Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Wael Elmedany

    Wael Elmedany

    Replacing the normal electricity and water meters with smart ones is one of the major transformations toward smart cities in the Kingdom of Bahrain. This transformation eliminates the need for manual reading and the estimated monthly... more
    Replacing the normal electricity and water meters with smart ones is one of the major transformations toward smart cities in the Kingdom of Bahrain. This transformation eliminates the need for manual reading and the estimated monthly billing values. The current approach of the system infrastructure is having the smart meters connected to a network and communicates with a server which reads the data from the meters on periodic times. The current system requires the connection to be active and the servers to be turned on all the time or at least for the time taken to connect to all meters or when any request is received from a user. Our proposed solution benefits from the server-less infrastructure which uses cloud managed services to eliminate the need for the server-based infrastructure. The proposed solution minimize the computing to its minimum requirement while enhancing the security for the system. In this paper, we are discussing the current system and the related issues with the required resources. Also, we are presenting the proposed system while comparing both systems for the used resources, security, complexity, availability, maintenance requirement, and reliability.
    There is a big demand for remote locations quality healthcare system and technological advancements in the field of medical electronics and mobile communication can help in providing quality monitoring as well as decreasing the cost of... more
    There is a big demand for remote locations quality healthcare system and technological advancements in the field of medical electronics and mobile communication can help in providing quality monitoring as well as decreasing the cost of healthcare.This paper introduces a real time low cost Smartphone based heart disease monitoring system. The proposed monitoring system extracts the ECG signal from the patient, sends it through the Internet and storesit inthe hospital server.The system implements anapplication based on Android platform to provide online information about the patient status such as the patient's heart beat rate, ECG, patient history and provides new reading every 30 minutes. The systemalso processesthe ECG using MATLAB to detect any abnormality and alerts the doctor and hospital by sending email and SMS message if any abnormality is detected. The system enables doctors to remotely follow-up the status of their patients using their smart phones. The system was teste...
    The identification of malicious network traffic through intrusion detection systems (IDS) becomes very challenging. This malicious network appears as a network protocols or normal access. In this paper, for the classification of... more
    The identification of malicious network traffic through intrusion detection systems (IDS) becomes very challenging. This malicious network appears as a network protocols or normal access. In this paper, for the classification of cyberattacks, four different algorithms are used on UNSW-NB15 dataset, these methods are naive bays (NB), Random Forest (RF), J48, and ZeroR. Also, K-MEANS and Expectation Maximization (EM) clustering algorithms are used to cluster the UNSW-NB15 dataset into two clusters depending on the target attribute attack, or normal network traffic. To develop an optimal subset of features, Correlation-based Feature Selection (CFS) is used, then the mentioned classification and clustering techniques are used. The used methods gives an efficient tool for studying and analyzing intrusion detection in large networks. The result show that RF and J48 algorithms performed best results with 97.59%, and 93.78%, respectively.
    Field of electronics engineering is the most captivatingamong students, researchers and academicians now-adays.With the passage of time the requirement of advance toolsfor engineering is increasing. Many institutions and... more
    Field of electronics engineering is the most captivatingamong students, researchers and academicians now-adays.With the passage of time the requirement of advance toolsfor engineering is increasing. Many institutions and universitiesaround the globe provide quality education to various engineeringdomain. Students although study theory courses but they alsoneed exposure that how theory can be related to actual devices.Simulations play an important role for relating theoretical componentsto the virtual practical environment. Students of RadioFrequency (RF) domain and especially students that are studyingMicroelectromechanical Systems (MEMS) as courses, due to theextreme complexity of these devices, students need multiple toolsto simulate the performance parameters. This paper highlightsthe most prominent tools that are used in the industry to designand implement RF MEMS structures. The role of Electromagnetic(EM) solvers and Finite Element Modeller (FEM) and itsimpact on electronics e...
