Abstract Book - Sudan University of Science and...

83

Transcript of Abstract Book - Sudan University of Science and...

Page 1: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection
Page 2: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

Abstract Book

2013 1st INTERNATIONAL CONFERENCE

on COMPUTING, ELECTRICAL and ELECTRONIC

ENGINEERING

(ICCEEE 2013)

‘Research Makes a Difference’

Corinthia Hotel, Khartoum, Sudan 26th

and 28th August 2013

http://icceee13.org/

Page 3: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

Jointly Technical Sponsored by

Sudan University of Science and Technology

&

University of Khartoum

Patrons

Ministry of Science and Communications

National Telecommunications Corporation

University of Gezira

Samsung Sudan

Co- organized by IEEE region 8

Organized by IEEE Sudan Subsection

Page 4: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

iii

Organizing Committee

General Chair

Sharief Fadul Babikir University of Khartoum

[email protected]

General Co-Chairs

Amir Abdelfattah A. Eisa Sudan University of Science & Technology

Jacqueline J. George Sudan University of Science & Technology

[email protected]

Secretaries

Tarig Mohamed Khalid University of Khartoum

Mussab Mustafa Hassan IEEE Sudan Subsection

Treasurers

Amir Abdelfattah A. Eisa Sudan University of Science & Technology

Tariq Faysal Kamil

Publication Chairs

Azza Elsiddig Eltraify IEEE Sudan Subsection

Sara Alabbas Doka IEEE Sudan Subsection

Page 5: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

iv

Technical Programme Committee

Chair

Rashid A. Saeed Sudan University of Science & Technology

Co-Chair

Bazara Barry University of Khartoum

Electrical Engineering Track Chair

Abdelrahman Ali Karrar University of Khartoum

Members

Kamal Ramadan University of Khartoum

Alfadil Zakaria Sudan University of Science & Technology

Sheroz Khan International Islamic University Malaysia

Electronic Engineering Track Chair

Ghassan Taha University of Khartoum

Members

Saad Bashir International Islamic University Malaysia

Eugene Golovins University of Pretoria

Neco Ventura University of Cape Town

Mohammed Ali Abbas University of Khartoum

Iman Abuel Maaly University of Khartoum

Computing Track Chair

Rania Mokhtar Sudan University of Science & Technology

Members

Mohamed Sidahmed Upstream Technology R&D, BP, UK

Mohamed A. Elhindi University of Wisconsin-La Crosse, USA

Mohsen Mahroos Cairo University, Egypt

Alla'Ddin Awooda Sudan University of Science & Technology

Ashraf Abdelhafiz Osman Intel Corporation, USA

Mohammed Mustafa Sudan University of Science & Technology

Mechatronic Engineering Track Chair

Musaab Zaroug Sudan University of Science & Technology

Members

Al-Khawad Ali Elfaki Ahmed Sudan University of Science & Technology

Asan G. A. Muthalif International Islamic University (Malaysia)

Nassereldeen Kabashi International Islamic University (Malaysia)

Biomedical Engineering Track Chair

Magdi B. M. Amien University of Gezira

Members

Moawia Amed Hassan Sudan University of Science & Technology

Omer Elfaroug Hussien University of Gezira

Fregoon Mohamed Ahmed Sudan University of Science & Technology

Khalid Ibrahim Hussien University of Gezira

Yasser Mostafa Ibrahim Kadah Cairo Universiy

Qingguo Xie Huazhong University of Science & Technology

Page 6: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

v

International Advisory Board

Sami M Sharif, Sudan

Mohamed Shambool Adlan, Sudan

Izzeldin Mohammed Osman, Sudan

Izzeldin Kamil Amin, Sudan

Yahia Abdalla Hamad, Sudan

Jaafar MH Elmirghani, UK

H. Anthony Chan, USA

Omer Mahmoud, Canada

Ibrahim Mohammed Elamin, Saudi Arabia

Johnson Agbinya, Australia

Borhanuddin Mohd Ali, Malaysia

Othman O. Khalifa, Malaysia

Omer Mohammed Nor, Sweden

Samir Ibrahim Shaheen, Egypt

Peter Stavroulakis, Greece

Page 7: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

vi

Welcome Remark

Dr. Shareif F. Babikir

General Chair of ICCEEE Organizing Committee

On behalf of the Organising Committee of ICCEEE-2013, the IEEE-Sudan Subsection, The sponsors of the conference and the Patrons, I am pleased to welcome you our wonderful city of Khartoum. I would like to thank everybody who made this conference a success. Holding such a conference in Sudan has been a dream since the establishment of the IEEE Subsection in Sudan. This has been a result of a huge effort and collaboration between leading Sudanese Universities, Governmental agencies together with a large number of volunteers.

We hope this long awaited meeting would bring experts, academics, professionals and students together in one forum to discuss on various topics of Computing, Electrical and Electronic Engineering ranging from their state-of-the-art aspects, industrial applications to prospects and possible breakthroughs in the future.

We hope that our students would benefit greatly from this conference. Meeting experts and academics would create a research culture among the young generations and inspire these young brains to be the inventors and leaders of tomorrow.

It is our dream that the ICCEEE-2013, been our first conference sponsored by IEEE-Sudan, will be the first of many more specialised conferences to be organised by academic institutions and Sudanese research and development bodies to create a solid research culture and cement professionalism among our engineers and researchers.

We wish you a nice stay in our lovely city and hope that you benefit and enjoy the academic sessions and other events of the conference.

Dr. Sharief F. Babiker General Chair, ICCEEE-13

Page 8: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

vii

Welcome Remark

Dr. Rashid A. Saeed

Technical Programme Committee Chair

On behalf of the technical committee of 1st ICCEEE 2013, I would like to welcome you all to our first ever IEEE conference in Sudan, which organized by IEEE Sudan Subsection with support of IEEE region 8. The main aim of this conference is to enrich the research culture among our research community; this stated in our motto “Research makes a difference”.

We have received 321 paper submissions from 29 countries. In five different tracks Computing, Electrical, Electronics, Biomedical, and Mechatronics Engineering. All papers were carefully peer-reviewed by 448 reviewers, with each paper reviewed by at least 2 reviewers. Only 138 papers were accepted for presentation. I feel proud of the papers quality we have accepted and published in IEEEXplore and I would like to express my deep gratitude to the TPC members and reviewers for their unlimited support and hard times to catch the deadlines we have committed. The reject rate was about 48%. We believe that many good manuscripts were rejected, this due to maintain the high quality.

The conference is arranged in 29 technical sessions and 3 parallel tracks. The papers are categorized under some of the current topic of interests such as artificial intelligence, fuzzy logic, pattern recognition, security, wireless sensor, RF and antennae, wireless communication and many more.

Maybe I can share with you some of the interesting statistics, which about 70% of the submissions were come from computing and electronics communities. This gives indication of how these two groups are contributing to our research pool. However in the meantime, we should put more efforts on biomedical, mechatronics and electrical researches.

Finally, I hope you will enjoy the keynotes, tutorials and technical sessions hosted in the five stars Corinthia Hotel from 26 to 28 August 2013 from 9am to 7 pm. And once again welcome in Khartoum where the two Niles meet in an unforgettable scene.

Dr. Rashid A. Saeed Technical Committee Chair, ICCEEE-13

Page 9: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

viii

Conference Programme

8.00 - 9.00AM 9.00 - 10.AM 10.00-11.00 11.00-

12.00

12.00-

13.20

13.20 -

14.20

14.40 -

16.00

16.00 -

16.20

16.20 -

17.40 18.00 - 20.00

Day 1

(26/8/13) Registration Opening Ceremony

Refre

shm

ent &

Bre

ak

TS11,

TS12 and

TS13

Pra

yer

Tim

e (Zu

hr) &

Lu

nch

TS14,

TS15 and

TS16

Pra

yer

Tim

e (Asr)

TS17,

TS18 and

TS19

Interactive Session

Day 2

(27/8/13) Networking

Keynote Speech

I

Keynote

Speech II

TS21,

TS22 and

TS23

TS24,

TS25 and

TS26

TS27,

TS28 and

TS29

Interactive Session

Day 3

(28/8/013) Networking

Keynote Speech

III Refreshment

& Break

Tutorials

I, II &III

TS31,

TS32 and

TS33

TS34, and

TS35 Social Activities

General Remarks

Language of presentation: English

Presentation time : 13 minutes

Presentation method: Slide presentation

Upload presentation before start of session

Fill up presenter biodata form before start of session (Biodata form will be supplied during conference)

COLOUR CODE:

Keynote Speeches & Tutorials

Computing

Communications

Electronics, Electrical, Biomedical and Mechatronics

Page 10: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

ix

Keynote Speeches

Keynote Speaker I: Professor Narayan Chandra Debnath

SOFTWARE ENGINEERING MODELS, METRICS AND TOOLS RESEARCH – CHALLENGES AND OPPORTUNITIES

Day 2 27 August 2013

09.00 – 10.00AM

Chairperson: Prof. Dr. Ibrahim El-Amin

Keynote Speaker II: Dr. Fanny Klett

THE WAR FOR TALENT -

CHALLENGES AND OPPORTUNITIES FOR ICT AND INNOVATION

Day 2 27 August 2013

10.00 – 11.00AM

Chairperson: Prof. Dr. Mustafa Nawari

Keynote Speaker III: Prof. Dr. Hinghung Anthony Chan

DISTRIBUTED MOBILITY FOR FUTURE MOBILE INTERNET

Day 3 28 August 2013

09.00 – 10.00AM

Chairperson: Dr. Bazara Barry

Tutorials

Tutorial I: Professor Ibrahim El-Amin

INTRODUCTION TO POWER QUALITY

Day 3 28 August 2013

11.00AM – 12.00Noon

Chairperson: Dr. Abderahman Karrar

Tutorial II: Dr. Hassan Hamdoun

AN INTERNET DIFFUSION, ASSOCIATED ENERGY CONSUMPTION AND WEB LITERACYDay 3

28 August 2013

11.00AM – 12.00Noon

Chairperson: Dr. Rania A. Mokhtar

Tutorial III: Prof. Dr. Mustafa Nawari, Eng.Yousif Hussin, Eng. Hind Mohamed

PKI TECHNOLOGY: THE SECURITY INFRASTRUCTURE FOR SUDAN'S E-GOVERNMENT

Day 3 28 August 2013

11.00AM – 12.00Noon

Dr. Amir Abdelfatah Eisa

Page 11: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

x

Paper Presentations

Day ONE: 26 August 2013

Technical Session ICCEEE 2013 (TS 11)

12.00-13.20pm (Room I)

TECHNICAL SESSION 1A: Text and Speech Processing Chairpersons: Prof. Dr. Othman O. Khalifa & Dr. Alla Adin Awooda

204 Semantic Web services for Nubian language

Ahmed Yousri Salama Mohammed,

105 Differential Evolution Cluster-based Text Summarization Methods

Albaraa Abuobieda, Naomie Salim, Mohammed S. Binwahlan and Ahmed H. Osman,.

145 Segmentation Approach for Online Arabic Handwriting

Hozeifa A. Abd Alshafy and Mohamed A. Mustafa,

181 ETAOSD: Static Dictionary-Based Transformation Method for Text Compression

Fadlelmoula M. Baloul, Mohsin H. Abdullah and Elsadig A. Babikir,

213 Segmentation Algorithm for Arabic Handwritten Text

Yusra Osman,

238 Acoustic Approach to Spoken Arabic Language Detection

Mohammed Elfahal and Mohammed Elhafiz,

Technical Session ICCEEE 2013 (TS 12)

12.00-13.20pm (Room II)

TECHNICAL SESSION 1B: Networking

Chairpersons: Prof. Dr. Aisha A. Hassan & Dr. Abuagla Babikir

269 Network Coding for hybrid Satellite-terrestrial Networks over non-identical Fading Channels

M. Awais Jadoon, Zainab A.Khan, Imran Khan, Ahmad Shah and Othman O. Khalifa

249 Localization for Wireless Sensor Networks Osman M. Elfadil,

8 Routing Protocols in ad-hoc Networks Performance of Standardized

Tariq Al-Ahdal and Saida Mohammad,

186

Multihoming Based Mobility Management Scheme in NEMO: A Qualitative and Quantitative

Analysis

Shayla Islam, Aisha Hassan Abdalla Hashim Hashim, Mohamed Hadi Habaebi Habaebi, M.K. Hasan

Hasan, Suhaimi Latif and Rashid Saeed,

202 Multicasting in Network mobility using Multicast Anchor Agent

Abdemuizz Adam,

102 A Multi-Layer Network Defense System using Artificial Immune System Mohamed M. K. Elhaj, Mamoun M. Suliman and Hussam Hamrawi.

Technical Session ICCEEE 2013 (TS 13)

12.00-13.20pm (Room III)

TECHNICAL SESSION 5B: Grid and Energy

Chairpersons: Prof. Dr. Ibrahim M. El-Amin & Dr. Ashraf Osman

43 A novel Control Method of Grid Connected Doubly Fed Induction Generator under Variable

Wind Speed Zakieldeen Elhassan, Li Yang and Tang Yi.

294 Method of Computing Maximum Loadability using Continuation Power Flow,Case Study Sudan

National Grid

Elfadil Zakaria, Kamal Ramadan and Dalia Eltigani.

215 Insights into Sustainable Energy-Capacity Trends towards Bridging the Digital Divide

Hassan Hamdoun, Solomon Mangeni and Yogesh Dwivedi

28 Optimization of Nuclear Energy Generation

Dryan Marende.

136 Jatropha Curcas: A Viable Alternative Source of Clean Energy to Meet Sudan’s Growing Energy

Demand

Hazir Farouk Abdelraheem, Andrew Lang and Mohammed Elhadi Ahmed.

46 Power Quality Indices :A Saudi Steel Mills Case Study

Ibrahim Elamin, Abdullah Al-Elyani and Abdelrahman Shuaib.

Page 12: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

xi

Technical Session ICCEEE 2013 (TS 14)

14.40 - 16.00pm (Room I)

TECHNICAL SESSION 4B: Data Mining

Chairpersons: Dr. Mohamed Elhafiz Mustafa & Dr. Nisreen Beshir

160 Extended Abstract: Mining Lexico-syntactic Patterns to Extract Chemical Entities with their

Associated Properties

Safaa Eltyeb and Naomie Salim,

180 Credit Scoring Using Data Mining Techniques

Eiman Kambal, Izzeldin Osman, Noon Mohammed, Sara Mohammed and Methag Taha,

103 Modeling Customer Relationship Management using Data Mining

Amira Kamil Ibrahim and Ajith Abraham.

287 Verifying Abstract Data Types: A Hybrid Approach

Nahid Ahmed Ali,

98 Specifying Abstract Data Types: A Behavioral Model, An Axiomatic Representation

Abdelrasoul Yahya.

280 Multi Document Summarization Based On Cross-Document Relation Using Voting Technique

Yogan J. Kumar, Naomie Salim, Albaraa Abuobieda and Ameer Tawfik,

Technical Session ICCEEE 2013 (TS 15)

14.40 - 16.00pm (Room II)

TECHNICAL SESSION 5A: Wireless Communication

Chairpersons: Dr. Hinghung Anthony Chan & Dr. Sami H.O. Salih

149 Performance Evaluation of DS-WCDMA

Khalid Bilal, Ibrahim Khider and Amin Abdelnabi

59 Efficient Design of Dual Digital Up Converter for WCDMA and CDMA2000 Using System

Generator

Mohamed Omara

245 Evaluation of Gateway Placement Approaches in Wireless Mesh Network

Awadallah Ahmed and Aisha Abdalla,

115 Synchronization Wireless Algorithm Based On Message Digest (Swamd) For Mobile Database

Taqwa Ahmed, Mariam Taha and Faiza Alim,

291 An Analysis of Resource Sharing Scheme in Heterogeneous Wireless Campus Network

Mosharrof H. Masud, Suhaimi A. Latif, Farhat Anwar and Md K. Alam,

38 Adaptive Joint Call Admission Control to Support QoS in Heterogeneous 4G Wireless Networks

Jacqueline J. George and Nada M. Adalla.

Technical Session ICCEEE 2013 (TS 16)

14.40 - 16.00pm (Room III)

TECHNICAL SESSION 5B: Biomedical (Instrumentation)

Chairpersons: Dr. Magdi Baker & Dr. Ashraf Osman

182 Motion Estimation in Ultrasound Image Using Dynamic Multi-Shape Search Alia M. A. Siddig, Razaz Kh. Yousif and Muhanned Al Anwer Awaad,

152 Multiple Measurements Vectors Compressed Sensing for Doppler Ultrasound Signal

Reconstruction

Sulieman M. S. Zobly and Yasir M. Kadah,

187 Detecting and Tracking ASD using New Block Flow in Ultrasound

Muhanned Al Anwer Awaad, Razaz Kh . Yousif and Alia M. A. Siddig

263 Comparison Between Gold Nanoparticles and Conductive Polymer Nanoparticles Used in

Photothermal Therapy

Nada Osman,

282 Evaluation of linear filter kernel developed from Ultrasound phantom image

Alwaleed Abdelrahman and Omer Hamid.

244 Design of Digital Apodization Technique For Medical Ultrasound Imaging

Mawia Hassan, Shaza Gaib Alla, Ilaf Sarour and Mohammed Alfadny.

Page 13: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

xii

Technical Session ICCEEE 2013 (TS 17)

16.20 - 17.40pm (Room I)

TECHNICAL SESSION 5B: Software Engineering

Chairpersons: Prof. Narayan Chandra Debnath & Dr. Hisham Abushama

74 Popular Agile Approaches in Software Development: Review and Analysis

Amani Alnimir and Hisham Abushama.

118 A Study of Software Process Improvement for Some Sudanese Organizations

Arafat Abdulgader, Mohamed A. Elshaikh and Radziah Mohamed,

314 Upgrading Distributed Agile Development

Aisha Hamid,

240 Enabling Use Case Function point on Service-oriented Architecture

Nusiba Abdalrhman Ahmed and Abdelgaffar Hamed,

214 Service Discovery using Perdurant Ontology

Afaf Mohamed and Robert Colomb.

125 A Validated Model for the Quality in Use of Mobile Government Systems

Nisreen B. Osman and Izzedin M. Osman.

Technical Session ICCEEE 2013 (TS 18)

16.20 - 17.40pm (Room II)

TECHNICAL SESSION 5A: Communication I (Wireless)

Chairpersons: Dr. S.M.A Motakabber & Dr. Sara Eljack

77 Design and Test of a USB/Bluetooth/IP Self-adaptive Connector for Sensor Network Application

Yousif Elhadi Elsideeg Ahmed, Basem Ahmed M. Hassan, Salim Omer Abdallah Alzubaidi, Yassin

Mahmod M. Ibraheem and Mustafa G. Hadi Khamisi, Sudan

50 Energy Aware Routing Protocol for Low Energy Sensor

Adel Gaafar.

101 Lightweight Inter-cluster Synchronization Scheme for Femtocell Network

Omnia Ahmed, Rashid A.Saeed and Mohammed Kamrul Hasan.

167 Implementation of Adaptive Modulation for Broadband Wireless Access Networks using

Cognitive Radio Approaches

Sami Salih, Mamoun Suliman, Abbas Mohamed and Ali Al-Refai.

15 Multifunction Filter for The Processing of Radar Signals

Moutaman Mirghani Daffalla.

319 A GPS Based Traffic Light Pre-emption Control System for Emergency Vehicles

Abubakr Eltayeb, Halla Almubarak and Tahani Attia.

Technical Session ICCEEE 2013 (TS 19)

16.20 - 17.40pm (Room III)

TECHNICAL SESSION 5B: Biomedical (UltraSonic)

Chairpersons: Dr. Magdi Baker & Dr. Rashidah F. Olanrewaju

91 Design of Non-Invasive Glucose Measuring Device

Ola Abdalsalam, Al-Khanssa Osman, Roua Abd-Alhadi and Saad Alshmaa,

154 Detection of Volatile Compounds in Urine Using an Electronic Nose Instrument

Thowiba Sabeel, Fauzan Che Harun and Solima Sabeel,

162 Heart Disease Diagnostic Graphical User Interface Using Fractal Dimension

Jacqueline J. George and Eman Mohammed Saeed Mohammed,

200 Discrimination of Four Classes in Brain-Computer Interface Based on Motor Imagery

Tasneem Mahmoud and Dr. Omer Elfarouk Hamed.

207 Measurement of Weight Distribution in The Foot

Safa Abdalziz, Shahd Tariq, Haifa Basher and Fragoon Ahmed.

229 Architecture and Circuit Design Balance between Integrated and Photon counting mode for X-

Ray Pixel Array Detector Read-out Electronics

Suliman Abdalla, Maha Abdelaziz and Amin Babiker.

Page 14: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

xiii

Day TWO: 27 August 2013

Technical Session ICCEEE 2013 (TS 21)

12.00-13.20pm (Room I)

TECHNICAL SESSION 3A: Security and Encryption

Chairpersons: Dr. Mohamed Fadlalla Elhag & Dr. Abuagla Babikir

57 A Hybrid Approach to Secure Transmitted Messages Using Advanced Encryption Standard

(AES) and Word Shift Coding Protocol

Abdelrahman Altigani and Bazara Barry,

305 Evaluating the Impact of AES Encryption Algorithm on Voice over Internet Protocol (VoIP)

Systems

Sulafa Khaled Talha and Bazara I. A. Barry,

84 Binary LU Encryption

Abdelhaliem Abbas,

285 Developing a Security Model to Protect Websites from Cross-site Scripting Attacks

Yousra Gad and Bazara Barry,

137 Measuring the Cybersecurity of Cloud Computing

Nahla Murtada.

86 A Parallel Computer System for the Detection and Classification of Breast Masses

Soha Yousuf and Sahar Mohammed.

Technical Session ICCEEE 2013 (TS 22)

12.00-13.20pm (Room II)

TECHNICAL SESSION 5A: Communication II (Wireless)

Chairpersons: Dr. Jacqueline John George Dr. Sara Eljack

61 Sparse Channel Estimation Using Adaptive Filtering and Compressed Sampling

Mohamed Khalifa, Abubakr Abdelhafiz and Azzedine Zerguine.

85 Inter-cell Interference Coordination in LTE-A HetNets: A Survey on self organizing approaches

Mohammad Kamrul Hasan,

302 Impulsive Noise Mitigation in Haar DWT Based OFDM Systems

Moaaz Mahdi, Khaizuran Abdullah and Mohammad Umar Siddiqi.

1 An Enhanced HWMP (E-HWMP) Protocol for Multihop Vehicular Communications

Amal Eltahir and Rashid Saeed.

168 A Novel Spectrum Sensing Scheduler Algorithm for Cognitive Radio Networks

Sami Salih, Mamoun Suliman and Abbas Mohamed.

321 Development of a Position Detection Technique for Chipless RFID Tagged Object

S. M. A. Motakabber, Muhammad Ibn Ibrahimy and A. H. M. Zahirul.

Technical Session ICCEEE 2013 (TS 23)

12.00-13.20pm (Room III)

TECHNICAL SESSION 5B: Mechatronics

Chairpersons: Dr. Musaab Hassan Zaroog & Dr. Alla Eldin Awooda

239 Design and Implementation of Robotic System to Transport Disabled People

Amal Elawad, Braa Hagadam, Rabah Hamed and Eltaher Hussein.

36 Carbon Nanotubes: Challenges and Opportunities

Gehad Hamdan, Saad Suliman and Al Khawad Elfaki.

165 Modeling Of Electrostatically Actuated Temperature Sensor

Ammar Atia, Moayad Mamoon Ibrahim, Omer Abd Algbar Mohamed and Musaab Hassan.

42 The Potential of Establishing Computer_Aided_Design (CAD) Industry in Africa: Sudan Case-

Study

Ashraf Osman, Amin Nabi and Ismail El-Azhary.

320 Performance Analysis of Different Techniques for Brain Computer Interfacing

Mohammad R. Hasan, Muhammad Ibn Ibrahimy and S.M.A. Motakabber.

252 Navigation Algorithm for Mobile Robots using WSNs

Osman Mudathir Elfadil.

Page 15: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

xiv

Technical Session ICCEEE 2013 (TS 24)

14.40 - 16.00pm (Room I)

TECHNICAL SESSION 1B: Pattern Recognition

Chairpersons: Dr. Hanan Adlan & Dr. Jacqueline John George

53 Speech Scrambling Based on Chaotic Maps and One Time Pad

Samah M. H. Alwahbani and Eihab B. M. Bashier

270 Face Recognition Using Local Graph Theory (LGT)

Eimad Abusham and Housam Basheir

227 On Password Strength Measurements: Password Entropy and Password Quality

Ala E.Moktar,Azza H.Salim, Settana M.Abdullah, Mariam M.Taha and Taqwa A.Alhaj

286 Feature Selection and Similarity Coefficient Based Method for Email Spam Filtering

Ali Ahmed, Ammar E. Elhadi, Hamza A. Hamza and Naser Elmisbah

288 An Improved Semantic Plagiarism Detection Scheme Based on Chi-squared Automatic

Interaction Detection

Ahmed Osman and Naomie Salim

262 A Tree-based Conceptual Matching For Plagiarism Detection

Ahmed Osman, Naomie Salim and Ammar E. Elhadi

Technical Session ICCEEE 2013 (TS 25)

14.40 - 16.00pm (Room II)

TECHNICAL SESSION 5B: RF and Antenna

Chairpersons: Prof. Dr. Saad O. Bashir & Sami H.O. Salih

141 New Fields Expressions of a Traveling Wave Circular Loop Antenna

Sameir Ali Hamed and Saad Bashir.

