Proceedings of the 2020 10th International Conference on Information Communication and Management, 2020
Internet of things (IoT) in recent years became widely spread over several applications, and use ... more Internet of things (IoT) in recent years became widely spread over several applications, and use different types of sensors, actuators and software tools. This paper focuses on DHT11 humidity and temperature sensor accuracy; many experiments were conducted to measure readings in different environments and on different sensors. Readings were uploaded over online server (thingSpeak), from NodeMCU ESP2566 board. Uploaded data were analyzed for different cases. Results showed that in normal conditions, the temperature variance between three sensors was below 0.3 Celsius degrees, and below 2% for humidity. But when added external source of heat and humidity for 10 minutes, the temperature variance increased to 1.4 Celsius degrees and 11% for humidity. To verify the measurements of temperature, an LM35 sensor was added to compare with DHT11 temperature readings, it was found that the readings were almost the same and difference is less than 0.8 Celsius degrees. It found that accuracy in DHT sensors is fair, especially with applications where readings change in a normal pattern. To alleviate error rate in fluctuating environments, averaging for multiple readings is required to get more accurate values.
2018 4th International Conference on Computer and Technology Applications (ICCTA), 2018
This paper aims to deploy a network that consists a group of computers connected with a microcomp... more This paper aims to deploy a network that consists a group of computers connected with a microcomputer with a camera. The system takes images of people, analyze, detect and recognize human faces using image processing algorithms. The system can serve as a security system in public places like Malls, Universities, and airports. It can detect and recognize a human face in different situations and scenarios. This system implements “Boosted Cascade of Simple Features algorithm” to detect human faces. “Local Binary Pattern algorithm” to recognize these faces. Raspberry Pi is the main component connected to a camera for image capturing. All needed programs were written in python. Tests and performance analysis were done to verify the efficiency of this system.
International Journal of Applied Mathematics Electronics and Computers, 2020
This paper aims to deploy a machine to control and monitor home devices, and to assist people who... more This paper aims to deploy a machine to control and monitor home devices, and to assist people who suffer from spinal cord injuries to control devices, such injuries cause people to lose their ability to use their body movements, normal people may use voice commands as well. The prototype used electrooculography (EOG) system [1, 2, 3]. The patients who suffer from spinal cord injuries may use this system to control household appliances and use the voice system to control home devices. This prototype use internet of things (IoT) technology through Wi-Fi and Arduino microcontroller to capture eye muscle movement signals, that are taken from patients, or voice signals to compare them with pre-recorded voice commands. Many tests have been made to assure correctness and speed using different environment parameters and conditions. The error rate was 2.5% for EOG and 1% for voice commands in the best cases. The idea could be developed further, smartphones and mobile data can be used for con...
Security System for Data using Steganography and Cryptography (SSDSC) is a set of hardware and so... more Security System for Data using Steganography and Cryptography (SSDSC) is a set of hardware and software components that will be used to send secured documents through the internet. Some of the software will be loaded into a microcontrollers in order to increase the complexity and security. The data will be encrypted using the Advanced Encryption Standard (AES) algorithm with a key from the Raspberry PI microcontroller and hide it inside an image using Least Significant Bit (LSB) algorithm, the data will be invisible. The image will be transmitted and received through the internet, the receivers will extract the hidden data from the image and decrypt it to have the original data with the image. Complicating the steps of hiding and encryption will reduce the possiblity of intrusin of secured documents, and the process will be trasparent to the user to increase security without affecting the normal steps and the behavior in secured documents exchange.
Proceedings of the 2020 10th International Conference on Information Communication and Management, 2020
Internet of things (IoT) in recent years became widely spread over several applications, and use ... more Internet of things (IoT) in recent years became widely spread over several applications, and use different types of sensors, actuators and software tools. This paper focuses on DHT11 humidity and temperature sensor accuracy; many experiments were conducted to measure readings in different environments and on different sensors. Readings were uploaded over online server (thingSpeak), from NodeMCU ESP2566 board. Uploaded data were analyzed for different cases. Results showed that in normal conditions, the temperature variance between three sensors was below 0.3 Celsius degrees, and below 2% for humidity. But when added external source of heat and humidity for 10 minutes, the temperature variance increased to 1.4 Celsius degrees and 11% for humidity. To verify the measurements of temperature, an LM35 sensor was added to compare with DHT11 temperature readings, it was found that the readings were almost the same and difference is less than 0.8 Celsius degrees. It found that accuracy in DHT sensors is fair, especially with applications where readings change in a normal pattern. To alleviate error rate in fluctuating environments, averaging for multiple readings is required to get more accurate values.
2018 4th International Conference on Computer and Technology Applications (ICCTA), 2018
This paper aims to deploy a network that consists a group of computers connected with a microcomp... more This paper aims to deploy a network that consists a group of computers connected with a microcomputer with a camera. The system takes images of people, analyze, detect and recognize human faces using image processing algorithms. The system can serve as a security system in public places like Malls, Universities, and airports. It can detect and recognize a human face in different situations and scenarios. This system implements “Boosted Cascade of Simple Features algorithm” to detect human faces. “Local Binary Pattern algorithm” to recognize these faces. Raspberry Pi is the main component connected to a camera for image capturing. All needed programs were written in python. Tests and performance analysis were done to verify the efficiency of this system.
International Journal of Applied Mathematics Electronics and Computers, 2020
This paper aims to deploy a machine to control and monitor home devices, and to assist people who... more This paper aims to deploy a machine to control and monitor home devices, and to assist people who suffer from spinal cord injuries to control devices, such injuries cause people to lose their ability to use their body movements, normal people may use voice commands as well. The prototype used electrooculography (EOG) system [1, 2, 3]. The patients who suffer from spinal cord injuries may use this system to control household appliances and use the voice system to control home devices. This prototype use internet of things (IoT) technology through Wi-Fi and Arduino microcontroller to capture eye muscle movement signals, that are taken from patients, or voice signals to compare them with pre-recorded voice commands. Many tests have been made to assure correctness and speed using different environment parameters and conditions. The error rate was 2.5% for EOG and 1% for voice commands in the best cases. The idea could be developed further, smartphones and mobile data can be used for con...
Security System for Data using Steganography and Cryptography (SSDSC) is a set of hardware and so... more Security System for Data using Steganography and Cryptography (SSDSC) is a set of hardware and software components that will be used to send secured documents through the internet. Some of the software will be loaded into a microcontrollers in order to increase the complexity and security. The data will be encrypted using the Advanced Encryption Standard (AES) algorithm with a key from the Raspberry PI microcontroller and hide it inside an image using Least Significant Bit (LSB) algorithm, the data will be invisible. The image will be transmitted and received through the internet, the receivers will extract the hidden data from the image and decrypt it to have the original data with the image. Complicating the steps of hiding and encryption will reduce the possiblity of intrusin of secured documents, and the process will be trasparent to the user to increase security without affecting the normal steps and the behavior in secured documents exchange.
Uploads
Papers by Ayman Wazwaz