    Research Interests:
    This paper presents a reconfigurable IP (intellectual property) core design and FPGA (field programmable gate arrays) hardware implementation of IEEE 802.3 and IEEE 802.5 systems, to be used for the serial data transmission and reception... more
    This paper presents a reconfigurable IP (intellectual property) core design and FPGA (field programmable gate arrays) hardware implementation of IEEE 802.3 and IEEE 802.5 systems, to be used for the serial data transmission and reception of a built in wireless transceiver system for Xilinx development boards. Today there are many applications that use wireless communications with FPGA development boards. The objective of this paper is to design a reconfigurable IP core design for IEEE 802.3 standard that can be used with different wireless applications. VHDL (vhsic hardware description language) has been used for describing the hardware of the circuit and FPGA has been used for targeting the hardware implementation. The data rate can be easily reconfigured for different baud rate based on the application used and the interfaced device.
    Research Interests:
    Research Interests:
    Purpose – The purpose of this paper is to present a development to the hardware and software of a real-time tracking system that provides the position of the tracked vehicle accurately using fairly low-cost equipment and services. Vehicle... more
    Purpose – The purpose of this paper is to present a development to the hardware and software of a real-time tracking system that provides the position of the tracked vehicle accurately using fairly low-cost equipment and services. Vehicle tracking industries are expanding as businesses are interested to know their fleet vehicles positions minute by minute every day. Many systems were proposed recently that can provide such information. Design/methodology/approach – The system is implemented using GM862 cellular quad band module. A monitoring server and a graphical user interface on a Web site have also been implemented to view the current location of a vehicle on a specific map. Findings – The experiments were conducted and tested in different areas of the Kingdom Of Bahrain using Google maps, and results are discussed. Originality/value – The developed system has been compared to the available and imported tracking systems to some of the telematics companies in Bahrain, and the com...
    ... Reyadh Al-Hakim, Sufyan Al-Irhayim, and Mustafa Nousif Computer Engineering Department University Of Bahrain, 32038 Bahrain ... The materials in this paper are organized as follows; tracking system architecture is presented in section... more
    ... Reyadh Al-Hakim, Sufyan Al-Irhayim, and Mustafa Nousif Computer Engineering Department University Of Bahrain, 32038 Bahrain ... The materials in this paper are organized as follows; tracking system architecture is presented in section two. ...
    Research Interests:
    The aim of this paper is to present and discuss issues related to the telematics business and management in Bahrain. Telematics is a part of Information and Communication Technologies (ICT), which plays a major role in the economic... more
    The aim of this paper is to present and discuss issues related to the telematics business and management in Bahrain. Telematics is a part of Information and Communication Technologies (ICT), which plays a major role in the economic development of countries. Telematics applications are becoming increasingly important in modern transportation to increase reliability, safety and security of both vehicles and drivers. There are many applications for telematics; some of these applications are telematics for educations, telematics for health, and vehicle telematics. One of the most important applications of telematics is vehicle telematics, which includes vehicle tracking, fleet management, container tracking, trail tracking. In this paper we are focusing on vehicle telematics business and management in Bahrain market.
    ABSTRACT A novel full search motion estimation co-processor architecture design is presented in this paper. The proposed architecture efficiently reuses search area data to minimize memory I/O while fully utilizing the hardware resources.... more
    ABSTRACT A novel full search motion estimation co-processor architecture design is presented in this paper. The proposed architecture efficiently reuses search area data to minimize memory I/O while fully utilizing the hardware resources. A smart processing element (PE) and an efficient simple internal memory are the main components of the proposed co-processor. An efficient algorithm is used for loading both the current block and the search area inside the PE array. The search area data flow horizontally while the current block data are stationary. As a result, the speed of the co-processor is improved in terms of the throughput and the operating frequency compared to the state-of-the-art techniques. A smart local memory and PE design guarantees a simple and a regular data flow. The design of the local memory is implemented using only registers and a simple counter. This simplifies the design by avoiding the use of complicated addressing to write or read into/from the local memory. The proposed architecture is implemented using both the FPGA and the ASIC flow design tools. For a search range of 32 × 32 and block size of 16 × 16, the architecture can perform motion estimation for 30 fps of HDTV video at 350 MHz and easily outperforms many fast full search architectures.