3 Near-Fields of an Array of Circular-Loop Antennas

Sameir Ali Hamed, Abdulwaheed Musa and Saad Bashir.

33 Reconfigurable Dual Band Antenna for 2.4 and 3.5GHz using Single PIN Diode

Alaa A. Yassin and Rashid A. Saeed.

35 Angle of arrival estimation in smart antenna by using MUSIC method for wideband wireless

communications

Nihad A. A. Elhag, Isam M. Osman, Alaa A. Yassin and Tsneem B. Ahmed.

171 Optimizing the Performance of Branch-line Couplers Using Open Ended Stubs

Siddig Gomha, Abdel Aziz T. Shalaby and El-Sayed M. El-Rabaie.

281 Analysis Of Aerodynamic Torques Affecting Dust Particle Orientation As Input To Microwave

Cross Polarization

Abdulwaheed Musa, Saad Bashir and Sameir Ali Hamed.

Technical Session ICCEEE 2013 (TS 26)

14.40 - 16.00pm (Room III)

TECHNICAL SESSION 5A: Electrical engineering I

Chairpersons: Dr. Kamal Ramadan & Dr. Amir Abdelfatah Eisa

208 Abinitio Method Study of Ionic Conductor CaF2

Nahid Osman, Gamar Mansour, Nodar Khalifa, Karlo Kuacgor Mathang and Alwaleed Adllan.

148 Mechanism for Charge Sharing Suppression in Single Photon Processing Pixel Array

Suliman Abdalla, Amin Babiker and Farouq Habbani.

195 Improvement of Voltage Stability Index Using Distributed Generation for Northern Nigeria Sub-

Transmission Region

Haruna Musa, Binta Usman and Sanusi Sani Adamu.

257 Compensation Technique and Power Quality Improvement in Multiphase Distribution System

Shashank Srivastava and Nitin Singh.

311 Design and implementation of Dual axis solar tracker based on solar maps Sara Elagib and Nada Osman.

6 On the Steady-State Error Covariance Matrix of Kalman Filtering with Intermittent

Observations in the Presence of Correlated Noises at the Same Time

Khalid Hag El Amin and Mirghani Fath Elrahman.

Page 16: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

xv

Technical Session ICCEEE 2013 (TS 27)

16.20 - 17.40pm (Room I)

TECHNICAL SESSION 4A: Security and Authentication

Chairpersons: Dr. Prof. Mustafa Nawari & Dr. Anwar Dafa-Alla

95 A Multi-Layer of Multi Factors Authentication Model for Online Banking Services Mahmoud Musa and Muna Ahmed.

309 Enhancement of Hardware Modular Multiplier Radix-4 Algorithm for Fast RSA Cryptosystem

Kauther Mahdi, Sami Sharif and Ahmed Ashur,

119 Authenticated Key Agreement protocol for Virtual Private Network based on Certicateless

Cryptography Abeer Eldewahi and Eihab Bashier,

218 Enhancement model for PKI certificate validation in the Mobile Banking Majda Omer and Eihab Bashir,

29 K-Nearest Neighbor classifier for Signature Verification System

Ahmed Abdelrahaman and Ahmed Abdallah,

199 Extracting Knowledge from Web Server Logs Using Classification Technique

Mirghani Eltahir and Anwar Dafa-Alla,

Technical Session ICCEEE 2013 (TS 28)

16.20 - 17.40pm (Room II)

TECHNICAL SESSION 5A: Electrical (Systems)

Chairpersons: Dr. Abderahman Karrar & Dr. Amir Abdelfatah Eisa

217 The Unscented Kalman Filter Applied to Satellite Orbit Determination

Ahmed Yassin, Elhussein Abd Elmageed, Mazin Hamad and Mahmoud Osman.

295 Prepaid Energy Meter Network via Power System Communication

Kamal Ramadan, Elfadil Zakaria and Dalia Eltigani.

221 Mathematical Modeling of Growth Conditions and Interpretation of Phase Diagram for InxGa1-

xN Epitaxial Layer

Md. Rafiqul Islam, Md. Soyaeb Hasan and Apurba Kumar Saha.

289 Sudan HF Model based on University of Khartoum Ionospheric Shells and their Mathematical

Derivations

Mohamed Yousif and Sami Sharif.

79 Development of a Lightning Risk Assessment Software in Accordance with IEC 62305-2

Mariana M Mounir, Aya E Hamid and Abdelrahman A Karrar.

Technical Session ICCEEE 2013 (TS 29)

16.20 - 17.40pm (Room III)

TECHNICAL SESSION 3B: Computing

Chairpersons: Dr. Hassan Hamdoun & Dr. Mohammed Abdalla Khaleel

220 On the Cache Performance of Information Centric Network

Suhaidi Hassan, Zeeshan Aziz and Kashif Nisar,

64 Development of Computer Aided Tools for UAV Flight Control

Abdelmoniem Idris, Abdelraheem Satti, Ahmed Imam and Moutaman Mirghani,

301 Cloud Computing for Rural ICT Development: Opportunities and Challenges

Mohamed Firdhous, Osman Ghazali and Suhaidi Hassan,

210 Extreme Programming Applied in a Large-Scale Distributed System

Elmuntasir A. Eltom and Eltigani Bashir,

169 Designing Low Cost Digital Dose Reminder System

Mohammed Nabri, Ahmed Hassan and Tasneem Mahmoud

278 Solving Problems of Computer Networks' Planning Using Elastic Networks Method

Samer Mohamed Kannan Mahmoud and Saeed A. Al-Ghamdi.

Page 17: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

xvi

Day Three: 28 August 2013

Technical Session ICCEEE 2013 (TS 31):

12.00-13.20pm (Room I)

TECHNICAL SESSION 5A: Artificial Systems

Chairpersons: Dr. Alfadil Zakaria & Dr. Anwar Dafa-Alla

315 Human Skin Color Recognition (identification): Case study

Alwaleed Abdelrahman, Hassan Yasser, Maram Mahir and Fatma Mohammed.

232 Enhancing Haptic Representation for 2D Objects

Abdelkareem Bedri and William Harwin.

298 Oil Price Prediction using Ensemble Machine Learning

Lubna Gabralla, Rania Jammazi and Ajith Abraham.

108 Hybrid Conceptual Framework for Artificial Immune System

Muna Elsadig Mohamed Ahmed Elsheik.

16 Human Posture Recognition and Classification

Othman O. Khalifa.

268 Quasi Fields Based S-Box Implementation

Eltayeb Abuelyaman.

Technical Session ICCEEE 2013 (TS 32)

12.00-13.20pm (Room II)

TECHNICAL SESSION 5A: Communication III (Protocols)

Chairpersons: Dr. Rania A. Mokhtar & Dr. Hassan Hamdoun

258 Effect of the Interior Gateway Routing Protocols in the Multiprotocol Label Switching Networks

Sara Eljack and Suhail Ahmed.

226 Investigation of Nested Nemo Schemes in Mobile Network Environment Mohammed Babiker, Aisha H. Abdalla and Ismail El-Azhary.

67 A Review in Interference Analysis and Management between Hierarchical and Flat Architectures

Communications

Abeer Zakaria and Rashid A. Saeed.

233 Performance Enhancement of the CAN Protocol Using Reed-Solomon Codes

Haitham Shabour, Moutaman Mirghani and Omer Sharif.

47 Accurate Modeling of PMSM for Differential Mode current and Differential Torque Calculation

Ali Ahmed Adam.

25 Design and Analysis of Novel AFSK Modem Using Microcontrollers Moutaman Mirghani.

Technical Session ICCEEE 2013 (TS 33)

12.00-13.20pm (Room III)

TECHNICAL SESSION 5B: Neural Network

Chairpersons: Dr. Huwaida Elshoush & Dr. Abdelraheem Satti

112 MRI Brain Image Classification Using Neural Networks

Walaa Ahmed, Ahmed Abdel-Rahma, Yusra Ibrahim and Magdi B. M. Amien.

317 Modeling Consumer Loan Default Prediction Using Ensemble Neural Networks

Amira Kamil Ibrahim and Ajith Abraham.

176 An evaluation on Offline Signature Verification using Artificial Neural Network Approach

Othman O. Khalifa, Md Khorshed Alam and Aisha-Hassan Abdulla.

313 Neural Networks Forecasting Architectures for Rainfall in the rain-fed Sectors in Sudan

Isam Basheir, Adil Khidir and Hanan Adlan.

52 Driving a Novel Phasors Formula for a Digital MHO Relay Algorithm for High Voltage

Transmission Line Based on Neural Networks

Auday Mohamad and Ali Ibrahim.

293 Implementation of Transient Stability Assessment using Artificial Neural Networks

Dalia Eltigani, Kamal Ramadan and Elfadil Zakaria.

Page 18: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

xvii

Technical Session ICCEEE 2013 (TS 34)

14.40 - 16.00pm (Room I)

TECHNICAL SESSION 5A: Computer Science

Chairpersons: Dr. Mohammed Abdalla Khaleel & Dr. Mohamed Elhafiz Mustafa

11 Benefit Cost Analysis in Appraisal and Planning Projects of Higher Learning Institutions

Muhammad Salim Javed, Ahmad Kamil Bin Mahmood and Suziah Bt. Sulaiman

156 Policy Cycle Analysis to Avoid Policy Conflict in Policy-based Management Systems

Abdelhamid Mansor, Wan M.N. Wan-Kadir and Toni Anwar.

80 Crossing Over Under the Root CA

Mustafa Nawari and Asma Abdalrahman.

88 Reliable Attributes Selection Technique for Predicting the Performance Measures of a DSM

Multiprocessor Architecture

Rasheed Zayid and Mehmet Fatih Akay.

135 Smart Phones As System Integration Development Tools (Android SCL Simulation Environment

as Prototype)

Khalid Elhussein and Mohammed Elobaid.

192 A Method for Mapping State Machine Behavior Models In MDA Issues and Challenges

Rihab Eltayeb, Robert Colomb and Abdelgaffar Hamed

Technical Session ICCEEE 2013 (TS 35)

14.40 - 16.00pm (Room II)

TECHNICAL SESSION 2A: Fuzzy Logic

Chairpersons: Dr. Abdelraheem Satti & Dr. Huwaida Elshoush

222 An Agent-based Proxy Cache Cleanup Model using Fuzzy Logic

Hiba Nasir, Yahia Abdalla Hamad and Amir Eisa,

51 Adaptive Median Filter Background Subtraction Technique Using Fuzzy Logic

Auday Mohamad and Mohammed Osman,

235 Intelligent System for Selecting Optimum (INST) Based on Fuzzy Logic to Develop a Courseware

(ISSIDC) Mohamed Fadlalla Elhag,

177 Fuzzy Academic Advising System for on Probation Students in Colleges of Applied Sciences -

Sultanate of Oman

Fadlelmoula M. Baloul and Prince Williams

78 Fuzzy Logic Control in Temperature Control System

Mohammed Elnour and Waleed Kannan,

82 Neuro-Fuzzy Inference System based Controller in 6 DoF in Puma 560

Zeinab Mahmoud Omer Yousif and Mergani Fathalrahman,

Page 19: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

xviii

Table of Contents

Welcome Remark vi

General Chair of ICCEEE Organizing Committee vi

Technical Programme Committee Chair vii

Conference Programme Error! Bookmark not defined.

Table of Contents xviii

Keynote Speakers 1

Prof. Narayan C. Debnath 1

Software Engineering Models, Metrics and Tools Research - Challenges and Opportunities 1

Dr. H. Anthony Chan, 3

Distributed Mobility for Future Mobile Internet 3

Dr. Fanny Klett, 5

The War for Talent - Challenges and Opportunities for ICT and Innovation 5

Tutorial/Industry Workshops 7

Introduction to Power Quality 7

Internet Diffusion, Associated Energy Consumption and Web Literacy 7

PKI Technology: The Security Infrastructure for Sudan's E-Government Error! Bookmark not defined.

ICCEEE’13 Papers 9

Computing 9

Tariq Al-Ahdal and Saida Mohammad. Performance of Standardized Routing Protocols in ad-hoc

Networks 9

Muhammad Salim Javed, Ahmad Kamil Bin Mahmood and Suziah Bt. Sulaiman. Benefit Cost Analysis in

Appraisal and Planning Projects of Higher Learning Institutions 9

Othman O. Khalifa. Human Posture recognition and Classification 9

Ahmed Abdelrahaman and Ahmed Abdallah. K-Nearest Neighbor classifier for Signature Verification

System 10

Auday Mohamad and Mohammed Osman. Adaptive Median Filter Background Subtraction Technique

Using Fuzzy Logic 10

Samah M. H. Alwahbani and Eihab B. M. Bashier. Speech Scrambling Based on Chaotic Maps and One

Time Pad 10

Abdelrahman Altigani and Bazara Barry. A Hybrid Approach to Secure Transmitted Messages Using

Advanced Encryption Standard (AES) and Word Shift Coding Protocol 11

Abdelmoniem Idris, Abdelraheem Satti, Ahmed Imam and Moutaman Mirghani. Development of

Computer Aided Tools for UAV Flight Control 11

Amani Alnimir and Hisham Abushama. Popular Agile Approaches in Software Development: Review and

Analysis 11

Mustafa Nawari and Asma Abdalrahman. Crossing Over Under the Root CA 12

Abdelhaliem Abbas. Binary LU Encryption 12

Rasheed Zayid and Mehmet Fatih Akay. Reliable Attributes Selection Technique for Predicting the

Performance Measures of a DSM Multiprocessor Architecture 12

Mahmoud Musa and Muna Ahmed. A Multi-Layer of Multi Factors Authentication Model for Online

Banking Services 13

Abdelrasoul Yahya. Specifying Abstract Data Types : A Behavioral Model, An Axiomatic Representation 13

Page 20: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

xix

Mohamed M. K. Elhaj, Mamoun M. A. Suliman and Dr. Hussam Hamrawi. A Multi-Layer Network

Defense System Using Artificial Immune System 13

Amira Kamil Ibrahim and Ajith Abraham. Modeling Customer Relationship Management Using Data

Mining 14

Albaraa Abuobieda, Naomie Salim, Mohammed Salem Binwahlan and Ahmed H.Osman. Differential

Evolution Cluster-based Text Summarization Methods 14

Muna Elsadig Mohamed Ahmed Elsheik. Hybrid Conceptual Framework for Artificial Immune System 14

Taqwa Ahmed, Mariam Taha and Faiza Alim. Synchronization Wireless Algorithm based on Message

Digest (SWAMD) for Mobile Database 15

Arafat Abdulgader, Mohamed Awad Elshaikh and Radziah Mohamed. A Study of Software Process

Improvement for Some Sudanese Organizations 15

Abeer Eldewahi and Eihab Bashier. Authenticated Key Agreement protocol for Virtual Private Network

based on Certicateless Cryptography 15

Nisreen Beshir Osman and Izzedin Mohammed Osman. A Validated Model for the Quality in Use of

Mobile Government Systems 16

Nahla Murtada. Measuring the Cybersecurity of Cloud Computing 16

Hozeifa Adam Abd Alshafy and Dr. Mohamed Alhafiz Mustafa. Segmentation Approach for Online

Arabic Handwriting 16

Abdelhamid Mansor, Wan M.N. Wan-Kadir and Toni Anwar. Policy Cycle Analysis to Avoid Policy

Conflict in Policy-based Management Systems 17

Safaa Eltyeb and Naomie Salim. Mining Lexico-syntactic Patterns to Extract Chemical Entities with their

Associated Properties 17

Othman O. Khalifa, Md Khorshed Alam and Aisha-Hassan Abdulla. An evaluation on Offline Signature

Verification using Artificial Neural Network Approach 17

Fadlelmoula Mohamed Baloul and Prince Williams. Fuzzy Academic Advising System for on Probation

Students in Colleges of Applied Sciences - Sultanate of Oman 18

Eiman Kambal, Izzeldin Osman, Noon Mohammed, Sara Mohammed and Methag Taha. Credit Scoring

Using Data Mining Techniques 18

Fadlelmoula Mohamed Baloul, Mohsin Hassan Abdullah and Elsadig Ahmed Babikir. ETAOSD: Static

Dictionary-Based Transformation Method for Text Compression 18

Rihab Eltayeb, Robert Colomb and Abdelgaffar Hamed. A Method for Mapping State Machine Behavior

Models In MDA Issues and Challenges 19

Mirghani Eltahir and Anwar Dafa-Alla. Extracting knowledge from web server logs using classification

technique 19

Ahmed Yousri Salama Mohammed. Semantic Web services for Nubian language 19

Elmuntasir Abdullah Hag Eltom and Eltigani Bashir. Extreme Programming Applied in a Large-Scale

Distributed System 20

Yusra Osman. Segmentation Algorithm for Arabic Handwritten Text 20

Afaf Mohamed and Robert Colomb. Service Discovery using perdurant ontology 20

Majda Omer and Eihab Bashir. Enhancement model for PKI certificate validation in the Mobile Banking 21

Suhaidi Hassan, Zeeshan Aziz and Kashif Nisar. On the Cache Performance of Information Centric

Network 21

Hiba Nasir, Yahia Abdalla Hamad and Amir Eisa. An Agent-based Proxy Cache Cleanup Model using

Fuzzy Logic2 22

Mohammed Babiker, Aisha H. Abdalla and Ismail El-Azhary. Investigation of Nested Nemo Schemes in

Mobile Network Environment 22

Mariam Taha, Taqwa Alhaj, Ala Moktar, Azza Salim and Settana Abdullah. On Password Strength

Measurements: Password Entropy and Password Quality 22

Page 21: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

xx

Mohamed Fadlalla Elhag. Intelligent System for Selecting Optimum (INST) Based on Fuzzy Logic to

Develop a Courseware (ISSIDC). 23

Mohammed Elfahal and Mohammed Elhafiz. Acoustic Approach to Spoken Arabic Language Detection 23

Nusiba Abdalrhman Ahmed and Abdelgaffar Hamed. Enabling Use Case Function point on Service-

oriented Architecture 23

Awadallah Ahmed and Aisha Abdalla. Evaluation of Gateway placement approaches in Wireless Mesh

Network 24

Osman Mudathir Elfadil. Localization for Wireless Sensor Networks 24

Osman Mudathir Elfadil. Navigation Algorithm for Mobile Robots using WSNs 24

Sara Eljack and Suhail Ahmed. Effect of the Interior Gateway Routing Protocols in the Multiprotocol

Label Switching Networks 25

Ahmed Osman, Naomie Salim and Ammar Ahmed E. Elhadi. A Tree-based Conceptual Matching for

Plagiarism Detection 25

Eltayeb Abuelyaman. Quasi Fields Based S-Box Implementation 25

Muhammad Awais Jadoon, Ahmad Shah, Othman O. Khalifa, Zainab Ali Khan and Imran Khan. Network

Coding for hybrid Satellite-terrestrial Networks over non-identical Fading Channels 26

Eimad Abusham and Housam Basheir. Face Recognition Using Local Graph Theory (LGT) 26

Samer Mohamed Kannan Mahmoud and Saeed A. Al-Ghamdi. Solving Problems of Computer Networks'

Planning using Elastic Networks Method 26

Yogan Jaya Kumar, Naomie Salim, Albaraa Abuobieda and Ameer Tawfik. Automatic Multi Document

Summarization Using Voting Technique 27

Yousra Gad and Bazara Barry. Developing a Security Model to Protect Websites from Cross-site

Scripting Attacks 27

Ali Ahmed, Ammar Ahmed Eltaeb Elhadi, Hamza Awad Elkarim Hamza Ibrahim and Naser Elmisbah.

Feature Selection and Similarity Coefficient Based Method for Email Spam Filtering 27

Nahid Ahmed Ali. Verifying Abstract Data Types: A Hybrid Approach 27

Ahmed Osman and Naomie Salim. An Improved Semantic Plagiarism Detection Scheme Based on Chi-

squared Automatic Interaction Detection 28

Mohamed Yousif and Sami Sharif. Sudan HF Model based on University of Khartoum Ionospheric Shells

and their Mathematical Derivations 28

Mosharrof Hussain Masud, Suhaimi Abd Latif, Farhat Anwar and Md Khorshed Alam. An Analysis of

Resource Sharing Scheme in Heterogeneous Wireless Campus Network 28

Lubna Gabralla, Rania Jammazi and Ajith Abraham. Oil Price Prediction Using Ensemble Machine

Learning 29

Mohamed Firdhous, Osman Ghazali and Suhaidi Hassan. Cloud Computing for Rural ICT Development:

Opportunities and Challenges 29

Sulafa Khaled Talha and Bazara I. A. Barry. Evaluating the Impact of AES Encryption Algorithm on

Voice over Internet Protocol (VoIP) Systems 29

Isam Basheir, Adil Khidir and Hanan Adlan. Neural Networks Forecasting Architectures for Rainfall in

the rain-fed Sectors in Sudan 30

Aisha Hamid. Upgrading Distributed Agile Development 30

Amira Kamil Ibrahim and Ajith Abraham. Modeling Consumer Loan Default Prediction Using Ensemble

Neural Networks 30

Electronics Engineering 31

Ama Eltahir and Rashid Saeed. An Enhanced HWMP (E-HWMP) Protocol for Multihop Vehicular

Communications 31

Sameir Ali Hamed, Abdulwaheed Musa and Saad Bashir. Near-Fields of an Array of Circular-Loop

Antennas 31

Page 22: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

xxi

Moutaman Mirghani Daffalla. Adaptive Multifunction Filter for Radar Signal Processing 31

Moutaman Mirghani. Design and Analysis of Low Baudrate Modem Using Microcontrollers 32

Alaa A. Yassin and Rashid A. Saeed. Reconfigurable Dual Band Antenna for 2.4 and3.5GHz using Single

PIN Diode 32

Nihad A. A. Elhag, Isam M. Osman, Alaa A. Yassin and Tsneem B. Ahmed. Angle of arrival estimation

in smart antenna by using MUSIC method for wideband wireless communications 33

Jacqueline J.George and Nada Mustafa Adalla. Adaptive Joint Call Admission Control to Support QoS in

Heterogeneous 4G Wireless Networks 33

Ashraf Osman, Amin Nabi and Ismail El-Azhary. The Potential of Establishing Computer_Aided_Design

(CAD) Industry in Africa – Sudan Case-Study 33

Adel Gaafar. Energy Aware Routing Protocol for Low Energy Sensor 34

Mohamed Omara. Efficient Design of Dual Digital Up Converter for WCDMA and CDMA2000 Using

System Generator 34

Abeer Abdalla Zakaria and Rashid A. Saeed. A Review in Interference Analysis and Management

between Hierarchical and Flat Architectures Communications 34

Mohammed Elnour and Waleed Kannan. PID and Fuzzy Logic in Temperature Control System 35

Omnia Ahmed, Rashid A.Saeed and Mohammed Kamrul Hasan. Lightweight Inter-cluster

Synchronization Scheme for Femtocell Network 35

Sameir Ali Hamed and Saad Bashir. New Fields Expressions of a Traveling Wave Circular Loop Antenna 35

Suliman Abdalla, Amin Babiker and Farouq Habbani. Mechanism for Charge Sharing Suppression in

Single Photon Processing Pixel Array 36

Khalid Bilal, Ibrahim Khider and Amin Abdelnabi. Performance Evaluation of DS-WCDMA 36

Sami Salih, Mamoun Suliman, Abbas Mohamed and Ali Al-Refai. Implementation of Adaptive

Modulation for Broadband Wireless Access Networks using Cognitive Radio Approaches 36

Sami Salih, Mamoun Suliman and Abbas Mohamed. A Novel Spectrum Sensing Scheduler Algorithm for

Cognitive Radio Networks 36

Mohammed Nabri, Ahmed Hassan and Tasneem Mahmoud. Designing Low Cost Digital Dose Reminder

System 37

Siddig Gomha, Abdel Aziz T. Shalaby and El-Sayed M. El-Rabaie. Optimizing the Performance of

Branch-line Couplers Using Open Ended Stubs 37

Abdelmuizz Adam and Rashid A Saeed. Multicasting in Network Mobility using Multicast Anchor Agent 37

Nahid Osman, Gamar Mansour, Nodar Khalifa, Karlo Kuacgor Mathang and Alwaleed Adllan. Abinitio

Method Study of Ionic Conductor CaF2 38

Ahmed Yassin, Elhussein Abd Elmageed, Mazin Hamad and Mahmoud Osman. The Unscented Kalman

Filter Applied to Satellite Orbit Determination 38

Md. Rafiqul Islam, Md. Soyaeb Hasan and Apurba Kumar Saha. Mathematical Modeling of Growth

Conditions and Interpretation of Phase Diagram for InxGa1-xN Epitaxial Layer 38

Abdelkareem Bedri and William Harwin. Enhancing Haptic Representation for 2D Objects 38

Haitham Shabour, Moutaman Mirghani and Omer Sharif. Performance Enhancement of the CAN

Protocol Using Reed-Solomon Codes 39

Abubakr Eltayeb, Halla Almubarak and Tahani Attia. A GPS Based Traffic Light Pre-emption Control

