جائزة البحث العلمى فى مجال الاتصالات2009

Page 1

816

86

Scientific Society of Telecom Engineers

SSTE

2009 ‍ ŘŠ ŘŁ  Ů„ ا ŘŞ م‏ ‍ــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــــ‏

65‍ Ř°ďť?‏85 9 0‍ Ůˆ ďť?â€ŹŘŒ ‍ ت‏5 ‍ ا‏%)(# ‍ي اďť?! ďť?‏/0$ ‍ اďť?‏1 2 ‍ م‏0‍ ا ه‏1986 ‍ م‏#$ %& '(‍ ا ŘŞ ‏%)(# ‍دأ اďť? ! اďť?! ďť?‏ (5 ‍ آ‏5#0 ‍ ŘŞ ŮˆŘŁŮ‡â€Ź5 ‍ ا‏5%)(‍ ŘŻŮˆŘą ه‏AB !0‍ا ďť?‏2C‍ Ůˆâ€ŹŘŒ ‍ =)Ů…  Ů„ ا ت‏0‍؍ اďť?‏/ Fâ€ŤŰŒ ? اďť?‏/(% ‍=ــ < ؊‏0 ! ‍;  اďť?‏ 5%)(#‍ ŘŞ اďť?‏5 ‍ آ‏5 5 2#Q‍ ŘŞ اďť?‏5 ‍ Ů… ا‏5$;& ( ‍س‏/â€ŤŘąŰŒâ€Ź/‍ ďť?‏5QF‍ ) اďť?‏5 #(‍( اďť?‏5$‍ب اďť?‏LM‍ ﺥ ŘŁŰŒ ďť?‏0‍ اďť? ŘŠ ‏H'#‍)Ů… ďť?‏90‍ اďť?‏IF‍ ŘŁďşšâ€ŹŘŒ H) ‍ Ůˆا‏H)‍ )ŰŒâ€Ź 5‍) ; ‏59‍ Ůˆďť?â€ŹŘŒ ‍ ت‏5 ‍ Ů„ ا‏5 ‍ ‏5 )5‍ )ŰŒâ€Ź/‍ آ  ه‏2!‍ Ůˆ‏U 9(0‍ Ůˆاďť?‏F‍ Ů… ďť?‏0‍ ا ه‏- F90$ ‍ اďť?‏%)(‍ـ‏#‍ ‏- ‍ب‏LM‍ ďť? اďť?‏6‍ ŮˆŘ°ďť?‏S 0= ‍اďť?‏ ‍ ذ‏05%?‍ ) ا‏5$‍ا اďť?‏/5 ‍ اďť?‏A‍)ŰŒâ€Ź590 ‍ م‏5;‍ Ůˆâ€ŹŘŒ 2001 -ICT-â€ŤŮˆâ€Ź2‍ ŰŒâ€Ź5‍ آ‏2 X5‍ ŘŞ ‏5 ‍ إ‏5(Z‍ أ‏65‍ ŮˆŘ°ďť?‏2001 ‍ م‏5 ‍ـ‏5 ‍؊‏25‍ ŰŒ ?ŮˆŮ„ ‏5S‍ اďť?‏Aâ€ŤŰŒâ€Ź25Q0 ! ‍اďť?‏ EED ‍ى‏2 ‍ اďť?‏%)(#‍م اďť?‏/‍أ ŰŒâ€Ź2‍ﺼ‏Xâ€ŤŮˆ‏.‍ ت‏/ ! ‍ ا ŘŞ Ůˆاďť?‏2‍ ŮˆزŰŒâ€Ź/ ‍ع‏/0‍اďť?)آ‏

