Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
  • Egypt
Current Online Social Networks (OSNs) use a centralized architecture that aggregates the user’s data at the provider’s servers. Such setup makes the provider actually own user’s data, which could represent a privacy violation for the... more
Current Online Social Networks (OSNs) use a centralized architecture that aggregates the user’s data at the provider’s servers. Such setup makes the provider actually own user’s data, which could represent a privacy violation for the users. Peer-to-peer Online Social Networks (P2P OSNs) could be an alternative to such centralized paradigm. Nevertheless, P2P OSNs still have its own technical challenges such as data access management. In this paper, a model for secure data access management in P2P OSNs is proposed. This model focuses on reducing the cost of access revocation in terms of network and computational resources compared to other P2P OSNs models. Moreover, it supports all the basic features of modern OSNs. Analysis and simulation show the superiority of this model in access revocation cost compared to other P2P OSNs models, and a comparable performance for other functions.
Internet of Things (IoT) is considered very widely spread in these days application and technology, which means a huge amount of data will need to be exchanged between devices and applications domains., For example, a weather application... more
Internet of Things (IoT) is considered very widely spread in these days application and technology, which means a huge amount of data will need to be exchanged between devices and applications domains., For example, a weather application needs to communicate with a traffic application. Data between both applications need to be interpreted and to be interoperable in both applications. These applications are based on domain-specific, which means there is no domain interoperability. As a result, some developers and users took the web approach to find an easy solution that can be offered from the web itself, which leads to the Web of Things (WoT). But as with most recommendations in the web community, if data interoperability is needed as part of your implementation, you need to use Semantic Web as an approach that leads to a combined approach called Semantic Web of Things (SWoT). However, not every developer and user are having experience with Semantic Web standards such as RDF, Turtle, RDF/XML, SPARQL, OWL, etc. This paper proposes WOTJD for WoT using JavaScript Object Notation Linked Data (JSON-LD). WOTJD helps IoT users to overcome the main challenges of data interoperability in WOT by helping in (1) Design and integrate WOT applications, (2) IoT data parsing and annotation, and (3) Linking domains with each other (by using domain knowledge expertise), A case study of solving interoperability between smart cars and weather domain through a mobile application is presented, and performance evaluation has been performed, Experimental results show how fast is WOTJD framework against the sensor data size.
Cloud computing is widely used in businesses as it increases efficiency, helps improve cash flow and offers many services. Cloud services allow individuals and businesses to use software and hardware that are managed by third parties at... more
Cloud computing is widely used in businesses as it increases efficiency, helps improve cash flow and offers many services. Cloud services allow individuals and businesses to use software and hardware that are managed by third parties at remote locations. Intelligent agent is a smart software program that is capable of taking flexible actions in some dynamic environments. A Multi agent system has more than one agent interacting with each other to cooperate, coordinate and negotiate, for solving a particular problem. Utilizing Multi Agent technologies allow clouds to be more flexible and more autonomous. This paper discuss the cloud computing environment and multi agent concept. It attempts to classify research papers in this area showing how agents help cloud through cloud services life cycle. A brief analysis of some research papers in different categories paving the way for open research points in this area.
Localization systems for wireless sensor networks are complex systems that have many applications in real life. In this dissertation, an efficient localization system tailored for wireless sensor networks is proposed. The system is... more
Localization systems for wireless sensor networks are complex systems that have many applications in real life. In this dissertation, an efficient localization system tailored for wireless sensor networks is proposed. The system is comprised of four subparts that work together to perform target ...
Research Interests:
Peer-to-peer (P2P) systems have emerged as a cheap, scalable and self-repairing file sharing, backup/storage and video on-demand (VoD) solutions. Such distributed systems rely on data fragmentation and distributed storage of data over... more
Peer-to-peer (P2P) systems have emerged as a cheap, scalable and self-repairing file sharing, backup/storage and video on-demand (VoD) solutions. Such distributed systems rely on data fragmentation and distributed storage of data over multiple peers. Files are usually partitioned into fixed-size blocks that are themselves partitioned into fragments. In such systems, some peers (clients) exploit the power of parallelism to download blocks/fragments of data stored in a distributed way over some other peers (servers). This idea is deployed even over a network of servers (mirrors and cache) to reduce download time. Determining response times in parallel downloading with capacity constraints on both the client downloads and server uploads is then an important measure of the quality of the service given by these systems. This download time depends on the throughput of the different connections created to obtain the fragments of the given file. This paper enriches the literature with a simple stochastic model of the download process in such large and complex systems. In particular, it characterizes the response time performance metric and assesses its expectation through Markovian model and validates the study through the packet level Network Simulator NS-2. The relative error between the numerical results of the proposed model and the result of the simulation is reported. The comparison shows that the Model characterizes with high accuracy the response time under realistic assumptions.
