Rania A. Mokhtar
Sudan University of Science and Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Rania A. Mokhtar.
international conference on computer and communication engineering | 2014
Alaa A. Yassin; Rashid A. Saeed; Rania A. Mokhtar
In this paper, we introduce dual-band micro strip patch antenna design for WiMax and WiFi implementation by mean of 3.5 GHz and 5.2 GHz central frequencies, respectively. The antenna system is been designed anchored in adds C-slot design on the patch and two parallel slit on the ground plane. The favor of this technique is that it puts forward low profile, high gain and wide bandwidth for the entire frequencies. Computer Simulation Technology (CST) microwave studio simulator is exploited to analyze the performance of the antenna system the results show the obtained return loss is 18 dB, 31 dB, gain 5.8dB, 6.7dB and bandwidth 42MHz, 138 MHz at 3.5GHz and 5.2GHz respectively.
international conference on sciences of electronics technologies of information and telecommunications | 2012
Rashid A. Saeed; Rania A. Mokhtar
In this chapter we discussed various spectrum sensing aspects and issues related to TV white space. Special attention has been paid to ongoing TV white space standards i.e. IEEE 802.22 and the IEEE 802.11af. These standards were studied based on their ability to detect primary user (PU) or TV incumbent users and coexistence with others signals and to avoid transmission in the busy and adjacent channels to ensure proper interference mitigation within the allowable transmitted powers. Throughout the chapter, many TVWS scenarios were studied and elaborated. Sensing is important for devices do not has registered in any database or registered but move with uncoordinated manner and do not have geo-location capabilities. Sensing can be handled via several suboptimal and optimal techniques to extract channel information. Sensing can be used for improving power control and interference cancelations.
2017 International Conference on Communication, Control, Computing and Electronics Engineering (ICCCCEE) | 2017
Saad Mohamed Ali Mohamed Gadal; Rania A. Mokhtar
The excessive use of the communication networks, rising of Internet of Things leads to increases the vulnerability to the important and secret information. advance attacking techniques and number of attackers are increasing radically. Intrusion is one of the main threats to the internet. Hence security issues had been big problem, so that various techniques and approaches have been presented to address the limitations of intrusion detection system such as low accuracy, high false alarm rate, and time consuming. This paper proposes a hybrid machine learning technique for network intrusion detection based on combination of K-means clustering and Sequential Minimal Optimization (SMO) classification. It introduces hybrid approach that able to reduce the rate of false positive alarm, false negative alarm rate, to improve the detection rate and detect zero-day attackers. The NSL-KDD dataset has been used in the proposed technique.. The classification has been performed by using Sequential Minimal Optimization. After training and testing the proposed hybrid machine learning technique, the results have shown that the proposed technique (K-mean + SMO) has achieved a positive detection rate of (94.48%) and reduce the false alarm rate to (1.2%) and achieved accuracy of (97.3695%).
Journal of Networks | 2013
Rania A. Mokhtar; Rashid A. Saeed; Raed A. Alsaqour; Yahia Abdallah
Cognitive radio (CR) technology aims to achieve efficient radio spectrum utilization based on overlay spectrum sharing. Therefore, one of the main requirements of CR systems is the capability to detect and sense the presence of primary transmissions. However, sensing is affected by the behavior of the wireless channel, i.e., hidden node, interference, shadowing, and fading, which may result in wrong detection decisions. Consequently, CRs may introduce harmful interference to primary radios. Cooperative spectrum sensing can improve detection decisions by obtaining sensing information from different sources, which has been recently proposed to overcome this problem. This paper reviews cooperative sensing aspects, approaches, architecture, as well as problematic aspect and drawbacks of the control channel and associated fusion methods.
