate orbital estimation, by correcting the tracking data (from Two-Line
Element, TLE, data sets) itself rather than using any external source of measurement for comparison and
correction (GPSs, optical sensors, radars…etc.).
Md. Rafiqul Islam, Md. Soyaeb Hasan and Apurba Kumar Saha. Mathematical Modeling of Growth
Conditions and Interpretation of Phase Diagram for InxGa1-xN Epitaxial Layer
Abstract: It is imperative to determine the dependence of the quality and characteristics of the epitaxial film on
different growth parameters. A mathematical model has been developed showing the effect of different growth
parameters e.g. temperature, TMI and TEG flow rate, molar ratio on epitaxial film. This model is considered for
InGaN film on GaN template with an Indium mole fraction up to 0.4 by Metal Organic Vapor Phase Epitaxy
(MOVPE). The results obtained from this model has been compared and fitted with experimentally obtained
data through XRD, RSM, PL, SEM etc. Finally, a phase diagram has been proposed to interpret the phase
separation and Indium content evolution under the influence of growth temperature and precursor gas flow.
Abdelkareem Bedri and William Harwin. Enhancing Haptic Representation for 2D Objects
Abstract: This paper considers two dimensional object tracking and recognition using combined texture and
pressure cues. Tactile object recognition plays a major role in several HCI applications especially scientific
visualization for the visually impaired. A tactile display based on a pantograph mechanism and 2×2 vibrotactile
![Page 63: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/63.jpg)
ICCEEE 2013
39
unit array was used to represent haptic virtual objects. Two experiments were carried out to evaluate the
efficiency and reliability of this novel method. The first experiment studied how the combined texture and
pressure cues improves the haptic interaction compared to using pressure cues only. The second experiment
examined users’ capability to track and recognize objects with two dimensional shapes using this method.
Results obtained indicate an improvement in boundary recognition and tracking accuracy by the combined
stimulation over the sole pressure stimulation. Results also demonstrate the capability of users to readily define
shapes for most of the virtually represented objects.
Haitham Shabour, Moutaman Mirghani and Omer Sharif. Performance Enhancement of the CAN
Protocol Using Reed-Solomon Codes
Abstract: Controller Area Network (CAN) is a shared serial bus communication that is widely used in
automotive and industrial network. The CAN bus is affected considerably by the conducted electromagnetic
interference (EMI) which is generated from many disturbances such as load dumb and ignition system noise.
The EMI reduces the bus efficiency by introducing bit error into the frame. In this paper, the effect of the
conducted EMI in automotive is comprehensively studied and Reed-Solomon (RS) encoding technique is
proposed to combat the burst bit error. This combat is evaluated for different burst error length based on
MATLAB environment, where the standard 64-bit user message is used. Moreover, the influence of the position
of the burst error is also explored. The obtained results show noticeable enhancement in the CAN bus
performance when the RS coding is integrated along with the Automatic Repeat Request (ARQ) that is
implemented in CAN protocol. Since there is no evident mathematical model for the distribution of EMI inside
a car, it has been measured practically by means of actual experiment. The measured EMI data is saved in
computer and used in the simulation of the CAN bus with aid of MATLAB. Other codes were applied in the
CAN bus simulation, and investigated in comparison to RS codes.
Abubakr Eltayeb, Halla Almubarak and Tahani Attia. A GPS Based Traffic Light Pre-emption Control
System for Emergency Vehicles
Abstract: Emergency vehicles such as ambulances, police force vehicles and fire fighting vehicles are required
to reach their destination as quickly as possible. Any unnecessary delays experienced on them along their way
could eventually cause dangerous events; leading to damages in lives or properties. One of the most important
delays is the time that is consumed on travelling between the starting point and the destination point of these
emergency vehicles; and in intersections with traffic lights, especially when these intersections are congested. In
this paper we discuss the design and implementation of an automatic pre- emption traffic control system, based
on the global positioning system satellites. It ensures the arrival of emergency vehicles to their destinations on
the minimum time possible. The results indicate that the proposed system has an optimum solution for the delay
time experienced on the emergency vehicles along their path.
Mohammad Rubaiyat Hasan, Muhammad Ibn Ibrahimy and S.M.A. Motakabber. Performance Analysis
of Different Techniques for Brain Computer Interfacing
Abstract: Recent works on different types of Brain Computer Interface (BCI) and their performance analysis
have provided some remarkable features for applications. The aim of this work is to compare the accuracies of
![Page 64: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/64.jpg)
ICCEEE 2013
40
different types of BCI to find out the suitable techniques. The study shows that each technique performance
depends on the type of BCI. A batter performance of the BCI systems is supported by the artificial neural
network.
S. M. A. Motakabber, Muhammad Ibn Ibrahimy and A. H. M. Zahirul. Development of a Position
Detection Technique for Chipless RFID Tagged Object
Abstract: Chipless RFID tag of microwave band is used to study the location of an object. Two microwave
antennas for narrow bandwidth beam used for scanning purpose. The antennas are mounted on two digital
stepper motor driven systems. The location of the tagged object is measured from the angular position of the
antennas. A squire space of 25 m2 and 1 m2 resolution are used for the project. The simulation result showed
that the location detection is almost error free. The accuracy of the position detection has a limitation and it
depends on the resolution of the system. The system may be used in the warehouse/store for auto inventory and
location finding purpose.
![Page 65: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/65.jpg)
ICCEEE 2013
41
Electrical Engineering
Khalid Hag El Amin and Mirghani Fath Elrahman. On the Steady-State Error Covariance Matrix of
Kalman Filtering with Intermittent Observations in the Presence of Correlated Noises at the Same Time
Abstract: Recent problems in state estimation focusing on estimating the state of a dynamical system using
sensor measurements that are transmitted over unreliable communication link. The embedded ideas for
analyzing such systems were proposed and called Kalman filtering with intermittent observations.
Unfortunately, to date, the tools for analyzing such system are woefully lacking when dealing with real time
applications, because the earlier system tools are restricted to independent noises or correlated noises at one time
step a part. In this paper, we consider a discrete time linear system state estimation problem across a lossy
network when the process and measurement noises were assume to be correlated to each other at the same time,
and we find minimum packet arrival rate that grantees certain performance at the remote estimator. Kalman
filtering algorithm was used as an optimal estimator to estimate the system state. The prediction and update
cycles of standard Kalman filter algorithm were reformulated to be applicable in the new system that we
consider. The prediction cycle were found to be not affected by the random loss of measurements but affected
by the correlated noises. We also show that the filtering update cycle were depend on both loss of measurements
and correlated noises at the same time. Minimum packet arrival rate were recorded and tabulated with respect to
the estimation error covariance which used as the performance criterion. As a result, we show that when
measurements are subject to random losses in the case of correlated noises at the same time, the covariance of
the estimation error of a state estimator becomes a random variable. We then derive conditions on channel
parameters that meet this metric in the case of scalar and vector systems. Examples are provided to illustrate the
theories and algorithms developed and numerical simulations show that the proposed method provides tighter
results than the ones available in the literature.