5%)(#‍ ŘŞ اďť?‏5 ‍) آ‏5‍ ŘŞ &ﺥ‏5 ‍ ا‏5%)(‍ ه‏A5$9 5 #(‍( اďť?‏5$‍ب اďť?‏L5a 5‍ن ‏/5Q‍ ŘŞ ŘŁŮˆ أن ŰŒâ€Ź5 ‍< ا‏5 = 5 5%)(#‍)Ů… ‏590 ‍ن اďť?‏/Q‍ أن ŰŒâ€ŹU â€ŤŰŒâ€Ź ‍ن‏/5Q‍ زŮˆان ŰŒâ€Ź9 5$‍؍ اďť?‏Lb5‍ات اďť?‏/(5$‍ل اďť?‏L5‍ى ﺼ‏25‍ ŘŠ اﺼ‏5 ‍ اŮˆâ€Ź5 5 ‍ دع‏c5 ‍ل‏/5 ‍ ďť?‏5 ‍)م‏90‍ اďť?‏8F$‍ ŰŒâ€ŹA‍ )ŰŒ) Ůˆďť?‏F‍اďť?‏. â€ŤŰŒâ€Ź2 ‍ ďť? ! ŘŞ اďť?‏ . #( ! ‍ ŘŞ اďť?‏/‍ﺽ‏/ ‍( ŮˆŮ„ اﺥ) اďť?‏0 ‍ اﺚ Ůˆâ€ŹF‍اďť?‏

( Securing Wireless Communication Networks)

Q %L‍ ŘŞ ا ŘŞ اďť?‏QFe ‍ &‏-1

Businesses, individuals and public administrations still underestimate the risks of insufficiently protecting networks and information. However, as enterprises increasingly are using wireless devices to create and transmit new data and to access the most sensitive information sitting on their corporate servers, the risks are much greater, the stakes are much higher, and potential loss is much more catastrophic. A good research in this are could address on the following topics: 1- Cellular Mobile Security 2- Wireless LAN Security 3 – Bluetooth Security : ‍ـ ŘŞ ŮˆŘą ا‏ • • •

Identification of security threats and their risks Security techniques used in each type of network (e.g. : A3, A5, A8, IEEE802.1x (EAP), WEP, IEEE802.11i, WPA, ‌ , etc) Current status of wireless network vulnerability.

( Convergence of Communication Networks) ‍ ŘŞ ا ت‏QFe ‍ عب‏90‍ اďť?‏-2

In today's society one can communicate with a friend via mail, online chatting, fixed telephone, mobile phones and many other forms of modern technology. Though the forms of technology are all very different, they all essentially provide the same basic service: person-to-person communication. The


convergence is commonly used in reference to the synergistic combination of voice (and telephone features), data (and productivity applications) and video, onto a single network. These previously separate technologies are now able to share resources and interact with each other creating new efficiencies : ‍ ŘŞ ŮˆŘą ا‏ 1- Multiplay Convergence. • Identify the technological convergence. • Identify the Multiplay. • Multiplay concepts and technologies (DSL, Video On Demand, Video Conferencing ‌). • Benefits of Multiplay and what are the different types. • How to organize features, billing, control in case of Multiplay. • Your Suggestions. 2- Convergence between Communications & Broadcasting • Convergence between telecommunication and broadcasting • Impact of convergence on communication equipment • New services expected for broadcasting by convergence • Broadcast service delivery and billing • Challenges facing broadcasting service providers • Your suggestions.

‍آ ت‏2 0 ‍(ا Ů„ اďť? )ŰŒ)ŘŠ  ا ŘŞ اďť?‏3G LONG TERM EVOLUTION&BEYOND)-3 3G LTE, which stands for 3G Long Term Evolution, is being standardized by 3GPP and 3GPP2 and is often described as “3.9Gâ€?. It is a technology that will enable cellular networks to support up to 10 times higher data rate and more users than existing HSxPA networks. It will employ OFDM and MIMO technologies which will allow mobile operators to offer true “quad playâ€? services, i.e., voice, high-speed, IPTV and full mobility. 3G LTE is designed to provide a simple evolutionary path for UMTS operators as they migrate from UMTS to HSDPA to HSUPA and then onto 3G LTE, also called HSOPA. 4G is the successor to the wireless access technologies of the 3G era. To cater to the QoS and data rate requirements of the forthcoming applications such as High Definition TV and DVB, 3GPP and IEEE (which are along the 3GP working groups), have decided that 4G should be very spectrally efficient, should dynamically share and utilize the network resources, have a high data rate and capacity larger than 3G, have smooth handovers across heterogeneous networks, and should be based on an all-IP packet switched network. Several telecom equipment giants are currently testing 4G communication at 100Mbps while moving and 1Gbps while stationary. The submitted paper should consider the main issues of 3G LTE and 4G such as: • • • • • • • •

