Salah A. Khamis
Tanta University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Salah A. Khamis.
International Journal of Speech Technology | 2015
Salwa M. Serag Eldin; Salah A. Khamis; Abdel-Aziz Ibrahim Mahmoud Hassanin; Mohammed A. Alsharqawy
For any cloud computing (ClComp), encryption of multimedia is one of the main applications as cloud tries to maintain it in a good situation and protect from any tampering. This work provides a new technique for audio for TV cloud computing. Encrypting the audio signals is addressed based on chaotic map and the algorithm was tested using an audio tone (AT) to evaluate the performance. The software of encrypt audio using AT based on chaotic map is specially designed to meet the needs of ClComp of Egyptian Radio and Television Union (ERTU). The proposed software of ClComp of ERTU is practical in nature and aims to provide individuals with an understanding of how to create cutting-edge web applications to be deployed distributive across the latest hosting platforms of ClComp of ERTU, including public/hybrid ClComp of ERTU, peer-to-peer networks, clusters, and multi-servers.
ieee international conference on semiconductor electronics | 2006
Ali El-Abd; M. Abdel Aziz; Abdel Aziz Shalby; Salah A. Khamis
Most theoretical I-V models appeared in the literature for AlGaN/GaN HEMTs fail to exactly fit the experimental data and a large deviation is reported, especially at large gate bias. Because the exact nature of the AlGaN/GaN hetrostructure is not fully described, we assume that there is a new phenomena in the device which causes this deviation. Here we compute this phenomena mathematically for doped and undoped devices using a new method. The model results will be useful in CAD programs to extract more accurate I-V characteristics for the AlGaN/GaN hetrostructure on sapphire substrate.
national radio science conference | 2012
Sameh A. Napoleon; A. S. Omar; Salwa Elramly; Salah A. Khamis; Mohamed E. Nasr
Localization and tracking have recently gained a special importance. A common system for positioning in outdoor environment as e.g. the Global Positioning System (GPS) exists already. GPS is useless for indoor positioning because its signals are weakened or even blocked. This motivated the use of another wireless system to accomplish positioning. Wireless Local Area Network (WLAN) Access Points (APs) are already installed inside buildings, making them a suitable replacement for GPS. Many techniques exist for extracting and calculating location information form the WLAN signals. Among them are super resolution algorithms such as Root Multiple Signal Classification (Root-MUSIC), Estimation of Signal Parameters via Rotational Invariance Technique (ESPRIT), and Matrix Pencil (MP). Many researchers applied these techniques on a specially designed WLAN signals. To apply these techniques in real applications, they should be tested on true wireless signals. In this paper, the performance of super resolution techniques is practically tested on a WLAN transceiver using the communication signals without any modifications.
international conference on innovations in information technology | 2016
Nermeen M. Abdal-Ghafour; Ayman Abdel-Hamid; Mohamed E. Nasr; Salah A. Khamis
Electronic passport is one of the hottest research fields nowadays due to reported different attacks against various countries. Several attacks such as brute force attack, guessing machine readable zones information are performed on Basic Access Control Protocol (BAC) due to its low entropy. This paper presents two proposed authentication enhancement techniques for seed key of BAC. The first proposed enhancement technique depends on a password provided by the citizen as input to the inspection system at the border during the verification process. The second proposed enhancement technique depends on extracting minutiae features from a scanned citizens fingerprint to increase strength of seed key. Performance evaluation experiments for proposed enhancement techniques are conducted using MATLAB proving that the proposed techniques enhance authentication procedures of BAC and increase entropy of seed key with minimum additional delay. A facial recognition database and fingerprint recognition database are tested proving the strength of proposed techniques against cracking.
national radio science conference | 2008
Ebrahim E. Bedeer; Hossam M. H. Shalaby; El-Sayed A. El-Badawy; Salah A. Khamis
This paper introduces a heuristic approach as a solution to the problem of routing, wavelength assignment (RWA), and traffic grooming when designing a logical topology given the network physical topology. The RWA problem is known to be the assigning of network resources (wavelengths, transmitters, and receivers) to successfully establish lightpaths in the wavelength division multiplexing (WDM) optical network. The traffic grooming problem is the multiplexing of lower speed connection requests to high speed streams. The physical topology consists of nodes and fiber links connecting these nodes. The logical topology consists of same nodes and lightpaths between these nodes, where a lightpath represents a direct optical connection without any intermediate electronics. For a given network physical topology and traffic pattern (traffic distribution between every node pairs), the objective is to design a logical topology and a routing algorithm so as to minimize both the average packet hop distance and amount of processing at each node. Two constraints are considered, namely, the number of wavelengths required to embed the resulting logical topology and the number of transmitters and receivers per node.
national radio science conference | 2008
Mohamed A. Naiel; Salah A. Khamis; Mohamed E. Nasr
Streaming of voice over Internet protocol (SVoIP) means transmission of real time voice signals and associated call control information over an IP-based network. This paper introduces a microcontroller based system that can be used for making a SVoIP gateway (SVoIP GW) that uses TCP/IP Stack. Using this technique one can transmit the voice of the POTS (plain old telephone service) over the internet by making conversion of the analogue voice into IP-packet. Further an OPNET program is used to simulate a system to accommodate a voice over IP networks .
international conference on computer and communication engineering | 2008
Ebrahim E. Bedeer; Hossam M. H. Shalaby; El-Sayed A. El-Badawy; Salah A. Khamis
This paper introduces a modified heuristic approach as a solution to the problem of routing, wavelength assignment (RWA), and traffic grooming when designing a logical topology given the network physical topology. The RWA problem is known to be the assigning of network resources (wavelengths, transmitters, and receivers) to successfully establish lightpaths in the Wavelength Division Multiplexing (WDM) optical network. The traffic grooming problem is the multiplexing of lower speed connection requests to high speed streams. The proposed heuristic is based on Dijkstrapsilas algorithm and it is a modification to the MSHT heuristic. For a given network physical topology and traffic pattern (traffic distribution between every node pairs), the objective is to design a logical topology and a routing algorithm so as to minimize both the average packet hop distance and amount of processing at each node. Two constraints are considered, namely, the number of wavelengths required to embed the resulting logical topology and the number of transmitters and receivers per node.
Sensing and Imaging: An International Journal | 2012
Amr M. Ragheb; Heba Osman; Saleh M. Elkaffas; Tarek A. El-Tobely; Salah A. Khamis; Mohamed M. E. El-Halawany; Mohamed E. Nasr; Moawad I. Dessouky; Waleed Al-Nuaimy; Fathi E. Abd El-Samie
Wireless Personal Communications | 2016
Mostafa Emara; Hanaa S. Ali; Salah A. Khamis; Fathi E. Abd El-Samie
international conference on bioinformatics | 2014
Salwa M. Serag Eldin; Salah A. Khamis; Abdel-Aziz Ibrahim Mahmoud Hassan; Mohammed A. Alsharqawy