    This paper introduces an idea of mobile applications for hardware learning laboratory. It can be used to deliver the hardware courses laboratory as M-learning courses. Much work has been done for developing the hardware design... more
    This paper introduces an idea of mobile applications for hardware learning laboratory. It can be used to deliver the hardware courses laboratory as M-learning courses. Much work has been done for developing the hardware design laboratories as electronic learning for delivering the hardware courses as full E-learning courses. This paper introduces a digital design lab as a mobile application to be used for M-learning courses. Using the introduced idea, the students can get a full access to the hardware laboratory tools through mobile applications. The students can also design, implement, test, and verify the results of the hardware experiments, remotely.
    ABSTRACT This paper presents the hardware design and implementation of a car-like mobile robot that work in an efficient way. The robot is programmed to avoid colliding with obstacles in its way by the aid of ultrasonic sensors. It will... more
    ABSTRACT This paper presents the hardware design and implementation of a car-like mobile robot that work in an efficient way. The robot is programmed to avoid colliding with obstacles in its way by the aid of ultrasonic sensors. It will change its path if the connected sensors detect an obstacle. After passing the obstacle, the robot will continue on its original path. The system was designed using VHDL in a high level design method. All parts of the design have been simulated and implemented using Xilinx tools. The system was tested in both simulation level using ModelSim and hardware level using Xilinx Spartan 3 AN development board.
    ... 60% (NORMAL HUMidiTy) Page 4. IV. COCLUSIONS AND FUTURE WORK An FPGA hARdWARE dESign iMPLEMEnTATiOn Of REMOTE SEnSing SySTEM fOR hUMidiTy And TEMPERATUREBASEd On USing GSM hAS BEEn inTROdUCEd in ThiS ARTiCLE. ...
    ... The system works as a remote sensing for the electrical appliances at home to check whether it is on or off, at the same time the user can control the electrical appliances at home by sendingSMS ( Short Messaging Service) message to... more
    ... The system works as a remote sensing for the electrical appliances at home to check whether it is on or off, at the same time the user can control the electrical appliances at home by sendingSMS ( Short Messaging Service) message to the system, for example ...
    Purpose – With the rapid development in wired and wireless networks, the demand for network security system is rising rapidly due to more and more new applications introduced. The main factors that rate the encryption algorithms are its... more
    Purpose – With the rapid development in wired and wireless networks, the demand for network security system is rising rapidly due to more and more new applications introduced. The main factors that rate the encryption algorithms are its ability to secure and protect data against attacks, its speed and efficiency. In this paper, a reconfigurable network security design using multi-mode data encryption standard (DES) algorithm has been implemented with low complexity and low cost, which will also reduce the speed. The paper aims to discuss these issues. Design/methodology/approach – The design can be easily reconfigured to 3DES (triple DES) which is more secure and more powerful in encryption and decryption, as one of the trick in designing 3DES is to reuse three instances of DES. The design can be used for wired and wireless network applications, and it has been described using VHDL and implemented in a reconfigurable Programmable System-on-Chip (PSoC). The hardware implementation ha...
    ... [18] GSM Based Remote Sensing and Control Systems Using FPGA, Wael M EI-Medany, Mahmoud REI-Sabry, The IEEE International Conference on Computer & Communication Engineering, ICCCE'08, Kuala Lumpur, Malaysia,... more
    ... [18] GSM Based Remote Sensing and Control Systems Using FPGA, Wael M EI-Medany, Mahmoud REI-Sabry, The IEEE International Conference on Computer & Communication Engineering, ICCCE'08, Kuala Lumpur, Malaysia, May 2008. ...
