Skip to main content

Showing 1–6 of 6 results for author: Reyad, O

Searching in archive cs. Search in all archives.
.
  1. IoT and Neural Network-Based Water Pum** Control System For Smart Irrigation

    Authors: M. E. Karar, M. F. Al-Rasheed, A. F. Al-Rasheed, O. Reyad

    Abstract: This article aims at saving the wasted water in the process of irrigation using the Internet of Things (IoT) based on a set of sensors and Multi-Layer Perceptron (MLP) neural network. The developed system handles the sensor data using the Arduino board to control the water pump automatically. The sensors measure the environmental factors; namely temperature, humidity, and soil moisture to estimate… ▽ More

    Submitted 8 May, 2020; originally announced May 2020.

    Comments: 6 pages, 5 figures, 1 table

    Journal ref: Inf. Sci. Lett. 9(2), 107-112 (2020)

  2. GASDUINO-Wireless Air Quality Monitoring System Using Internet of Things

    Authors: M. E. Karar, A. M. Al-Masaad, O. Reyad

    Abstract: The Health Effects Institute (HEI) reported recently that the deaths from the negative health effects of the air pollution in the Middle East Region is about 500,000 people. Therefore, this paper presents a new design and development of portable system; called GASDUINO that allows the user to measure the quality of air using the Internet of Things (IoT). The main components of developed GASDUINO s… ▽ More

    Submitted 8 May, 2020; originally announced May 2020.

    Comments: 5 pages, 4 figures, 1 table

    Journal ref: Inf. Sci. Lett. 9(2), 113-117 (2020)

  3. Application of Intelligent Multi Agent Based Systems For E-Healthcare Security

    Authors: Faizal Khan, Omar Reyad

    Abstract: In recent years, availability and usage of extensive systems for Electronic Healthcare Record (EHR) is increased. In medical centers such hospitals and other laboratories, more health data sets were formed during the treatment process. In order to enhance the standard of the services provided in healthcare, these records where shared and can be used by various users depends on their requirements.… ▽ More

    Submitted 2 April, 2020; originally announced April 2020.

    Comments: 6 pages, 3 figures, 1 table, journal

    Journal ref: Inf. Sci. Lett. 8(2) 2019

  4. arXiv:2003.09501  [pdf, ps, other

    cs.CY

    Novel Coronavirus COVID-19 Strike on Arab Countries and Territories: A Situation Report I

    Authors: Omar Reyad

    Abstract: The novel Coronavirus (COVID-19) is an infectious disease caused by a new virus called COVID-19 or 2019-nCoV that first identified in Wuhan, China. The disease causes respiratory illness (such as the flu) with other symptoms such as a cough, fever, and in more severe cases, difficulty breathing. This new Coronavirus seems to be very infectious and has spread quickly and globally. In this work, inf… ▽ More

    Submitted 20 March, 2020; originally announced March 2020.

    Comments: 3 pages, 2 figures, 1 table, Situation Report

  5. arXiv:2002.09239  [pdf, ps, other

    cs.CR

    Random Bit Generator Mechanism Based on Elliptic Curves and Secure Hash Function

    Authors: O. Reyad, M. E. Karar, K. Hamed

    Abstract: Pseudorandom bit generators (PRBG) can be designed to take the advantage of some hard number theoretic problems such as the discrete logarithm problem (DLP). Such type of generators will have good randomness and unpredictability properties as it is so difficult to find an easy solution to the regarding mathematical dilemma. Hash functions in turn play a remarkable role in many cryptographic tasks… ▽ More

    Submitted 21 February, 2020; originally announced February 2020.

    Comments: 6 pages, 8 figures, conference

  6. A Novel Image Encryption Scheme Based on Different Block Sizes for Grayscale and Color Images

    Authors: Omar Reyad, M. A. Mofaddel, W. M. Abd-Elhafiez, Mohamed Fathy

    Abstract: In this paper, two image encryption schemes are proposed for grayscale and color images. The two encryption schemes are based on dividing each image into blocks of different sizes. In the first scheme, the two dimension ($2$D) input image is divided into various blocks of size $N \times N$. Each block is transformed into a one dimensional ($1$D) array by using the Zigzag pattern. Then, the exclusi… ▽ More

    Submitted 21 February, 2018; originally announced February 2018.

    Comments: 7 pages, 4 figures, conference

    MSC Class: Computer science

    Journal ref: 12th International Conference on Computer Engineering and Systems (ICCES) 2017