-
Structural Analysis of Brightest Cluster Galaxies in Poor and Rich Clusters
Authors:
Eman Shaaban,
Sinan Alis,
Mehmet Bektasoglu,
Fuat Korhan Yelkenci,
Eyup Kaan Ulgen,
Oguzhan Cakir,
Suleyman Fisek
Abstract:
Studying structural parameters of brightest cluster galaxies (BCGs) provides important clues to understand their formation and evolution. We present the results of the surface brightness profile fitting of 1685 brightest cluster galaxies (BCGs) drawn from the Canada-France-Hawaii Telescope Legacy Survey in the redshift range of $0.1 < z < 1.0$. We fit $r$-band images of BCGs with a single Sérsic p…
▽ More
Studying structural parameters of brightest cluster galaxies (BCGs) provides important clues to understand their formation and evolution. We present the results of the surface brightness profile fitting of 1685 brightest cluster galaxies (BCGs) drawn from the Canada-France-Hawaii Telescope Legacy Survey in the redshift range of $0.1 < z < 1.0$. We fit $r$-band images of BCGs with a single Sérsic profile. The sample is splitted into two groups based on the host cluster richness to investigate the impact of the environment. Our results suggest that BCGs in rich clusters are statistically larger than their counterparts in poor clusters. We provide best-fit linear regressions for the Kormendy, the $log \ R_e - log \ n$, and the size-luminosity relations. In addition, we examined the evolution of the structural parameters, however the BCGs in our sample do not show a significant size change since z$\sim$1.
△ Less
Submitted 25 December, 2022;
originally announced December 2022.
-
Structure, Electrical and Optical Properties of ITO Thin Films and their Influence on Performance of CdS/CdTe Thin-Film Solar Cells
Authors:
Moustafa Ahmed,
Ahmed Bakry,
Essam R. Shaaban,
Hamed Dalir
Abstract:
In terms of mixing graded TiO2 and SnO2 powders by solid-state reaction method, ITO was prepared. Using electron beam gun technology, ITO films with different thicknesses were prepared. The influence of film thickness on structure, electrical and optical properties was studied. The XRD patterns were utilized to determine the structural parameters (lattice strain and crystallite size) of ITO with d…
▽ More
In terms of mixing graded TiO2 and SnO2 powders by solid-state reaction method, ITO was prepared. Using electron beam gun technology, ITO films with different thicknesses were prepared. The influence of film thickness on structure, electrical and optical properties was studied. The XRD patterns were utilized to determine the structural parameters (lattice strain and crystallite size) of ITO with different thicknesses. It is observed that the average crystallite size increases as the film thickness increases, but the lattice strain decreases. SEM shows that as the film thickness increases, the grain size of ITO increases and improves. The electrical properties of ITO films with different thicknesses were measured by the standard four-point probe method. It can be seen that as the thickness of the ITO film increases from 75 nm to 325 nm, the resistivity decreases from 29x10^-4 Ohm/cm to 1.65x10^-4 Ohm/cm. This means that ITO films with lower electrical properties will be more suitable for high-efficiency CdTe solar cells. Three optical layer models (adhesive layer of the substrate/B-spline layer of ITO film/surface roughness layer) are used to calculate the film thickness with high-precision ellipsometry. In the higher T(lambda) and R(lambda) absorption regions, the absorption coefficient is determined to calculate the optical energy gap, which increases from 3.56 eV to 3.69 eV. Finally, the effects of ITO layers of various thicknesses on the performance of CdS/CdTe solar cells are also studied. When the thickness of the ITO window layer is 325 nm, Voc = 0.82 V, Jsc = 17 mA/cm2, and FF = 57.4%, the highest power conversion efficiency (PCE) is 8.6%.
△ Less
Submitted 23 December, 2020;
originally announced December 2020.