    Internet of things (IoT) is the paradigm that is revolutionizing our daily lives. It has become an important part of our lives due to its ability to transform lives. More and more organizations are using IoT devices as they open new... more
    Internet of things (IoT) is the paradigm that is revolutionizing our daily lives. It has become an important part of our lives due to its ability to transform lives. More and more organizations are using IoT devices as they open new opportunities for healthcare, wearable devices, home appliances and improve sharing and communication of information using the internet. With all these opportunities the challenges related to IoT security are rising. The limited resources and open deployment environment makes it vulnerable to several malicious attacks such as Distributed Denial of service (DDoS). Traditional detection approaches are inadequate for current security requirements. By applying the machine learning techniques these approaches can be improved which in turn will result in improved security. Therefore, this paper is a review of current advancements made in the application of machine learning techniques for the detection of DDoS attacks in IoT. There are many survey papers on intrusion detection in IoT but there is very little which particularly focuses on DDoS attacks. As more and more organizations are using IoT devices, but due to lack of knowledge they sometimes find it hard to understand how to ensure security, this paper will serve as a guide, as its main contribution is to provide an overview of the current state of the art of applications of machine learning techniques in the detection of Distributed Denial of Service attacks in IoT. This paper will also add to the knowledge of researchers who are interested in IoT security.
    Blockchain technology is a collection of records called blocks, and it is characterized by several features including transparency, which means that everyone in the network can view all information stored in the blockchain, and blockchain... more
    Blockchain technology is a collection of records called blocks, and it is characterized by several features including transparency, which means that everyone in the network can view all information stored in the blockchain, and blockchain technology is also decentralized, meaning that there is no authority within it. This technology is used in many areas, including digital identities. Digital auctions as well as cryptocurrency and so on. Blockchain technology plays a large role in healthcare in terms of its many services, as it helps healthcare researchers decode the genetic code and securely transmit patient medical records, and it also manages the drug supply chain. All Blockchain-based systems are exposed to various attacks by attackers, which threatens the security of information and data stored on blockchain systems, and among these systems are blockchain-based healthcare systems. This paper focuses on the recent attacks and countermeasures of blockchain technology in the healthcare field. Several expected attacks are discussed and countermeasures that can be used to prevent or reduce the risk of these attacks are mentioned.
    The rising of technology in the 21st century grows in a way that we never thought of before. The COVID-19 pandemic shifted many organizations in different sizes, specialties, and sectors to work online, resulting in a critical need to... more
    The rising of technology in the 21st century grows in a way that we never thought of before. The COVID-19 pandemic shifted many organizations in different sizes, specialties, and sectors to work online, resulting in a critical need to secure their software, applications, and web-based applications. Furthermore, Organizations that do not implement security in the Software Development Life Cycle (SDLC) process often discover that their applications suffer from security flaws and security bugs, thus exposing their applications to attacks. Applying security measures to the SDLC will ensure that applications are secure from the early planning stages until release. Penetration testing is an essential security measure and is counted as one of the best security practices applied to applications because it focuses on the technical part of application security. Each kind of application the organization uses, in-house developed applications or on-the-shelf applications, has its method for penetration testing. This paper is a systematic literature review that examines the web application security measures and the penetration testing methods and tools to detect vulnerabilities on web applications. Moreover, it gives a general view of adapting penetration testing as a security approach to the SDLC.
    Purpose The purpose of this paper is to investigate the latest research related to secure routing protocols in Wireless Sensor Network (WSN) and propose a new approach that can achieve a higher security level compared to the existing one.... more
    Purpose The purpose of this paper is to investigate the latest research related to secure routing protocols in Wireless Sensor Network (WSN) and propose a new approach that can achieve a higher security level compared to the existing one. One of the main security issues in WSNs is the security of routing protocols. A typical WSN consists of a large number of small size, low-power, low-cost sensor devices. These devices are very resource-constrained and usually use cheap short-range radios to communicate with each other in an ad hoc fashion thus, achieving security in these networks is a big challenge, which is open for research. Design/methodology/approach The route updates and data messages of the protocol are authenticated using Edwards-curves Digital Signature Algorithm (EdDSA). Routing protocols play an essential role in WSNs, they ensure the delivery of the sensed data from the remote sensor nodes to back-end systems via a data sink. Routing protocols depend on route updates re...