Dryan Marende. Optimization of Nuclear Energy Generation
Abstract: Nowadays, global dependence on fossil fuel has led to the release of over 26.7 billion tons of CO2
into the atmosphere each year. The per annum increase is considered to be 3 ppm. Addition to that, there is
energy-related GHG emission mainly from fuel combustion for heat supply, electricity generation and transport
that account for 88% of total emission including CO2, CH4 and some trace of NO2. To achieve a sustainable
nuclear energy generation and its optimization, the energy system engineering should provide a methodological
scientific framework that arrives at realistic integrated solution to complex problem. This should include
adopting a holistic system-based approach, especially at decision making and planning level. Nuclear energy is a
mature technology with modern reactors displaying a high degree of safety, proliferation resistance, reduction of
nuclear waste volume and cost effectiveness relating to global economy. Its optimization should be modeled and
applied in the study of physical and chemical systems, production planning and scheduling system, resource
allocation in the financial system, location, transportation and engineering design. This paper focuses mainly on
nuclear power generation and its optimization as a viable and justifiable alternative to global dependence on
fossil fuel. The optimization technique used in this paper is linear programming that can be used to define the
optimal portfolio having clear reliable data and target.
![Page 66: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/66.jpg)
ICCEEE 2013
42
Zakieldeen Elhassan, Li Yang and Tang Yi. A novel control method of grid connected doubly fed induction
generator under variable wind speed
Abstract: This paper has presented a novel control method of DFIG connected to the grid under variable wind
speed and dynamic mode during the system operation. The control method is deeply done in the DFIG
converter's control. The parameter controls which applied in grid side control are electromagnetic torque and
DC link voltage, whereas in the rotor side, the converter uses DFIG rotor speed and reactive power. The
electromagnetic torque has been used as an essential part in the GSC control instead of grid reactive power.
Both GSC and RSC are used back to back converters with two-level IGBT devices which the pulses are
generated from the PWM. The simulation carried out using PSCAD/EMTDC program. The results show that,
this method is a suitable to apply in DFIG with variable wind speed in dynamic operation and steady state. And
also the validation of the method reliability has been demonstrated.
Ibrahim Elamin, Abdullah Al-Elyani and Abdelrahman Shuaib. Power Quality Indices: A Saudi Steel
Mills Case Study
Abstract: The automation of industrial processes has lead to effective increase in production and reduction in
cost. However this is coupled with concerns about the level and requirements of power quality as nonlinear
industrial loads contribute significantly to producing harmonics distortions into the supply. These loads include
converters, switch mode power supplies, and arc furnace, etc. Introducing the electric arc furnaces (EAF) to the
steel industry has increased the amount of produced steel worldwide. The electric arc furnace operates as a batch
melting process producing batches of molten steel known as "heats". The electric arc furnace operating cycle is
called the tap-to-tap cycle and is made up of the following operations. This paper reports on the assessment of
power quality at an industrial system in Saudi Arabia. The power quality data are collected from the main
electrical substation which is feeding the Electric Arc Furnace (EAF) and Ladle Furnace (LF). The Fluke
434/435 Device “Three Phase Power Quality Analyzer” was connected at the measuring point location for
period of time to measure the required electrical parameters. These parameters are RMS Voltage, RMS Current,
Voltage THD, Current THD, individual harmonics, Active Power in MW, Reactive Power in MVAR, Power
Factor (PF), and Flickers for Long Term (Plt) and Short Term (Pst). The power quality measurements have been
conducted for a period of 120 hours. The data shows the voltage THD (THD V) and current THD (THD I) for
the data measured over a period of 120 hours. The graph shows high THDV at heat # 7 and heat 59 which are
the first heats after EAF maintenance period and without SVC in case of heat # 7. The EAF in this case is cold
and has no hot heel (cold bath). The electrical arc is on contact with hard scrap and DRI without the support of
hot heel. This usually causes higher THD V. The figure shows high values of Pst and Plt in six different
occasions. For Pst, the spikes at heats # 7 and # 59 were due to starting the EAF on cold path as first heat after
few hours stoppage for the maintenance activities. But in general, the power quality indices are within the IEEE
and IEC standards.
![Page 67: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/67.jpg)
ICCEEE 2013
43
Ali Ahmed Adam. Accurate Modeling of PMSM for Differential Mode current and Differential Torque
Calculation
Abstract: In this paper an accurate modeling of permanent magnet synchronous motor that is suitable for high
frequency differential mode calculation is proposed. The model takes into consideration the core losses and the
two resonance responses that occurred during the experimental results. The model is suitable for calculation of
torque ripple contribution due to flow of the differential current in motor winding. The experimental
measurements show that the motor differential mode stray capacitances are functions of rotor position. The
simulation results of the proposed differential mode circuits together with the experimental results show that the
level of the differential mode noise currents is of significant value that can not be ignored. However, the flow of
some of this differential mode current in the motor stator windings has small contribution of the torque ripple.
Auday Mohamad and Ali Ibrahim. Driving a Novel Phasors Formula for a Digital MHO Relay Algorithm
for High Voltage Transmission Line Based on Neural Networks
Abstract: Artificial neural networks and fuzzy logic are used in this paper to achieve a high speed, more
reliable and high accuracy fault detection for a high voltage transmission line. Traditional digital distance relay
designs use estimation algorithms to determine the phasors of currents and voltages. Current phasors are
affected by D.C decaying noise, this lead to slower response time or inaccurate decision of digital relay in some
cases. This paper presents a modified distance relaying algorithm that use phasors of voltage only that has been
combined with adaptive resonance theory (ART) neural network to eliminate the use of current phasors. The
neural network is trained to recognize faults on basis of a specific relay characteristic. The modified algorithm
eliminates the need of phasors estimation of current which is used as neural networks inputs to determine the
appearance of fault from relay location. The neural network has been trained using training patterns generated
from general normalized MHO characteristics. Three main software stages are used in the design. In the first
stage, a generation of fault patterns using concentric circles which represent impedances of line for different
types of fault. In second stage, adaptive resonance theory neural network has been trained for these patterns to
perform sets of clusters that hold characteristics of different types of faults. In third stage, a high voltage parallel
transmission line test system is simulated using power system computer aided design (PSCAD) program.