This paper describes a new approach for utilizing genetic algorithms to solve High-Level Synthesis tasks with multiple voltages. The novelty of the method lies in its approach for modeling and encoding the resulting chromosomes. The... more
This paper describes a new approach for utilizing genetic algorithms to solve High-Level Synthesis tasks with multiple voltages. The novelty of the method lies in its approach for modeling and encoding the resulting chromosomes. The proposed system receives a control/data flow graph, ...
Presents a range of CAD algorithms and techniques for synthesizing and optimizing interconnect Provides insight & intuition into layout analysis and optimization for interconnect in high speed, high complexity integrated circuits
Research Interests:
... Zaher Merhi, Milad Ghantous, Mohammad Elgamel, Magdy Bayoumi, And Ayman El-Desouki University ofLouisiana at Lafayette, National Electronic Research Institute tzmm2571, mmg4545, mas8520, mab}@ cacs. louisiana. edu,... more
... Zaher Merhi, Milad Ghantous, Mohammad Elgamel, Magdy Bayoumi, And Ayman El-Desouki University ofLouisiana at Lafayette, National Electronic Research Institute tzmm2571, mmg4545, mas8520, mab}@ cacs. louisiana. edu, adesouki@msit.gov.eg Abstract ...
Reliable remote measuring of flow meters for the petroleum gas industry is proposed in this work. The monitoring of flow rates and the total amount of the fluid flow is collected using a manual process. The main goal of this work is to... more
Reliable remote measuring of flow meters for the petroleum gas industry is proposed in this work. The monitoring of flow rates and the total amount of the fluid flow is collected using a manual process. The main goal of this work is to implement a mechanism that avoids human error and achieves reliable, continuous, and accurate monitoring. We employed the
Frequency-Domain Motion Estimation (FD-ME) evolved as a technique that would greatly reduce ME computations and the whole encoding time. In Dynamic Padding FD-ME (DP-FD-ME), a dynamic padding threshold adaptively selects the proper search... more
Frequency-Domain Motion Estimation (FD-ME) evolved as a technique that would greatly reduce ME computations and the whole encoding time. In Dynamic Padding FD-ME (DP-FD-ME), a dynamic padding threshold adaptively selects the proper search area size according to a pre-estimated set of motion vectors. The main drawback of DP is the mismatched transformed search area formed from different consecutive transformed blocks
Power consumption is very critical for portable video applications. During compression, the motion estimation unit consumes the largest portion of power since it performs a huge amount of computation. Different low power architectures for... more
Power consumption is very critical for portable video applications. During compression, the motion estimation unit consumes the largest portion of power since it performs a huge amount of computation. Different low power architectures for implementing the full-search block-matching (FSBM) motion estimation are discussed. Also, architectural enhancements to further reduce the power consumed during FSBM motion estimation without sacrificing throughput or optimality are presented. The proposed approach achieves these power savings by disabling portions of the architecture that perform unnecessary computations. A comparison between the different architectures including our enhancements and others is presented using simulation and analytical analysis. Different benchmarks are used to test and compare the discussed architectures. Analytical and simulation results show the effectiveness of the enhancements.
Abstract— Reliable sand detection is an important component of oil production system. In practice, produced sand in oil pipelines poses a serious problem in many production situations, since a small amount of sand in the produced fluid... more
Abstract— Reliable sand detection is an important component of oil production system. In practice, produced sand in oil pipelines poses a serious problem in many production situations, since a small amount of sand in the produced fluid can result in significant ...