Give dentailed insight into the state of the technical art of 3G LTE and 4G mobile radio networks Illustrate the fundamental building blocks of 3G LTE/4G Show the 3G LTE /4G architecture Discuss the different protocols involved in achieving high data rates in 3G LTE/4G Show the operation principles of how OFDM, MIMO and SDR work Elements of the 3G LTE/4G air interface Operation of handovers over heterogeneous networks Evolution path to 4G services

Wireless Sensor Networks – ‍ – ŘŞ ا ŘŞ ا‏4 Wireless sensor networks (WSN) represent a special subset of wireless networks where the sensors act to collect data, that are to be forwarded to a collection point (a server). Due to the power limitation of such devices, the relatively high attenuation of the propagated signal, and in order to maximize the use of the shared resources, special Access Control and Routing algorithms have been proposed for WSN. Meanwhile, one of the popular applications for WSN is in Location Identification of the objects to which they are attached.


: тАл ┘И╪▒ ╪зтАм :2 тАл ╪зтАм3 тАл я║ПтАм5 (67тАл ╪з (! ┘И я║ХтАм5 тАл ╪г┘ИтАм4 тАл ╪г┘ИтАм3 !"#$ тАл "* ╪з ╪в(' ┘И╪з & ╪з я║╣ ╪зтАм╪М , тАл ╪г╪пя╗етАм2 тАл ┘ИтАм1 тАл ╪н ╪г┘Ж ┘К ╪з ╪зтАм 1. Present a survey of the various applications for which WSN is considered a viable and powerful candidate. 2. Present the general architecture for WSN and identify its various components and the function of each component. 3. Present a survey of the latest algorithms proposed for Access Control in WSN, identify which of them have been standardized, describe using appropriate methods the operation of such algorithms, and provide a simulation and/or analytic study in order to compare the performance of these algorithms. 4. Present a survey of the latest algorithms proposed for Routing in WSN, identify which of them have been standardized, describe using appropriate methods the operation of such algorithms, and present a simulation and/or analytic study in order to compare the performance of these algorithms. 5. Present a survey of the latest algorithms proposed for Location Identification in WSN, identify which of them have been standardized, describe using appropriate methods the operation of such algorithms, and provide a simulation and/or analytic study in order to compare the performance of these algorithms.