Different fault conditions including different fault resistances and different fault inception angles are applied
and a voltage signal has been read from one end of transmission line to generate input patterns to test the
designed algorithm by calculate the distance between these patterns and the clusters that are generated in stage
two using fuzzy logic. The test results have been compared with test results of relay algorithm use Discrete
Fourier Transform (DFT) for the same power system. The test results show that the relay is able to detect faults
in lesser time with high accuracy as compared to conventional digital relay algorithm that use Discrete Fourier
Transform (DFT) as phasors estimator algorithm.
Mohamed Khalifa, Abubakr Abdelhafiz and Azzedine Zerguine. Sparse Channel Estimation Using
Adaptive Filtering and Compressed Sampling
Abstract: Many real-life systems admit sparse representations with few non-zero coefficients. Examples
include multipath wireless communication channels where reflections reach the receiver with long delays. Many
![Page 68: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/68.jpg)
ICCEEE 2013
44
of the above applications require estimation techniques with computational complexity due to time-varying
dynamics and a large number of parameters to be identified. The wireless channel is described by sparse fading
rays and long zero samples and thus admits a sparse representation. Traditionally, adaptive algorithms such as
the least mean squares (LMS), the recursive least squares (RLS) and fast variants thereof have been widely
applied for estimation/equalization of such channels. One drawback of the above algorithms is that they have no
particular advantage in sparse system identification due to the fact that they do not utilize of the sparsity inherent
in the channels. In this work, two techniques for sparse-channel identification are compared: LMS algorithm
with a zero-norm constraint and the recently-developed Compressed Sensing (CS) technique. The performance
of these two techniques is compared using real-world channel measurements.
Mariana M Mounir, Aya E Hamid and Abdelrahman A Karrar. Development of Lightning Risk
Assessment Software in Accordance with IEC 62305-2
Abstract: The IEC 62305-2 standard presents a risk management procedure to assess the risk due to all possible
effects of lightning flashes to structures. This procedure is quite complicated. It requires the definition of about
68 parameters. It could take hours and hours of calculations to assess the primary risk on the structure and with
the need of performing it more than once to evaluate various protection schemas it becomes impractical to carry
out these calculations by hand. At the same time it seems that the software tools to carry out the necessary risk
assessment are extremely limited, with only one notable package developed by Furse. Hence it was felt that
there is a strong motivation to develop a user friendly software tool to simplify the process of lightning risk
assessment for designers. The Lightning Risk Assessment software developed has many powerful features
which may excel the capabilities in existing packages. It can successfully consider any type of structure with
any number of incoming lines. It allows for splitting the structure under consideration into multiple zones in
order to pinpoint high risk areas. It then performs an accurate risk assessment and shows in just a few seconds
where in the structure and why it is so important to arrange protection measures. Finally it guides the designer
and provides him with the adequate protection measures to reduce a certain risk to or below the tolerable limit.
The package is enhanced by incorporation of a graphical tool for estimating the collection area which provides a
user interface for drawing the structure, however complex it is. Existing packages usually only compute
collection areas for simple structures, forcing the user to manually enter the area for more complex shapes. The
software was tested on the highest building in Sudan, the National Telecommunications Corporation building
(+130 m high). Results were compared to the StrikeRisk v5.0 Risk Management Software by Furse and direct
computation of IEC 62305-2 and it was found that the match is almost perfect.
Mohammad Kamrul Hasan, Ahmad Fadzil Ismail, Aisha Hassan Abdallah, Khaizuran Abdullah, Rashid
Saeed, Huda Adiba Moh Ramli and Shayla Islam. Inter-cell Interference Coordination in LTE-A HetNets:
A Survey on self organizing approaches
Abstract: Heterogeneous Networks (HetNet) comprise networks with specially designed architecture. These
networks are composed of multi-mode, multi-layer, and multi-band network structures and utilize cells of
varying sizes. To cover large areas, established base stations (macro sites) are used; for coating buildings,
microcells are employed; for covering individual levels or floors in a building, Pico-cells are utilized; and finally
for providing wireless coverage to individual apartments, small offices, and home based businesses, femtocells
![Page 69: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/69.jpg)
ICCEEE 2013
45
are exploited. The goal behind the implementation of HetNets involves increment the capacity of the established
network, modifying spectrum use, lowering the capital and operating costs, and offering steady user-based
experience of network architecture. Furthermore, HeNodeBs have been developed for voice, data, video services
in home and offices and a certain outdoor scenario with a very limited geographical coverage. However, these
random small cell deployments cause severe problems and results interference in the network. Therefore the
ultimate is the total system performance degradation and this interference becomes a key challenge in HetNet.
This article investigates the performances of the current trends and approaches of interference in self organizing
network for LTE-A.
Hazir Farouk Abdelraheem, Andrew Lang and Mohammed Elhadi Ahmed Elsayed. Jatropha Curcas: A
Viable Alternative Source of Clean Energy to Meet Sudan’s Growing Energy Demand
Abstract: Jatropha (Jatropha curcas) is a plant native to Central America and is a source of oil and other by-
products with commercial potential and economic value. Recent studies have shown that the oil from Jatropha
seeds can be used for the production of biodiesel that meets the EN and ASTM biodiesel specification standards.
Biofuel produced from Jatropha curcas can be used in a variety of ways to meet Sudan’s energy demand,
particularly in the rural areas. Such usages range from fuel derived from Jatropha seeds or pelleted seedcake,
small-scale equipment suited to rural cooperatives for expelling oil, affordable engines and gensets that run on
pure vegetable oil. Use of all of these can be important in helping to stimulate rural and regional economies by
creating jobs and keeping money within the region, regardless of whether the Jatropha is grown on an industrial
scale or as small-scale plantings. The purpose of this paper therefore, is to detail the processes and the expected
outcome for biofuel production at a commercial scale in Sudan from Jatropha curcas oil feedstock. The paper
covers issues of policy development, sustainability and economics that need to be addressed by Sudan
authorities while taking this path toward sustainable biofuel production. The major source of information for the
paper was the development of the Roadmap for Sudan Biofuels Production, with the biodiesel component likely
to be sourced principally from Jatropha oil.
Shayla Islam, Aisha Hassan Abdalla, Mohamed Hadi Habaebi, M. K. Hasan, Suhaimi Latif and Rashid
Saeed. Multihoming Based Mobility Management Scheme in NEMO: A Qualitative and Quantitative
Analysis
Abstract: In order to support mobile network, a management mechanism of Network Mobility Basic Support
Protocol (NEMO BSP) has been standardized by Information Engineering Task Force (IETF). NEMO BSP is an
extension of Mobile IPv6 (MIPv6) and inherits all the shortcomings like higher handoff latency, packet loss etc.