Event-based systems are typically characterized by having long periods of sleep and short abrupt periods of high data traffic when an event is detected. High throughput event-based sensor network applications are severely limited by the... more
Event-based systems are typically characterized by having long periods of sleep and short abrupt periods of high data traffic when an event is detected. High throughput event-based sensor network applications are severely limited by the medium access control layer. EVA-MAC is a medium access control that is tailored specifically for event based systems. In event-based systems, multiple sensors that are
Research Interests:
... Yasser Ismail, Mohamed Elgamel, J.Luis Tecpanecatl-Xihuitl, and Magdy Bayoumi The ... To reduce the complexity of the motion estimation process, adaptive block size phase correlation motion estimation (ABS-PC-ME) technique using... more
... Yasser Ismail, Mohamed Elgamel, J.Luis Tecpanecatl-Xihuitl, and Magdy Bayoumi The ... To reduce the complexity of the motion estimation process, adaptive block size phase correlation motion estimation (ABS-PC-ME) technique using several prediction techniques ...
Node localizations techniques are a critical part in many wireless sensor network (WSN) applications. There are several challenges for building an efficient localization system that is suitable for wireless sensor networks, mainly,... more
Node localizations techniques are a critical part in many wireless sensor network (WSN) applications. There are several challenges for building an efficient localization system that is suitable for wireless sensor networks, mainly, reducing computational complexity and communication overhead. For example, solving an over constraint set of linear equations via least square approximations and utilizing square root operations are computationally intensive.
... Muhieddine ElKaissi, Mohamed Elgamel, and Magdy Bayoumi The Center for Advanced Computer Studies University of Louisiana at Lafayette PO Box 44330, Lafayette ... The use of landmarks is fundamental in topological navigation of mobile... more
... Muhieddine ElKaissi, Mohamed Elgamel, and Magdy Bayoumi The Center for Advanced Computer Studies University of Louisiana at Lafayette PO Box 44330, Lafayette ... The use of landmarks is fundamental in topological navigation of mobile robots [4], [5], [6]. Onone hand, they ...
Abstract: The International Center of Excellence in Software Engineering (ICESE) is a multifaceted center that aims at establishing active programs in research, outreach, and education. The significance of this center relies on its goal... more
Abstract: The International Center of Excellence in Software Engineering (ICESE) is a multifaceted center that aims at establishing active programs in research, outreach, and education. The significance of this center relies on its goal of bringing together on a tightly coupled fashion, and on a weekly or bi weekly basis through virtual meeting environments, researches from the Arab world and international researchers to work on projects that advance the state of the art in software engineering. The center focuses on applying ...
Abstract Reliable remote measuring of flow meters for the petroleum gas industry is proposed in this work. The monitoring of flow rates and the total amount of the fluid flow is collected using a manual process. The main goal of this work... more
Abstract Reliable remote measuring of flow meters for the petroleum gas industry is proposed in this work. The monitoring of flow rates and the total amount of the fluid flow is collected using a manual process. The main goal of this work is to implement a mechanism that avoids human error and achieves reliable, continuous, and accurate monitoring.
Frequency-Domain Motion Estimation (FD-ME) evolved as a technique that would greatly reduce ME computations and the whole encoding time. In Dynamic Padding FD-ME (DP-FD-ME), a dynamic padding threshold adaptively selects the proper search... more
Frequency-Domain Motion Estimation (FD-ME) evolved as a technique that would greatly reduce ME computations and the whole encoding time. In Dynamic Padding FD-ME (DP-FD-ME), a dynamic padding threshold adaptively selects the proper search area size according to a pre-estimated set of motion vectors. The main drawback of DP is the mismatched transformed search area formed from different consecutive transformed blocks
We present various systolic architectures for full search block matching motion estimation. Along with one dimensional (N PE's) and two dimensional (N2 PE's) systolic array architectures using 2N, 3N,... ...., N2-N processing... more
We present various systolic architectures for full search block matching motion estimation. Along with one dimensional (N PE's) and two dimensional (N2 PE's) systolic array architectures using 2N, 3N,... ...., N2-N processing elements are also presented. Each of the architectures is analyzed and then compared with others in terms of power consumption, area, delay and noise. Simulation and analysis results
The migration to using ultra deep sub-micron (UDSM) process, 0.25 µm or below, necessitates new design methodologies and EDA tools to address the new design challenges. One of the main challenges is noise. All different types of deep... more
The migration to using ultra deep sub-micron (UDSM) process, 0.25 µm or below, necessitates new design methodologies and EDA tools to address the new design challenges. One of the main challenges is noise. All different types of deep submicron noise such as cross talk, ...