    This paper presents a software design and hardware implementation of smart mobile robot with real time applications. The presented mobile robot has several features; it has indoor and outdoor tracking systems, and smart detecting system... more
    This paper presents a software design and hardware implementation of smart mobile robot with real time applications. The presented mobile robot has several features; it has indoor and outdoor tracking systems, and smart detecting system that can detect different types of explosive gases. Besides that, the robot can analyze and display the percentage of the temperature, humanity and gases results in order to identify the danger points. The robot has an alarming system by sending instant notifications and reports to users. The robot can be controlled indoors using Bluetooth application or outdoors using GPRS and TCP/IP Protocol. Also, it provides a live video streaming using high resolution IP Camera. The prototype has been tested experimentally and the results are analyzed and discussed.
    One of the most significant barriers for using Low Density Parity Check (LDPC) codes in many wireless communication system and magnetic storage devices is the bit error rate floor phenomena with their complex message passing iterative... more
    One of the most significant barriers for using Low Density Parity Check (LDPC) codes in many wireless communication system and magnetic storage devices is the bit error rate floor phenomena with their complex message passing iterative algorithm. LDPC codes aremostly used in communication system because of its outstanding performance achievement. There are various decoding algorithm for LDPC decoder. In this paper, we presented the mathematical analysis of Minimum Weight Decoding (MWD) algorithm and its error rate performance over Additive White Gaussian Noise (AWGN) channel. A comparison of bit error rate performance over signal to noise ratio (dB) is carried out for different codes such as hamming code, BCH code and LDPC code. This paper shows bit error performance of decoder using minimum weight decoding algorithm. The main significance of this paper is that it shows efficient performance of Minimum Weight Decoding (MWD) algorithm based LDPC Decoder. We presented three classes of ...
    Nowadays Internet of Thing (IoT) technology has accessed all the aspects of our life. One of the IoT applications is the smart transportation. Smart transportation gains a lot of attention, as it is part of the smart cities. The data... more
    Nowadays Internet of Thing (IoT) technology has accessed all the aspects of our life. One of the IoT applications is the smart transportation. Smart transportation gains a lot of attention, as it is part of the smart cities. The data transmission in smart transportation is done through the wireless communication and especially through the Vehicular ad hoc networks (VANETs) which made the data vulnerable to many issues concerning security. Therefore, security techniques should be applied to secure vehicle's user data. In this paper, the RC5 encryption algorithm will be used as a security technique to protect users' privacy in smart transportation. The simulation of RC5 will be implemented with FPGA using Quartus Prime Lite Edition version 18. The purpose is to check hardware resources of RC5 and make sure it is suitable for smart transportation.
    The world today is moving toward the connected environment because of the advance in the Information Technology, smart cities are a result of this evolution. One of the important technologies that get high attention within the framework... more
    The world today is moving toward the connected environment because of the advance in the Information Technology, smart cities are a result of this evolution. One of the important technologies that get high attention within the framework of the smart cities is the smart transportation. The smart transportation or the Intelligent Transportation System (ITS) solved many issues related to the transportation. On the other hand, it has many security and privacy issues. Therefore, this research aims to investigate the security issues, privacy issues and the solutions for the smart transportation. The contribution of this research resides on promoting the researchers to the different types of the security and privacy issues with the solutions so that they can use the outcomes as a base for their further researches.
    Nowadays, Mobile Crowd Sensing (MCS) became the popular paradigm for sensing data. MCS is vulnerable to many types of threats and faces many challenges. Trustworthiness is one of the main MCS challenges; attackers aim to inject faulty... more
    Nowadays, Mobile Crowd Sensing (MCS) became the popular paradigm for sensing data. MCS is vulnerable to many types of threats and faces many challenges. Trustworthiness is one of the main MCS challenges; attackers aim to inject faulty data to corrupt the system or waste its resources. Thus, MCS organizers must ensure that no malicious users are contributing to have trusted sensed data. Faulty sensor readings in MCS can be due to sensor failure or malicious behavior. Attackers targets degrade the system performance and reduce the worker's reputation by injecting false data. This paper evaluates different machine learning algorithms classifying the received sensed data as true, a faulty sensor, or attacker behavior. These algorithms are Decision Tree (DT), Support Vector Machine (SVM), and Random Frost (RF). Evaluating the result for comparison obtained based on accuracy, precision, Recall, f1 score, and the confusion matrix. The result shows that among all classifiers, RF shows the highest accuracy of 97.9%.