-
Confidential Algorithm for Golden Cryptography Using Haar Wavelet
Authors:
Marghny H. Mohamed,
Yousef B. Mahdy,
Wafaa Abd El-Wahed Shaban
Abstract:
One of the most important consideration techniques when one want to solve the protecting of digital signal is the golden matrix. The golden matrices can be used for creation of a new kind of cryptography called the golden cryptography. Many research papers have proved that the method is very fast and simple for technical realization and can be used for cryptographic protection of digital signals.…
▽ More
One of the most important consideration techniques when one want to solve the protecting of digital signal is the golden matrix. The golden matrices can be used for creation of a new kind of cryptography called the golden cryptography. Many research papers have proved that the method is very fast and simple for technical realization and can be used for cryptographic protection of digital signals. In this paper, we introduce a technique of encryption based on combination of haar wavelet and golden matrix. These combinations carry out after compression data by adaptive Huffman code to reduce data size and remove redundant data. This process will provide multisecurity services. In addition Message Authentication Code (MAC) technique can be used to provide authentication and the integrity of this scheme. The proposed scheme is accomplished through five stages, the compression data, key generation, encryption stage, the decryption stage and decompression at communication ends.
△ Less
Submitted 15 January, 2015;
originally announced January 2015.
-
Stop_times based Routing Protocol for VANET
Authors:
Hafez Moawad,
Eman Shaaban,
Zaki Taha Fayed
Abstract:
Vehicular Ad hoc Network (VANET) is a special class of Mobile Ad hoc Network (MANET) where vehicles are considered as MANET nodes with wireless links. The key difference of VANET and MANET is the special mobility pattern and rapidly changeable topology. There has been significant interest in improving safety and traffic efficiency using VANET. The design of routing protocols in VANET is important…
▽ More
Vehicular Ad hoc Network (VANET) is a special class of Mobile Ad hoc Network (MANET) where vehicles are considered as MANET nodes with wireless links. The key difference of VANET and MANET is the special mobility pattern and rapidly changeable topology. There has been significant interest in improving safety and traffic efficiency using VANET. The design of routing protocols in VANET is important and necessary issue for support the smart ITS. Existing routing protocols of MANET are not suitable for VANET. AOMDV is the most important on demand multipath routing protocol. This paper proposes SSD-AOMDV as VANET routing protocol. SSD-AOMDV improves AOMDV to suit VANET characteristics. SSD-AOMDV adds the mobility parameters: Stop_times, Speed and Direction to hop count as new AOMDV routing metric to select next hop during the route discovery phase. Stop_times metric is added to simulate buses mobility pattern and traffic lights at intersections. Simulation results show that SSD-AOMDV achieves better performance compared to AOMDV.
△ Less
Submitted 28 November, 2013;
originally announced November 2013.
-
GPU-Framework for Teamwork Action Recognition
Authors:
Mohamed Elhoseiny,
Hossam Faheem,
Taymour Nazmy,
Eman Shaaban
Abstract:
Real time processing for teamwork action recognition is a challenge, due to complex computational models to achieve high system performance. Hence, this paper proposes a framework based on Graphical Processing Units (GPUs) to achieve a significant speed up in the performance of role based activity recognition of teamwork. The framework can be applied in various fields, especially athletic and mili…
▽ More
Real time processing for teamwork action recognition is a challenge, due to complex computational models to achieve high system performance. Hence, this paper proposes a framework based on Graphical Processing Units (GPUs) to achieve a significant speed up in the performance of role based activity recognition of teamwork. The framework can be applied in various fields, especially athletic and military applications. Furthermore, the framework can be customized for many action recognition applications. The paper presents the stages of the framework where GPUs are the main tool for performance improvement. The speedup is achieved by performing video processing and Machine learning algorithms on GPU. Video processing and machine learning algorithms covers all computations involved in our framework. Video processing tasks on involves GPU implementation of Motion detection, segmentation and object tracking algorithms. In addition, our framework is integrated with GPUCV, a GPU version of OpenCV functions. Machine learning tasks are supported under our framework with GPU implementations of Support Vector Machine (SVM) for object classification and feature discretization, Hidden Marcov Model (HMM) for activity recognition phase, and ID3 algorithm for role recognition of team members. The system was tested against UC-Teamwork dataset and speedup of 20X has been achieved on NVidia 9500GT graphics card (32 500MHZ processors).