System for Emergency Vehicles 39

Mohammad Rubaiyat Hasan, Muhammad Ibn Ibrahimy and S.M.A. Motakabber. Performance Analysis

of Different Techniques for Brain Computer Interfacing 39

S. M. A. Motakabber, Muhammad Ibn Ibrahimy and A. H. M. Zahirul. Development of a Position

Detection Technique for Chipless RFID Tagged Object 40

Page 23: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

xxii

Electrical Engineering 41

Khalid Hag El Amin and Mirghani Fath Elrahman. On the Steady-State Error Covariance Matrix of

Kalman Filtering with Intermittent Observations in the Presence of Correlated Noises at the Same Time 41

Dryan Marende. Optimization of Nuclear Energy Generation 41

Zakieldeen Elhassan, Li Yang and Tang Yi. A novel control method of grid connected doubly fed

induction generator under variable wind speed 42

Ibrahim Elamin, Abdullah Al-Elyani and Abdelrahman Shuaib. Power Quality Indices: A Saudi Steel

Mills Case Study 42

Ali Ahmed Adam. Accurate Modeling of PMSM for Differential Mode current and Differential Torque

Calculation 43

Auday Mohamad and Ali Ibrahim. Driving a Novel Phasors Formula for a Digital MHO Relay Algorithm

for High Voltage Transmission Line Based on Neural Networks 43

Mohamed Khalifa, Abubakr Abdelhafiz and Azzedine Zerguine. Sparse Channel Estimation Using

Adaptive Filtering and Compressed Sampling 43

Mariana M Mounir, Aya E Hamid and Abdelrahman A Karrar. Development of Lightning Risk

Assessment Software in Accordance with IEC 62305-2 44

Mohammad Kamrul Hasan, Ahmad Fadzil Ismail, Aisha Hassan Abdallah Hashim, Khaizuran Abdullah,

Rashid Saeed, Huda Adiba Moh Ramli and Shayla Islam. Inter-cell Interference Coordination in LTE-A

HetNets: A Survey on self organizing approaches 44

Hazir Farouk Abdelraheem, Andrew Lang and Mohammed Elhadi Ahmed Elsayed. Jatropha Curcas: A

Viable Alternative Source of Clean Energy to Meet Sudan’s Growing Energy Demand 45

Shayla Islam, Aisha Hassan Abdalla Hashim Hashim, Mohamed Hadi Habaebi Habaebi, M.K. Hasan

Hasan, Suhaimi Latif and Rashid Saeed. Multihoming Based Mobility Management Scheme in NEMO: A

Qualitative and Quantitative Analysis 45

Haruna Musa, Binta Usman and Sanusi Sani Adamu. Improvement of Voltage Stability Index Using

Distributed Generation for Northern Nigeria Sub-Transmission Region 46

Hassan Hamdoun, Solomon Mangeni and Yogesh Dwivedi. Insights into Sustainable Energy-Capacity

Trends towards Bridging the Digital Divide 46

Shashank Srivastava and Nitin Singh. Compensation Technique and Power Quality Improvement in

Multiphase Distribution System 46

Abdulwaheed Musa, Saad Bashir and Sameir Ali Hamed. Analysis of Aerodynamic Torques Affecting

Dust Particle Orientation as Input to Microwave Cross Polarization 46

Dalia Eltigani, Kamal Ramadan and Elfadil Zakaria. Implementation of Transient Stability Assessment

using Artificial Neural Networks 47

Elfadil Zakaria, Kamal Ramadan and Dalia Eltigani. Method of Computing Maximum Loadability Using

Continuation Power Flow: Case Study Sudan National Grid 47

Kamal Ramadan, Elfadil Zakaria and Dalia Eltigani. Prepaid Energy Meter Network via Power System

Communication 48

Moaaz Mahdi, Khaizuran Abdullah and Mohammad Umar Siddiqi. Impulsive Noise Mitigation in Haar

DWT Based OFDM Systems 48

Kauther Mahdi, Sami Sharif and Ahmed Ashur. Enhancement of Hardware Modular Multiplier Radix-4

Algorithm for Fast RSA Cryptosystem 48

Sara Elagib and Nada Osman. Design and implementation of Dual axis solar tracker based on solar maps 49

Biomedical Engineering 50

Yousif Elhadi Elsideeg Ahmed, Basem Ahmed M. Hassan, Salim Omer Abdallah Alzubaidi, Yassin

Mahmod M. Ibraheem and Mustafa G. Hadi Khamisi. Design and Test of a USB/Bluetooth/IP Self-

adaptive Connector for Sensor Network Application 50

Soha Yousuf and Sahar Mohammed. A Parallel Computer System for the Detection and Classification of

Breast Masses 50

Page 24: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

xxiii

Ola Abdalsalam, Al-Khanssa Osman, Roua Abd-Alhadi and Saad Alshmaa. Design of Non-Invasive

Glucose Measuring Device 50

Walaa Ahmed, Ahmed Osman, Yusra Ibrahim and Magdi B. M. Amien. MRI Brain Image Classification

Using Neural Networks 51

Sulieman M. S. Zobly and Yasir M. Kadah. Multiple Measurements Vectors Compressed Sensing for

Doppler Ultrasound Signal Reconstruction 51

Thowiba Sabeel, Fauzan Che Harun and Solima Sabeel. Detection of Volatile Compounds In Urine Using

An Electronic Nose Instrument 51

Jacqueline J.George and Eman Mohammed Saeed Mohammed. Heart Disease Diagnostic Graphical

User Interface Using Fractal Dimension 52

Alia M. A. Siddig, Razaz Kh. Yousif and Muhanned Al Anwer Awaad. Motion Estimation in Ultrasound

Image Using Dynamic Multi-Shape Search 52

Muhanned Al Anwer Awaad, Razaz Kh . Yousif and Alia M. A. Siddig. Detecting and Tracking ASD

using New Block Flow in Ultrasound 53

Tasneem Mahmoud and Omer Elfarouk Hamed. Discrimination of Four Classes in Brain-Computer

Interface Based on Motor Imagery 53

Safa Abdalziz, Shahd Tariq, Haifa Basher and Fragoon Ahmed. Measurement of Weight Distribution in

the Foot 54

Suliman Abdalla, Maha Abdelaziz and Amin Babiker. Architecture and Circuit Design Balance between

Integrated and Photon counting mode for X-Ray Pixel Array Detector Read-out Electronics 54

Amal Elawad, Braa Hagadam, Rabah Hamed and Eltaher Hussein. Design and Implementation of Robotic

System to Transport Disabled People 54

Mawia Hassan, Shaza Gaib Alla, Ilaf Sarour and Mohammed Alfadny. Design of Digital Apodization

Technique for Medical Ultrasound Imaging 55

Nada Osman. Comparison between Gold Nanoparticles and Conductive Polymer Nanoparticles Used in

Photothermal Therapy 55

Alwaleed Abdelrahman and Omer Hamid. Evaluation of linear filter kernel developed from Ultrasound

phantom image 55

Alwaleed Abdelrahman, Hassan Yasser, Maram Mahir and Fatma Mohammed. Human Skin Color

Recognition (identification): A case study 56

Mechatronics Engineering 57

Gehad Hamdan, Saad Suliman and Al Khawad Elfaki. Carbon Nanotubes: Challenges and Opportunities 57

Zeinab Mahmoud Omer Yousif and Mergani Fathalrahman. Neuro-Fuzzy Inference System based

Controller in 6 DoF in Puma 560 57

Khalid Elhussein and Mohammed Elobaid. Smart Phones as System Integration Development Tools

(Android SCL Simulation Environment as Prototype) 57

Ammar Atia, Moayad Mamoon Ibrahim, Omer Abd Algbar Mohamed and Musaab Hassan. Modeling of

Electrostatically Actuated Temperature Sensor 58

Page 25: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

1

Keynote Speakers

Prof. Narayan C. Debnath

Winona State University, Winona, USA

President

International Society for Computers and Their Applications (ISCA)

Dr. Narayan C. Debnath has been a Full Professor of Computer Science since 1989 and currently the Chairman

of Computer Science at Winona State University, Minnesota, USA. He is also serving as the President of the

International Society for Computers and Their Applications (ISCA). Dr. Debnath is a recipient of a Doctorate

degree in Computer Science and a Doctorate degree in Applied Physics (Electrical Engineering). In the past, he

served as the President, Vice President, and Conference Coordinator of the International Society for Computers

and Their Applications (ISCA), and has been a member of the ISCA Board of Directors since 2001. He served

as the Acting Chairman of the Department of Computer Science at Winona State University and received

numerous Honors and Awards. During 1986-1989, Dr. Debnath was a faculty of Computer Science at the

University of Wisconsin-River Falls, USA, where he was nominated for the National Science Foundation

Presidential Young Investigator Award in 1989.

Software Engineering Models, Metrics and Tools Research - Challenges and

Opportunities

Abstract: This keynote presentation will describe recent progress in software models, metrics and tools

research, and will outline potential future research directions, challenges and new opportunities.

Software Models and Metrics, an area of Software Engineering, plays an important role in the analysis and

measurement, evaluation and testing of software, and thus allows to effectively deal with the software

management, planning and maintenance issues in order to help enhance the maintenance phase of the software

life cycle.

In software models and metrics research, attention has been directed toward reducing software cost. To this end,

researchers have attempted to find relationships between the characteristics of programs and the difficulty of

performing tasks. The objective has been to develop abstract models and measures of software complexity that

can be used for cost projection, manpower allocation, and program and programmer evaluation. In the software

engineering models and metrics literature, a number of abstract models, essentially directed graph

representations, of imperative language software have been proposed and analyzed to derive useful properties

that may help understanding computer programs and thus allow better maintainability of software.

In this keynote presentation, a family of abstract models for representing imperative language software will be

described. The basic concepts, definitions, and some applications of these graph models will be presented. These

graphs may have wide range of applications in software engineering and technology. These graphs may serve as

Page 26: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

2

potential tools for (a) the study interconnection or integration complexity, an area that needs serious attention,

(b) the study of compiler optimization, a topic to help compiler design and code optimization, (c) the study and

analysis of concurrent programs, an area that may be useful to study the characteristics of concurrent programs,

(d) the study and research in expression and statement complexity, an important topic in metrics research and

may help to estimate program clarity, and (e) the study of the characteristics of software involving recursion, an

area that needs to be addressed to compute the complexity of recursive programs. Once these models are defined

with a sound theoretical basis and accurately validated, the entire family of graphs may serve as potential tools

for further study and research in mathematics, computer science, software engineering, and technology.

Moreover, these software models and related concepts may potentially lead to new research directions in

software models, metrics and Tools. The models can help develop automated software tools for a number of

applications in software engineering. They can be directly used for defining new software complexity metrics

and may potentially serve as software testing tools. They can be applied and/or redefined to study other

programming language paradigms including Object Oriented programming languages, applicative programming

languages, and concurrent programming languages.

Page 27: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

3

Dr. H. Anthony Chan, PhD, IEEE Fellow Member

Huawei Technologies, Dallas, USA

Chair

IEEE Standard 802.21c Task Group on Single Radio Handover Optimization

H. Anthony Chan received his PhD in physics at University of Maryland, College Park in 1982 and then

continued post-doctorate research there in basic science. After joining the former AT&T Bell Labs in 1986, his

work moved to industry-oriented research in areas of interconnection, electronic packaging, reliability, and

assembly in manufacturing, and then moved again to network management, network architecture and standards

for both wireless and wireline networks. He moved to academia as professor at University of Cape Town in

2004, and moved again to industry research as he joined Huawei Technologies in Dallas in 2007.

Dr. Chan is a Fellow of IEEE, chair of IEEE Standard 802.21c Task Group on Single Radio Handover

Optimization, Vice-chair of IEEE standard 802.21 Working Group on Media Independent Handover, and a

honorary professor at The University of Hong Kong. He has authored/co-authored over 200 conference and

journal papers, a research handbook, several book chapters. He is a Distinguished Lecturer/Speaker of IEEE

Communication Society and of IEEE Reliability Society, and had delivered 40 conference tutorials and short

courses and 6 keynotes.

Distributed Mobility for Future Mobile Internet

Abstract: The cellular networks, which are currently serving 6 billion cellular phones and mobile devices

globally, have employed centralized control with different network functions arranged in a hierarchy.

Standardization of Internet mobility management in the Internet Engineering Task Force (IETF) has been

primarily in centralized mobility management including Mobile IPv6 (MIPv6) and its extensions, and the

deployments have primarily been in a centralized manner for the hierarchical cellular networks. Yet there are

already numerous variants and extensions of MIPv6 including Proxy Mobile IPv6 (PMIPv6), Hierarchical

MIPv6 (HMIPv6), and Network Mobility (NEMO), which have been developed over the years owing to the

different needs that are found afterwards. Deployment of Internet mobility mechanisms can then become

complicated, especially when interoperability with different deployments is an issue.

The Internet has employed distributed control functions and is more flattened, i.e., less hierarchical. As the

cellular networks converge with the Internet and may become more flattened, the needed mobility management

functions are expected to be distributed rather than centralized. Despite the large amount of standards work in

Internet mobility in IETF primarily with centralized mobility, the deployment in the Internet is still slow. Such a

fundamental change to distributed mobility is needed in the mobile Internet.

Mobility management with centralized mobility anchoring in existing hierarchical mobile networks is quite

prone to suboptimal routing and issues related to scalability. Centralized functions present a single point of

Page 28: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

4

failure, and inevitably introduce longer delays and higher signaling loads for network operations related to

mobility management. To make matters worse, there are numerous variants of Mobile IP in addition to other

protocols standardized outside the IETF, making it much more difficult to create economical and interoperable

solutions.

The existing mobility management standards in IETF, the issues of mobility management for the future mobile

Internet, the trend of the mobile Internet and the proposed distributed mobility at IETF are explained. It will

provide a fundamental understanding of broad subject of mobility management but will be presented in terms of

easily understandable concepts for a diverse audience.

Page 29: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

5

Dr. Fanny Klett, PhD, IEEE Fellow Member

Waltershausen, GERMANY

Director

The German Workforce Advanced Distributed Learning Partnership Laboratory

Dr. Fanny Klett assumed the Directorship of the German Workforce Advanced Distributed Learning Partnership

Laboratory, which is run in cooperation with the US Government, in 2009. Prior to this position, she has been

with leading German research institutions in principal positions. Fanny Klett is regularly invited as Visiting

Professor and Distinguished Lecturer at universities across Europe and Asia. Her research and development

interests are on advanced ICT solutions in the areas of information, data and content management with regard to

competency and job performance management, assessment, knowledge management, technology-enhanced

learning, data fusion, data mining and interoperability.

Dr. Klett actively works in standardization bodies, such as IEEE Learning Technology Standards Committee,

US Advanced Distributed Learning Initiative, and ISO, and is CEN WS-LT LTSO expert. She chaired and

served on more than 20 conference planning and program committees of UNESCO, IEEE, APSCE, etc. Fanny

Klett is associated editor of IEEE publications and serves on the peer-reviewer board of the IEEE Transactions

on Education, and the IEEE Educational Technology and Society Journal. Recently, she has been invited to join

the Advisory Board of the Knowledge Management and E-Learning International Journal. In addition, she

assists various governmental and industrial research and development funding organizations Europe-wide, and

in the US, as an expert.

Dr. Klett is IEEE Fellow. She has been actively involved in many IEEE Boards and Committees by representing

also the IEEE Region 8 (Europe, Middle East, and Africa). Fanny Klett is Member of the Sponsor Executive

Committee and Secretary of the IEEE Learning Technology Standards Committee, and Member of the Council

and the Academic Board of the European Association for Education in Electrical and Information Engineering.

Dr. Klett has published more than 80 technical and invited papers, white papers and book chapters, and has

organized numerous Special Sessions and workshops on ICT research and standardization themes at leading

international conferences worldwide.

The War for Talent - Challenges and Opportunities for ICT and Innovation

Abstract: Rising competition obliges companies to seek for innovative ways of doing business, increase

effectiveness and efficiency of work, and productivity. Information and Communication Technologies (ICT)

help business achieve these aims whereas the pressure to keep on innovation grows. However, human capital

remains a key source of innovation and competitive improvement. Thus, skills development, talent identification

and management, and learning appear to become essential business aspects of innovation and competitive

advantage. In this scenario, the higher education system appears as a viable public catalyst for a quality

improvement of processes and educational products to respond to the needs of industry, and the community. A

key difficulty here is the proper matching of academic courses and curricula with the possible career pathways

Page 30: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

6

for students. Current and relevant career information becomes critical in helping to determine employment

routes and support carrier paths.

It seems like a paradox that recently we have been saying that we need the right content in the right context at

the right time. Now, the War for Talent is on, and one of the main challenges refers to having the right

employees with the right qualifications at the right time. Shifting from content management to human capital

management and talent identification involves the implementation of conventional and new technologies as well

as traditional and novel approaches to learning, assessment, performance, and quality management. Against this

background, a strong linkage between academia, industry and government is required to facilitate the

implementation of standardized technological solutions, and bridge education effort, skills development and

employment outcomes. In addition, the analysis and application of competencies into ICT based human

resources management systems increasingly represents a driving force for addressing the future human

performance potential and, simultaneously, it serves as a key source of maximizing the Return-On-Investment in

people and technology in academia and business.

This talk refers to recent technology and standardization trends toward skills development, and job performance

to answer the questions that is increasingly raised in our Knowledge Economy: Are graduates prepared for

industrial and market needs? Is higher education all set to fit into the society and demographic change

requirements, and can it deliver individuals ready for the market needs? How can ICT intertwine education

strategies and workforce performance? How can ICT deliver advanced technological solutions and facilitate

novel methodical approaches toward human capital management in terms of career development, assessment

and recruitment as a driver for innovation and sustainable competitive advantage for academia and business in

the changing conditions of the global employment market, and the War for Talent?

Finally, the talk reflects also the demand for quality education, promotion and recognition of education and

training products that goes together with the need for quality management standards and a holistic approach to

the management of education, competency, skills and assessment data. ICT based solutions toward mapping of

competency data, exchange of competency definitions and related standards help to leverage this central issue of

human capital management.

Page 31: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

7

Tutorial/Industry Workshops

Introduction to Power Quality

Professor Ibrahim El-Amin

Department of Electrical Engineering, the King Fahd University of Petroleum and Mineral

Abstract: One of the most essential requirements of continuous process industry is quality of power. On the

other hand, it is almost impossible to get power without any disturbance. It is necessary to define some of the

important terms to distinguish voltage sag/dip from similar terms used for power disturbances. The IEEE

defines power quality indicator which applies in most of the cases, however this studies are done for plants

having 1 second bus transfer scheme. Therefore definitions are slightly modified as under to suit the protection

scheme and override circuits. The tutorial provides an overview of the problems of power quality and its impact

on the industry and the power systems. Participants will be exposed to the sources of power quality problem,

international standards, and power quality indices. Monitoring and mitigation methods will also be discussed.

Internet Diffusion, Associated Energy Consumption and Web Literacy

Dr. Hassan Hamdoun,

Systems and Process Engineering Centre, College of Engineering, Swansea University, Singleton Park,

Abstract: An interactive tutorial of internet diffusion and web literacy in developing countries and giving

insights into the Open System Interconnection (OSI) networking model emphasizing the increasing research

interests in cross layer approaches and the need to reduce internet energy consumption . Participants will be

exposed to internet diffusion in developing countries, internet energy consumption , energy evaluation metrics

and models and the trends for the internet of things. One Initiative to improve internet diffusion and web literacy

in rural communities, the Mobile Internet Island (MII), will be given as an example.

PKI Technology: The Security Infrastructure for Sudan's E-Government

Professor Mustafa Nawari, Eng. Yousif Hussin, Eng. Hind Mohamed

Abstract: Cryptography, the black-art of hiding information, is the basis of securing the world of ICT today. It's

the science that enables our critical data-communication systems, including global financial systems, and

communication intelligence. PKI (Public Key Infrastructure) utilizes the concepts of Cryptography to provide

optimal security to make the Internet work as a trusted platform.

This session will briefly introduce the underlying concepts of PKI, and envision how the science of

Cryptography could change and integrate into our daily lives.

Page 32: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

8

In addition to that, this session will introduce the current progress of Sudan's national PKI project, in terms of

the pillars of the technology Software, Hardware and Policies, and how it can help to support the economy and

fight against corruption in government-to-citizen services through electronic means.

Page 33: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

9

ICCEEE’13 Papers

Computing

Tariq Al-Ahdal and Saida Mohammad. Performance of Standardized Routing Protocols in ad-hoc

Networks

Abstract: Mobile ad-hoc network (MANET) is a collection of mobile nodes that form dynamic and temporary

networks. The wireless links in this network are highly error prone and can go down frequently due to mobility

of nodes, interference, and less infrastructure. One of the challenges in the study of MANET routing protocols is

the dynamically changing topology. Hence, they establish an efficient communication path between the source

and destination nodes with minimum routing overhead and bandwidth consumption. The design problem of

such routing protocol is not straightforward since MANET environment introduces new challenges that are not

present in fixed networks. In this paper, we study and compare the performance of the following routing

protocols AODV, DSR, DSDV, RAODV, AOMDV, and TORA. Network Simulator (NS) version 2.34 is used

to study the relative performance of the routing protocols varying network traffic load and pause time. The

results show that AOMDV has better performance than RAODV and AODV in terms of average end-to-end

delay.

Muhammad Salim Javed, Ahmad Kamil Bin Mahmood and Suziah Bt. Sulaiman. Benefit Cost Analysis in

Appraisal and Planning Projects of Higher Learning Institutions

Abstract: Benefit Cost Analysis is a technique used for assessing the impacts of proposed actions in a project

planning process. Under available resource constraints, accurate Benefit Cost Analysis provides a better

economic choice among the projects. The main objective of the study is to address issues of Benefit Cost

Analysis in project planning processes. A case study of the higher learning institution project of Pakistan is

carried out wherein application and implications of Benefit Cost Analysis upon the project are evaluated and

discussed. This study highlighted the significance of the correct estimation of benefits and costs in project

appraisal and planning. For a more comprehensive appraisal and realistic outcomes, consideration should be

given to the determination of accurate benefits and costs of a project

Othman O. Khalifa. Human Posture Recognition and Classification

Abstract: Human posture recognition is gaining increasing attention in the field of computer vision due to its

promising applications in the areas of personal health care, environmental awareness, human-computer-

interaction and surveillance systems. Human posture recognition in video sequences is a challenging task which

is part of the more general problem of video sequence interpretation. This paper presents a novel an intelligent

human posture recognition system for video surveillance using a single static camera. The training and testing

were performed using four different classifiers. The recognition rates (accuracies) of those classifiers were then

compared and results indicate that MLP gives the highest recognition rate. Moreover, results show that

supervised learning classifiers tend to perform better than unsupervised classifiers for the case of human posture

recognition. Furthermore, for each individual classifier, the recognition rate has been found to be proportional to

Page 34: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

10

the number of postures trained and evaluated. Performance comparisons between the proposed systems and

existing systems were also carried out.

Ahmed Abdelrahaman and Ahmed Abdallah. K-Nearest Neighbor classifier for Signature Verification

System

Abstract: The paper presents an off-line signature verification system using k-NN classifier. Global features

from the signatures are extracted using Radon Transform. For each registered user in the system database a

number of reference signatures are enrolled and aligned for statistics information extraction about his signature.

Extreme points warping algorithm is used to align two signatures. During the k-NN classifier training, a number

of genuine and forged signatures are chosen. A test signature’s verification is established by first aligning it with

each reference signature for the claimed user. The signature is then classified as genuine or forgery, according to

the alignment scores which are normalized by reference statistics, using standard pattern classification

techniques. Using a database of 2250 signatures (genuine signatures and skilled forgeries) from 75 writers in the

proposed signature verification system, a performance of approximately 80% is achieved.

Auday Mohamad and Mohammed Osman. Adaptive Median Filter Background Subtraction Technique

Using Fuzzy Logic

Abstract: This paper is based on the median filter algorithm that is considered one of the most commonly used

algorithms in the field of background subtraction. In order to make the median filter algorithm adaptive with

sudden change in surrounding circumstances a fuzzy logic inference system has been developed to make the

parameters of Median Filter algorithm adaptive to the changes of sudden circumstances that surrounding the

moving object to detach it from the background. Experimental results demonstrate that the fuzzy inference

system is very efficient and robust.

Samah M. H. Alwahbani and Eihab B. M. Bashier. Speech Scrambling Based on Chaotic Maps and One

Time Pad

Abstract: Due to the rapid development in digital communications and networking technologies in the past two

decades, speech communications have become essential in several applications such as voice over IP, voice

conferencing, military and phone banking. But, such applications encounter many security threats such as the

unauthorized listening and illegal usage over networks. Therefore, it has become necessary to protect sensitive

speech signals from such a threat. Speech scrambling is a well known technique for the encryption of speech

streams that is used to scramble clear speech signals to unintelligible signals. Many researchers have proposed

methods to scramble speech streams, based on chaotic maps which have been successfully used for speech

scrambling, due to their good properties such as randomness, sensitivity to changes in initial conditions and

system parameters and aperiodicity. This paper uses two chaotic maps, circle map and logistic map for speech

confusion and diffusion, respectively. In the confusion stage, speech samples are divided into small segments.