2017 International Conference on Communication, Control, Computing and Electronics Engineering (ICCCCEE) | 2017
Khidir Elhadi Bala Ahmed; Rashid A. Saeed; Rania A. Mokhtar
Object tracking in real time is one of the most important topics in the field of computer Vision. The work undertaken in this dissertation is mainly focused on development of a reliable and robust real time tracking system that can track the object of interest in the video acquired from a stationary or moving camera. The proposed algorithm is a real time algorithm that operates in 25 frames per second depending on the input video properties and probability distribution of the intensity of the tracked object. The Digital Video Development Platform DM6437 EVM is used to obtain the real time video sequence and process the frame to extract the object using the CAMSHIFT algorithm. The information obtained from the frame is extracted and mean shift algorithm is used to search the object with in the frame. The experimental results obtained from the proposal prove the consistency and real time performance of the proposed algorithm.
2015 International Conference on Computing, Control, Networking, Electronics and Embedded Systems Engineering (ICCNEEE) | 2015
Ahmed Kh. Mohammed; Rania A. Mokhtar; HasanAlbasry E. Eltahir
Target Localization using small unmanned aerial vehicles (UAVs) has emerged in the recent decades as an effective and essential option in surveillance, military and other fields. Often, UAV holds a camera and with the aid of different sensors it can determine the target location. This research represents a mathematical method for calculating the distance between the UAV and the target using UAV coordinates and the tilt angle of the camera while posing to the target. Then, with knowing the heading of the UAV, it obtains the coordinates of the target. This proposed method assumes that the target altitude is known or estimated from previous background about the geographical nature of the field.
2015 International Conference on Computing, Control, Networking, Electronics and Embedded Systems Engineering (ICCNEEE) | 2015
Khidir Elhadi Bala Ahmed; Rania A. Mokhtar; Rashid A. Saeed
Image Histogram is useful in wide range of applications, it shows the image intensity distribution which is used in many image processing techniques. The processing time is very critical in real time applications, so the optimized and robust techniques are preferred. This paper is discussing a simple method for calculating histogram of the image with sampled Histogram which is similar to the histogram of the hall image; moreover the number of calculated pixels and processing time is less than calculating the hall image Histogram. The method used in this approach is by selecting sample pixels form the hall image and then calculating the intensity distribution of the selected pixels. The results of the simulation show same histogram of the reference image and less processing time.
2015 International Conference on Computing, Control, Networking, Electronics and Embedded Systems Engineering (ICCNEEE) | 2015
Mubark A. Elmubark; Rashid A. Saeed; M.A Elshaikh; Rania A. Mokhtar
For efficient network applications, its necessary to build security mechanisms for a secure communication. End-to-end security plays a crucial role for the communication in the network, to provide the confidentiality, the authentication and mostly the prevention from DOS attacks at high level. The main downside of the key generation and key exchange are that, the attackers might access the transmitted data and use it to obtain the key and even generate new keys. Also, the process of generating the key is inefficient and time consuming. This paper, propose a fast and secure key exchange protocol in the TVWS. In order to check these security properties, this paper used a formal verification tools called AVISPA.
2012 International Symposium on Telecommunication Technologies | 2012
Mubark A. Elmubark; Rashid A. Saeed; Rania A. Mokhtar; Hafizal Mohamad; Hashim Elshafie
In this paper we design a new protocol for confidentiality which can be applied in three scenarios. The first scenario does not need too many database modifications. We found that this protocol can offer a confident method for registration and all other messages between master/mode II devices and TV white space database (WSDB). The second scenario is tried to overcome of the delay of the first scenario registration, by let the Master mode pick a random number (Info_Number) and the answer of this number (Info_Value) and put it in the REG-REQ before send it to the WSD. But this needed a modification in the REG-REQ. The third scenario is needed another modification in the WSD by adding a new tow columns we call it MasterID and Password and then give any Master mode a MasterID and Password and the registration will need two steps, first one the Master sending its MasterID and the password, and the second step must use either Scenario 1 or Scenario 2.
Indian journal of science and technology | 2015
Rania A. Mokhtar; Ahmad Fadzil Ismail; M. K. Hasan; Wahidah Hashim; Hajir Abbas; Rashid A. Saeed; Shayla Islam
Collaboration
Dive into the Rania A. Mokhtar's collaboration.
Saad Mohamed Ali Mohamed Gadal
Sudan University of Science and Technology
View shared research outputs