Skip to main content

Showing 1–8 of 8 results for author: Shaaban, E

.
  1. Structural Analysis of Brightest Cluster Galaxies in Poor and Rich Clusters

    Authors: Eman Shaaban, Sinan Alis, Mehmet Bektasoglu, Fuat Korhan Yelkenci, Eyup Kaan Ulgen, Oguzhan Cakir, Suleyman Fisek

    Abstract: Studying structural parameters of brightest cluster galaxies (BCGs) provides important clues to understand their formation and evolution. We present the results of the surface brightness profile fitting of 1685 brightest cluster galaxies (BCGs) drawn from the Canada-France-Hawaii Telescope Legacy Survey in the redshift range of $0.1 < z < 1.0$. We fit $r$-band images of BCGs with a single Sérsic p… ▽ More

    Submitted 25 December, 2022; originally announced December 2022.

    Comments: 13 pages, 11 figures, 6 tables, accepted for publication in New Astronomy

  2. arXiv:2012.13086  [pdf

    cond-mat.mtrl-sci physics.optics

    Structure, Electrical and Optical Properties of ITO Thin Films and their Influence on Performance of CdS/CdTe Thin-Film Solar Cells

    Authors: Moustafa Ahmed, Ahmed Bakry, Essam R. Shaaban, Hamed Dalir

    Abstract: In terms of mixing graded TiO2 and SnO2 powders by solid-state reaction method, ITO was prepared. Using electron beam gun technology, ITO films with different thicknesses were prepared. The influence of film thickness on structure, electrical and optical properties was studied. The XRD patterns were utilized to determine the structural parameters (lattice strain and crystallite size) of ITO with d… ▽ More

    Submitted 23 December, 2020; originally announced December 2020.

    Comments: 20 Pages, 13 figures

  3. arXiv:1501.03617  [pdf

    cs.CR

    Confidential Algorithm for Golden Cryptography Using Haar Wavelet

    Authors: Marghny H. Mohamed, Yousef B. Mahdy, Wafaa Abd El-Wahed Shaban

    Abstract: One of the most important consideration techniques when one want to solve the protecting of digital signal is the golden matrix. The golden matrices can be used for creation of a new kind of cryptography called the golden cryptography. Many research papers have proved that the method is very fast and simple for technical realization and can be used for cryptographic protection of digital signals.… ▽ More

    Submitted 15 January, 2015; originally announced January 2015.

  4. Stop_times based Routing Protocol for VANET

    Authors: Hafez Moawad, Eman Shaaban, Zaki Taha Fayed

    Abstract: Vehicular Ad hoc Network (VANET) is a special class of Mobile Ad hoc Network (MANET) where vehicles are considered as MANET nodes with wireless links. The key difference of VANET and MANET is the special mobility pattern and rapidly changeable topology. There has been significant interest in improving safety and traffic efficiency using VANET. The design of routing protocols in VANET is important… ▽ More

    Submitted 28 November, 2013; originally announced November 2013.

    Comments: 6 pages, 4 figure, Published with International Journal of Computer Applications (IJCA)

    Journal ref: International Journal of Computer Applications 81(18):4-9, November 2013. Published by Foundation of Computer Science, New York, USA

  5. arXiv:1310.3322  [pdf

    cs.DC

    GPU-Framework for Teamwork Action Recognition

    Authors: Mohamed Elhoseiny, Hossam Faheem, Taymour Nazmy, Eman Shaaban

    Abstract: Real time processing for teamwork action recognition is a challenge, due to complex computational models to achieve high system performance. Hence, this paper proposes a framework based on Graphical Processing Units (GPUs) to achieve a significant speed up in the performance of role based activity recognition of teamwork. The framework can be applied in various fields, especially athletic and mili… ▽ More

    Submitted 11 October, 2013; originally announced October 2013.

    Comments: 7 pages

  6. arXiv:1201.3782  [pdf

    cs.NI

    Performance Analysis of Observation Based Cooperation Enforcement in Ad Hoc Networks

    Authors: Abeer Ghandar, Eman Shabaan, Zaky Taha Fayed

    Abstract: Node misbehavior due to selfish or malicious behavior could significantly degrade the performance of MANET because most existing routing protocols in MANET aim to find the most efficient path. Overhearing and reputation based cooperation schemes have been used to detect and isolate the misbehaving nodes as well as to force them to cooperate. Performance analysis has been done for the network traff… ▽ More

    Submitted 18 January, 2012; originally announced January 2012.

    Journal ref: International Journal of Computer Science Issues (IJCSI), Vol. 8, Issue 6, No 2, pp. 79-85, November 2011

  7. Lightweight Mutual Authentication Protocol for Low Cost RFID Tags

    Authors: Eslam Gamal Ahmed, Eman Shaaban, Mohamed Hashem

    Abstract: Radio Frequency Identification (RFID) technology one of the most promising technologies in the field of ubiquitous computing. Indeed, RFID technology may well replace barcode technology. Although it offers many advantages over other identification systems, there are also associated security risks that are not easy to be addressed. When designing a real lightweight authentication protocol for low c… ▽ More

    Submitted 25 May, 2010; originally announced May 2010.

    Comments: 11 Pages, IJNSA

    Journal ref: International Journal of Network Security & Its Applications 2.2 (2010) 27-37

  8. arXiv:1004.1237   

    cs.CR

    Lightweight Distance bound Protocol for Low Cost RFID Tags

    Authors: Eslam Gamal Ahmed, Eman Shaaban, Mohamed Hashem

    Abstract: Almost all existing RFID authentication schemes (tag/reader) are vulnerable to relay attacks, because of their inability to estimate the distance to the tag. These attacks are very serious since it can be mounted without the notice of neither the reader nor the tag and cannot be prevented by cryptographic protocols that operate at the application layer. Distance bounding protocols represent a prom… ▽ More

    Submitted 7 May, 2010; v1 submitted 7 April, 2010; originally announced April 2010.

    Comments: Results in paper questionable. Article withdrawn by authors.

    Journal ref: IJCSIS, Vol. 7 No. 3, March 2010