Then, indices of ordered generated sequence of circle map are used to shuffle the positions of the speech signal

segments. Then, a one-time pad generated by the logistic map is used for the diffusion stage. Furthermore,

feedbacks are used to make the decryption of any speech sample depends on all the previous samples and the

output of the logistic map. Several experimental results on speech scrambling and descrambling, key space, key

Page 35: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

11

sensitivity tests, chosen/known plain text attack, statistical analysis and time analysis show that the proposed

method for speech scrambling performs efficiently and can be applied for secure real time speech

communications.

Abdelrahman Altigani and Bazara Barry. A Hybrid Approach to Secure Transmitted Messages Using

Advanced Encryption Standard (AES) and Word Shift Coding Protocol

Abstract: The key idea behind this study is to propose a new approach that provides an additional layer of

protection to transmitted messages over a communication network. The approach combines the well known

symmetric encryption algorithm (AES) and the steganography protocol Word Shift Coding Protocol. The AES

is used to equip the “secret” data with initial confidentiality layer; then the encrypted data is represented in

binary, and hidden in a textual carrier. As will be discussed in the paper, the resulting model has a far better

impact on the confidentiality of the transmitted message and overall computational security of the system.

Abdelmoniem Idris, Abdelraheem Satti, Ahmed Imam and Moutaman Mirghani. Development of

Computer Aided Tools for UAV Flight Control

Abstract: Proper design of the flight controller of an unconventional Unmanned Aerial Vehicle (UAV) requires

highly stable performance, as well as reliable Computer Aided Tools (CAT). Such tools provide simulation

process that is based on classical control design. This paper describes development of flight control design and

simulation process, which can be applied to vehicles of wide range classes. The design process is based on

single input – single output (SISO) flight dynamics modeling and simulation using Matlab/Simulink, Visual C#

dot Net and Microsoft flight simulator on a local area network (LAN) environment. The proposed tool provides

solution of flight dynamics that can be used by designers of parameterized vehicle UAV models and offers

efficient simulation mean for specific use cases. SK1 flight simulator (SAHIL) is intended to be used for tuning

of the controller parameters in linear flight control. Thereby, it gives requirements for controller, simulation and

analysis as computational design criteria. It facilitates successful testing of the design via simulation process to

achieve high performance UAV. The use of flight simulation tools greatly reduces the risk as well as the

required amount of flight tests, particularly in complex and dense aerospace situation, which is a well-

recognized benefit of such approaches.

Amani Alnimir and Hisham Abushama. Popular Agile Approaches in Software Development: Review and

Analysis

Abstract: The selection of a software development methodology is vital activity in any software project. It has a

great impact on customer satisfaction and business welfare. Normally the selection is based on experience or in

some cases a rational. In third world countries and especially in Sudan, where this research is conducted, the

choice of a software methodology is always a struggle in software companies. Probably is because most of these

companies are whether are start-up or have humble resources such as small to medium enterprises (SMEs).

Currently the government of Sudan (main buyer of local software products) pushing the software industry to

produce quality products and to reduce risks of buying software products from foreign companies, therefore

quality products is real concern for these companies. Usually, start-up or SMEs software companies seeking for

rapid and agile way of development accompanied with plug & play engineering practices. Agile software

Page 36: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

12

development methodologies become lately the way forward quality assurance. Since the last decade, agile

methods increase popularity and usage among software industries. These methods came to tackles requirement

changes quickly, satisfy customers, support interaction, communication and produce high quality products.

There are a lot of debates in the literature about agile methods especially on the most newest and used ones.

However, academic research on the subject still limited as most of existing literature are written either by

practitioners or consultants. The aim of this paper is to begin filling this gap by systematically reviewing the

existing literature on the most popular agile software development methodologies. This paper has three

purposes: first, it proposes a definition and a classification of agile software development methods. Second it

analyses the most popular agile methods against the defined criteria. Third, it compares these methods and

highlights their similarities and differences. Based on this analysis, future research needs are identified and

discussed.

Mustafa Nawari and Asma Abdalrahman. Crossing Over Under the Root CA

Abstract: National level Public key infrastructure had faced a set of challenges, one of this is to make decision

about which is most appropriate TRUST MODEL to be adopted in Sudan and CAs Interoperability, and This is

due to the complexity of the government departments and their continuous changes and restructuring. Also the

relative expected traffic between these departments represents another challenge. For example, the Banking

system have most of their traffic is between banks. This paper considers these challenges and a solution is

proposed to make Interoperability smooth and robust

Abdelhaliem Abbas. Binary LU Encryption

Abstract: In this paper we introduce an encryption scheme using binary matrices as an encryption/decryption

keys. The scheme can be viewed as a binary version of the classical Hill Cipher with new method for generating

a random key-matrix and its inverse simultaneously using LU factorization method. We suggest a solution to the

known plain-text attack, which is the main weakness in the classical Hill Cipher. We used bitwise operations in

matrix multiplications, and the speed is comparable to AES.

Rasheed Zayid and Mehmet Fatih Akay. Reliable Attributes Selection Technique for Predicting the

Performance Measures of a DSM Multiprocessor Architecture

Abstract: In this study we develop a model for predicting the performance measures of a distributed shared

memory (DSM) multiprocessor architecture by using a reliable attribute selection method. The structure of a

DSM platform is interconnected by the Simultaneous Optical Multiprocessor Exchange Bus (SOME-Bus),

which is a low latency high bandwidth fiber-optic interconnection network. OPNET Modeler is used to simulate

the SOME-Bus multiprocessor architecture and to create the datasets. The input variables of the prediction

model include the ratio service time over packet transfer time (varies from 0.01 to 1), traffic patterns (uniform,

hot region, bit reverse and perfect shuffle), DSM protocol type, node number (varies to 16, 32and 64), thread

number (varies from 1 to 6). The attribute selection method examined using different machine learning tools.

These tools include: multilayer feed forward artificial neural network (FFANNs), support vector regression with

radial basis function (SVR-RBF) and multiple linear regression (MLR). Cross validation (CV) technique is

applied using 10 folds. The model predicts and benchmarks the outputs averages of: channel waiting time

Page 37: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

13

(CWT), channel utilization (CU), network response time (NRT), input waiting time (IWT) and processor

utilization (PU) on small numbers of processors nodes. The results show that FFANN-based model gives the

best results (i.e. SEE=11.1 and R = 0.998587 for CWT; SEE=18.96 and R = 0.997 for NRT; SEE=60.46 and

R=0.8638 for IWT; SEE=0.04795 and R = 0.9838 for PU; SEE=0.0348 and R=0.9990 for CU). Results of the

constructed new selected subset are compared with the original feature space and the findings prove the

accuracy and reliability of the model. It is concluded that FFANN models shortens the time quite a bit for

obtaining the performance measures of a DSM multiprocessor and can be used as an effective tool for this

purpose.

Mahmoud Musa and Muna Ahmed. A Multi-Layer of Multi Factors Authentication Model for Online

Banking Services

Abstract: The security risks of Internet banking have always been a concern to the service providers and users.

There has been a global trend to adopt authentication scheme to increase the security of Internet banking. There

is an unlimited range of variations of how a user can be authenticated to an internet web application with

different standards used in different countries. In this work, user authentication methods being used in various

online environments are analyzed. Moreover, the study covered the internet banking, electronic transactions and

financial services, to identify the characteristics and issues of such authentication methods in order to present a

user authentication level system model suitable for different online services. A new model of Internet banking

services authentication is introduced where Multi factor authentication methods are integrated with multi layer

authentication techniques in order to produce a standard layered multi factor authentication model suitable for

different internet banking services based on risk assessment criteria. The produced model consist of 5 level in

which each level contain a one or combination of authentication factors such as knowledge based, possession-

based or Biometric-based factors. The model then enhanced by adding control information factors, specifically

for levels (4, 5), in order to support layering needs. The proposed standard model tested using higher-amount

transaction schemes and it shows improvement and fulfillment of authentication and secure internet banking

services needs.

Abdelrasoul Yahya. Specifying Abstract Data Types: A Behavioral Model, an Axiomatic Representation

Abstract: Several decades after the emergence of software engineering as an engineering discipline, one of the

most enduring problems dogging this discipline remains the issue of specifying the requirements of a software

product in a complete, consistent, and minimal manner. Not only is the problem technically challenging, in light

of the size and complexity of today’s software products, but it also involves very high costs, due to the fact that

an error in the requirements phase can have a negative impact on all subsequent phases. In this paper, we present

a specification model for abstract data types, and discuss its properties as well as plans for its automation.

Mohamed M. K. Elhaj, Mamoun M. A. Suliman and Dr. Hussam Hamrawi. A Multi-Layer Network

Defense System Using Artificial Immune System

Abstract: Artificial immune systems are computational intelligent systems inspired by human biological

immune systems. The biological immune system can detect and defend the human body against different kinds

of intruders. These systems are distributed, adaptive and multilayered in nature, and the proposed artificial

Page 38: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

14

immune system incorporates these powerful and diverse set of characteristics in designing a network security

system. Recent advances in biological immune systems showed that the innate part of the system plays a greater

role than previously thought. In this paper, this recent development is the corner stone of the new multi-layer

model of artificial immune systems. We describe a work in progress to construct a multilayered defense system

composed of two main layers, innate and adaptive layers. This paper describes the multi-layered system layers

and components, gives a detailed justification and design considerations of the system components, and shows

first results from the innate layer of the system. The preliminary results show that about 70% of the traffic can

be dealt with before entering the adaptive layer of the immune system.

Amira Kamil Ibrahim and Ajith Abraham. Modeling Customer Relationship Management Using Data

Mining

Abstract: In this paper a loan default prediction model was constricted using two attribute detection functions,

resulting in two data-sets with reduced attributes and the original data-set. A supervised two-layer feed-forward

network, with sigmoid hidden neurons and output neurons is used to produce the prediction model. Back

propagation learning algorithm was used for the network. Furthermore three different training algorithms were

used to train the neural networks. The neural networks are trained using real world credit application cases from

the German bank datasets which has 1000 cases; each case with 24 numerical attributes; upon which the

decision is based. The aim of this paper was to compare between the resulting models produced from using

different training algorithms, scaled conjugate gradient backpropagation, Levenberg-Marquardt algorithm and

One-step secant backpropagation (SCG, LM and OSS). This study show that although there is no great

difference between LM and SCG but still LM gives better results. The attribute reduction function used helped

to produced models quickly and more accurately.

Albaraa Abuobieda, Naomie Salim, Mohammed Salem Binwahlan and Ahmed H. Osman. Differential

Evolution Cluster-based Text Summarization Methods

Abstract: In this paper, three similarity measures; Normalized Google Distance (NGD), Jaccard and Cosine

Similarity measure were employed and tested for textual based clustering problem. A robust evolutionary

algorithm called a Differential Evolution algorithm was also used to optimize the data clustering process and

increase the quality of the generated text summaries. The Recall Oriented Under Gisting Evaluation (ROUGE)

was used as an evaluation measure toolkit to assess the quality of the summaries. Experimental results showed

that all of our proposed methods are better than the benchmark methods. More importantly, a Jaccard-similarity

based method outperformed the other two proposed methods, namely, NGD and Cosine similarity measures.

Muna Elsadig Mohamed Ahmed Elsheik. Hybrid Conceptual Framework for Artificial Immune System

Abstract: Artificial immune system (AIS) has been used to solve many problems in different domains. In 1986,

the combination of immune system and machine learning was first introduced by the researchers, who initiated

the field of artificial immune system. Since then, AIS has been built for a wide range of applications with

successful implementation; they include data mining, neural network, fraud detection, document classification,

and intrusion detection and prevention systems. Frameworks for artificial immune system are presented by

Susan Stepeny et al in 2004 and 2005. The authors have suggested that bio inspired algorithms to be built and

Page 39: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

15

analyzed in the perspective of a multidisciplinary conceptual framework that presents biological models and

well-analyzed principles. Many researchers have made some great efforts to define a general AIS engineering

framework; In 2003 L.N.D. Castro and J.I. Timmis presented a general framework for engineering AISs. In this

work, we have integrated conceptual frameworks of AIS with layered framework for engineering AIS to

introduce a new hybrid conceptual framework to develop AIS systems

Taqwa Ahmed, Mariam Taha and Faiza Alim. Synchronization Wireless Algorithm based on Message

Digest (SWAMD) for Mobile Database

Abstract: This research paper presents the design of a proposed synchronization wireless algorithm based on

message digest (SWAMD) as an aid to assist data synchronization between the mobile database and the server-

side database via wireless connectivity. SWAMD proposes storing images from the server-side database and the

mobile database in a message digest table in order to easily compare two images and pinpoint the rows that need

to be synchronized. It follows a user synchronization policy which happens in the case of two different images

found in the message digest tables. SWAMD makes use of standard SQL functions for the synchronization

process. It does not produce timestamps and does not make use of stored procedures nor triggers. The SWAMD

techniques are not specific to a particular database vendor. This means that it can be used to just about any

combination of mobile database and server-side database platforms.

Arafat Abdulgader, Mohamed Awad Elshaikh and Radziah Mohamed. A Study of Software Process

Improvement for Some Sudanese Organizations

Abstract: The software process improvement is initiated to achieve the quality of the software processes which

lead to quality of final software products. Software processes are improved by implementing software process

standards. These standards are often called software process improvement frameworks or standards. Software

process improvement is necessary to increase the efficiency and productivity of software companies and

enhance the final software products. However, most of the Sudanese software companies do not follow any

software process improvement standards. For this reason, normally these companies produce the software

without high quality. Furthermore, the low quality may be the cause of some problems such as unreliable

software and high maintenance. Some of the Sudanese software organizations were visited, to interview

software experts and observe how these organizations can improve their software process. Furthermore, the

results of these interviews have been used to design a questionnaire in order to show the relationship between

Sudanese software organizations and software process improvement standards. This study has identified the

problems faced by these organizations during the implementation of software process improvement standards

and shows the ability of these organizations to implement the software process improvement standards.

Moreover, this work can be used as a first step towards to produce software process improvement standard for

the Sudanese software industry.

Abeer Eldewahi and Eihab Bashier. Authenticated Key Agreement protocol for Virtual Private Network

based on Certicateless Cryptography

Abstract: Virtual Private Networks have been efficient tools that provide inter-connectivity to exchange

information between different (remote) parties that belong to a specific network. A virtual private network

Page 40: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

16

possesses all the features of the private networks and are built upon existing network, but they suffer severe

security problems, particularly, the authentication problem. In this paper we propose a new model for the VPN

based on certificateless cryptography to authenticate users and establish a secure session between them. The

new model solves the PKI problems of the certificates management in the VPNs.

Nisreen Beshir Osman and Izzedin Mohammed Osman. A Validated Model for the Quality in Use of

Mobile Government Systems

Abstract: Mobile government systems have become a very important channel of government services delivery

to citizens, business, and other governmental organizations. However, the Quality in Use (QiU) of mobile

systems is one of the challenges that face the usage of these systems to the maximum potential. This paper

presents a proposed model for determining the QiU of mobile government systems. The model uses Usability,

user Acceptance to mobile systems, and User experience with the system as the attributes that determine the

QiU of these systems. The model was validated based on the objective and subjective measures of the attributes.

The data was collected from 75 subjects participated in experiments by performing 4 representative tasks on a

high fidelity prototype for a Mobile Civil Registry System. The results of the analysed data showed that

Usability of the MCRS is related significantly to the Acceptance to use the system. The results also showed that

User experience with the system was affected by the Usability and the Acceptance constructs. The results of the

study clearly point out the important roles of QiU of mobile information systems and that designers of such

systems need to focus the Usability, user Acceptance and User experience with the system in order to improve

the QiU of mobile system.

Nahla Murtada. Measuring the Cybersecurity of Cloud Computing

Abstract: After the era of mainframe computing (from the nineteen fifties to the nineteen seventies), and the era

of personal computing (from the nineteen eighties to the first decade of this millennium), we are now witnessing

the emergence of the era of could computing (starting from the second decade of this millennium). In the era of

cloud computing, end users of computing resources subscribe to service providers, and pay for services on the

basis of their level of use. This means that large numbers of users share computing and storage resources in a

context where they have little control over access privileges. This raises massive security concerns, which must

be addressed in order for the cloud computing paradigm to fulfill all its potential and deliver all its promise. In

this paper, we discuss an economic based measure of cyber security, and explore how it can be used to measure

the security of the cloud, from the standpoint of the various stakeholders.

Hozeifa Adam Abd Alshafy and Mohamed Alhafiz Mustafa. Segmentation Approach for Online Arabic

Handwriting

Abstract: This paper presents a new approach for online Arabic handwriting segmentation based on the

detection of character boundaries. The approach automatically detects the boundaries of characters within online

Arabic handwriting, thus it gives segments for the handwriting based on these boundaries. The implementation

results show a significant improvement toward the recognition of online Arabic handwriting.

Page 41: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

17

Abdelhamid Mansor, Wan M.N. Wan-Kadir and Toni Anwar. Policy Cycle Analysis to Avoid Policy

Conflict in Policy-based Management Systems

Abstract: A management policy evolves over time by addition, deletion and modifications of rules. Policies

authored by different administrators may be merged to form the final system management policy. These

operations cause various problems such as policy conflicts. Static and dynamic conflicts are considered as two

classes of conflict which need to be understood and independently managed. Furthermore, the distinction

between these two classed is important; as detecting and resolving of conflict can be computationally intensive,

time consuming and hence, costly. However, a dynamic conflict is quite unpredictable, in that it may, or may

not; proceed to a state of a realized conflict. In this paper we present static analyses to address the cycles cased

when there are two or more policies are enforced simultaneously. Moreover, the paper provides temporal

specification patterns to avoid each type of conflicts, and to ensure that policies are enforced correctly.

Safaa Eltyeb and Naomie Salim. Mining Lexico-syntactic Patterns to Extract Chemical Entities with their

Associated Properties

Abstract: Specific information on newly discovered compound is often difficult to be found in chemical

databases. The chemical and drug literature is very rich with the information resulted from new chemical

synthesis. This paper presents a survey on the types of information associated with chemical compounds

extracted from chemical and drug text and the approaches that have been used in the extraction process.

Thereafter, it gives a description for a novel pattern-based extraction method to be developed in the future

taking into account specific types of information associated with chemical compounds not explored before in the

automated extraction from a text. The paper focuses on the extraction of the properties that influence the

bioavailability of drug candidates’ compounds. The result of this study can help the database curators in

compiling the drug related chemical databases and the researchers to digest the huge amount of textual

information which is growing rapidly.

Othman O. Khalifa, Md Khorshed Alam and Aisha-Hassan Abdulla. An evaluation on Offline Signature

Verification using Artificial Neural Network Approach

Abstract: The signature verification is the oldest security technique to verify the identification of persons.

Recently, the signature recognition schemes are growing in the world of security technology. It offers two

different types of schemes those are offline and online method. The offline technique means to verify a

signature written on paper which is scanned to convert it into a digital image, whereas the online system

required an online device such as Tablet PC, touch screen monitor by a pressure sensitive pen to verify the

signature. In this paper discusses a review background of offline signature verification schemes which

considered as a highly secured technique to recognize the genuine person’s identity. It addresses the offline

signature verification technique using Artificial Neural Network (ANN) approach. It also explains the

fundamental characteristics of offline signature verification processes and highlights the various signature

recognition issues.

Page 42: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

18

Fadlelmoula Mohamed Baloul and Prince Williams. Fuzzy Academic Advising System for on Probation

Students in Colleges of Applied Sciences - Sultanate of Oman

Abstract: The aim of this paper is to investigate using the TOPSIS fuzzy model in the academic advising area

as an educational management system to advice on probation students to register appropriate number of credit

hours to minimize the risk. The most important criteria that could affect the academic advising process are

discussed. Accordingly a separate rating table of each alternative and separate weight table of each criterion are

described by linguistic terms and expressed by triangular fuzzy numbers. According to the concept of TOPSIS,

the closeness coefficients calculated to determine the best alternative that could minimize the risk by calculating

the distance to both the fuzzy positive ideal solution (FPIS) and the fuzzy negative ideal solution (FNIS) at same

time. Finally, a real case study is shown to highlight the proposed fuzzy system for ranking different alternatives

decisions in academic advising activity.

Eiman Kambal, Izzeldin Osman, Noon Mohammed, Sara Mohammed and Methag Taha. Credit Scoring

Using Data Mining Techniques

Abstract: One of the key success factors of lending organizations in general and banks in particular is the

assessment of borrower credit worthiness in advance during the credit evaluation process. Credit scoring models

have been applied by many researchers to improve the process of assessing credit worthiness by differentiating

between prospective loans on the basis of the likelihood of repayment. Thus, credit scoring is a very typical

Data Mining (DM) classification problem. Many traditional statistical and modern computational intelligence

techniques have been presented in the literature to tackle this problem. The main objective of this paper is to

describe an experiment of building suitable Credit Scoring Models (CSMs) for the Sudanese banks. Two

commonly discussed data mining classification techniques are chosen in this paper namely: Decision Tree (DT)

and Artificial Neural Networks (ANN). In addition Genetic Algorithms (GA) and Principal Component

Analysis (PCA) are also applied as feature selection techniques. In addition to a Sudanese credit dataset,

German credit dataset is also used to evaluate these techniques. The results reveal that ANN models outperform

DT models in most cases. Using GA as a feature selection is more effective than PCA technique. The highest

accuracy of German data set (80.67%) and Sudanese credit scoring models (69.74%) are achieved by a hybrid

GA-ANN model. Although DT and its hybrid models (PCA-DT, GA-DT) are outperformed by ANN and its

hybrid models (PCA-ANN, GA-ANN) in most cases, they produced interpretable loan granting decisions.

Fadlelmoula Mohamed Baloul, Mohsin Hassan Abdullah and Elsadig Ahmed Babikir. ETAOSD: Static

Dictionary-Based Transformation Method for Text Compression

Abstract: The aim of this paper is to present a new static dictionary-based algorithm for text transformation to

increase the data compression ratio when using standard compression tools. The basic idea of the new algorithm

is to define a pattern for each word in a static dictionary by replacing all or most of the characters in the words

of the dictionary by the most frequently used character in any text file. The proposed algorithm transforms any

text file into another encrypted file with a size almost same as that of the original text file but with different

statistical properties. The new transformation method has been designed, implemented and tested using a

standard data set. Generally, the output result has shown different levels of enhancements on different common

Page 43: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

19

standard data compression tools such as Arithmetic, Huffman, Bzip2, Gzip and WinZip. The compression

performance of all common compression tools has been enhanced especially when the patterns of the

transformed words passed through costless running length encoding (RLE) algorithm. On using Bzip2, the

resultant output files produced about 76.75% as compression ratio with 1.88 as average code length. The final

result is very promising and it could be enhanced more in case of applying dynamic dictionary-based text

transformation technique.

Rihab Eltayeb, Robert Colomb and Abdelgaffar Hamed. A Method for Mapping State Machine Behavior

Models In MDA Issues and Challenges

Abstract: Software development is a complex process and the information technology market is faced by many

challenges. Among the challenges is the effect of technology "platforms" change (languages, operating-systems,

interoperability solutions, architecture frameworks etc.). Model Driven Architecture (MDA) is a new

development method as a positive effort from the Object Management Group (OMG) to overcome software

development problems including but not limited to technology change. The philosophy of MDA regarding

technology change is the separation of concerns. In MDA, structures and behaviors based on the business

functions are abstracted and modeled in a Platform Independent Model (PIM). The implementation specific

structures and behaviors are modeled in a Platform Specific Model (PSM). The PIM is then realized into the

PSM through a mapping process to automatically generate the software. Current practice shows that MDA

approach works quite well but, in most cases, behavioral models are used for other purposes like documentation

rather than complementing the structural models to facilitate automatic software generation. This paper

examines the issues and challenges when mapping behavior models between different abstraction layers,

respectively PIM and PSM using state machine models. A general solution to one of those challenges is

discussed and outlined using a case study.

Mirghani Eltahir and Anwar Dafa-Alla. Extracting knowledge from web server logs using classification

technique

Abstract: The growth of internet is increasing rapidly and the use of websites and web based systems become

very common. main problem that faces any website admin or any web application system is data increasing per-

second, which is stored in different type and format in the server log file about users, learning about users,

expect or predict their needs in the future and maintaining structure and content of the website or web service

according to their previous data become importance. Web usage mining aims to discover useful information or

knowledge from usage data that registered in log file, based on the primary kinds of data used in the mining

process. By using one of web mining techniques, this paper used classification technique to discover knowledge

from web server logs, where all user navigation were registered and stored.

Ahmed Yousri Salama Mohammed. Semantic Web services for Nubian language

Abstract: A pilot study was conducted to test the ability of semantic web tools to design the Nubian Ontology

for Nubba civilization .An important objective of the pilot study was to investigate the capability of the tools

that help in developing semantic web services such as multilingual Dictionary and information retrieval (IR)

services to design Nubian Ontology. TobBraid composer was used as tool in this study to test if it supports

Page 44: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

20

Nubian letters .Also the pilot Ontology that had been designed consisted of 18 classes and 4 properties

represents the translation and pronunciation form/to Nubian ,Arabic and English languages. SKOS was used for

first time in semantic research to represent Arabic and Nubian letters .SKOS used in the developed pilot for

Nubian Ontology .The results indicate that TobBraid composer displays Nubian letter correctly and the

inference engine answers the simple and complex queries .Multilingual dictionary designed and tested with

simple query and complex query and the result was displayed correctly as plain text and as visual map.