Abstract—Motion estimation (ME) plays an important role in modern video coders since it consumes approximately 60–80% of the entire encoder's computations. In this paper, three novel techniques are proposed to... more
Abstract—Motion estimation (ME) plays an important role in modern video coders since it consumes approximately 60–80% of the entire encoder's computations. In this paper, three novel techniques are proposed to effectively speed up the ME process. First, a smart prediction technique ...
Abstract—Scaling down to deep submicrometer (DSM) tech-nology has made noise a metric of equal importance as compared to power, speed, and area. Smaller feature size, lower supply voltage, and higher frequency are some of the... more
Abstract—Scaling down to deep submicrometer (DSM) tech-nology has made noise a metric of equal importance as compared to power, speed, and area. Smaller feature size, lower supply voltage, and higher frequency are some of the characteristics for DSM circuits that make ...
H.264/AVC is a new video coding standard of the ITU-T video coding expert group which has a significant improvement in the rate distortion efficiency compared with the previous standards. However, there is an exhaustive motion search... more
H.264/AVC is a new video coding standard of the ITU-T video coding expert group which has a significant improvement in the rate distortion efficiency compared with the previous standards. However, there is an exhaustive motion search across multiple block sizes and multiple reference frames leading to a linear increase in processing time. Although, the encoding quality is improved, the complexity of the encoder and computational cost are also increased at the same time. In this paper, we reduce the computational cost by reducing the number of candidate pixels required for the sum of absolute difference for each block (SAD) using two early stop search techniques. These techniques are applied on two scan search patterns (raster and spiral search patterns) and compared with the conventional full search (FS), three step search (TSS), and diamond search (DS) algorithms. Results show that there is at least 98% reduction in computations with a maximum loss of 0.1 dB compared with the conventional FS algorithm.
Abstract—For JPEG2000 real-time applications, Embedded Block Coding with Optimized Truncation (EBCOT) is a time-consuming part and becoming a bottleneck for the entire system throughput. Since Arithmetic Encoder (AE) is one part of EBCOT,... more
Abstract—For JPEG2000 real-time applications, Embedded Block Coding with Optimized Truncation (EBCOT) is a time-consuming part and becoming a bottleneck for the entire system throughput. Since Arithmetic Encoder (AE) is one part of EBCOT, low performance of AE ...
This paper describes a new approach for utilizing genetic algorithms to solve high-level synthesis tasks with multiple voltages. The novelty of the method lies in its approach for modeling and encoding the resulting chromosomes. The... more
This paper describes a new approach for utilizing genetic algorithms to solve high-level synthesis tasks with multiple voltages. The novelty of the method lies in its approach for modeling and encoding the resulting chromosomes. The proposed system receives a control/data flow graph, hardware library, and the constraints for area, time, and power as inputs. It then uses this information to concurrently solve the scheduling, binding, and allocation problems in order to generate a solution optimized for average and peak power. The new formulation eliminates the need to check for a valid schedule since it always generates a valid one. This leads to a simple evaluation function and a quick solution. The evaluation function is a mix of constraints satisfaction and a consideration of average and peak power. Simulation results show that the lower power solutions are obtained in a reasonable CPU time, which is in the range of seconds.
Page 1. Enhanced Low Power Motion Estimation VLSI Architectures for Video Compression Mohamed A. Elgamel, Ahmed M. Shams', Xi Xueling, and Magdy A. Bayoumi The Center for Advanced Computer Studies, University ...
Efficiency in any wireless sensor based application relies significantly on the medium access control it implements. It is not likely that we will see in the near future a unified MAC protocol for wireless sensor networks that is suitable... more
Efficiency in any wireless sensor based application relies significantly on the medium access control it implements. It is not likely that we will see in the near future a unified MAC protocol for wireless sensor networks that is suitable for all wireless sensor applications. In this context, we propose an event based medium access control (EB-MAC) that is tailored for event based systems. Typically, event based systems are characterized by having long periods of inactivity and short abrupt periods of high data contention when an event is detected. High data traffic is generated simultaneously from all sensors detecting the event to deliver captured data. EB-MAC arranges data transfer dynamically using an election based scheduling technique. When data transfer begins, each sensor at a time starts sending data packets in a contention free environment. The protocol is implemented on MicaZ sensor motes where it showed efficiency in reliability, throughput and energy conservation. The algorithm is compared with an implementation of B-MAC with RTS/CTS on MicaZ where it showed its superiority in throughput and latency.