    Broadcasting applications such as video surveillance systems are using High Definition (HD) videos. The use of high-resolution videos increases significantly the data volume of video coding standards such as High-Efficiency Video Coding... more
    Broadcasting applications such as video surveillance systems are using High Definition (HD) videos. The use of high-resolution videos increases significantly the data volume of video coding standards such as High-Efficiency Video Coding (HEVC) and Advanced Video Coding (AVC), which increases the challenge for storing, processing, encrypting, and transmitting these data over different communication channels. Video compression standards use state-of-the-art techniques to compress raw video sequences more efficiently, such techniques require high computational complexity and memory utilization. With the emergent of using HEVC and video surveillance systems, many security risks arise such as man-in-the-middle attacks, and unauthorized disclosure. Such risks can be mitigated by encrypting the traffic of HEVC. The most widely used encryption algorithm is the Advanced Encryption Standard (AES). Most of the computational complexity in AES hardware-implemented is due to S-box or sub-byte operation and that because it needs many resources and it is a non-linear structure. The proposed AES S-box ROM design considers the latest HEVC used for homeland security video surveillance systems. This paper presents different designs for VHDL efficient ROM implementation of AES S-box using IP core generator, ROM components, and using Functions, which are all supported by Xilinx. IP core generator has Block Memory Generator (BMG) component in its library. S-box IP core ROM is implemented using Single port block memory. The S-box lookup table has been used to fill the ROM using the .coe file format provided during the initialization of the IP core ROM. The width is set to 8-bit to address the 256 values while the depth is set to 8-bit which represents the data filed in the ROM. The whole design is synthesized using Xilinx ISE Design Suite 14.7 software, while Modelism (version10.4a) is used for the simulation process. The proposed IP core ROM design has shown better memory utilization compared to non-IP core ROM design, which is more suitable for memory-intensive applications. The proposed design is suitable for implementation using the FPGA ROM design. Hardware complexity, frequency, memory utilization, and delay are presented in this paper.
    Blockchain-based applications cover numerous fields from financial services to the Internet of Things (IoT). The smart contracts which are the programmable blocks that execute predefined command are executed on participating nodes. Such... more
    Blockchain-based applications cover numerous fields from financial services to the Internet of Things (IoT). The smart contracts which are the programmable blocks that execute predefined command are executed on participating nodes. Such execution leads to privacy and confidentiality issues as nodes process data to execute the smart contracts. A zero-knowledge proof is used in cryptocurrencies for allowing spending digital money without revealing the identity of persons. In this paper, we aim to introduce a zero-knowledge proof model using blockchain to enable sharing data securely between services and devices without affecting the confidentiality or privacy of data. The security model fuses digital assets within a blockchain and serves as a trustless layer for protecting the data, which results in enhancing the security of data sharing. We apply the model to two recently introduced concepts in Bahrain: The National Healthcare Insurance Scheme and government-collected VAT. Applying the model for exchanging medical data and sharing medical records between the private sector and public sector will enable maintaining the privacy of patients and increasing efficiency of operations. For VAT, the model helps secure the overall process of VAT reporting and B2B transactional processes in general.
    As technology improves at an astounding rate, cities have to improve their services in terms of safety, healthcare, transportation, and the overall welfare of their residents. Internet of Things (IoT) play a major role in the... more
    As technology improves at an astounding rate, cities have to improve their services in terms of safety, healthcare, transportation, and the overall welfare of their residents. Internet of Things (IoT) play a major role in the infrastructure of a smart city by gathering and processing data from distributed sensors to implement smart services, such as traffic control, environment monitoring, and waste management. However, the most challenging part is securing data from various attacks while maintaining low-complexity techniques and algorithms. Considering security concerns to the deployment of IoT as the main source of data collection and transmission, attacks are classified to identify a suitable scheme of defending against them. This paper provides a two-fold contribution to analyze security and privacy in the context of smart cities for healthcare applications. Thus, on one hand an overview of different IoT applications and their cyber vulnerabilities are presented. On the other hand, a comprehensive evaluation of possible approaches to mitigate the problem of cyber attacks is described.