Elmuntasir Abdullah Hag Eltom and Eltigani Bashir. Extreme Programming Applied in a Large-Scale

Distributed System

Abstract: This work shows how Extreme programming (XP) could enhance the development and

implementation of large -scale systems. A number of papers have been published in the past few years reporting

experiences with agile development and XP in particular. However information on the practical usage of XP in

large-scale systems is still considered limited. We have conducted this research to gain better understanding of

the impact of using XP process to the development effort of large-scale distributed systems while taking Sudan

Traffic Violations project as an example. It has been shown that adaptation of Extreme Programming practices

in the project has maximized the Human factor output, and helped in the generation of promising ideas

regarding complex design issues that the team used to approach the system overall conceptualization and

implementation as well as future extensions.

Yusra Osman. Segmentation Algorithm for Arabic Handwritten Text

Abstract: Segmentation is the process of dividing the binary image into useful regions according to certain

conditions. It is the most important phase in any optical character recognition (OCR) system and its accuracy

affects significantly the recognition rate of that system. In cursive nature languages such as Arabic, the

segmentation procedure is complicated especially in handwritten documents because writers’ styles differ as

well as the special cases of characters overlapping and ligatures. Hence, there is an urgent need to design and

implement segmentation algorithms using general descriptors and features that most writers follow. In this

paper, a segmentation algorithm for Arabic handwritten text is developed. The main idea of the algorithm is to

divide the selected image into lines and sub-words. Then, for each sub-word, the contour of each sub-word is

traced from a starting point. After that, the algorithm detects the exact points where the contour changes its state

from a horizontal line to another state of vertical or curved line. Finally, the coordinates of these points are

considered as the character segmentation points. The algorithm was tested using the words of IFN/ENIT

database. Over 537 tested words containing 3222 character; the algorithm achieved 89.4% of correct character

segmentation points.

Afaf Mohamed and Robert Colomb. Service Discovery using perdurant ontology

Abstract: Service discovery is a mechanism for finding services, the existing service discovery mechanisms

offer low retrieval precision and recall. The main reason of that is due to the limitations around search engines

and retrieving process. The service inventory provides a mechanism for organizing all of the services across the

enterprise. UDDI as an inventory is the main registry for publishing and finding web sevices. The current

problem with service inventories such as UDDI is the retrieval process which associated with the search engines

Page 45: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

21

that support only syntactic, keyword-Oriented search.Many researchers talked about that and some of them

introduce the use of semantic service discovery mechanisms to improve the quality of result. The key to

searching service inventories is to find ways to represent them in a way that can be exploited by one of the

standard methods like Google type search. In our work we introduce a review of ontolgies and mechanisms used

there. Endrant and perdurant ontologies are suggested as a new solution for enhancing the retrieving result. The

main concern is service inventories at design time by designing perdurant ontology and produce queries at run

time to specify how to access the services by using TripAdvisor website as a concreate case study.

Majda Omer and Eihab Bashir. Enhancement model for PKI certificate validation in the Mobile Banking

Abstract: The Mobile banking is a service that allows customers to do banking transactions on their mobile

phone by using many mobile device technologies like SMS, WAP, and J2ME applications. The bank

transactions, such as balance inquiry or transfer money and so on are usually contains and transmits critical

information. Therefore, such transactions are under risks to violation in confidentiality, integrity, and

authentication. The Public Key Infrastructure (PKI) system can used to provide the confidentiality, integrity, and

non-repudiation services, in particular the authentication service for mobile banking. However, the current

existent of PKI is not appropriate for mobile devices, because they have proven of suffering from resource

limitations. This paper propose enhancement model for efficient certificate validation in the PKI system, in

addition to choosing the proper public key cryptography algorithm, in regards to mutual authentication service

to be convenient with mobile banking. The model has been proposed by using two methods; firstly, the

NOVOMODO system to provide better efficiency for certificate revocation and validation. Secondly,NTRU

algorithm to generate public and private keys, data encryption/decryption, signing/verifying data and

certificates, because NTRU has better performance than other public key cryptographic algorithms, with the

same level of security. Finally, the using of the proposed solution model with mobile banking system can

support authentication service that fitting with this system, furthermore, it can provide others security services

like confidentiality and integrity services.

Suhaidi Hassan, Zeeshan Aziz and Kashif Nisar. On the Cache Performance of Information Centric

Network

Abstract: The current internet model has proved more sustainable then the provisioned capacity while at the

time of designing the architecture. The voluminous growth of traffic over the internet has brought challenges for

the exiting networking architecture. The information centric paradigm appears to give efficient solution towards

content dissemination model. This is a content focused networking paradigm rather than host to host

communication. Caching is one of the major components of information centric networks. This paper is

intended to explore the impact of cache on critical attributes of networks. We have made a comparative analysis

of in-network and edge network caching mechanism in simulation. The results proved that in-network caching

mechanism is far better than network edge caching with improved throughout, increase link capacity to avoid

congestion.

Page 46: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

22

Hiba Nasir, Yahia Abdalla Hamad and Amir Eisa. An Agent-based Proxy Cache Cleanup Model using

Fuzzy Logic2

Abstract: Proxy caching is one of the solutions to enhance the performance of Web traffic. Most of the existing

traditional proxy caching policies such as Size, Greedy Dual Size (GDS), Least Frequently Used (LFU), and

Least Recently Used (LRU), are not efficient in Proxy caching. Each policy has a limitation. Thus, there is a

need to find another approach to perform and manage the cache cleanup task in an efficient way. Today, proxy

cache cleanup task is usually performed manually by a human administrator. This work proposes an agent-

based model to automate the cache cleanup task. The cache cleanup task is performed proactively on both the

parent proxy and the child proxy caches based on the integration of the caching polices. Fuzzy logic is used to

integrate the LFU and LRU caching replacement techniques on the child cache side. Size, LFU, and LRU

techniques are used on the parent cache side. The agent chooses clean up priority to make an intelligent

decision. The paper reviews some of the existing intelligent web caching approaches and then describes the

proposed model.

Mohammed Babiker, Aisha H. Abdalla and Ismail El-Azhary. Investigation of Nested Nemo Schemes in

Mobile Network Environment

Abstract: Using of mobiles and wireless devices becomes very important in recent years , due to the increasing

of services and applications they provide Through which. The major issue is providing seamless mobility to

achieves better performance . The Internet Engineering Task Force has developed Mobile IP, which allows

Mobile node moving from Network to another using original IP address. The Internet Engineering Task Force

also developed Mobility Basic Support Protocol (BSP) for managing mobile networks as a single unit, when a

Mobile Router in mobile network attached to other Mobile Router in another mobile network, it makes a

hierarchical form known as Nested Mobile Network, which is suffer from major problems in multilevel of

nesting case, some issues such as tunneling overhead, packet losing and delay are affect directly Nested

Network Performance. This paper is to investigate the current approaches that are introducing Nested Nemo

Schemes in Mobile Network environment. It highlights the advantages and the limitations of these approaches.

Both the qualitative and the quantitative evolutions of these proposals are hereby presented.

Mariam Taha, Taqwa Alhaj, Ala Moktar, Azza Salim and Settana Abdullah. On Password Strength

Measurements: Password Entropy and Password Quality

Abstract: In this paper, we propose a new algorithm to compute the strength of passwords based on two

measurements, mainly: password entropy and password quality. The passwords considered by the algorithm

consist of eight characters alpha numerics with especial characters .For such passwords, the low/high entropy

patterns are identified in the analysis to be compared with the second measurement; the password quality.Two

general results obtained: high entropy passwords are also high quality password, and low quality passwords are

low entropy passwords.

Page 47: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

23

Mohamed Fadlalla Elhag. Intelligent System for Selecting Optimum (INST) Based on Fuzzy Logic to

Develop a Courseware (ISSIDC).

Abstract: Instructor’s teaching experience or instructional style (INST) is an essential factor in the knowledge

transfer for T-learning (SCHUNK,257), so in this paper I tried to cope (INST) in E-learning system as well.

Specifically, this paper proposed (Methodological approach based on Fuzzy logic to Select the Optimum

Instructional style(s) for Designing a Specific E-learning system” (MFSOI-DSE). The proposed (MFSOI-DSE)

extends the fuzzy logic concepts and techniques in E-learning field, explicitly, in selecting an optimum (INST)

for developing a specific courseware. In this paper I proposed a new procedure for representing the (INST) in

quantitative values instead of qualitative description, using Frame of cognition/knowledge. In this paper, a

conducted case study using the proposed procedure has met the selection of INST for developing a specific

courseware with an expertise decision. Moreover, the paper specified the best software tools for building an

automated system based on the above mentioned procedure in order to facilitate the (MFSOI-DSE).The topic of

this paper lies on a multidisciplinary area of research, so it needs a solid background in computer science,

Fuzzy logic and Instructional design field. Finally, I hope this paper will improve the quality of the E-learning

systems based on IQP (Instructional Quality Profile)

Mohammed Elfahal and Mohammed Elhafiz. Acoustic Approach to Spoken Arabic Language Detection

Abstract: Spoken Language detection is the process of either to accept or to reject a language identity from its

sample speech. The process is essential as it represents the first essential phase for developing a complete

multilingual-enabled speech processing applications. However, most efforts are focused on European languages

and the research is relatively few for other languages such as Arabic. This is mainly due to the lack of tools and

resources, e.g., speech corpora. This paper describes an ongoing research to develop a language independent

Modern Standard Arabic (MSA) detector which is a binary SVM classifier based on speech acoustic features. In

that context, the classifier is used to classify speech utterance into either classA, which represents the Arabic

language or classNA to denote non-Arabic languages. As most currently available speech corpora are license

restricted and their languages are selected based on population or geographical distribution, a new multilingual

speech corpus with six languages created is being created. Languages in this created corpus have some sort of

similarity with MSA, e.g., Arabic and Hebrew. This property adds another dimension of complexity to the

classification task. This is because one of the major goals of this research is to measure whether the efficiency of

the built model (classifier) for detecting MSA, when trained with this language, will be preserved on the same

level when tested with other languages that have some sort of relationship with MSA. This will be referred in

this paper as stability-against-similarity of the model.

Nusiba Abdalrhman Ahmed and Abdelgaffar Hamed. Enabling Use Case Function point on Service-

oriented Architecture

Abstract: Software complexity estimation is an important activity to software development life-cycle such as in

terms of effort, cost and size. A lot of estimation models were proposed in the literature but they do not consider

the new paradigm shift in software development service-oriented architecture (SOA). SOA is a new style of

software architecture that has six principles like standard interface (contract) which allows building technology-

Page 48: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

24

independent applications that can interoperate. Function Point (FP) metrics were designed to consider functional

requirements (complexity) instead of lines of code, which is enriched by Use Case Point (UCP),a software

estimation technique proposed to estimate the software size and effort for software development projects of

object-oriented systems. However, estimation techniques for Service-Oriented Architecture (SOA) are still not

investigated well. Generally the demanded is having global view by relating function point methods with SOA

design principles so this is an attempt to provide this view. As UML use case and activity models are widely

recognized for its easy of communication, this paper has adopted them for estimating service-based systems

complexity as a source of information for system under estimation in high level models. The proposed technique

is compatible to the design principles of SOA and provides a systematic and formal way for complexity

estimation. Courseware management service-based system is used as case study to evaluate the proposed

technique.

Awadallah Ahmed and Aisha Abdalla. Evaluation of Gateway placement approaches in Wireless Mesh

Network

Abstract: In this paper, Gateway placement approaches in Wireless Mesh Network are reviewed, and their

purposes are studied. According to the relevant researches in this area, there are many gateway placement

approaches in Wireless Mesh Network that have been founded. These approaches are designed to find an

optimal network throughput, cost minimization, quality of services and load balancing. In this paper these

approaches are classified depending on the mechanism of gateway selection/placement and their design

philosophy. This classification can helps in determining the optimal approaches by comparing and analyzing the

mechanism of each approach and then select the suitable approach that can be used depending on the aim of the

wireless mesh network.

Osman Mudathir Elfadil. Localization for Wireless Sensor Networks

Abstract: Localization is one of the fundamental problems in wireless sensor networks (WSNs), since locations

of the sensor nodes are critical to both network operations and to most of the application level tasks. There

exists an extensive body of paper that aims at obtaining locations as well as spatial relations of nodes in WSNs

without requiring specialized hardware and/or employing only a limited number of beacons that are aware of

their own locations.

Osman Mudathir Elfadil. Navigation Algorithm for Mobile Robots using WSNs

Abstract: In this paper, a new navigation algorithm is proposed for mobile robots as one of the applications of

localization system for WSNs. In this navigation system, the robot can navigate autonomously with the aid of a

sensor network and additional entity such as middleware-server is not needed. So, this system can be

constructed at low cost, and high accuracy. Also if temperature sensors are mounted to nodes, it is also possible

for the robot to avoid danger (hot) regions by changing the routing path. In this algorithm, we have presented a

navigation algorithm that allows the mobile robot to navigate without the need for a map, compass, or GPS

while interacting with neighboring sensor nodes. One of the features of our navigation system is that it allows a

number of robots to navigate at the same time. In addition, this method is suitable for both indoor and outdoor

navigations. So that robot navigation is allowed with the localizations of the robot and sensor nodes, which

Page 49: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

25

greatly expands its application area. The algorithm using TDoA with ultrasonic sensors to measure distances can

be suitable in indoor environments and more accurate since the range of ultrasound is relatively short and in

case if it used for outdoor navigation, it is better to use a RSSI method to measure distances because RF signals

propagate more uniformly. All in all the wireless sensor network environments and navigation algorithm can apt

for low cost effective robot navigation and overcome the limitations of traditional navigation algorithms.

Sara Eljack and Suhail Ahmed. Effect of the Interior Gateway Routing Protocols in the Multiprotocol Label

Switching Networks

Abstract: Traditional IP based networks, Frame Relay and ATM networks have some drawbacks in the

management operation of large networks such as cost, security, scalability and flexibility. Therefore, to solve the

above mentioned weakness, the MPLS-based VPN networking is introduced to work with existing deployed

backbones and allow organizations to interconnect the dispersed sites and remote workers through secure links

by using public internet. This work aims to provide a better understanding of the operation of service providers’

large networks management, through focusing on the MPLS VPN technology. It offers a detailed description of

the major operation of the MPLS VPN networks to meet a customer requirement in the content delivery

mission. In addition, this work focuses on the effect of the interior gateway routing protocols on the MPLS VPN

networks, two famous protocols have been chosen to be investigated (OSPF and IS-IS) and two proposed

designs are introduced and simulated by using OPNET Modeler; then a deep network performance analysis is

provided.

Ahmed Osman, Naomie Salim and Ammar Ahmed E. Elhadi. A Tree-based Conceptual Matching for

Plagiarism Detection

Abstract: This paper discusses a new plagiarism detection method for text documents called Tree-based

Conceptual Matching. The proposed method not only represents the content of a text document as a tree, but it

also captured the underlying semantic meaning in terms of the relationships among its concepts. The method

was adopted to detect plagiarism in text documents. The tree-based played a very important role in this method.

It looked at the amount of detecting plagiarized sentences from the original documents. Experiments have been

carried out using the CS11 standard plagiarism detection corpus. The results were evaluated using information

retrieval measurements, which are Recall, Precision and F-measure. The results were compared with other

methods for plagiarism detection and we found our method outperforms the other methods for plagiarism

detection.

Eltayeb Abuelyaman. Quasi Fields Based S-Box Implementation

Abstract: The byte substitution table which is known as the S-Box is one of the major steps of the Advances

Encryption Standard (AES). Its entries are pre-computed and stored on lookup tables (ROMs) to avoid tedious

real time computations using Galois Field. However, in many situations, storing data weakens the overall

security as it gives a hacker a chance to put his foot at the door. To harden against such vulnerability, a modified

approach that avoids onerous Galois Field operations is necessary. To that end, two possible replacements are

compared in this paper. The first is based on the field of residues of prime numbers and the second is based on

the quasi-field of residues of powers of two. The first uses a reduced lookup table. The advantage of reduced

Page 50: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

26

lookup table over the complete table originally proposed for AES is demonstrated in this paper. The second

performs byte substitution on real-time bases. Each approach is evaluated and recommendations are given for

environments where each outperforms the other. The paper also justifies need for speeding up byte substitution.

Muhammad Awais Jadoon, Ahmad Shah, Othman O. Khalifa, Zainab Ali Khan and Imran Khan.

Network Coding for hybrid Satellite-terrestrial Networks over non-identical Fading Channels

Abstract: Satellite communication technology can well address for global communication system concern

along imperative features. Network coding techniques are implicit for future wireless communication network

demands in terms of throughput, security and robustness. Physical layer network coding (PNC) and Analog

network Coding (ANC), are considered as two of the most studied variants of the network coding. Analysis

revealed that similar performance augmentation can be made in satellite terrestrial networks with highly

unpredictable behavior. In this paper feasibility study focuses on a comparative analysis amongst PNC and ANC

in terrestrial land mobile satellite (LMS) networks in standings of their respective SER and outage probabilities.

Eimad Abusham and Housam Basheir. Face Recognition Using Local Graph Theory (LGT)

Abstract: The problem associated with Illumination variation is one of the major problems in image processing,

pattern recognition, medical image, etc; hence there is a need to handle and deal with such variations. This paper

presents a novel, simple, fast and efficient algorithm for face recognition call Local Graph Theory (LGT). LGT

features are derived from a general definition of texture of graph neighborhood. The experiments results on our

face database images demonstrated the effectiveness of the proposed method. The new method can be stabilized

more quickly and obtain higher correct rate. Finally, LGT can be easily applied in many real time fields, such as

image processing, pattern recognition, medical image as pre-processing.

Samer Mohamed Kannan Mahmoud and Saeed A. Al-Ghamdi. Solving Problems of Computer Networks'

Planning using Elastic Networks Method

Abstract: This part of research focuses on analysis and evaluation for synthesis problem of a computer network

heterogeneous structure. Where the core of the network has a ring topology, the network lower level-topology

tree, and this paper composed of two interrelated parts. Firstly, this part of presented herein addresses one of

problems concerned with planning of computer networks with heterogeneous structure associated with cost

effectiveness. However, the second part presents other side of the computer networks' structure problem

associated with optimality of network size. Specifically, at this first part focusing attention on the cost

effectiveness problem of networks' structural features using modified elastic net method. It adopted modified

method applied for reaching shortest path topology of computer network backbone structure via computing

method of weight coefficient values. That solution characterized by introducing additional synthesized weight

coefficients' values taking into account the amount of internal network nodes' demands/ traffic. Interestingly,

obtained solution results after simulated experiments proved to take the advantage of better cost effectiveness

(lower cost) of designed network structure, rather than other well known applicable solutions to date.

Page 51: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

27

Yogan Jaya Kumar, Naomie Salim, Albaraa Abuobieda and Ameer Tawfik. Automatic Multi Document

Summarization Using Voting Technique

Abstract: News articles which are available through online search often provide readers with large collection of

texts. Especially in the case of news story, different news sources reporting on the same event usually returns

multiple articles in response to a reader’s search. In this work, we first identify cross-document relations from

un-annotated texts using Genetic-CBR approach. Following that, we develop a new sentence scoring model

based on voting technique over the identified cross-document relations. Our experiments show that

incorporating the proposed methods in the summarization process yields substantial improvement over the

mainstream methods. The performances of all methods were evaluated using ROUGE: - a standard evaluation

metric used in text summarization.

Yousra Gad and Bazara Barry. Developing a Security Model to Protect Websites from Cross-site Scripting

Attacks

Abstract: The growth of the Internet in recent years has led to the spread of information crimes in renewed and

changing ways. This paper is focused on understanding the issues surrounding cross-site scripting attacks and

providing a simple and effective security model to protect websites from such attacks. The security model is

based on a sequence of levels and is built using a combination of tools. Tests against a set of cross-site scripting

attacks show the proposed model effectiveness and convenience.

Ali Ahmed, Ammar Ahmed Eltaeb Elhadi, Hamza Awad Elkarim Hamza Ibrahim and Naser Elmisbah.

Feature Selection and Similarity Coefficient Based Method for Email Spam Filtering

Abstract: Many threats in the real world can be related to activities of persons on the Internet. Spam is one of

the most pressing security problems online. Spam filters try to identify likely spam either manually or

automatically. Most of the spam datasets used in the spam filtering area of study deal with large amounts of data

containing irrelevant and/or redundant features. This redundant information has a negative impact on the

accuracy and detection rate of many methods that have been used for detection and filtering. In this study,

statistical feature selection approach combined with similarity coefficients are used to improve the accuracy and

detection rate for the spam detection and filtering. At the end, the study results based on email spam datasets

show that our proposed approach enhanced the detection rate, false alarm rate and the accuracy.

Nahid Ahmed Ali. Verifying Abstract Data Types: A Hybrid Approach

Abstract: At a time when software products are taking on increasingly critical functions, and are growing

increasingly large and complex, the need to ensure their quality also increases significantly. Yet, despite several

decades of research, the verification of software products of industrial size and complexity remains an

unfulfilled challenge. In this paper, we discuss a hybrid approach to the verification of abstract data types

against axiomatic specifications, which consists in deploying static techniques and dynamic techniques in a

complementary manner, avoiding the drawbacks of each technique used in isolation.

Page 52: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

28

Ahmed Osman and Naomie Salim. An Improved Semantic Plagiarism Detection Scheme Based on Chi-

squared Automatic Interaction Detection

Abstract: This paper introduces an improved semantic text plagiarism detection technique based on Chi-

squared Automatic Interaction Detection (CHAID). The proposed technique analyses and compares text based

on semantic allocation for each term inside the sentence. It also captures the underlying semantic meaning in

terms of the relationships between its concepts via Semantic Role Labeling (SRL). SRL offers significant

advantages when generating arguments for each sentence semantically. Voting for each argument generated by

the CHAID technique, in order to select important arguments, is a main feature of the proposed method. Only

the most important arguments selected by the CHAID method were used in the similarity calculation process.

Testing was done using the CS11 and PAN-PC-10 datasets. The results show that this proposed method

improves the SRL plagiarism detection method as well as exhibiting improved performance in terms of Recall,

Precision and F-Measure when compared to current methods of plagiarism detection.

Mohamed Yousif and Sami Sharif. Sudan HF Model based on University of Khartoum Ionospheric Shells

and their Mathematical Derivations

Abstract: Abstract: The effect of changing properties of F layer during day and night on the Sudanese

ionospheric links in terms of the optimum frequency is well discussed in this paper. The study is based on the

current solar conditions. The concept of UKIS is introduced and illustrated graphically and represented by

mathematical equations. Five cities have been chosen for this study: one is located in center (Khartoum) and the

others are (wadi halfa) in the north, (nimule) in the south (Kassala) and in the east, and (AlJunaynah) in the

west. The concept of twin ionospheric links is introduced and its relation to the UKIS is well illustrated. Contour

maps that represent the strength and death time of the UKIS for the country are attached to the paper. The study

is based on empirical ionospheric modeling and the statistics are computed using the international ionosphere

model ( IRI).

Mosharrof Hussain Masud, Suhaimi Abd Latif, Farhat Anwar and Md Khorshed Alam. An Analysis of

Resource Sharing Scheme in Heterogeneous Wireless Campus Network

Abstract: The next generation wireless technology systems are being devised with the vision of heterogeneity

where a Multimode Device (MD) would be connected with multiple wireless networks like GSM, WiFi, and

WiMAX. Bandwidth is one of the main resources of these technologies which is operated independently that

need to be aggregated among these technologies in Heterogeneous Wireless Network (HWN). This paper aims

to investigate the issues of campus based heterogeneous wireless network, its benefits and challenges. It has

found that an efficient scheduling model for packet reordering, an appropriate interface selection mechanism is

important for HWN. Besides its benefits, this paper also addresses the schemes including genetic algorithm,

fuzzy logic technique and game theory those have been using for bandwidth allocation. Finally, this paper

proposes a mechanism for bandwidth allocation in a HWN environment.

Page 53: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

29

Lubna Gabralla, Rania Jammazi and Ajith Abraham. Oil Price Prediction Using Ensemble Machine

Learning

Abstract: Crude oil price forecasting is a challenging task due to its complex nonlinear and chaotic behaviour.

During the last couple of decades, both academicians and practitioners devoted proactive knowledge to address

this issue. A strand of them has focused on some key factors that may influence the crude oil price prediction

accuracy. This paper extends this particular branch of recent works by considering a number of influential

features as inputs to test the forecasting performance of daily WTI crude oil price covering the period 4th

January 1999 through 10th October 2012. Empirical results indicate that the proposed methods are efficient and

warrant further research in this field.

Mohamed Firdhous, Osman Ghazali and Suhaidi Hassan. Cloud Computing for Rural ICT Development:

Opportunities and Challenges

Abstract: According to the United Nations, almost 50 percent of world population and more than 70 percent of

that of the developing countries are living in rural areas. Majority of this rural population live in poverty

especially in North and sub Saharan Africa where they live in less than $1 a day the absolute poverty line. Rural

population face unique problems compared to that of their urban counterparts with respect to access to

technologies, high unemployment, insufficient access to infrastructure, markets and social services. Experts

have identified ICT as the tool for managing the inefficiencies in traditional methods for the empowerment of

rural masses. In this paper, the authors study how cloud computing can be used to meet the ICT requirements for

rural development with special respect to the opportunities and challenges of implementing and using the new

technology.