As Network Mobility (NEMO) is engaged to manage the movement of Mobile Router (MR) and it’s Mobile
Network Nodes (MNNs) during handoff, it is very important to improve the performance of mobility
management protocol to achieve continuous Internet connectivity with lower delay and packet loss in NEMO
environment. When a change in point of attachment of the mobile network is accompanied by a sudden burst of
signaling messages, "Signaling Storm" occurs and it ultimately results in temporary congestion, handoff delays,
or even packet loss. This effect is especially noteworthy for wireless environment where bandwidth is relatively
limited. Therefore providing uninterrupted Internet connection through applying multihoming technique in
NEMO is becoming most significant areas for current researchers. The purpose of this paper is to give a general
![Page 70: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/70.jpg)
ICCEEE 2013
46
overview on existing mobility management approaches which enable multihoming and network based mobility
protocol with NEMO in an integrated manner. Furthermore, it highlights the strengths and the limitations of
these schemes for future analysis. Both the qualitative and the quantitative evolutions of these schemes are also
presented here.
Haruna Musa, Binta Usman and Sanusi Sani Adamu. Improvement of Voltage Stability Index Using
Distributed Generation for Northern Nigeria Sub-Transmission Region
Abstract: Introduction of Distributed Generation (DG) into our existing networks have changed the pattern of
power flow from conventional vertical power flow to bi-directional and this change has great implication on the
networks in terms of power loss reduction and voltage stability of the entire system. In view of this development
this paper proposes use of particle swarm optimization (PSO) for the optimal placement and sizing of DG in
Shiroro complex, a sub- transmission of northern part of Nigeria for the improvement of Voltage stability index
and power losses reduction. Based on simulation results obtained the presence of DG in the network has greatly
improved the voltage stability index of critical buses and these buses are now capable of taken more loads.
Hassan Hamdoun, Solomon Mangeni and Yogesh Dwivedi. Insights into Sustainable Energy-Capacity
Trends towards Bridging the Digital Divide
Abstract: This paper presents an analysis of energy-capacity trends of the broadband communications services
in Sub Saharan Africa sampling Sudan case. The analysis utilizes the joule/bit metric to visualize the
distribution of the broadband services availability across the country, hence the region. Consequently this
provides an explanation for how the energy-capacity relationship can impact the Digital Divide. The socio
economic aspects and policy impacts of this phenomenon are analyzed. We further present steps towards
implementing greener solutions to the digital divide via the introduction of Hybrid Wireless-fiber Broadband
access systems that combine Passive Optical Networks (PON) with Self-organizing wireless Networks based on
Wimax and LTE systems.
Shashank Srivastava and Nitin Singh. Compensation Technique and Power Quality Improvement in
Multiphase Distribution System
Abstract: The degradation in power quality is an important issue in these days drawing attention of industry
also. Multiphase distribution systems are better solution as compared to single and three phase systems due to so
inherent advantage as loads are split over multiple phases. As most of the loads in real life are inductive in
nature, reactive power is generated and thus requires compensation. In this paper compensation has been done in
six phase using modification in theories used for three phase systems.. Results are obtained for resistive and
inductive load and case of unbalanced system is also considered. Simulation model is developed in MATLAB /
Simulink environment.
Abdulwaheed Musa, Saad Bashir and Sameir Ali Hamed. Analysis of Aerodynamic Torques Affecting Dust
Particle Orientation as Input to Microwave Cross Polarization
Abstract: Cross polarization in microwave link, method of using dual orthogonal polarizations to optimally
conserve the frequency spectrum, has received considerable interest in the recent time. This paper implicitly
![Page 71: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/71.jpg)
ICCEEE 2013
47
discusses its prediction in sand and dust storms. Cross polarization in dust storms occurs due to the non-
sphericity of the falling dust particles and the tendency of the particles to align in a particular direction at a time
(canting angle). It is therefore important to have adequate information on the dust particle sizes, particle shapes,
orientation of particles along the propagation path etc. for the cross polarization due to dust storms. This work
deals with the latter two points by making use of a more reliable measure of turbulence shear and inertial torque
to tackle orientation of sand and dust storms suspended particles calculations as input to cross polarization
discrimination magnitudes. The paper explicitly analyses the systematic alignment of particles due to torque of
fluid flow round dust particles as a main parameter causing cross polarization. The results obtained show that
there exists some form of systematic alignment of particles in the most relevant size range that was considered.
Dalia Eltigani, Kamal Ramadan and Elfadil Zakaria. Implementation of Transient Stability Assessment
using Artificial Neural Networks
Abstract: This paper aim at verifyng the accuracy of Artificial Neural Networks (ANN) in assessing the
transient stability of a single machine infinite bus system. The fault critical clearing time obtained through ANN
is compared to the results of the conventional equal area criterion method. The multilayer Feed forward artificial
neural network concepts is applied to the system. The training of the ANN is achieved through the supervised
learning; and the back propagation technique is used as a gradient descent learning method in order to minimize
the training error. The training data set is generated using two steps process. Firstly the equal area criterion is
used to determine the critical angle. Then the swing equation is solved using the point-to-point method up to the
critical angle to determine the critical clearing time. Then the stability of the system will be verified. As a result
we find that the critical clearing time is predicted with less accuracy using ANN compared to the conventional
methods for the same input data sets
Elfadil Zakaria, Kamal Ramadan and Dalia Eltigani. Method of Computing Maximum Loadability Using
Continuation Power Flow: Case Study Sudan National Grid
Abstract: This work presents a method of finding a continuum of power flow solutions starting at some base
load and leading to the steady state voltage stability limit (critical point) of the system. Continuation power flow
calculation plays a key role to understand the limitation of power flow solutions in varying loads. It is useful for
evaluating the critical point of the PV curve in static voltage stability. P-V curves are constructed to calculate
loadability margins and identify the weakest bus in the system. However, drawing the P-V curve is time
consuming in large-scale power systems. As a result, The Power System Analysis Toolbox (PSAT), open source
Matlab software package for analysis and design electric power systems. PSAT includes power flow,
continuation power flow, and optimal power flow, small-signal stability analysis, and time domain simulation.
In this work we used continuation power flow only. The proposed method is successfully applied to the National
Grid. Our methods provided several results. We discussed the validity of results with the known IEEE 30-bus
system as a bench mark, in addition to other methods.