△ Less
Submitted 11 October, 2013;
originally announced October 2013.
-
Performance Analysis of Observation Based Cooperation Enforcement in Ad Hoc Networks
Authors:
Abeer Ghandar,
Eman Shabaan,
Zaky Taha Fayed
Abstract:
Node misbehavior due to selfish or malicious behavior could significantly degrade the performance of MANET because most existing routing protocols in MANET aim to find the most efficient path. Overhearing and reputation based cooperation schemes have been used to detect and isolate the misbehaving nodes as well as to force them to cooperate. Performance analysis has been done for the network traff…
▽ More
Node misbehavior due to selfish or malicious behavior could significantly degrade the performance of MANET because most existing routing protocols in MANET aim to find the most efficient path. Overhearing and reputation based cooperation schemes have been used to detect and isolate the misbehaving nodes as well as to force them to cooperate. Performance analysis has been done for the network traffic using OCEAN over DSR on ns2 while considering the low energy levels for mobile nodes. Throughput, energy level, routing packets and normalized routing overhead are analyzed for OCEAN and normal DSR to show the impact of OCEAN on the overall network performance.
△ Less
Submitted 18 January, 2012;
originally announced January 2012.
-
Lightweight Mutual Authentication Protocol for Low Cost RFID Tags
Authors:
Eslam Gamal Ahmed,
Eman Shaaban,
Mohamed Hashem
Abstract:
Radio Frequency Identification (RFID) technology one of the most promising technologies in the field of ubiquitous computing. Indeed, RFID technology may well replace barcode technology. Although it offers many advantages over other identification systems, there are also associated security risks that are not easy to be addressed. When designing a real lightweight authentication protocol for low c…
▽ More
Radio Frequency Identification (RFID) technology one of the most promising technologies in the field of ubiquitous computing. Indeed, RFID technology may well replace barcode technology. Although it offers many advantages over other identification systems, there are also associated security risks that are not easy to be addressed. When designing a real lightweight authentication protocol for low cost RFID tags, a number of challenges arise due to the extremely limited computational, storage and communication abilities of Low-cost RFID tags. This paper proposes a real mutual authentication protocol for low cost RFID tags. The proposed protocol prevents passive attacks as active attacks are discounted when designing a protocol to meet the requirements of low cost RFID tags. However the implementation of the protocol meets the limited abilities of low cost RFID tags.
△ Less
Submitted 25 May, 2010;
originally announced May 2010.
-
Lightweight Distance bound Protocol for Low Cost RFID Tags
Authors:
Eslam Gamal Ahmed,
Eman Shaaban,
Mohamed Hashem
Abstract:
Almost all existing RFID authentication schemes (tag/reader) are vulnerable to relay attacks, because of their inability to estimate the distance to the tag. These attacks are very serious since it can be mounted without the notice of neither the reader nor the tag and cannot be prevented by cryptographic protocols that operate at the application layer. Distance bounding protocols represent a prom…
▽ More
Almost all existing RFID authentication schemes (tag/reader) are vulnerable to relay attacks, because of their inability to estimate the distance to the tag. These attacks are very serious since it can be mounted without the notice of neither the reader nor the tag and cannot be prevented by cryptographic protocols that operate at the application layer. Distance bounding protocols represent a promising way to thwart relay attacks, by measuring the round trip time of short authenticated messages. All the existing distance bounding protocols use random number generator and hash functions at the tag side which make them inapplicable at low cost RFID tags. This paper proposes a lightweight distance bound protocol for low cost RFID tags. The proposed protocol based on modified version of Gossamer mutual authentication protocol. The implementation of the proposed protocol meets the limited abilities of low-cost RFID tags.
△ Less
Submitted 7 May, 2010; v1 submitted 7 April, 2010;
originally announced April 2010.