Sulafa Khaled Talha and Bazara I. A. Barry. Evaluating the Impact of AES Encryption Algorithm on Voice

over Internet Protocol (VoIP) Systems

Abstract: Securing computer systems has become of vital importance especially with the sophistication and

advancement of attacking tools and techniques. Therefore, it is critical to apply security mechanisms that are

capable of protecting systems in a way that ensures and provides major security services. However, providing a

system with security services comes at the expense of system performance. The resource-intensive nature of

effective security mechanisms may have a negative impact on certain aspects of system performance. A major

security service that is required in computer networks and information systems is confidentiality which ensures

that transmitted data are protected from unauthorized disclosure. Encryption is the security mechanism that is

used to provide confidentiality. Prior to transmitting sensitive data over an information channel, encryption

algorithms transforms data into a form that is not readily intelligible. On the side of the receiver, a decryption

operation takes place to recover the original form of the sent data. Clearly, encryption and decryption operations

have their impact on the performance of the system. This study investigates the impact of providing

confidentiality services on the performance of systems. The study takes Voice over Internet Protocol (VoIP)

systems - which are used to make telephone calls over the Internet - as an example of systems that are greatly

affected by performance degradation. The study measures how key VoIP performance parameters are impacted

when certain encryption algorithms are implemented, and whether that impact falls within the tolerable levels.

Page 54: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

30

Isam Basheir, Adil Khidir and Hanan Adlan. Neural Networks Forecasting Architectures for Rainfall in

the rain-fed Sectors in Sudan

Abstract: Feedforward Multilayer Perceptron (MLP) are universal approximators. Weight adjustment of the

connectionist model is crucial to architecture, that model systems behavior. This paper developed a neural

network for hydrological purposes. Two architectures were developed, investigated, and tested for forecasting

rainfall in the rain-fed Sectors in Sudan. A monthly architecture and a decade architecture are developed with

backpropagation feedforward neural network. The two architectures are found to be efficient for forecasting

rainfall in these sectors.

Aisha Hamid. Upgrading Distributed Agile Development

Abstract: Agile software development teams are normally collocated a matter that enhances the implementation

of its principles. In the growing world of software industry it is better to get benefit of markets, skills and

reduced cost which are distributed all over the world. This can be achieved by upgrading the practices of agile

software development to be in harmony with distributed software development and keeping its intrinsic values

from being destroyed or even distorted in spite of geographical barriers, different cultures and different time

zones. This paper studies an approach based on sequential development of the software to help in dealing with

the challenges that face agile methodology when it is combined with distributed software development.

Amira Kamil Ibrahim and Ajith Abraham. Modeling Consumer Loan Default Prediction Using Ensemble

Neural Networks

Abstract: In this paper a loan default prediction model was constricted using three different training algorithms,

to train a supervised two-layer feed-forward network, with sigmoid hidden neurons and output neurons, to

produce the prediction model. But first, two attribute filtering functions were used, resulting in two data-sets

with reduced attributes and the original data-set. Back propagation learning algorithm was used for the network.

The neural networks are trained using real world credit application cases from a German bank datasets which

has 1000 cases; each case with 24 numerical attributes; upon which the decision is based. The aim of this paper

was to compare between the resulting models produced from using different training algorithms, scaled

conjugate gradient backpropagation, Levenberg-Marquardt algorithm, One-step secant backpropagation (SCG,

LM and OSS) and an ensemble of SCG, LM and OSS. Empirical results indicate that training algorithms

improve the design of a loan default prediction model.

Page 55: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

31

Electronics Engineering

Ama Eltahir and Rashid Saeed. An Enhanced HWMP (E-HWMP) Protocol for Multihop Vehicular

Communications

Abstract: Integration of Vehicular Ad-hoc Network (VANET) and Universal Mobile Telecommunication

System (UMTS) is promising architecture for future machine-to-machine applications. This integration help the

vehicles have steady Internet connection through UMTS network and at the same time can communicate with

other vehicles. However, the dead spot areas and unsuccessfully handoff processes due to the high speed of the

vehicles can disrupt the implementation of this kind of architecture. In this paper, a new Simplified Gateway

Selection (SGS) scheme for multi-hop relay in VANET-UMTS integration network is proposed. The main aim

of this research is to enhance the integration between VANET and UMTS network, and extend the coverage in

the area where there is no coverage, and reduce the amount of overhead, and reduce delay metrics, and

increasing the packet delivery ratio, and also to reduce the dead spot in VANET-UMTS network. An enhanced

version of HWMP with combination of IEEE802.11p and IEEE802.11s for multi-hop vehicular communications

is proposed. An integrated simulation environment combined of VanetMobiSim and NS2 is used to simulate and

evaluate the proposed scheme. The simulations results show that, E-HWMP protocol performed better than Ad-

hoc on demand Distance Vector (AODV) routing protocol. Furthermore, E-HWMP is compared with other

cluster-based gateway selection that used in the previous works; the result shows that our E-HWMP protocol

outperforms the other cluster based gateway selections schemes in term of connection delay, control packet

overhead, packet delivery ratio and overall throughput.

Sameir Ali Hamed, Abdulwaheed Musa and Saad Bashir. Near-Fields of an Array of Circular-Loop

Antennas

Abstract: In this paper an exact electromagnetic near-fields expressions for an array of circular loop antennas

(CLAs) are presented. The technique is based on the spherical Bessel functions (SBFs) and associated Legendre

polynomials (ALPs) expansion for the Green’s function. Fields of the uniform current CLAs array and that on

the axis of the array, as well as the fields of the so called gate antenna arrangement, are obtained from the

general expressions as special cases. The known far-field expressions for the array of CLAs are derived from the

general expressions which check the correctness of these general field expressions.

Moutaman Mirghani Daffalla. Adaptive Multifunction Filter for Radar Signal Processing

Abstract: Filtering of radar signals frequently takes place to realize a certain task, such as interference reduction

or Doppler processing to remove clutter. However, in this paper a digital filter is proposed to be designed as a

multifunction processor, achieving several sorts of signal processing within the same module. Processing is

easily done in the baseband rather than in passband, for a moderately slow DSP processor. Hence, a lowpass

filter will perform the task of rejection of the out-of-band interference. Higher SNR can be obtained to enhance

the detection of targets inside noise if that filter is matched to the expected radar signal, even if it caused signal

distortion. Doppler processing makes use of digital filters to cancel signals from fixed and slow targets. The

proposed filter would be designed as an adaptive filter to follow interference and clutter changes, and eliminate

Page 56: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

32

blindness to some moving radar targets that arise in digital Doppler processing due to aliasing caused by targets

of higher speeds. Matlab simulations are made to validate the idea and observe features and limitations of the

proposed adaptive filter. Adaptive filter that is based on the least-mean-square algorithm is designed to achieve

the best outcome.

Moutaman Mirghani. Design and Analysis of Low Baudrate Modem Using Microcontrollers

Abstract: Special technique is proposed for the design of soft modems that would be appropriate to transfer text

messages at up to 300 bauds. Modulation scheme used is audio frequency shift keying, which is suitable for

transport of text messages through the voice channel over HF and VHF radios. The soft modem is primarily

designed to be implemented using low cost microcontrollers, and without the need of analog circuits such as

active filters or a phase-locked loops. In addition to the physical layer, the proposed modem performs data link

layer tasks such as framing and error detection and automatic request. Though synchronous transmission could

be applied, asynchronous serial communication protocol is used to minimize design complexity, and be in

essence to asynchronous FSK demodulation. The FSK modulation technique used is continuous phase FSK to

eliminate phase jitters problem. Minimum shift keying can be applied, but with limitation for flexibility in

changing baudrate and carriers frequencies. Proposed FSK demodulation is not a synchronous nor a PLL or a

filter-based detector. Instead, a sort of frequency counter is proposed in this paper. Matlab simulations are made

to validate the algorithm and observe features and limitations, such as the bit error rate and maximum bitrate.

Later, the algorithm is examined by the aid of a code running on a virtual microcontroller, before being running

on a real one.

Alaa A. Yassin and Rashid A. Saeed. Reconfigurable Dual Band Antenna for 2.4 and3.5GHz using Single

PIN Diode

Abstract: Heterogeneous network tends to use multiple types of wireless access networks. In heterogeneous

wireless networks, different wireless access technologies are integrated to complement each other in terms of

coverage area, mobility support, bandwidth, and price. In this paper, dual radios, fixed-WiMAX (i.e. 802.16d) at

3.5 GHz and WLAN at 2.4 GHz are used. Dual band rectangular microstrip antenna with reconfigurable

capability is proposed, which has the advantage of simple structure, small size and easy fabrication. FR-4

substrate with dielectric constant ε_r=4.3 and thickness h=1.6mm parameters are employed for the proposed

design. This design shows excellent mechanical characteristics for the antenna. This study is concentrates on

effect of patch dimensions, width and length of microstrip feed line. Then reconfigurable antenna using

customized slots on different locations on the microstrip patch at dual band frequencies are considered. The

proposed antenna is switchable between two resonance frequencies by PIN diode. The simulation is

implemented by CST microwave studio simulator showed good performance. The return loss was -22 dB at

frequency 2.4GHz and -27 dB at 3.5GHz.The bandwidths were 65MHz at 2.4 and 50 MHz at 3.5GHz.

Page 57: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

33

Nihad A. A. Elhag, Isam M. Osman, Alaa A. Yassin and Tsneem B. Ahmed. Angle of arrival estimation in

smart antenna by using MUSIC method for wideband wireless communications

Abstract: Smart antenna technology in mobile communication is one of the most promising techniques enhance

the capacity of communications networks. One of the problematic issues in smart antenna is the detection of

arrival signal in different angles in multipath Rayleigh fading channel. In this paper a new smart antenna signal

processing method for estimating the signal angle of arrival (AoA) is proposed, by using MUSIC method for

wideband wireless communications. The simulation is conducted under different random signal arrivals and

space between array elements. The achieved results show that the proposed method determined exact angle of

arrival of more than 90% of the received signals Rayleigh fading channel.

Jacqueline J.George and Nada Mustafa Adalla. Adaptive Joint Call Admission Control to Support QoS in

Heterogeneous 4G Wireless Networks

Abstract: Call admission control (CAC) is one of the basic mechanisms for ensuring high quality of service

(QoS) offered to the user in Wireless Heterogeneous Networks (HetNet). Based on the available network

resources, it estimates the impact of accepting or blocking a new session request. Many CAC algorithms have

been proposed in the literature but they were all limited by the available bandwidth. This paper proposes a

bandwidth adaptation technique for the Adaptive Joint CAC (AJCAC) algorithm; it is proposed as a solution for

congestion; where the AJCAC algorithm degrades the bandwidth of some ongoing users to make room for new

incoming ones. A restoration process must take place when the network is underutilized; where the algorithm

restores the maximum bandwidth service to the degraded users. In this paper the bandwidth degradation process

was investigated and evaluated. The results showed that as the degradation in the bandwidth increases the

adaption required in the network increases. On the other hand, degradation in the QoS results in a decrease in

the blocking probability.

Ashraf Osman, Amin Nabi and Ismail El-Azhary. The Potential of Establishing Computer_Aided_Design

(CAD) Industry in Africa – Sudan Case-Study

Abstract: The VLSI electronic circuit designs have steadily grown in their capacity and complexity through the

years. The design automation has become an essential part of the design team to enable design completion and

verification. Responsibility of a design automation engineer includes setup, customization, integration of design

tools (EDA, and non EDA). In Africa, the higher education of the microelectronics focuses mainly on the

instruction of chip/circuit design. Virtually little or no emphasis is applied to grow design automation skill sets

of their graduates. This paper discusses the potential of African educational institutes of becoming the supplier

of qualified design automation engineers for future African IC industry and/or worldwide VLSI job market.

This paper will propose that African universities should start emphasizing more on design automation to

increase number of graduates in the Design automation field. The benefit of such effort will enable African

graduates to exploit the microelectronics job market and eventually help encourage industry to be established

within Africa for growth opportunities

Page 58: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

34

Adel Gaafar. Energy Aware Routing Protocol for Low Energy Sensor

Abstract: In this paper, we propose an energy efficient data forwarding protocol called Energy Aware

Geographic Routing Protocol (EAGRP) for wireless sensor networks to extend the life time of the network. In

EAGRP, both position information and energy are available at nodes used to route packets from sources to

destination. This will prolong the lifetime of the sensor nodes; hence the network life time and thus get higher

packet delivery ratio and minimal compromise of energy efficiency. The proposed protocol is an efficient and

energy conservative routing technique for multi-hop wireless sensor networks. The routing design of EAGRP is

based on two parameters: location and energy levels of nodes. Each node knows the location and energy level of

its neighbors. The performance measures have been analyzed with variable number of nodes. The simulations

are carried out for different number of nodes employing these algorithms considering the different metrics.

Simulation results have shown that the EAGRP performs competitively against the other routing protocol in

terms of packet delivery ratio, throughput, energy consumption, and delay. Consequently, it can be concluded

that EGARP can efficiently and effectively extend the network lifetime by increasing the successful data

delivery rate.

Mohamed Omara. Efficient Design of Dual Digital Up Converter for WCDMA and CDMA2000 Using

System Generator

Abstract: This paper presents an efficient method to design Dual Digital Up Converter (DUC) for WCDMA

and CDMA2000 for Software Defined Radios (SDRs). The proposed Design which includes a programmable

DDS, mixer and three cascaded stages of programmable digital filters has been simulated with Matlab, designed

with Xilinx system generator and synthesized with Xilinx Synthesis Tool (XST) targeting Spartan 3A based

xc3sd1800a FPGA. The Dual-mode feature is achieved by using a control unit which loads the filters

coefficients of each system from ROM to the programmable digital filters upon desired System. The

programmable DDS module is generated by Xilinx DDS Compiler and can operate at maximum frequency of

61.44MHz and provide the flexibility for multi-carrier base station. The results show that the system design flow

based on Xilinx System Generator is simple and feasible and meets the performance requirements for the

downlink transmit path for each system. The proposed design is consuming very less resources available on

target device to provide cost effective solution for SDR based wireless applications.

Abeer Abdalla Zakaria and Rashid A. Saeed. A Review in Interference Analysis and Management between

Hierarchical and Flat Architectures Communications

Abstract: Femtocells home base station, which are low power cellular base station that operate in licensed

spectrum, installed on the subscriber’s premises to provide cellular services within home, residences, apartment

complexes, business offices and outdoor hotspot scenarios connected with the internet and cellular operator

networks via digital subscriber line (DSL) router or cable modem, to improve coverage, provide, high data

throughput, better voice services. This paper surveys femtocell technology, describes the key challenges facing

femto network and it presents the future direction on applying planning and optimization to enhance femtocell

performance, a detailed discussion about the interference management between the legacy hierarchical and flat

Page 59: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

35

architectures, where cell planning processes used in microcell networks which are not scaled to support millions

of femtocells problem and its recent researches are discussed and reviewed.

Mohammed Elnour and Waleed Kannan. PID and Fuzzy Logic in Temperature Control System

Abstract: In this paper an artificial intelligent control method is proposed to design temperature controller

suitable for low temperature applications such as laboratory equipments (e.g. ovens and incubators). The

proposed design uses fuzzy logic control (FLC) as a control method that maintains the temperature of simulated

heater to the desired point. Microcontroller based circuit is built to acquire data from sensor, actuate heat

element and communicate with computer workstation. MATLAB fuzzy logic controller is designed, tested, and

tuned to control the circuit. The Fuzzy Logic Controller performance is evaluated in several situations by

comparing it with conventional Proportional Integral Derivative controller in terms of speed of response to the

desired setting value, overshoot in fixed set point and robustness against disturbance. FLC is fast in response to

the setting with compare to PID, and more stable against external disturbance. Both of FLC and PID have

neglect overshoot value and steady state error, but FLC has noticeable deviation in high set points.

Omnia Ahmed, Rashid A.Saeed and Mohammed Kamrul Hasan. Lightweight Inter-cluster

Synchronization Scheme for Femtocell Network

Abstract: Femtocell is a small sized indoor basestation to increase the coverage and capacity. Femtocell is

connected through broadband backhual to the IEEE1588 to synchronize and manage the network. Due to

limited/poor connectivity femtocell suffers by frequency misallignment and clock differencs. To overcome this

problem MS-Assisted Receiver-Receiver Time Synchronization Strategy has been proposed. But this strategy is

not fully covered in all situations if there has no Mobile Station for a long time in any of fBS network and make

network overhead by generating the message flooding for a big adjacent network. However, in this paper,

lightweight inter -cluster synchronization scheme is proposed which functions through intra-cluster and inter-

cluster synchronization scheme and added between them as enhancement intermediate nodes selection if the

Cluster Head cannot see neighbor CH and by using the Hybrid Wireless Mesh Protocol (HWMP) to select one

intermediate node, and so we get the best path to access neighboring CH to update clocks and synchronize the

clusters. The proposed scheme provides high scalability and works in a decentralized manner. The analytical

results show that synchronization accuracy can be achieved up to 60% higher than MS-Assisted Receiver-

Receiver time synchronization strategy for femtocells.

Sameir Ali Hamed and Saad Bashir. New Fields Expressions of a Traveling Wave Circular Loop Antenna

Abstract: A technique that is based on spherical wave functions expansion for the free space Green’s function

is used to derive an exact near and far electromagnetic fields of traveling wave current circular loop antennas

(TW-CLAs) with arbitrary phase change. The Known Far-fields for TW-CLA are obtained from the general

field expressions presented in this paper using large argument approximations for spherical Bessel functions. A

simplified expression for the magnetic fields on the axis of the antenna are obtained as an special case of the

general filed expressions.

Page 60: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

36

Suliman Abdalla, Amin Babiker and Farouq Habbani. Mechanism for Charge Sharing Suppression in

Single Photon Processing Pixel Array

Abstract: This paper proposes a mechanism for suppression of charge sharing in single photon processing pixel

array by introducing additional circuit. The idea of the proposed mechanism is that in each pixel only analog

part will introduced, the digital part is shared between each four pixels, this leads to reduce the number of

transistors (area). By having communication pixels, a decision that which one of the neighboring pixels shall

collect the distributed charges is taken. The functionality, which involves analog and digital behaviors, is

modeled in VHDL.

Khalid Bilal, Ibrahim Khider and Amin Abdelnabi. Performance Evaluation of DS-WCDMA

Abstract: The objectives of this paper are to study, analyze and evaluate the performance of Direct Sequence –

Wide Code Division Multiple Access (DS-WCDMA) systems in Mobile fading propagation channel. The

Parameters which are considered for the evaluation performance are Additive white Gaussian noise (AWGN),

the number of paths in the propagation fading channel and the Code sequence length. The evaluation of DS-

WCDMA was derived for different type of digital modulation using Mat lab simulation link. The results were

obtained in terms of bit error rates(BER)in graphical form.

Sami Salih, Mamoun Suliman, Abbas Mohamed and Ali Al-Refai. Implementation of Adaptive Modulation

for Broadband Wireless Access Networks using Cognitive Radio Approaches

Abstract: Broadband Wireless Access (BWA) has become the best way to meet escalating business demand for

rapid Internet connection and integrated "triple play" services. In addition, not only for topographic but also for

technological limitations, alternative wireless solutions have been found. These systems are designed based on

Cognitive Radio (CR) approaches, which can adjust its operation according to the environment and technical

variations. This tracking feature allows the communication system to deliver the Best Ever, compare to Best

Effort, services to the users. In this paper, an implementation of a cognitive engine for adaptive modulation and

coding (AMC) is presented. This engine will track the radio channel variations in terms of SNR and be able to

select a suitable modulation order among predefined Modulation and Coding Schemes (MCS) to maintain the

specified BER by the user requirements.

Sami Salih, Mamoun Suliman and Abbas Mohamed. A Novel Spectrum Sensing Scheduler Algorithm for

Cognitive Radio Networks

Abstract: Cognitive Radios’ is recognized as a novel approach to improve the utilization of a precious wireless

communication natural resource; the radio frequency spectrum. Historically, telecom regulators assigned fixed

spectrum bands to the licensee wireless network operators, this spectrum management approach is guarantee

interference free environment, except of some configurations faults or illegal usage. However, with the

increasing demand for more bandwidth in the finite radio spectrum, the concept of secondary operator’s was

emerged, but with emphases to not influence licensed operators. Consequently, Cognitive Radio Networks

(CRN) architecture enters the market as an intelligent solution to these issues, with concentration on the

spectrum sensing procedures to achieve the regulatory constraint. The most successful sensing algorithms is

Page 61: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

37

those applying cooperation and scheduling to have better scanning information, however those algorithms are

developed base on the primary network activities which is good in terms of reducing the expected interference,

but it lay more computational loads on the CRN. In this paper, a novel sensing scheduler algorithm is proposed,

the idea is to utilize the CRN by fairly distribute the sensing task among the sensors, then utilizing the radio

spectrum shared with the primary networks.

Mohammed Nabri, Ahmed Hassan and Tasneem Mahmoud. Designing Low Cost Digital Dose Reminder

System

Abstract: Patients often do not pay attention to the importance of taking their drugs with the exact dosage on

time, it has been noticed that this leads to malfunctioning and lowers the efficiency of their medication; a

prominent practical solution has been studied and provided here. Dose Reminder System, is a simple device

designed for home use, it can be easily programmed by the caregiver and used by the elderly. Time & dose

control proved to be very effective in illness management; therefore, it was essential to develop an effective

solution that solves this problem, which will increase accuracy and reduce amount of attention & cost needed

for caregiving. The prototype produced here was designed on low cost to make it within reach of the majority;

functions are fully working, also the model is mobile but the size is a bit larger than required. The design was

successfully implemented and tested; and despite of some problems that faced the design related to availability

of components and materials in local market, the recorded accuracy is approximately 90%.

Siddig Gomha, Abdel Aziz T. Shalaby and El-Sayed M. El-Rabaie. Optimizing the Performance of Branch-

line Couplers Using Open Ended Stubs

Abstract: Branch-Line Couplers (BLC) are one of the most popular passive circuits used for microwave and

millimeter-wave applications. They have dimensions of a quarter-wave length by quarter-wavelength at the

center frequency. Due to these large electrical lengths of the transmission-line elements, BLC occupy a

significant amount of circuit area. This problem worsens with decreasing frequency. There are several

techniques used to solve this problem, such as using lumped components in conjunction with high-impedance

transmission lines, meandering transmission-line, and using both short and open ended stubs to represent

distributed inductors and capacitors. In this paper we use open ended stub on transmission line to design

compact BLC by using planner microstrip technique. We will derive in detail the closed formulas for the BLC

design. The effect of changing the value of the number of open ended stubs on the coupler performance is

investigated. It has been shown that the number of open ended stubs used for optimum design depends mainly

on the center frequency range used. Also it has been shown that at frequency range (1-2 GHz) there is a big

difference on the design area of the coupler for both the conventional and open ended stubs. The paper presents

a clear comparative study between the performances of BLC using both open ended and conventional approach.

Abdelmuizz Adam and Rashid A Saeed. Multicasting in Network Mobility using Multicast Anchor Agent

Abstract: this paper discusses the cost functions of the three multicast schemes Bi-directional Tunneling,

Remote Subscription and Agent Based. To developed from a probability model of engagement between any

mobile network nodes in multicast group to a home agent. So the performance parameters required taken under

continuous session duration constraints, taken in account the effects of nesting topology of Network mobility

Page 62: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

38

system and movement of it NEMO cluster. The cost functions of providing multicast among BT, RS and AB are

compared. Then we used the probabilities of multicast anchor agent forwarding data to their destinations, to

formulate the multicast path function as a 0-1 knapsack problem to show the selected items (multicast paths)

according to the mentioned optimization selection conditions. It was shown that the performance of AB

multicast schemes is better than BT and RS.

Nahid Osman, Gamar Mansour, Nodar Khalifa, Karlo Kuacgor Mathang and Alwaleed Adllan. Abinitio

Method Study of Ionic Conductor CaF2

Abstract: CaF2, fluorite, is a prime candidate for solid state electrolytes used in batteries could replaced of

SiO2 in metal-oxide-semiconductor (MOS) technology. Using abinitio density functional theory (DFT) method

corrected by PAW and ultra soft pseudo potential, the structural, electronic, lattice constants, band gab, density

of states in addition to thermal and optical properties have been investigated. The results have a good agreement

with the experimental.

Ahmed Yassin, Elhussein Abd Elmageed, Mazin Hamad and Mahmoud Osman. The Unscented Kalman

Filter Applied to Satellite Orbit Determination

Abstract: Satellite Orbit Determination (OD) is the process to estimate the position and velocity (the state

vector, state, or ephemeris) of an orbiting object. Any satellite in its orbit faces many perturbation forces that

affect its position in its orbit and therefore affect the tracking system. This leads to search for a method to

correct these drifts. The nonlinear problem of tracking and predicting where a satellite will be over some time is

one of OD early challenges. This report shows the design and implementation of an unscented Kalman filter for

nonlinear estimation applied to satellite orbit determination, the way it was embedded and the effects of adding

it on the tracking results to get more accurate orbital estimation, by correcting the tracking data (from Two-Line

Element, TLE, data sets) itself rather than using any external source of measurement for comparison and

correction (GPSs, optical sensors, radars…etc.).