![Page 72: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/72.jpg)
ICCEEE 2013
48
Kamal Ramadan, Elfadil Zakaria and Dalia Eltigani. Prepaid Energy Meter Network via Power System
Communication
Abstract: This paper presents a new idea of designing a prepaid energy meters that has an ability of connecting
to a unified centre (Energy Company). The process of connecting the meters to a unified centre can facilitate the
security, control and maintenance purposes. The mentioned network is economical because it is established by
using the existing power lines instead of constructing a new wired or wireless network. The data is transmitted
over this network by using Power Line Communication (PLC) technology. A special device can inject the data
to the network and also it can capture the data from the network, this device is the power line communication
modem. A simple design of the network is done by using two computer and two modems (PLM) and a program
codes. By using a modem the program can take the measurements data from the meter then send them to the
computer server and vice versa. The designed network making the user (Energy Company) able to access any
prepaid energy meter in the unified area and to control the measurements of this meter; and as a result of this
action stealing of electricity can be prevented. Also the user (Energy Company) can communicate with the
consumer by sending text messages such as a serial number for recharging the energy or to alarm the consumer
before the whole amount of electricity is totally consumed. Moreover, this network offers the ability of
controlling the supply of energy such as switch “On” or “Off” of the electricity supplying. We have successfully
implemented the Energy Meter network via PLC for these suggested commercial and security applications to
demonstrate the advantage of reading and viewing the electricity consumption and recharging the prepaid meter.
The design implementation and result seems to be sufficient.
Moaaz Mahdi, Khaizuran Abdullah and Mohammad Umar Siddiqi. Impulsive Noise Mitigation in Haar
DWT Based OFDM Systems
Abstract: In this work, a simple mitigation technique for the effect of impulsive noise in Haar discrete wavelet
transform (DWT) based OFDM systems is presented. Based on the analysis for a certain configuration of Haar
DWT-OFDM, redundancy in the transmitted samples was found and exploited to mitigate the impulsive noise
by replacing the corrupted samples. The technique is implementable with different modulation schemes
(BPSK,QPSK and 16-QAM). Under the assumption of Bernoulli-Gaussian model for impulsive noise, the
proposed technique is efficient with low probability of impulse hit. With p = 0:001 and BPSK scheme, it can
achieve BER of around 10^{-4} saving around 7 dB of SNR.
Kauther Mahdi, Sami Sharif and Ahmed Ashur. Enhancement of Hardware Modular Multiplier Radix-4
Algorithm for Fast RSA Cryptosystem
Abstract: Algorithms and architectures for performing modular multiplication operations are important in
residue number system and cryptography. In this paper a new algorithm of Radix-4 MSB modular multiplier
using 4-2 compressor is presented. The recoding rules for the radix-4 Booth algorithm are used to reduce the
number of partial products and improve the total hardware area and time. This new algorithm avoided a carry
store and feedback in the some algorithms presented in the literature. It simulated and implemented using
MatLab and VHDL.
![Page 73: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/73.jpg)
ICCEEE 2013
49
Sara Elagib and Nada Osman. Design and implementation of Dual axis solar tracker based on solar maps
Abstract: Finding energy sources to satisfy the world’s growing demand is one of society’s foremost
challenges. Renewable energy in the form of electricity has been in use to some degree long years ago. Sources
such as Solar, Wind, Hydro and Geothermal have all been utilized with varying levels of success. In this context
the sun trackers are such devices for improving the efficiency of solar energy generating systems. The diurnal
and seasonal movement of earth affects the radiation intensity on the solar systems. Sun trackers move the solar
systems to compensate for these motions; The Solar Tracker attempts to navigate to the best angle of exposure
of light from the sun. This paper describes the design and development of a Microcontroller based solar tracking
system, based on solar maps, which can predict the exact apparent position of the Sun, by the latitude's location,
it also covers the solar tracking mechanical structure together with the associated electronic circuits. The
electromechanical tracker was implemented successfully, utilizing servo motors as actuators for the tracker, a
GPS to provide location, UTC time, a PC to perform heavy calculations, and an ATmega128 microcontroller as
the main controller, suitably programmed, to control the two servo motors to ensure that the panels supporting
structure is always oriented towards the sun.
![Page 74: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/74.jpg)
ICCEEE 2013
50
Biomedical Engineering
Yousif Elhadi Elsideeg Ahmed, Basem Ahmed M. Hassan, Salim Omer Abdallah Alzubaidi, Yassin
Mahmod M. Ibraheem and Mustafa G. Hadi Khamisi. Design and Test of a USB/Bluetooth/IP Self-
adaptive Connector for Sensor Network Application
Abstract: This research work provides a simple programmable interconnection medium to be used as sensor
node in sensor network applications with the capability to adapt itself according to the network coverage and
resources available or selected: either USB, Bluetooth network or IP network. Microcontroller, USB modules,
Bluetooth module internet module and temperature sensor used for system test in addition to C programming
language editor used for test software development. The developed system successfully detects and responds the
communications via these techniques. Therefore, it can be used in monitoring and measurement medical
systems
Soha Yousuf and Sahar Mohammed. A Parallel Computer System for the Detection and Classification of
Breast Masses
Abstract: Breast masses are regarded of paramount importance as attributed clear malignancy targets whose
detection proves acute for breast cancer diagnosis. Despite the boost in technology that has enhanced diagnostic
and clinical developments in the medical field; the accuracy to mammographic tumor evaluation still remains a
comprising issue. This is even, with greater regard towards mass detection. This paper is aimed towards creating
a dynamic mammographic image enhancement system in parallel to a tumor detection and classification system.
A dynamic listing of histogram-based algorithms constitutes the enhancement system. The detection and
classification system comprise of a segmentation seed region growing algorithm and a multilayer perceptron
(MLP) neural classifier using Backpropagation algorithm. Results have rendered the proposed techniques
promising with accurate levels of benign and malignant tumor discrimination and enhanced breast image
quality. The latter system achieved 88% sensitivity, 72% specificity, an Az value of 0.84 and an overall
classification accuracy of 80%.
Ola Abdalsalam, Al-Khanssa Osman, Roua Abd-Alhadi and Saad Alshmaa. Design of Non-Invasive
Glucose Measuring Device
Abstract: This device has been intended to provide an efficient method to monitor patients’ glucose level
without the need of puncturing the skin. Occlusion spectroscopy technique had been used to measure the
scattering angle of NIR when interacting with glucose molecules within the patients’ tissues. A significant
relationship between glucose characteristics and a certain range of wavelength in the EMS has been found,
further more a relationship between the angle of scattering and the glucose concentration has been found. This
study presents a new effective, simple and safe method to reduce any discomfort due to measurement
procedures produced by old invasive methods.