тАл╪з ) я╗бтАм/; ( SINGLE SPACE ) g;тАл ┘И╪▒тАм20 )тАл ┘И █МтАмg;тАл ┘И╪▒тАм15 9 FтАл ╪к ╪зя╗ЭтАмSтАл )╪п я║╣тАм-1 тАля╗е █МтАмhтАл ╪зтАмi тАл я╗ЭтАмFтАл┘Ж ╪зя╗ЭтАм/QтАл █МтАм-2 . g QтАл я╗ЭтАмg #(тАл ╪зя╗ЭтАмg($тАл╪и я╗ЭтАмLMтАл ) ; ) ╪зя╗ЭтАмS kтАл)╪▒█МтАм0тАл ╪зя╗ЭтАмl тАл ╪г ╪б ┘ЗтАмHтАл ╪птАм$тАл ╪и я╗б ╪гя║б) ╪зя╗ЭтАмMтАл я║етАмAтАл)█МтАм9 U тАл╪│ █МтАм/тАл╪▒█МтАм/тАл я╗ЭтАмQFтАл ╪зя╗ЭтАмF MтАл я╗ЭтАмgF$(тАл я╗ЭтАм-3 тАл ┘ДтАмQe gтАл! я╗етАм0% тАл ╪зтАм1тАл ╪▒ я╗бтАмQ тАл╪╢ ╪зтАм2 /тАля║╜тАм/тАл я╗бтАмL$ $ тАл┘Ж ┘З( ┘ГтАм/QтАл ┘И╪г┘Ж █МтАмFтАл)┘Б я╗б ╪зя╗ЭтАм#тАл)я╗б )╪п ╪зя╗ЭтАм9тАл я╗бтАмFтАл┘К ╪зя╗ЭтАм/0 тАл ╪г┘Ж █МтАмU тАл █МтАм-4 ( тАл)┘ЕтАм90 тАл╪з┘Ж ╪зя╗ЭтАм/( тАл я╗е ╪к ┘ИтАмg 90$тАл я╗бтАмg SтАл я║╣тАмFтАл ╪зя╗ЭтАм1тАл я╗бтАм8 2тАл )┘И█МтАмg тАл я╗етАмFтАл┘Е ╪зя╗ЭтАм/%2тАл┘И╪зя╗ЭтАм . F; тАл┘К я╗бтАм2тАл ╪гя║етАмH тАл ╪г┘И я║бтАм2 XтАл ╪г┘И ;)┘Е я╗бтАмg !тАл╪к ╪зя╗ЭтАмL тАл ╪гя║б) ╪зя╗ЭтАмF; тАл я╗бтАм2qтАл)┘Е ;) я╗етАм9 тАл ╪зя╗ЭтАмFтАл┘Ж ╪зя╗ЭтАм/QтАл ╪г █МтАмU тАл █МтАм-5 тАл ╪птАм0 тАл ╪зтАм8тАл я║б┘А┘А┘АтАмg ! тАл ┘Ия╗ЭтАмg ! тАл я╗ЭтАмg !тАл ╪зя╗ЭтАмg( тАл ┘И╪г ╪б ╪зя╗ЭтАмgтАл█МтАм2 тАл я╗Э я╗б! ╪к ╪зя╗ЭтАмg%)(#тАл ╪в ╪к ╪зя╗ЭтАмH' %тАл я╗б ╪гтАмg( тАл╪л я╗ЭтАм/ FтАл ╪зя╗ЭтАмA Q 0 тАл┘ЕтАм/9тАл █МтАм-1 . тАл ┘ЖтАмQ тАл)┘Е я╗Э ! ╪п ┘И╪зя╗ЭтАм90 тАл ╪зя╗ЭтАм2M=тАл ╪гя╗б ┘Е ╪зя╗Э ( ┘И█МтАмF тАл╪╢ я╗ЭтАм2 тАл)┘ЕтАм90 тАл я╗б ╪зя╗ЭтАмU MтАл ┘И█МтАм#(тАл╪зя╗ЭтАм тАл ╪▒тАмF0 hтАл ╪зтАмc тАл╪йтАм2тАл ╪зя╗Э я║╜тАмAтАл ┘АтАм9 'тАля║етАмXтАл ( )┘И█МтАмIEEE 1тАл я╗бтАм8 $(0тАл┘К ) я╗ЭтАм2 тАл ╪зя╗ЭтАм%)(#тАл┘Е ╪зя╗ЭтАм/тАл █МтАм#!тАл╪▓█МтАм/ тАл┘КтАм2 тАл ╪й ╪й █МтАмSтАл╪л ╪зя╗ЭтАм/ FтАл ╪зя╗ЭтАмI( -2 (тАл╪лтАм/ F тАл я╗ЭтАмc #(тАл ╪зя╗ЭтАмA 90тАл () ╪зя╗ЭтАм

! : c ? тАл╪л ╪г ╪л ┘З ╪втАмLZ $тАл╪з я║бтАм/ тАл; ╪зя╗ЭтАм тАл ╪з?┘И┘ДтАмS тАл┘Й я╗ЭтАм2 тАл я╗бтАмg ( 2000 -1 cтАл я╗етАмbтАл ╪зя╗ЭтАмS тАл┘Й я╗ЭтАм2 тАл я╗бтАмg ( 1500 -2 тАл я╗ЭтАмbтАл ╪зя╗ЭтАмS тАл┘Й я╗ЭтАм2 тАл я╗бтАмg ( 1000 -3 F% ( тАл ╪зя╗ЭтАмH'#тАл) я╗ЭтАм9!тАл ┘Д я║е ╪╡ █МтАмS0тАл ╪й ╪зя║бтАмSтАл╪л ╪зя╗ЭтАм/ FтАл╪з ╪зя╗ЭтАм/ 1тАл╪▓█МтАм/ A0 %тАл┘ИтАм