Md. Rafiqul Islam, Md. Soyaeb Hasan and Apurba Kumar Saha. Mathematical Modeling of Growth

Conditions and Interpretation of Phase Diagram for InxGa1-xN Epitaxial Layer

Abstract: It is imperative to determine the dependence of the quality and characteristics of the epitaxial film on

different growth parameters. A mathematical model has been developed showing the effect of different growth

parameters e.g. temperature, TMI and TEG flow rate, molar ratio on epitaxial film. This model is considered for

InGaN film on GaN template with an Indium mole fraction up to 0.4 by Metal Organic Vapor Phase Epitaxy

(MOVPE). The results obtained from this model has been compared and fitted with experimentally obtained

data through XRD, RSM, PL, SEM etc. Finally, a phase diagram has been proposed to interpret the phase

separation and Indium content evolution under the influence of growth temperature and precursor gas flow.

Abdelkareem Bedri and William Harwin. Enhancing Haptic Representation for 2D Objects

Abstract: This paper considers two dimensional object tracking and recognition using combined texture and

pressure cues. Tactile object recognition plays a major role in several HCI applications especially scientific

visualization for the visually impaired. A tactile display based on a pantograph mechanism and 2×2 vibrotactile

Page 63: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

39

unit array was used to represent haptic virtual objects. Two experiments were carried out to evaluate the

efficiency and reliability of this novel method. The first experiment studied how the combined texture and

pressure cues improves the haptic interaction compared to using pressure cues only. The second experiment

examined users’ capability to track and recognize objects with two dimensional shapes using this method.

Results obtained indicate an improvement in boundary recognition and tracking accuracy by the combined

stimulation over the sole pressure stimulation. Results also demonstrate the capability of users to readily define

shapes for most of the virtually represented objects.

Haitham Shabour, Moutaman Mirghani and Omer Sharif. Performance Enhancement of the CAN

Protocol Using Reed-Solomon Codes

Abstract: Controller Area Network (CAN) is a shared serial bus communication that is widely used in

automotive and industrial network. The CAN bus is affected considerably by the conducted electromagnetic

interference (EMI) which is generated from many disturbances such as load dumb and ignition system noise.

The EMI reduces the bus efficiency by introducing bit error into the frame. In this paper, the effect of the

conducted EMI in automotive is comprehensively studied and Reed-Solomon (RS) encoding technique is

proposed to combat the burst bit error. This combat is evaluated for different burst error length based on

MATLAB environment, where the standard 64-bit user message is used. Moreover, the influence of the position

of the burst error is also explored. The obtained results show noticeable enhancement in the CAN bus

performance when the RS coding is integrated along with the Automatic Repeat Request (ARQ) that is

implemented in CAN protocol. Since there is no evident mathematical model for the distribution of EMI inside

a car, it has been measured practically by means of actual experiment. The measured EMI data is saved in

computer and used in the simulation of the CAN bus with aid of MATLAB. Other codes were applied in the

CAN bus simulation, and investigated in comparison to RS codes.

Abubakr Eltayeb, Halla Almubarak and Tahani Attia. A GPS Based Traffic Light Pre-emption Control

System for Emergency Vehicles

Abstract: Emergency vehicles such as ambulances, police force vehicles and fire fighting vehicles are required

to reach their destination as quickly as possible. Any unnecessary delays experienced on them along their way

could eventually cause dangerous events; leading to damages in lives or properties. One of the most important

delays is the time that is consumed on travelling between the starting point and the destination point of these

emergency vehicles; and in intersections with traffic lights, especially when these intersections are congested. In

this paper we discuss the design and implementation of an automatic pre- emption traffic control system, based

on the global positioning system satellites. It ensures the arrival of emergency vehicles to their destinations on

the minimum time possible. The results indicate that the proposed system has an optimum solution for the delay

time experienced on the emergency vehicles along their path.

Mohammad Rubaiyat Hasan, Muhammad Ibn Ibrahimy and S.M.A. Motakabber. Performance Analysis

of Different Techniques for Brain Computer Interfacing

Abstract: Recent works on different types of Brain Computer Interface (BCI) and their performance analysis

have provided some remarkable features for applications. The aim of this work is to compare the accuracies of

Page 64: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

40

different types of BCI to find out the suitable techniques. The study shows that each technique performance

depends on the type of BCI. A batter performance of the BCI systems is supported by the artificial neural

network.

S. M. A. Motakabber, Muhammad Ibn Ibrahimy and A. H. M. Zahirul. Development of a Position

Detection Technique for Chipless RFID Tagged Object

Abstract: Chipless RFID tag of microwave band is used to study the location of an object. Two microwave

antennas for narrow bandwidth beam used for scanning purpose. The antennas are mounted on two digital

stepper motor driven systems. The location of the tagged object is measured from the angular position of the

antennas. A squire space of 25 m2 and 1 m2 resolution are used for the project. The simulation result showed

that the location detection is almost error free. The accuracy of the position detection has a limitation and it

depends on the resolution of the system. The system may be used in the warehouse/store for auto inventory and

location finding purpose.

Page 65: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

41

Electrical Engineering

Khalid Hag El Amin and Mirghani Fath Elrahman. On the Steady-State Error Covariance Matrix of

Kalman Filtering with Intermittent Observations in the Presence of Correlated Noises at the Same Time

Abstract: Recent problems in state estimation focusing on estimating the state of a dynamical system using

sensor measurements that are transmitted over unreliable communication link. The embedded ideas for

analyzing such systems were proposed and called Kalman filtering with intermittent observations.

Unfortunately, to date, the tools for analyzing such system are woefully lacking when dealing with real time

applications, because the earlier system tools are restricted to independent noises or correlated noises at one time

step a part. In this paper, we consider a discrete time linear system state estimation problem across a lossy

network when the process and measurement noises were assume to be correlated to each other at the same time,

and we find minimum packet arrival rate that grantees certain performance at the remote estimator. Kalman

filtering algorithm was used as an optimal estimator to estimate the system state. The prediction and update

cycles of standard Kalman filter algorithm were reformulated to be applicable in the new system that we

consider. The prediction cycle were found to be not affected by the random loss of measurements but affected

by the correlated noises. We also show that the filtering update cycle were depend on both loss of measurements

and correlated noises at the same time. Minimum packet arrival rate were recorded and tabulated with respect to

the estimation error covariance which used as the performance criterion. As a result, we show that when

measurements are subject to random losses in the case of correlated noises at the same time, the covariance of

the estimation error of a state estimator becomes a random variable. We then derive conditions on channel

parameters that meet this metric in the case of scalar and vector systems. Examples are provided to illustrate the

theories and algorithms developed and numerical simulations show that the proposed method provides tighter

results than the ones available in the literature.

Dryan Marende. Optimization of Nuclear Energy Generation

Abstract: Nowadays, global dependence on fossil fuel has led to the release of over 26.7 billion tons of CO2

into the atmosphere each year. The per annum increase is considered to be 3 ppm. Addition to that, there is

energy-related GHG emission mainly from fuel combustion for heat supply, electricity generation and transport

that account for 88% of total emission including CO2, CH4 and some trace of NO2. To achieve a sustainable

nuclear energy generation and its optimization, the energy system engineering should provide a methodological

scientific framework that arrives at realistic integrated solution to complex problem. This should include

adopting a holistic system-based approach, especially at decision making and planning level. Nuclear energy is a

mature technology with modern reactors displaying a high degree of safety, proliferation resistance, reduction of

nuclear waste volume and cost effectiveness relating to global economy. Its optimization should be modeled and

applied in the study of physical and chemical systems, production planning and scheduling system, resource

allocation in the financial system, location, transportation and engineering design. This paper focuses mainly on

nuclear power generation and its optimization as a viable and justifiable alternative to global dependence on

fossil fuel. The optimization technique used in this paper is linear programming that can be used to define the

optimal portfolio having clear reliable data and target.

Page 66: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

42

Zakieldeen Elhassan, Li Yang and Tang Yi. A novel control method of grid connected doubly fed induction

generator under variable wind speed

Abstract: This paper has presented a novel control method of DFIG connected to the grid under variable wind

speed and dynamic mode during the system operation. The control method is deeply done in the DFIG

converter's control. The parameter controls which applied in grid side control are electromagnetic torque and

DC link voltage, whereas in the rotor side, the converter uses DFIG rotor speed and reactive power. The

electromagnetic torque has been used as an essential part in the GSC control instead of grid reactive power.

Both GSC and RSC are used back to back converters with two-level IGBT devices which the pulses are

generated from the PWM. The simulation carried out using PSCAD/EMTDC program. The results show that,

this method is a suitable to apply in DFIG with variable wind speed in dynamic operation and steady state. And

also the validation of the method reliability has been demonstrated.

Ibrahim Elamin, Abdullah Al-Elyani and Abdelrahman Shuaib. Power Quality Indices: A Saudi Steel

Mills Case Study

Abstract: The automation of industrial processes has lead to effective increase in production and reduction in

cost. However this is coupled with concerns about the level and requirements of power quality as nonlinear

industrial loads contribute significantly to producing harmonics distortions into the supply. These loads include

converters, switch mode power supplies, and arc furnace, etc. Introducing the electric arc furnaces (EAF) to the

steel industry has increased the amount of produced steel worldwide. The electric arc furnace operates as a batch

melting process producing batches of molten steel known as "heats". The electric arc furnace operating cycle is

called the tap-to-tap cycle and is made up of the following operations. This paper reports on the assessment of

power quality at an industrial system in Saudi Arabia. The power quality data are collected from the main

electrical substation which is feeding the Electric Arc Furnace (EAF) and Ladle Furnace (LF). The Fluke

434/435 Device “Three Phase Power Quality Analyzer” was connected at the measuring point location for

period of time to measure the required electrical parameters. These parameters are RMS Voltage, RMS Current,

Voltage THD, Current THD, individual harmonics, Active Power in MW, Reactive Power in MVAR, Power

Factor (PF), and Flickers for Long Term (Plt) and Short Term (Pst). The power quality measurements have been

conducted for a period of 120 hours. The data shows the voltage THD (THD V) and current THD (THD I) for

the data measured over a period of 120 hours. The graph shows high THDV at heat # 7 and heat 59 which are

the first heats after EAF maintenance period and without SVC in case of heat # 7. The EAF in this case is cold

and has no hot heel (cold bath). The electrical arc is on contact with hard scrap and DRI without the support of

hot heel. This usually causes higher THD V. The figure shows high values of Pst and Plt in six different

occasions. For Pst, the spikes at heats # 7 and # 59 were due to starting the EAF on cold path as first heat after

few hours stoppage for the maintenance activities. But in general, the power quality indices are within the IEEE

and IEC standards.

Page 67: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

43

Ali Ahmed Adam. Accurate Modeling of PMSM for Differential Mode current and Differential Torque

Calculation

Abstract: In this paper an accurate modeling of permanent magnet synchronous motor that is suitable for high

frequency differential mode calculation is proposed. The model takes into consideration the core losses and the

two resonance responses that occurred during the experimental results. The model is suitable for calculation of

torque ripple contribution due to flow of the differential current in motor winding. The experimental

measurements show that the motor differential mode stray capacitances are functions of rotor position. The

simulation results of the proposed differential mode circuits together with the experimental results show that the

level of the differential mode noise currents is of significant value that can not be ignored. However, the flow of

some of this differential mode current in the motor stator windings has small contribution of the torque ripple.

Auday Mohamad and Ali Ibrahim. Driving a Novel Phasors Formula for a Digital MHO Relay Algorithm

for High Voltage Transmission Line Based on Neural Networks

Abstract: Artificial neural networks and fuzzy logic are used in this paper to achieve a high speed, more

reliable and high accuracy fault detection for a high voltage transmission line. Traditional digital distance relay

designs use estimation algorithms to determine the phasors of currents and voltages. Current phasors are

affected by D.C decaying noise, this lead to slower response time or inaccurate decision of digital relay in some

cases. This paper presents a modified distance relaying algorithm that use phasors of voltage only that has been

combined with adaptive resonance theory (ART) neural network to eliminate the use of current phasors. The

neural network is trained to recognize faults on basis of a specific relay characteristic. The modified algorithm

eliminates the need of phasors estimation of current which is used as neural networks inputs to determine the

appearance of fault from relay location. The neural network has been trained using training patterns generated

from general normalized MHO characteristics. Three main software stages are used in the design. In the first

stage, a generation of fault patterns using concentric circles which represent impedances of line for different

types of fault. In second stage, adaptive resonance theory neural network has been trained for these patterns to

perform sets of clusters that hold characteristics of different types of faults. In third stage, a high voltage parallel

transmission line test system is simulated using power system computer aided design (PSCAD) program.

Different fault conditions including different fault resistances and different fault inception angles are applied

and a voltage signal has been read from one end of transmission line to generate input patterns to test the

designed algorithm by calculate the distance between these patterns and the clusters that are generated in stage

two using fuzzy logic. The test results have been compared with test results of relay algorithm use Discrete

Fourier Transform (DFT) for the same power system. The test results show that the relay is able to detect faults

in lesser time with high accuracy as compared to conventional digital relay algorithm that use Discrete Fourier

Transform (DFT) as phasors estimator algorithm.

Mohamed Khalifa, Abubakr Abdelhafiz and Azzedine Zerguine. Sparse Channel Estimation Using

Adaptive Filtering and Compressed Sampling

Abstract: Many real-life systems admit sparse representations with few non-zero coefficients. Examples

include multipath wireless communication channels where reflections reach the receiver with long delays. Many

Page 68: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

44

of the above applications require estimation techniques with computational complexity due to time-varying

dynamics and a large number of parameters to be identified. The wireless channel is described by sparse fading

rays and long zero samples and thus admits a sparse representation. Traditionally, adaptive algorithms such as

the least mean squares (LMS), the recursive least squares (RLS) and fast variants thereof have been widely

applied for estimation/equalization of such channels. One drawback of the above algorithms is that they have no

particular advantage in sparse system identification due to the fact that they do not utilize of the sparsity inherent

in the channels. In this work, two techniques for sparse-channel identification are compared: LMS algorithm

with a zero-norm constraint and the recently-developed Compressed Sensing (CS) technique. The performance

of these two techniques is compared using real-world channel measurements.

Mariana M Mounir, Aya E Hamid and Abdelrahman A Karrar. Development of Lightning Risk

Assessment Software in Accordance with IEC 62305-2

Abstract: The IEC 62305-2 standard presents a risk management procedure to assess the risk due to all possible

effects of lightning flashes to structures. This procedure is quite complicated. It requires the definition of about

68 parameters. It could take hours and hours of calculations to assess the primary risk on the structure and with

the need of performing it more than once to evaluate various protection schemas it becomes impractical to carry

out these calculations by hand. At the same time it seems that the software tools to carry out the necessary risk

assessment are extremely limited, with only one notable package developed by Furse. Hence it was felt that

there is a strong motivation to develop a user friendly software tool to simplify the process of lightning risk

assessment for designers. The Lightning Risk Assessment software developed has many powerful features

which may excel the capabilities in existing packages. It can successfully consider any type of structure with

any number of incoming lines. It allows for splitting the structure under consideration into multiple zones in

order to pinpoint high risk areas. It then performs an accurate risk assessment and shows in just a few seconds

where in the structure and why it is so important to arrange protection measures. Finally it guides the designer

and provides him with the adequate protection measures to reduce a certain risk to or below the tolerable limit.

The package is enhanced by incorporation of a graphical tool for estimating the collection area which provides a

user interface for drawing the structure, however complex it is. Existing packages usually only compute

collection areas for simple structures, forcing the user to manually enter the area for more complex shapes. The

software was tested on the highest building in Sudan, the National Telecommunications Corporation building

(+130 m high). Results were compared to the StrikeRisk v5.0 Risk Management Software by Furse and direct

computation of IEC 62305-2 and it was found that the match is almost perfect.

Mohammad Kamrul Hasan, Ahmad Fadzil Ismail, Aisha Hassan Abdallah, Khaizuran Abdullah, Rashid

Saeed, Huda Adiba Moh Ramli and Shayla Islam. Inter-cell Interference Coordination in LTE-A HetNets:

A Survey on self organizing approaches

Abstract: Heterogeneous Networks (HetNet) comprise networks with specially designed architecture. These

networks are composed of multi-mode, multi-layer, and multi-band network structures and utilize cells of

varying sizes. To cover large areas, established base stations (macro sites) are used; for coating buildings,

microcells are employed; for covering individual levels or floors in a building, Pico-cells are utilized; and finally

for providing wireless coverage to individual apartments, small offices, and home based businesses, femtocells

Page 69: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

45

are exploited. The goal behind the implementation of HetNets involves increment the capacity of the established

network, modifying spectrum use, lowering the capital and operating costs, and offering steady user-based

experience of network architecture. Furthermore, HeNodeBs have been developed for voice, data, video services

in home and offices and a certain outdoor scenario with a very limited geographical coverage. However, these

random small cell deployments cause severe problems and results interference in the network. Therefore the

ultimate is the total system performance degradation and this interference becomes a key challenge in HetNet.

This article investigates the performances of the current trends and approaches of interference in self organizing

network for LTE-A.

Hazir Farouk Abdelraheem, Andrew Lang and Mohammed Elhadi Ahmed Elsayed. Jatropha Curcas: A

Viable Alternative Source of Clean Energy to Meet Sudan’s Growing Energy Demand

Abstract: Jatropha (Jatropha curcas) is a plant native to Central America and is a source of oil and other by-

products with commercial potential and economic value. Recent studies have shown that the oil from Jatropha

seeds can be used for the production of biodiesel that meets the EN and ASTM biodiesel specification standards.

Biofuel produced from Jatropha curcas can be used in a variety of ways to meet Sudan’s energy demand,

particularly in the rural areas. Such usages range from fuel derived from Jatropha seeds or pelleted seedcake,

small-scale equipment suited to rural cooperatives for expelling oil, affordable engines and gensets that run on

pure vegetable oil. Use of all of these can be important in helping to stimulate rural and regional economies by

creating jobs and keeping money within the region, regardless of whether the Jatropha is grown on an industrial

scale or as small-scale plantings. The purpose of this paper therefore, is to detail the processes and the expected

outcome for biofuel production at a commercial scale in Sudan from Jatropha curcas oil feedstock. The paper

covers issues of policy development, sustainability and economics that need to be addressed by Sudan

authorities while taking this path toward sustainable biofuel production. The major source of information for the

paper was the development of the Roadmap for Sudan Biofuels Production, with the biodiesel component likely

to be sourced principally from Jatropha oil.

Shayla Islam, Aisha Hassan Abdalla, Mohamed Hadi Habaebi, M. K. Hasan, Suhaimi Latif and Rashid

Saeed. Multihoming Based Mobility Management Scheme in NEMO: A Qualitative and Quantitative

Analysis

Abstract: In order to support mobile network, a management mechanism of Network Mobility Basic Support

Protocol (NEMO BSP) has been standardized by Information Engineering Task Force (IETF). NEMO BSP is an

extension of Mobile IPv6 (MIPv6) and inherits all the shortcomings like higher handoff latency, packet loss etc.

As Network Mobility (NEMO) is engaged to manage the movement of Mobile Router (MR) and it’s Mobile

Network Nodes (MNNs) during handoff, it is very important to improve the performance of mobility

management protocol to achieve continuous Internet connectivity with lower delay and packet loss in NEMO

environment. When a change in point of attachment of the mobile network is accompanied by a sudden burst of

signaling messages, "Signaling Storm" occurs and it ultimately results in temporary congestion, handoff delays,

or even packet loss. This effect is especially noteworthy for wireless environment where bandwidth is relatively

limited. Therefore providing uninterrupted Internet connection through applying multihoming technique in

NEMO is becoming most significant areas for current researchers. The purpose of this paper is to give a general

Page 70: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

46

overview on existing mobility management approaches which enable multihoming and network based mobility

protocol with NEMO in an integrated manner. Furthermore, it highlights the strengths and the limitations of

these schemes for future analysis. Both the qualitative and the quantitative evolutions of these schemes are also

presented here.

Haruna Musa, Binta Usman and Sanusi Sani Adamu. Improvement of Voltage Stability Index Using

Distributed Generation for Northern Nigeria Sub-Transmission Region

Abstract: Introduction of Distributed Generation (DG) into our existing networks have changed the pattern of

power flow from conventional vertical power flow to bi-directional and this change has great implication on the

networks in terms of power loss reduction and voltage stability of the entire system. In view of this development

this paper proposes use of particle swarm optimization (PSO) for the optimal placement and sizing of DG in

Shiroro complex, a sub- transmission of northern part of Nigeria for the improvement of Voltage stability index

and power losses reduction. Based on simulation results obtained the presence of DG in the network has greatly

improved the voltage stability index of critical buses and these buses are now capable of taken more loads.

Hassan Hamdoun, Solomon Mangeni and Yogesh Dwivedi. Insights into Sustainable Energy-Capacity

Trends towards Bridging the Digital Divide

Abstract: This paper presents an analysis of energy-capacity trends of the broadband communications services

in Sub Saharan Africa sampling Sudan case. The analysis utilizes the joule/bit metric to visualize the

distribution of the broadband services availability across the country, hence the region. Consequently this

provides an explanation for how the energy-capacity relationship can impact the Digital Divide. The socio

economic aspects and policy impacts of this phenomenon are analyzed. We further present steps towards

implementing greener solutions to the digital divide via the introduction of Hybrid Wireless-fiber Broadband

access systems that combine Passive Optical Networks (PON) with Self-organizing wireless Networks based on

Wimax and LTE systems.

Shashank Srivastava and Nitin Singh. Compensation Technique and Power Quality Improvement in

Multiphase Distribution System

Abstract: The degradation in power quality is an important issue in these days drawing attention of industry

also. Multiphase distribution systems are better solution as compared to single and three phase systems due to so

inherent advantage as loads are split over multiple phases. As most of the loads in real life are inductive in

nature, reactive power is generated and thus requires compensation. In this paper compensation has been done in

six phase using modification in theories used for three phase systems.. Results are obtained for resistive and

inductive load and case of unbalanced system is also considered. Simulation model is developed in MATLAB /

Simulink environment.

Abdulwaheed Musa, Saad Bashir and Sameir Ali Hamed. Analysis of Aerodynamic Torques Affecting Dust

Particle Orientation as Input to Microwave Cross Polarization

Abstract: Cross polarization in microwave link, method of using dual orthogonal polarizations to optimally

conserve the frequency spectrum, has received considerable interest in the recent time. This paper implicitly

Page 71: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

47

discusses its prediction in sand and dust storms. Cross polarization in dust storms occurs due to the non-

sphericity of the falling dust particles and the tendency of the particles to align in a particular direction at a time

(canting angle). It is therefore important to have adequate information on the dust particle sizes, particle shapes,

orientation of particles along the propagation path etc. for the cross polarization due to dust storms. This work

deals with the latter two points by making use of a more reliable measure of turbulence shear and inertial torque

to tackle orientation of sand and dust storms suspended particles calculations as input to cross polarization

discrimination magnitudes. The paper explicitly analyses the systematic alignment of particles due to torque of

fluid flow round dust particles as a main parameter causing cross polarization. The results obtained show that

there exists some form of systematic alignment of particles in the most relevant size range that was considered.

Dalia Eltigani, Kamal Ramadan and Elfadil Zakaria. Implementation of Transient Stability Assessment

using Artificial Neural Networks

Abstract: This paper aim at verifyng the accuracy of Artificial Neural Networks (ANN) in assessing the

transient stability of a single machine infinite bus system. The fault critical clearing time obtained through ANN

is compared to the results of the conventional equal area criterion method. The multilayer Feed forward artificial

neural network concepts is applied to the system. The training of the ANN is achieved through the supervised

learning; and the back propagation technique is used as a gradient descent learning method in order to minimize

the training error. The training data set is generated using two steps process. Firstly the equal area criterion is

used to determine the critical angle. Then the swing equation is solved using the point-to-point method up to the

critical angle to determine the critical clearing time. Then the stability of the system will be verified. As a result

we find that the critical clearing time is predicted with less accuracy using ANN compared to the conventional

methods for the same input data sets

Elfadil Zakaria, Kamal Ramadan and Dalia Eltigani. Method of Computing Maximum Loadability Using

Continuation Power Flow: Case Study Sudan National Grid

Abstract: This work presents a method of finding a continuum of power flow solutions starting at some base

load and leading to the steady state voltage stability limit (critical point) of the system. Continuation power flow

calculation plays a key role to understand the limitation of power flow solutions in varying loads. It is useful for

evaluating the critical point of the PV curve in static voltage stability. P-V curves are constructed to calculate

loadability margins and identify the weakest bus in the system. However, drawing the P-V curve is time

consuming in large-scale power systems. As a result, The Power System Analysis Toolbox (PSAT), open source

Matlab software package for analysis and design electric power systems. PSAT includes power flow,

continuation power flow, and optimal power flow, small-signal stability analysis, and time domain simulation.

In this work we used continuation power flow only. The proposed method is successfully applied to the National

Grid. Our methods provided several results. We discussed the validity of results with the known IEEE 30-bus

system as a bench mark, in addition to other methods.