![Page 75: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/75.jpg)
ICCEEE 2013
51
Walaa Ahmed, Ahmed Osman, Yusra Ibrahim and Magdi B. M. Amien. MRI Brain Image Classification
Using Neural Networks
Abstract: Classification of brain tumor using Magnetic resonance Imaging (MRI) is a difficult task due to the
variance and complexity of tumors. This paper presents Neural Network techniques for the classification of the
magnetic resonance human brain images. The proposed Neural Network technique consists of three stages,
preprocessing, feature extraction with dimensionality reduction, and classification. In the first stage, we The MR
image will obtain and convert it to data form (encoded information that can be stored, manipulated and
transmitted by digital devices), in the second stage have obtained the features related with MRI images and
dimensionally reduced using principles component analysis (PCA), then In the classification stage the Back-
Propagation Neural Network has been used as a classifier to classify subjects as normal or abnormal MRI brain
images. In the experiments three datasets of MRI-Brain-Images have been used for tainting and testing the
proposed method. The result of the proposed technique was compared with the results of baseline algorithms,
and it presents validity as competitive results quality-wise, and showed that the classification accuracy of our
method is 96.33%.
Sulieman M. S. Zobly and Yasir M. Kadah. Multiple Measurements Vectors Compressed Sensing for
Doppler Ultrasound Signal Reconstruction
Abstract: Compressed sensing (CS) is a novel framework for reconstruction images and signals. In this work
we want to make use of the latest sampling theory multiple measurement vectors (MMV) compressed sensing
model, to reconstruct the Doppler ultrasound signal. Compressed sensing theory states that it is possible to
reconstruct images or signals from fewer numbers of measurements. In usual CS algorithms, the measurement
matrix is vectors so the single measurement vectors (SMV) applied to generate a sparse solution. Instead of
using the SMV model we want to make use of the MMV model to generate the sparse solution in this work.
Doppler ultrasound is one of the most important imaging techniques. To acquire the images much data were
needed, which cause increased in process time and other problems such as increasing heating per unit and
increasing the amount of the data that needed for reconstruction. To overcome these problems we proposed data
acquisition based on compressed sensing framework. The result shows that the Doppler signal can be
reconstructed perfectly by using compressed sensing framework.
Thowiba Sabeel, Fauzan Che Harun and Solima Sabeel. Detection of Volatile Compounds In Urine Using
An Electronic Nose Instrument
Abstract: Conventional clinical diagnostics tool for commonly detection of urine composition are based on
biochemical, physics and microbiological methods. Recent developments in gas-sensing technology and pattern
recognition methods make electronic nose technology an interesting alternative tool for medical point of care
devices. The gas emission from sample will cause changes in the gas sensors array conductivity, thus translating
the odour information to electrical signals that will be used for pattern recognition to differentiate or
discriminate samples. This work, focuses on discriminating between urine with various differences, in the term
of composition the result are verified using urine analyzer instrument to determine the availability of various
components in urine then, the comparison will be done with the data from e-nose system (Cyranose 320). There
![Page 76: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/76.jpg)
ICCEEE 2013
52
were thirteen samples, nine samples selected and classified as two healthy, one sample positive of bacteria and
sex mucus, the distinguished between healthy and unhealthy samples assayed by urine analyzer before
electronic nose experiment, the most abundant were mucus and bacteria as abnormal ranges. The data was
processed using principal component analysis and analysis of variance (ANOVA). The data analysis performed
shows the first principal components (PC1) and second principal components (PC2) results reveal that there is a
significant difference (F= 1151.795, P < 0.05) in sensors responses to differentiate between three group
containing various volatile compounds for PC2 showed (F= 0.034, P > 0.05). This work is a first step towards
developing an alternative measurement system, which does not need any conditioning or sample preparation, for
fast and simple clinical analysis of urine samples for early detection of disease.
Jacqueline J. George and Eman Mohammed Saeed Mohammed. Heart Disease Diagnostic Graphical User
Interface Using Fractal Dimension
Abstract: An Electrocardiogram (ECG) signal gives significant information for the cardiologist to detect
cardiac diseases. Cardiac diseases are among the main causes of death in the world. A significant amount of
research and development effort has been devoted on the detection of cardiac diseases, but still it is unable to
reduce the death rate. Therefore, it is necessary to have proper methods to determine the cardiac condition of the
patient. In this paper an easy method for detecting heart diseases is presented. ECG signals are self-similar
objects; can well be considered for fractal analysis. Fractal Dimension method was used to distinguish and
analyze three specific heart diseases namely Premature Atrial Contraction (PAC), Premature Ventricular
Contraction (PVC), and Atrial Fibrillation from the normal ECG signal. Rescaled range method was used to
determine the specific range of fractal dimension for each disease. ECG signals used were taken from three
databases, MIT-BIH Arrhythmia Database, the MIT-BIH Normal Sinus Rhythm Database, and the Intracardiac
Atrial Fibrillation Database. A Graphical User Interface was designed using MATLAB to help in diagnosing
patients. The GUI uses a raw ECG data to calculate the Fractal Dimension, to distinguish between the ECG
signals of healthy person and patients with the three specific heart diseases from the raw ECG data. The results
show that the methodological analysis does provide a significant clinical advantage, and matches doctors’
opinion.
Alia M. A. Siddig, Razaz Kh. Yousif and Muhanned Al Anwer Awaad. Motion Estimation in Ultrasound
Image Using Dynamic Multi-Shape Search
Abstract: Motion Estimation is a key problem in video processing and computer vision. It is the process of
determining motion vectors that describe the transformation from one 2-Dimension or 3-Dimension image to
another. Many algorithms for motion estimation have been proposed, but some are computationally expensive
and some have quality limitations. Block-Matching is a widely-used method for stereo vision, Visual tracking,
video compression, and objects motion estimation, in which images/videos extracted into macro-blocks, it is a
way of locating matching blocks in a sequence of digital video frames for the purposes of motion
estimation.Thereby achieving image/videos redundancy is reduced from one frame to another. In this paper a
new novel approach, we call it Dynamic Multi Shape Search technique, has been proposed to efficiently
estimate the location of atrial-septal-defect, which uses three steps with 23 points separated to 9 points with
semi diamond shape, then 9 points with square shape and finally 5 points with diamond shape. The main feature
![Page 77: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/77.jpg)
ICCEEE 2013
53
of this approach is to allow a full search, while being accurate at the same time. In addition it takes less time
than Four Step Search techniques. The contribution of this paper is to show that small or large motion can be
estimated directly by using our novel Dynamic programming Multi-shape Search Technique nstead the oldest
block-matching computation algorithms. Our new approach was compared with baseline algorithms like three
steps Search and four steps Search. The results showed the validity of our method as competitive results quality-
wise, and a significant gain speed-wise.