    Wireless communications, with the emerging technologies of cloud computing, ubiquitous sensing and big data, had the impact of changing all aspects of our lives. The aim of this paper is to discuss the possibility of enhancing greenhouse... more
    Wireless communications, with the emerging technologies of cloud computing, ubiquitous sensing and big data, had the impact of changing all aspects of our lives. The aim of this paper is to discuss the possibility of enhancing greenhouse agricultural activities in an arid climate using Internet of Things (IoT) and other computational technologies, especially as an enablers of Controlled Environment Agriculture (CEA). The utilization of CEA practices and the efficiency and effectiveness of agricultural big data are highly affected by the availability of wireless connectivity. In this paper we propose a framework that utilizes emerging computational technologies to monitor and control a CEA.
    This paper presents a remote monitoring system using web-based/mobile application for detecting explosive gases. ROBODEM (Robot-Detection-Explosive-Materials) system aims to develop a remotely controlled explosive gas detection system... more
    This paper presents a remote monitoring system using web-based/mobile application for detecting explosive gases. ROBODEM (Robot-Detection-Explosive-Materials) system aims to develop a remotely controlled explosive gas detection system handled by a LEGO-Mindstrom-NXT robot. The main controller has been designed using Ardunio-Uno microcontroller with IP camera for live video streaming, GPS for live tracking and gas detection system using MQ6 and MQ5 sensors, and. This robot can be controlled either indoor using Bluetooth or outdoor using the Internet. ROBODEM provides sensors results, daily reports, an alarm and notification emails/SMS. The prototype has been tested experimentally and the results are analyzed and discussed.
    This paper presents a remote monitoring system using website and mobile application for detecting explosive gases. The ROBODEM (ROBOt Detection Explosive Materials) system aims to develop a remotely controlled explosive gas detection... more
    This paper presents a remote monitoring system using website and mobile application for detecting explosive gases. The ROBODEM (ROBOt Detection Explosive Materials) system aims to develop a remotely controlled explosive gas detection system handled by a LEGO Mindstrom NXT robot. The main controller has been designed using arduino uno microcontroller. This robot comes with an IP camera for live video streaming, Gas detection system using MQ6 and MQ5 sensors, as well as GPS receiver for live tracking. This robot can be controlled either indoor using Bluetooth or outdoor using the Internet. The system provides information regarding ROBODEM such as sensors results, current location of the robot, current time and date. This system produces an alarm and a popup window appears in the website if there is leakage of explosive gases. ROBODEM has a live tracking of the robot's path that shown in Google map. The prototype has been tested experimentally and the results are analyzed and discussed.
    This paper presents and discusses issues related to the development of telematics’ products and services in Bahrain. Telematics is an integration of telecommunications and informatics and it is part of Information and communication... more
    This paper presents and discusses issues related to the development of telematics’ products and services in Bahrain. Telematics is an integration of telecommunications and informatics and it is part of Information and communication technologies (ICT). One of the most important applications of telematics is to provide services to and from smart phones and vehicles. Telematics application for vehicles includes safety and security of both vehicles and drivers and increase of fleet operational efficiency. This research will focus on the development of telematics in Kingdom of Bahrain. A real case study will be given of Spatial Technology Solutions Company (STS), being a small telematics company founded in Bahrain.
    ABSTRACT Motion Estimation (ME) is the most computationally intensive part of video compression. Speed up this process will open new application for high speed video transmission. Fast Motion Estimation (FME) co-processor architecture... more
    ABSTRACT Motion Estimation (ME) is the most computationally intensive part of video compression. Speed up this process will open new application for high speed video transmission. Fast Motion Estimation (FME) co-processor architecture that efficiently reuses search area data is proposed. Smart and efficient small Processing Element (PE) and local memory are the central of the architecture. The search area data flows horizontally while the current block data is stationary. A smart local memory and PE design guaranteesa simple and regular dataflow. For a search range of [-16,+15] and block size of 16, our architecture can perform motion estimation for 60 fps of 4CIF video at 290.5 Mhz. This high frequency allows our architecture to be used in high speed video transmission applications.

    And 48 more