Page 72: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

48

Kamal Ramadan, Elfadil Zakaria and Dalia Eltigani. Prepaid Energy Meter Network via Power System

Communication

Abstract: This paper presents a new idea of designing a prepaid energy meters that has an ability of connecting

to a unified centre (Energy Company). The process of connecting the meters to a unified centre can facilitate the

security, control and maintenance purposes. The mentioned network is economical because it is established by

using the existing power lines instead of constructing a new wired or wireless network. The data is transmitted

over this network by using Power Line Communication (PLC) technology. A special device can inject the data

to the network and also it can capture the data from the network, this device is the power line communication

modem. A simple design of the network is done by using two computer and two modems (PLM) and a program

codes. By using a modem the program can take the measurements data from the meter then send them to the

computer server and vice versa. The designed network making the user (Energy Company) able to access any

prepaid energy meter in the unified area and to control the measurements of this meter; and as a result of this

action stealing of electricity can be prevented. Also the user (Energy Company) can communicate with the

consumer by sending text messages such as a serial number for recharging the energy or to alarm the consumer

before the whole amount of electricity is totally consumed. Moreover, this network offers the ability of

controlling the supply of energy such as switch “On” or “Off” of the electricity supplying. We have successfully

implemented the Energy Meter network via PLC for these suggested commercial and security applications to

demonstrate the advantage of reading and viewing the electricity consumption and recharging the prepaid meter.

The design implementation and result seems to be sufficient.

Moaaz Mahdi, Khaizuran Abdullah and Mohammad Umar Siddiqi. Impulsive Noise Mitigation in Haar

DWT Based OFDM Systems

Abstract: In this work, a simple mitigation technique for the effect of impulsive noise in Haar discrete wavelet

transform (DWT) based OFDM systems is presented. Based on the analysis for a certain configuration of Haar

DWT-OFDM, redundancy in the transmitted samples was found and exploited to mitigate the impulsive noise

by replacing the corrupted samples. The technique is implementable with different modulation schemes

(BPSK,QPSK and 16-QAM). Under the assumption of Bernoulli-Gaussian model for impulsive noise, the

proposed technique is efficient with low probability of impulse hit. With p = 0:001 and BPSK scheme, it can

achieve BER of around 10^{-4} saving around 7 dB of SNR.

Kauther Mahdi, Sami Sharif and Ahmed Ashur. Enhancement of Hardware Modular Multiplier Radix-4

Algorithm for Fast RSA Cryptosystem

Abstract: Algorithms and architectures for performing modular multiplication operations are important in

residue number system and cryptography. In this paper a new algorithm of Radix-4 MSB modular multiplier

using 4-2 compressor is presented. The recoding rules for the radix-4 Booth algorithm are used to reduce the

number of partial products and improve the total hardware area and time. This new algorithm avoided a carry

store and feedback in the some algorithms presented in the literature. It simulated and implemented using

MatLab and VHDL.

Page 73: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

49

Sara Elagib and Nada Osman. Design and implementation of Dual axis solar tracker based on solar maps

Abstract: Finding energy sources to satisfy the world’s growing demand is one of society’s foremost

challenges. Renewable energy in the form of electricity has been in use to some degree long years ago. Sources

such as Solar, Wind, Hydro and Geothermal have all been utilized with varying levels of success. In this context

the sun trackers are such devices for improving the efficiency of solar energy generating systems. The diurnal

and seasonal movement of earth affects the radiation intensity on the solar systems. Sun trackers move the solar

systems to compensate for these motions; The Solar Tracker attempts to navigate to the best angle of exposure

of light from the sun. This paper describes the design and development of a Microcontroller based solar tracking

system, based on solar maps, which can predict the exact apparent position of the Sun, by the latitude's location,

it also covers the solar tracking mechanical structure together with the associated electronic circuits. The

electromechanical tracker was implemented successfully, utilizing servo motors as actuators for the tracker, a

GPS to provide location, UTC time, a PC to perform heavy calculations, and an ATmega128 microcontroller as

the main controller, suitably programmed, to control the two servo motors to ensure that the panels supporting

structure is always oriented towards the sun.

Page 74: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

50

Biomedical Engineering

Yousif Elhadi Elsideeg Ahmed, Basem Ahmed M. Hassan, Salim Omer Abdallah Alzubaidi, Yassin

Mahmod M. Ibraheem and Mustafa G. Hadi Khamisi. Design and Test of a USB/Bluetooth/IP Self-

adaptive Connector for Sensor Network Application

Abstract: This research work provides a simple programmable interconnection medium to be used as sensor

node in sensor network applications with the capability to adapt itself according to the network coverage and

resources available or selected: either USB, Bluetooth network or IP network. Microcontroller, USB modules,

Bluetooth module internet module and temperature sensor used for system test in addition to C programming

language editor used for test software development. The developed system successfully detects and responds the

communications via these techniques. Therefore, it can be used in monitoring and measurement medical

systems

Soha Yousuf and Sahar Mohammed. A Parallel Computer System for the Detection and Classification of

Breast Masses

Abstract: Breast masses are regarded of paramount importance as attributed clear malignancy targets whose

detection proves acute for breast cancer diagnosis. Despite the boost in technology that has enhanced diagnostic

and clinical developments in the medical field; the accuracy to mammographic tumor evaluation still remains a

comprising issue. This is even, with greater regard towards mass detection. This paper is aimed towards creating

a dynamic mammographic image enhancement system in parallel to a tumor detection and classification system.

A dynamic listing of histogram-based algorithms constitutes the enhancement system. The detection and

classification system comprise of a segmentation seed region growing algorithm and a multilayer perceptron

(MLP) neural classifier using Backpropagation algorithm. Results have rendered the proposed techniques

promising with accurate levels of benign and malignant tumor discrimination and enhanced breast image

quality. The latter system achieved 88% sensitivity, 72% specificity, an Az value of 0.84 and an overall

classification accuracy of 80%.

Ola Abdalsalam, Al-Khanssa Osman, Roua Abd-Alhadi and Saad Alshmaa. Design of Non-Invasive

Glucose Measuring Device

Abstract: This device has been intended to provide an efficient method to monitor patients’ glucose level

without the need of puncturing the skin. Occlusion spectroscopy technique had been used to measure the

scattering angle of NIR when interacting with glucose molecules within the patients’ tissues. A significant

relationship between glucose characteristics and a certain range of wavelength in the EMS has been found,

further more a relationship between the angle of scattering and the glucose concentration has been found. This

study presents a new effective, simple and safe method to reduce any discomfort due to measurement

procedures produced by old invasive methods.

Page 75: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

51

Walaa Ahmed, Ahmed Osman, Yusra Ibrahim and Magdi B. M. Amien. MRI Brain Image Classification

Using Neural Networks

Abstract: Classification of brain tumor using Magnetic resonance Imaging (MRI) is a difficult task due to the

variance and complexity of tumors. This paper presents Neural Network techniques for the classification of the

magnetic resonance human brain images. The proposed Neural Network technique consists of three stages,

preprocessing, feature extraction with dimensionality reduction, and classification. In the first stage, we The MR

image will obtain and convert it to data form (encoded information that can be stored, manipulated and

transmitted by digital devices), in the second stage have obtained the features related with MRI images and

dimensionally reduced using principles component analysis (PCA), then In the classification stage the Back-

Propagation Neural Network has been used as a classifier to classify subjects as normal or abnormal MRI brain

images. In the experiments three datasets of MRI-Brain-Images have been used for tainting and testing the

proposed method. The result of the proposed technique was compared with the results of baseline algorithms,

and it presents validity as competitive results quality-wise, and showed that the classification accuracy of our

method is 96.33%.

Sulieman M. S. Zobly and Yasir M. Kadah. Multiple Measurements Vectors Compressed Sensing for

Doppler Ultrasound Signal Reconstruction

Abstract: Compressed sensing (CS) is a novel framework for reconstruction images and signals. In this work

we want to make use of the latest sampling theory multiple measurement vectors (MMV) compressed sensing

model, to reconstruct the Doppler ultrasound signal. Compressed sensing theory states that it is possible to

reconstruct images or signals from fewer numbers of measurements. In usual CS algorithms, the measurement

matrix is vectors so the single measurement vectors (SMV) applied to generate a sparse solution. Instead of

using the SMV model we want to make use of the MMV model to generate the sparse solution in this work.

Doppler ultrasound is one of the most important imaging techniques. To acquire the images much data were

needed, which cause increased in process time and other problems such as increasing heating per unit and

increasing the amount of the data that needed for reconstruction. To overcome these problems we proposed data

acquisition based on compressed sensing framework. The result shows that the Doppler signal can be

reconstructed perfectly by using compressed sensing framework.

Thowiba Sabeel, Fauzan Che Harun and Solima Sabeel. Detection of Volatile Compounds In Urine Using

An Electronic Nose Instrument

Abstract: Conventional clinical diagnostics tool for commonly detection of urine composition are based on

biochemical, physics and microbiological methods. Recent developments in gas-sensing technology and pattern

recognition methods make electronic nose technology an interesting alternative tool for medical point of care

devices. The gas emission from sample will cause changes in the gas sensors array conductivity, thus translating

the odour information to electrical signals that will be used for pattern recognition to differentiate or

discriminate samples. This work, focuses on discriminating between urine with various differences, in the term

of composition the result are verified using urine analyzer instrument to determine the availability of various

components in urine then, the comparison will be done with the data from e-nose system (Cyranose 320). There

Page 76: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

52

were thirteen samples, nine samples selected and classified as two healthy, one sample positive of bacteria and

sex mucus, the distinguished between healthy and unhealthy samples assayed by urine analyzer before

electronic nose experiment, the most abundant were mucus and bacteria as abnormal ranges. The data was

processed using principal component analysis and analysis of variance (ANOVA). The data analysis performed

shows the first principal components (PC1) and second principal components (PC2) results reveal that there is a

significant difference (F= 1151.795, P < 0.05) in sensors responses to differentiate between three group

containing various volatile compounds for PC2 showed (F= 0.034, P > 0.05). This work is a first step towards

developing an alternative measurement system, which does not need any conditioning or sample preparation, for

fast and simple clinical analysis of urine samples for early detection of disease.

Jacqueline J. George and Eman Mohammed Saeed Mohammed. Heart Disease Diagnostic Graphical User

Interface Using Fractal Dimension

Abstract: An Electrocardiogram (ECG) signal gives significant information for the cardiologist to detect

cardiac diseases. Cardiac diseases are among the main causes of death in the world. A significant amount of

research and development effort has been devoted on the detection of cardiac diseases, but still it is unable to

reduce the death rate. Therefore, it is necessary to have proper methods to determine the cardiac condition of the

patient. In this paper an easy method for detecting heart diseases is presented. ECG signals are self-similar

objects; can well be considered for fractal analysis. Fractal Dimension method was used to distinguish and

analyze three specific heart diseases namely Premature Atrial Contraction (PAC), Premature Ventricular

Contraction (PVC), and Atrial Fibrillation from the normal ECG signal. Rescaled range method was used to

determine the specific range of fractal dimension for each disease. ECG signals used were taken from three

databases, MIT-BIH Arrhythmia Database, the MIT-BIH Normal Sinus Rhythm Database, and the Intracardiac

Atrial Fibrillation Database. A Graphical User Interface was designed using MATLAB to help in diagnosing

patients. The GUI uses a raw ECG data to calculate the Fractal Dimension, to distinguish between the ECG

signals of healthy person and patients with the three specific heart diseases from the raw ECG data. The results

show that the methodological analysis does provide a significant clinical advantage, and matches doctors’

opinion.

Alia M. A. Siddig, Razaz Kh. Yousif and Muhanned Al Anwer Awaad. Motion Estimation in Ultrasound

Image Using Dynamic Multi-Shape Search

Abstract: Motion Estimation is a key problem in video processing and computer vision. It is the process of

determining motion vectors that describe the transformation from one 2-Dimension or 3-Dimension image to

another. Many algorithms for motion estimation have been proposed, but some are computationally expensive

and some have quality limitations. Block-Matching is a widely-used method for stereo vision, Visual tracking,

video compression, and objects motion estimation, in which images/videos extracted into macro-blocks, it is a

way of locating matching blocks in a sequence of digital video frames for the purposes of motion

estimation.Thereby achieving image/videos redundancy is reduced from one frame to another. In this paper a

new novel approach, we call it Dynamic Multi Shape Search technique, has been proposed to efficiently

estimate the location of atrial-septal-defect, which uses three steps with 23 points separated to 9 points with

semi diamond shape, then 9 points with square shape and finally 5 points with diamond shape. The main feature

Page 77: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

53

of this approach is to allow a full search, while being accurate at the same time. In addition it takes less time

than Four Step Search techniques. The contribution of this paper is to show that small or large motion can be

estimated directly by using our novel Dynamic programming Multi-shape Search Technique nstead the oldest

block-matching computation algorithms. Our new approach was compared with baseline algorithms like three

steps Search and four steps Search. The results showed the validity of our method as competitive results quality-

wise, and a significant gain speed-wise.

Muhanned Al Anwer Awaad, Razaz Kh . Yousif and Alia M. A. Siddig. Detecting and Tracking ASD using

New Block Flow in Ultrasound

Abstract: Medical ultrasound imaging is widely used to diagnose cardiac disorders and diseases. Atrial Septal

Defect (ASD) is one of the known congenital heart defect that can be detected using ultrasound

(Echocardiogram). There are many technique that have been developed for ASD detection (Chest X-ray,

Electrocardiogram (ECG), Magnetic resonance imaging (MRI) and many other techniques). But sometimes

these techniques are not accurate enough and need more tests to ensure the presence of ASD, in addition

consuming a lot of time. In this work, a technique was developed called Dynamic Multi Shape Search (DMSS).

This technique depends on detecting ASD and tracking blood flow; which combines the advantages of block

matching and optical flow techniques. It uses a search window that divides the ultrasound image into blocks and

finds the minimum difference between the test points of the test image with the standard one of ASD using Sum

Absolute Difference (SAD) criteria, then applied three steps with semi diamond, square and diamond shapes to

find the best match. The propos method compared with the baseline methods; which are less accurate, consume

a lot of time and some of them painful for patient. The results showed validity for our method as competitive

results quality-wise, and a significant gain speed-wise.

Tasneem Mahmoud and Omer Elfarouk Hamed. Discrimination of Four Classes in Brain-Computer

Interface Based on Motor Imagery

Abstract: The aim of science is to provide relief against weakness and disease, to help those who are disabled

to have a normal life without limitations. And when Albert Einstein said: “Imagination is more important than

knowledge.” may be even he didn’t imagine the possibility of using motor imagery (instead of actual

movement) in performing Brain computer Interface system to help those with severe motor disabilities and

spinal cord injuries to live normally. This study investigated the classification of multiclass motor imagery for

electroencephalogram (EEG)-based Brain-Computer Interface (BCI) using independent component analysis

(ICA), principle component analysis (PCA) and support vector machine (SVM) techniques. The dataset used is

available on BCI competition IV and we observed that the best published results were obtained by using Filter

Bank CSP, Naive Bayes Parzen Window classifier and LDA. And we improved in the way of using the

combination of ICA and SVM to obtain similar results. The proposed techniques were successful in classifying

four different motor imageries (MI) for 9 subjects who performed left hand, right hand, foot and tongue motor

imageries (MI) from EEG measurements.

Page 78: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

54

Safa Abdalziz, Shahd Tariq, Haifa Basher and Fragoon Ahmed. Measurement of Weight Distribution in

the Foot

Abstract: Recent advance in the development of methods for the measurement of static weight distribution on

the foot are reviewed and find that there is no low cost equipment in the present scenario to determine these

parameters, developing an economical method will help the doctors to diagnose the weight distribution in the

foot and the abnormality based on type of the foot. The major technical challenge is to design the individual

weight measuring point without using load cell or pressure sensor, since it increases cost of the equipment. This

system involves optical based weight measurement. As an additional feature, it measures the severity of loss of

sensation in the foot through a Vibro-tactile threshold sensation technique. This technique help assess the degree

of loss of sensation in the foot for a diabetes patient. our project involves two foot plates in which one is

designed with seven LED -LDR setup and the other a dummy. Depending on the weight of the person, the

intensity of light falling on the LDR from the LED varies. The detected signal is fed to the microcontroller for

processing and the output is displayed in a PC monitor.

Suliman Abdalla, Maha Abdelaziz and Amin Babiker. Architecture and Circuit Design Balance between

Integrated and Photon counting mode for X-Ray Pixel Array Detector Read-out Electronics

Abstract: This paper proposes new circuit architecture readout for X-ray pixel detector for imaging based on

the design of the integrating and single photon processing pixel array. The proposed architecture design

provides a balance between single photon processing mode and the integrating mode. This leads to a good

compromise of circuit complexity. We show that the increase of complexity, will lead to increase in circuit area

of less than that happened in the case of single photon processing mode

Amal Elawad, Braa Hagadam, Rabah Hamed and Eltaher Hussein. Design and Implementation of Robotic

System to Transport Disabled People

Abstract: The use of robotics in human healthcare is growing interest. In most institutions, services provided to

the elderly and disabled are unsatisfactory, mainly due to their dependence on human assistance. Utilizing

robots will spare human work force and help decreasing the risk of infection; and subsequently, economizing on

personnel and hygiene expenses. This paper discussed these issues in three points, in order to present a low cost

autonomous robotic wheelchair design to transport the elderly and disabled within hospitals. First, a design of a

robot was implemented on a small prototype. The robot was navigated using line-following with obstacle

detection technique; which is economical, simple and easily executed. Second, a design of a robotic wheelchair

was presented. The wheelchair was developed from manual wheelchairs used in hospitals after proper

adjustments, and a design of two gearboxes has been proposed. Third, the advantage of using robotic

wheelchairs inside hospitals was discussed by utilizing findings from previous studies. The robot prototype

circuit was built using optical and ultrasonic sensors, two DC motors and L293D motor driver; and programmed

with Atmega16L Microcontroller. The robot was able to follow a predetermined line-path and detect obstacles

within an acceptable range.

Page 79: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

55

Mawia Hassan, Shaza Gaib Alla, Ilaf Sarour and Mohammed Alfadny. Design of Digital Apodization

Technique for Medical Ultrasound Imaging

Abstract: Ultrasound imaging is one of the important noninvasive technique that using in medical diagnosis.

Unfortunately the far field beam pattern in ultrasound is a sinc function which has a better main lobe (the

resolution of ultrasound imaging) and high side-lobe about -13dB down from the maximum on axis value (the

contrast of ultrasound imaging). The result for that is one of a famous artifact in medical ultrasound that the

anatomy of the organ outside the main beam to be mapped into the main beam (false echo). This artifact is

known apodization. In this work we used different types of FIR filter to rounded edges of the aperture that taper

toward zero at the ends of the aperture to create low sidelobes level and reduce the false echo. We used

windowing function (hamming, hanning, Blackman, Bartlett, flattop, nuttall, Kaiser (β=8 and 10), parzen and

bohman) as apodization function to the reconstructed image to reduce the effect of the side-lobes. We computed

the SNR for each image and also the main lobe and the side-lobe. The results showed that there is trade-off in

selecting these function: the main lobe of the beam broadens as the side-lobes lower. However, Kaiser (β =10)

gave the best SNR (188.75 db) and best compensation between the contrast and resolution (main lobe=1.10 mm

and the side-lobe= -71.7db) We found that if we use the Kaiser filter (β =10) this would reduce the side-lobe and

improve the false echo in the ultrasound imaging.

Nada Osman. Comparison between Gold Nanoparticles and Conductive Polymer Nanoparticles Used in

Photothermal Therapy

Abstract: Nanoparticles have been used for over a decade in photothermal therapy for cancer treatment.

Photothermal therapy (PTT) is the process of using light-absorbing nanoparticles in the range of near-infrared

(NIR), to burn cancer cells by the heat generated from illuminating the nanoparticle. Gold nanoparticles (GNPs)

were commonly used due to their great ability to absorb and scatter light. Recently, certain types of conductive

polymer nanoparticles (CPNs) have been found to have the great ability to absorb NIR light. The aim of this

review paper is to study and compare between the optical and thermal properties of the GNPs and CPNs, in

order to find the optimum characteristics that best meet the requirements of PTT.

Alwaleed Abdelrahman and Omer Hamid. Evaluation of linear filter kernel developed from Ultrasound

phantom image

Abstract: the resolution reduction in ultrasound images is due to the nature of ultrasound propagation and

interaction with tissues, in which speckle noise is the dominant noise source. A tissue equivalent phantom, with

ultrasound properties similar to human tissues, was imaged and a background kernel was extracted from the

image to function as a linear filter. The phantom image has been studied to evaluate the kernel size and location

that could be selected. The objective of using the ultrasound phantom image is to simulate homogenous noise

distribution related to scanning parameters of the ultrasound system. Implementations of the proposed method in

pre-diagnosed images were presented. Standard filters were implemented to assess the performance of the

proposed algorithm. The proposed method presents better results than a number of common linear filters.

Page 80: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

56

Alwaleed Abdelrahman, Hassan Yasser, Maram Mahir and Fatma Mohammed. Human Skin Color

Recognition (identification): A case study

Abstract: Human skin color has been studied as biometric indicator, most of previous researches studies

focused in using skin color to detect the face, human motion and skin color. In this article commercial imaging

tool has been used to evaluate that every human being has a unique code in term of skin color properties, which

is different from one person to another even if they are relatives. Fifty picture of the nose were shots by a mobile

camera with a resolution of 3 mega pixel, included five pictures from one family. The nose area has been the

region of interest, where a specific part was cropped, to represent a region of less direct exposure to the sun light

as the rest of the face. The pictures were converted color from RGB to HSV format in order to isolate the effect

of the light intensity during shots. Finally all pictures were analyzed using mathematical and statistical methods.

This algorithm found that the variation in skin color from one person to another is statistically remarkable when

implementing this technique.

Page 81: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

57

Mechatronics Engineering

Gehad Hamdan, Saad Suliman and Al Khawad Elfaki. Carbon Nanotubes: Challenges and Opportunities

Abstract: Carbon nanotubes (CNTs) are one of the wonders of modern science discovered. They have shown

the research community an outstanding set of properties. CNTs have stimulated enormous interest for

conductive and high-strength composites; energy storage and energy conversion devices; biological and

chemical sensors; hydrogen storage media; and nanometer-sized semiconductor devices; and magnetic

recording, nano electronic devices and flat panel displays due to their unique physical and chemical properties

such as high surface-to-volume ratio, high conductivity, high strength and chemical inertness. In the past

decade, researchers made numerous attempts and efforts exploiting the exceptional properties of CNTs toward

the development of CNTs applications. A recent direction of research has been to try to gain further

understanding by the use of computational methods and models which appeared with the advancement of

computer technology. In this paper, a summary of recent research achievements related to the carbon nanotubes

and their applications in nanomaterials. Several important aspects that influence the properties of carbon

nanotube will also be discussed.

Zeinab Mahmoud Omer Yousif and Mergani Fathalrahman. Neuro-Fuzzy Inference System based

Controller in 6 DoF in Puma 560

Abstract: One of the problems in robotics field is, orientation of arm's end to desired location therefore the new

method must be find the solution of forward and inverse Kinematics (IK) problem. Traditional methods such as

iterative, geometric and algebraic are used to solve (IK) inadequate if the joint structure of the robot is more

complex. As the complexity of manipulator increases, solution of IK is difficult and computationally expensive.

In this paper, using the ability of Adaptive Neuro-Fuzzy Inference System (ANFIS) to learn from training data,

it is possible to create ANFIS with limited mathematical representation of the system. In the proposed method,

forward kinematics relations of robot arm are used to obtain the data for training and testing of ANFIS.

Simulation and practical results are carried out on a PUMA 560 with 6DoF robot arm and are used to show the

effectiveness of the approach.

Khalid Elhussein and Mohammed Elobaid. Smart Phones as System Integration Development Tools

(Android SCL Simulation Environment as Prototype)

Abstract: Smart phones and cloud computing were introduced to automation industry as components of

connected enterprise integration systems. The established protocols and interfacing done in that area, beside the

rapid growth of the hardware specification of those devices, was behind the motivation to think of smart phones

as programming and simulation devices. This paper proposes a conceptual design of a system integration work

structure based on smart phones and cloud computing. The conceptual design is supported by prototype of an

Android application for Siemens SCL programming and simulation. The proposal assumes a private cloud with

a SAAS/PAAS/IAAS cloud model owned by an Automation solutions vendor (provider) whereas the handheld

portable computing devices (e.g. smart phones) performs typical POUs (Project organization units)

configuration and/or programming of preconfigured device (controller) and uploading the generated and tested –

Page 82: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection

ICCEEE 2013

58

by means of simulation- code as (.prj files) or .txt files to the cloud. As part of the design, the paper will present

a smart phone based automation application which will be capable of parsing the IEC 61131-3 SCL PLC

programming language code, interpreting and checking validity by means of a high level simulator (Java based),

generating a .txt file, this will assume a private cloud model and a coding (Engineering) management

application on the server side.

Ammar Atia, Moayad Mamoon Ibrahim, Omer Abd Algbar Mohamed and Musaab Hassan. Modeling of

Electrostatically Actuated Temperature Sensor

Abstract: Micro electromechanical system (MEMS) is an emerging technology that gives high accuracy and

high speed with least error due to the micro dimension. To design simple but accurate MEMS sensors remains a

challenge. Modeling of a MEMS temperature sensor, using simple microcantilever structure, is represented in

this paper. The sensor is actuated electrostatically. The effect of temperature on the resonance was calculated

using ANSYS software. The device was made of copper (contact electrode) , silicon (vibrating part) and silicon

oxide ( insulation layer). When the temperature varies the properties of the MEMS device also changes and

hence the resonance frequency.

Page 83: Abstract Book - Sudan University of Science and Technologysustech.edu/files/20131008094646969.pdf · 2013-10-08 · Sudan has been a dream since the establishment of the IEEE Subsection