Muhanned Al Anwer Awaad, Razaz Kh . Yousif and Alia M. A. Siddig. Detecting and Tracking ASD using
New Block Flow in Ultrasound
Abstract: Medical ultrasound imaging is widely used to diagnose cardiac disorders and diseases. Atrial Septal
Defect (ASD) is one of the known congenital heart defect that can be detected using ultrasound
(Echocardiogram). There are many technique that have been developed for ASD detection (Chest X-ray,
Electrocardiogram (ECG), Magnetic resonance imaging (MRI) and many other techniques). But sometimes
these techniques are not accurate enough and need more tests to ensure the presence of ASD, in addition
consuming a lot of time. In this work, a technique was developed called Dynamic Multi Shape Search (DMSS).
This technique depends on detecting ASD and tracking blood flow; which combines the advantages of block
matching and optical flow techniques. It uses a search window that divides the ultrasound image into blocks and
finds the minimum difference between the test points of the test image with the standard one of ASD using Sum
Absolute Difference (SAD) criteria, then applied three steps with semi diamond, square and diamond shapes to
find the best match. The propos method compared with the baseline methods; which are less accurate, consume
a lot of time and some of them painful for patient. The results showed validity for our method as competitive
results quality-wise, and a significant gain speed-wise.
Tasneem Mahmoud and Omer Elfarouk Hamed. Discrimination of Four Classes in Brain-Computer
Interface Based on Motor Imagery
Abstract: The aim of science is to provide relief against weakness and disease, to help those who are disabled
to have a normal life without limitations. And when Albert Einstein said: “Imagination is more important than
knowledge.” may be even he didn’t imagine the possibility of using motor imagery (instead of actual
movement) in performing Brain computer Interface system to help those with severe motor disabilities and
spinal cord injuries to live normally. This study investigated the classification of multiclass motor imagery for
electroencephalogram (EEG)-based Brain-Computer Interface (BCI) using independent component analysis
(ICA), principle component analysis (PCA) and support vector machine (SVM) techniques. The dataset used is
available on BCI competition IV and we observed that the best published results were obtained by using Filter
Bank CSP, Naive Bayes Parzen Window classifier and LDA. And we improved in the way of using the
combination of ICA and SVM to obtain similar results. The proposed techniques were successful in classifying
four different motor imageries (MI) for 9 subjects who performed left hand, right hand, foot and tongue motor
imageries (MI) from EEG measurements.
![Page 78: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/78.jpg)
ICCEEE 2013
54
Safa Abdalziz, Shahd Tariq, Haifa Basher and Fragoon Ahmed. Measurement of Weight Distribution in
the Foot
Abstract: Recent advance in the development of methods for the measurement of static weight distribution on
the foot are reviewed and find that there is no low cost equipment in the present scenario to determine these
parameters, developing an economical method will help the doctors to diagnose the weight distribution in the
foot and the abnormality based on type of the foot. The major technical challenge is to design the individual
weight measuring point without using load cell or pressure sensor, since it increases cost of the equipment. This
system involves optical based weight measurement. As an additional feature, it measures the severity of loss of
sensation in the foot through a Vibro-tactile threshold sensation technique. This technique help assess the degree
of loss of sensation in the foot for a diabetes patient. our project involves two foot plates in which one is
designed with seven LED -LDR setup and the other a dummy. Depending on the weight of the person, the
intensity of light falling on the LDR from the LED varies. The detected signal is fed to the microcontroller for
processing and the output is displayed in a PC monitor.
Suliman Abdalla, Maha Abdelaziz and Amin Babiker. Architecture and Circuit Design Balance between
Integrated and Photon counting mode for X-Ray Pixel Array Detector Read-out Electronics
Abstract: This paper proposes new circuit architecture readout for X-ray pixel detector for imaging based on
the design of the integrating and single photon processing pixel array. The proposed architecture design
provides a balance between single photon processing mode and the integrating mode. This leads to a good
compromise of circuit complexity. We show that the increase of complexity, will lead to increase in circuit area
of less than that happened in the case of single photon processing mode
Amal Elawad, Braa Hagadam, Rabah Hamed and Eltaher Hussein. Design and Implementation of Robotic
System to Transport Disabled People
Abstract: The use of robotics in human healthcare is growing interest. In most institutions, services provided to
the elderly and disabled are unsatisfactory, mainly due to their dependence on human assistance. Utilizing
robots will spare human work force and help decreasing the risk of infection; and subsequently, economizing on
personnel and hygiene expenses. This paper discussed these issues in three points, in order to present a low cost
autonomous robotic wheelchair design to transport the elderly and disabled within hospitals. First, a design of a
robot was implemented on a small prototype. The robot was navigated using line-following with obstacle
detection technique; which is economical, simple and easily executed. Second, a design of a robotic wheelchair
was presented. The wheelchair was developed from manual wheelchairs used in hospitals after proper
adjustments, and a design of two gearboxes has been proposed. Third, the advantage of using robotic
wheelchairs inside hospitals was discussed by utilizing findings from previous studies. The robot prototype
circuit was built using optical and ultrasonic sensors, two DC motors and L293D motor driver; and programmed
with Atmega16L Microcontroller. The robot was able to follow a predetermined line-path and detect obstacles
within an acceptable range.
![Page 79: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/79.jpg)
ICCEEE 2013
55
Mawia Hassan, Shaza Gaib Alla, Ilaf Sarour and Mohammed Alfadny. Design of Digital Apodization
Technique for Medical Ultrasound Imaging
Abstract: Ultrasound imaging is one of the important noninvasive technique that using in medical diagnosis.
Unfortunately the far field beam pattern in ultrasound is a sinc function which has a better main lobe (the
resolution of ultrasound imaging) and high side-lobe about -13dB down from the maximum on axis value (the
contrast of ultrasound imaging). The result for that is one of a famous artifact in medical ultrasound that the
anatomy of the organ outside the main beam to be mapped into the main beam (false echo). This artifact is
known apodization. In this work we used different types of FIR filter to rounded edges of the aperture that taper
toward zero at the ends of the aperture to create low sidelobes level and reduce the false echo. We used
windowing function (hamming, hanning, Blackman, Bartlett, flattop, nuttall, Kaiser (β=8 and 10), parzen and
bohman) as apodization function to the reconstructed image to reduce the effect of the side-lobes. We computed
the SNR for each image and also the main lobe and the side-lobe. The results showed that there is trade-off in
selecting these function: the main lobe of the beam broadens as the side-lobes lower. However, Kaiser (β =10)
gave the best SNR (188.75 db) and best compensation between the contrast and resolution (main lobe=1.10 mm
and the side-lobe= -71.7db) We found that if we use the Kaiser filter (β =10) this would reduce the side-lobe and
improve the false echo in the ultrasound imaging.