: тАл╪лтАм/ FтАл)┘Е я╗ЭтАм90тАл ╪зя╗ЭтАм-*: тАл я╗Э ) ╪зя╗ЭтАмA $ тАл╪л ╪г┘ИтАм/ FтАл ╪зя╗ЭтАм%2 -1 тАл╪п╪зя╗етАм/$тАл╪п я╗б )┘К ╪зя╗ЭтАм.тАл╪гтАм тАл╪г┘ИтАм тАл ╪зя╗Э )█М)┘КтАм2тАл ┘ЗтАмa тАл╪птАм/ тАл╪п я╗бтАм.тАл╪гтАм . H2тАл ┘ЗтАм9тАл ╪зя╗ЭтАмg!тАл тАУ я╗бтАмg%)(#тАл тАУ ╪в ╪зя╗ЭтАмg 2#QтАл┘Ия╗е ╪к ┘И╪з ╪к ╪зя╗ЭтАм20QтАл ╪з я╗ЭтАмA$; SSTE.ORGEG@GMAIL.COM ! тАл ╪зя╗Э= ╪╡ я╗ЭтАмcтАл┘Ия╗етАм20QтАля╗ЭтАмhтАл█М) ╪зтАм2FтАл ╪зя╗ЭтАм2F тАл┘Ия╗етАм20QтАл= ╪зя╗ЭтАм$тАл я╗етАм%2 -2 (melsoudani@yahoo.com) тАл╪п╪зя╗етАм/$тАл╪п я╗б )┘К ╪зя╗ЭтАм.тАл( ╪г┘И ╪гтАмhadidi@eun.eg) тАл╪п ╪зя╗Э )█М)┘КтАм/ тАл╪п я╗бтАм.тАл╪г┘И ╪гтАм 2009 /тАл я╗б █МтАм15 /тАл ╪з ╪л ┘ЗтАм9 0тАл ) я╗ЭтАм/тАл я╗бтАм2тАля║етАмvтАл┘ИтАм

╪М╪М╪М тАл ╪з ╪ктАм%)(# тАл я╗ЭтАмg !тАл ╪зя╗ЭтАмg ! тАл ( ╪к ╪зя╗ЭтАмU aтАл ╪гтАм1тАля╗бтАм тАл┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘А┘АтАм %)(тАл ┘ЗтАмA$; /(Melsoudani@yahoo.com) 0101768163 тАл╪п╪зя╗етАм/$тАл! ) ╪зя╗ЭтАм% тАл╪п я╗б )┘КтАм.тАл ╪гтАм-( Hadidi@eun.eg) 0101504699 тАл╪п ╪зя╗Э )█М)┘КтАм/ тАл╪п я╗бтАм.тАл ╪гтАм: тАл╪ктАмL%тАл╪зтАм2 тАл╪зя╗ЭтАм /тАл ┘ЕтАм-0122170009-3959999(02) wтАл█МтАм2; / тАл я╗б ) ╪гтАм/тАл ┘ЕтАм- 0122117247 тАл ╪п┘КтАмe/ тАл╪п ╪гтАм/ тАл я╗бтАм/тАл ┘ЕтАм-H2тАл ┘ЗтАм9тАл я╗б! ╪зя╗ЭтАм- g%)(#тАл ╪в ╪зя╗ЭтАм/ g 2#QтАл┘Ия╗е ╪к ┘И╪з ╪к ╪зя╗ЭтАм20Q тАл╪з я╗ЭтАм kтАл ( ) ╪втАмSSTE@EECD-CU.EDU.EG ) & .SSTE.ORGEG@GMAIL.COM ) ) тАл┘Ия╗етАм20Q тАл█М) ╪зя╗ЭтАм2 - 0102586038 ) тАл ) я╗бтАм$тАл ! ╪зя╗ЭтАмa WWW.SSTE.EG.ORG / WWW.eecd-cu.edu.eg/sste тАля╗етАм20тАл ╪з я╗етАмQFe g ! тАл ╪зя╗ЭтАм1;/тАл( я╗бтАм02)3939946


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.