Page 1. IEICE TRANS. INF. & SYST., VOL.E88–D, NO.7 JULY 2005 1501 PAPER Special Section on Recent Advances in Circuits and Systems Noise Metrics in Flip-Flop Designs ∗ Mohammed A. ELGAMEL †a) , Md Ibrahim FAISAL † ,... more
Page 1. IEICE TRANS. INF. & SYST., VOL.E88–D, NO.7 JULY 2005 1501 PAPER Special Section on Recent Advances in Circuits and Systems Noise Metrics in Flip-Flop Designs ∗ Mohammed A. ELGAMEL †a) , Md Ibrahim FAISAL † , and Magdy A. BAYOUMI † , Nonmembers ...
Abstract The extensive use of a dynamic circuit techniques for higher performance has already been implemented in many circuits like microprocessors. With the scaling down to deep submicron technology and the move towards dynamic circuit... more
Abstract The extensive use of a dynamic circuit techniques for higher performance has already been implemented in many circuits like microprocessors. With the scaling down to deep submicron technology and the move towards dynamic circuit techniques, noise ...
Dynamic Block Size Motion Estimation (DBS-ME) and smart Dynamic Early Search Termination (DEST) techniques are proposed and implemented in this paper. Both of the proposed techniques are combined and applied to the conventional phase... more
Dynamic Block Size Motion Estimation (DBS-ME) and smart Dynamic Early Search Termination (DEST) techniques are proposed and implemented in this paper. Both of the proposed techniques are combined and applied to the conventional phase correlation technique. The performance, visual quality and complexity of the proposed techniques are compared to that of the original phase correlation motion estimation (PC-ME) and Full Search Block Matching (FSBM) techniques. The proposed techniques provide an increase in the encoding quality besides a decrease in the computational complexity of ME process. Results show that there is approximately 100% of the stationary blocks decided by the FSBM algorithm are discovered correctly which consequently reduce the computations compared with the original FS and PC techniques. Also it is noted that, DBS-ME technique greatly decreases the computations required for ME process by decreasing the required padding to one or two pixels for both the current and the reference blocks. In addition, the motion field of the proposed algorithm gives much lower entropy than PC-ME which means more reduction in the transmitted bit rate.
In ultra deep submicron (UDSM) circuit design, the interconnect delay and noise have become the dominant factors in determining circuit performance. Analytical expressions are preferred because simulation is always expensive and... more
In ultra deep submicron (UDSM) circuit design, the interconnect delay and noise have become the dominant factors in determining circuit performance. Analytical expressions are preferred because simulation is always expensive and ineffective in use with modern designs containing millions of transistors and wires. However, analytical expressions are not sufficiently accurate and do not consider all of interconnect and driver parameters.
Abstract—A low cost target localization algorithm is developed for wireless sensor networks based on acoustic signals. When an object is detected, each sensor will start delay calculations to estimate the TDOA (time difference of arrival)... more
Abstract—A low cost target localization algorithm is developed for wireless sensor networks based on acoustic signals. When an object is detected, each sensor will start delay calculations to estimate the TDOA (time difference of arrival) of the target in hand with respect to each sensor. ...
With high clock frequencies, faster transistor rise/fall time, long signal wires, the use of wider wires and Cu material interconnects, the decreased spacing between adjacent wires, and the increased aspect ratio, the crosstalk noise is... more
With high clock frequencies, faster transistor rise/fall time, long signal wires, the use of wider wires and Cu material interconnects, the decreased spacing between adjacent wires, and the increased aspect ratio, the crosstalk noise is becoming an important design metric in digital circuits. For a risk-free layout solution of a chip, capacitive and inductive noises should be considered at various routing process stages. A formulation and efficient solution for the min-area spacing problem to satisfy maximum reliability in multiple coupled nets is provided. The noise model used can handle different wire widths, different spacing among wires, and different wire lengths. Experimental results show that the proposed framework redistributes the spacing among neighboring wires to achieve maximum reliability through the minimization of the maximum crosstalk noise in nets.
Abstract—Efficient target localization in wireless sensor networks is a complex and challenging task. Many past assumptions for target localization are not valid for wireless sensor networks. Limited hardware resources, energy... more
Abstract—Efficient target localization in wireless sensor networks is a complex and challenging task. Many past assumptions for target localization are not valid for wireless sensor networks. Limited hardware resources, energy conservation, and noise disruption due to ...

And 14 more