Nada Osman. Comparison between Gold Nanoparticles and Conductive Polymer Nanoparticles Used in
Photothermal Therapy
Abstract: Nanoparticles have been used for over a decade in photothermal therapy for cancer treatment.
Photothermal therapy (PTT) is the process of using light-absorbing nanoparticles in the range of near-infrared
(NIR), to burn cancer cells by the heat generated from illuminating the nanoparticle. Gold nanoparticles (GNPs)
were commonly used due to their great ability to absorb and scatter light. Recently, certain types of conductive
polymer nanoparticles (CPNs) have been found to have the great ability to absorb NIR light. The aim of this
review paper is to study and compare between the optical and thermal properties of the GNPs and CPNs, in
order to find the optimum characteristics that best meet the requirements of PTT.
Alwaleed Abdelrahman and Omer Hamid. Evaluation of linear filter kernel developed from Ultrasound
phantom image
Abstract: the resolution reduction in ultrasound images is due to the nature of ultrasound propagation and
interaction with tissues, in which speckle noise is the dominant noise source. A tissue equivalent phantom, with
ultrasound properties similar to human tissues, was imaged and a background kernel was extracted from the
image to function as a linear filter. The phantom image has been studied to evaluate the kernel size and location
that could be selected. The objective of using the ultrasound phantom image is to simulate homogenous noise
distribution related to scanning parameters of the ultrasound system. Implementations of the proposed method in
pre-diagnosed images were presented. Standard filters were implemented to assess the performance of the
proposed algorithm. The proposed method presents better results than a number of common linear filters.
![Page 80: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/80.jpg)
ICCEEE 2013
56
Alwaleed Abdelrahman, Hassan Yasser, Maram Mahir and Fatma Mohammed. Human Skin Color
Recognition (identification): A case study
Abstract: Human skin color has been studied as biometric indicator, most of previous researches studies
focused in using skin color to detect the face, human motion and skin color. In this article commercial imaging
tool has been used to evaluate that every human being has a unique code in term of skin color properties, which
is different from one person to another even if they are relatives. Fifty picture of the nose were shots by a mobile
camera with a resolution of 3 mega pixel, included five pictures from one family. The nose area has been the
region of interest, where a specific part was cropped, to represent a region of less direct exposure to the sun light
as the rest of the face. The pictures were converted color from RGB to HSV format in order to isolate the effect
of the light intensity during shots. Finally all pictures were analyzed using mathematical and statistical methods.
This algorithm found that the variation in skin color from one person to another is statistically remarkable when
implementing this technique.
![Page 81: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/81.jpg)
ICCEEE 2013
57
Mechatronics Engineering
Gehad Hamdan, Saad Suliman and Al Khawad Elfaki. Carbon Nanotubes: Challenges and Opportunities
Abstract: Carbon nanotubes (CNTs) are one of the wonders of modern science discovered. They have shown
the research community an outstanding set of properties. CNTs have stimulated enormous interest for
conductive and high-strength composites; energy storage and energy conversion devices; biological and
chemical sensors; hydrogen storage media; and nanometer-sized semiconductor devices; and magnetic
recording, nano electronic devices and flat panel displays due to their unique physical and chemical properties
such as high surface-to-volume ratio, high conductivity, high strength and chemical inertness. In the past
decade, researchers made numerous attempts and efforts exploiting the exceptional properties of CNTs toward
the development of CNTs applications. A recent direction of research has been to try to gain further
understanding by the use of computational methods and models which appeared with the advancement of
computer technology. In this paper, a summary of recent research achievements related to the carbon nanotubes
and their applications in nanomaterials. Several important aspects that influence the properties of carbon
nanotube will also be discussed.
Zeinab Mahmoud Omer Yousif and Mergani Fathalrahman. Neuro-Fuzzy Inference System based
Controller in 6 DoF in Puma 560
Abstract: One of the problems in robotics field is, orientation of arm's end to desired location therefore the new
method must be find the solution of forward and inverse Kinematics (IK) problem. Traditional methods such as
iterative, geometric and algebraic are used to solve (IK) inadequate if the joint structure of the robot is more
complex. As the complexity of manipulator increases, solution of IK is difficult and computationally expensive.
In this paper, using the ability of Adaptive Neuro-Fuzzy Inference System (ANFIS) to learn from training data,
it is possible to create ANFIS with limited mathematical representation of the system. In the proposed method,
forward kinematics relations of robot arm are used to obtain the data for training and testing of ANFIS.
Simulation and practical results are carried out on a PUMA 560 with 6DoF robot arm and are used to show the
effectiveness of the approach.
Khalid Elhussein and Mohammed Elobaid. Smart Phones as System Integration Development Tools
(Android SCL Simulation Environment as Prototype)
Abstract: Smart phones and cloud computing were introduced to automation industry as components of
connected enterprise integration systems. The established protocols and interfacing done in that area, beside the
rapid growth of the hardware specification of those devices, was behind the motivation to think of smart phones
as programming and simulation devices. This paper proposes a conceptual design of a system integration work
structure based on smart phones and cloud computing. The conceptual design is supported by prototype of an
Android application for Siemens SCL programming and simulation. The proposal assumes a private cloud with
a SAAS/PAAS/IAAS cloud model owned by an Automation solutions vendor (provider) whereas the handheld
portable computing devices (e.g. smart phones) performs typical POUs (Project organization units)
configuration and/or programming of preconfigured device (controller) and uploading the generated and tested –
![Page 82: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/82.jpg)
ICCEEE 2013
58
by means of simulation- code as (.prj files) or .txt files to the cloud. As part of the design, the paper will present
a smart phone based automation application which will be capable of parsing the IEC 61131-3 SCL PLC
programming language code, interpreting and checking validity by means of a high level simulator (Java based),
generating a .txt file, this will assume a private cloud model and a coding (Engineering) management
application on the server side.
Ammar Atia, Moayad Mamoon Ibrahim, Omer Abd Algbar Mohamed and Musaab Hassan. Modeling of
Electrostatically Actuated Temperature Sensor
Abstract: Micro electromechanical system (MEMS) is an emerging technology that gives high accuracy and
high speed with least error due to the micro dimension. To design simple but accurate MEMS sensors remains a
challenge. Modeling of a MEMS temperature sensor, using simple microcantilever structure, is represented in
this paper. The sensor is actuated electrostatically. The effect of temperature on the resonance was calculated
using ANSYS software. The device was made of copper (contact electrode) , silicon (vibrating part) and silicon
oxide ( insulation layer). When the temperature varies the properties of the MEMS device also changes and
hence the resonance frequency.
![Page 83: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection](https://reader031.fdocuments.in/reader031/viewer/2022020416/5d437a0588c993ea558c0ebc/html5/thumbnails/83.jpg)