-
IoT and Neural Network-Based Water Pum** Control System For Smart Irrigation
Authors:
M. E. Karar,
M. F. Al-Rasheed,
A. F. Al-Rasheed,
O. Reyad
Abstract:
This article aims at saving the wasted water in the process of irrigation using the Internet of Things (IoT) based on a set of sensors and Multi-Layer Perceptron (MLP) neural network. The developed system handles the sensor data using the Arduino board to control the water pump automatically. The sensors measure the environmental factors; namely temperature, humidity, and soil moisture to estimate…
▽ More
This article aims at saving the wasted water in the process of irrigation using the Internet of Things (IoT) based on a set of sensors and Multi-Layer Perceptron (MLP) neural network. The developed system handles the sensor data using the Arduino board to control the water pump automatically. The sensors measure the environmental factors; namely temperature, humidity, and soil moisture to estimate the required time for the operation of water irrigation. The water pump control system consists of software and hardware tools such as Arduino Remote XY interface and electronic sensors in the framework of IoT technology. The machine learning algorithm such as the MLP neural network plays an important role to support the decision of automatic control of IoT-based irrigation system, managing the water consumption effectively.
△ Less
Submitted 8 May, 2020;
originally announced May 2020.
-
GASDUINO-Wireless Air Quality Monitoring System Using Internet of Things
Authors:
M. E. Karar,
A. M. Al-Masaad,
O. Reyad
Abstract:
The Health Effects Institute (HEI) reported recently that the deaths from the negative health effects of the air pollution in the Middle East Region is about 500,000 people. Therefore, this paper presents a new design and development of portable system; called GASDUINO that allows the user to measure the quality of air using the Internet of Things (IoT). The main components of developed GASDUINO s…
▽ More
The Health Effects Institute (HEI) reported recently that the deaths from the negative health effects of the air pollution in the Middle East Region is about 500,000 people. Therefore, this paper presents a new design and development of portable system; called GASDUINO that allows the user to measure the quality of air using the Internet of Things (IoT). The main components of developed GASDUINO system are the Arduino microcontroller board, Gas sensor (MQ-135), Android user interface (UI) connected with all things via Remote XY Arduino cloud. The developed system can alarm the users about the dangerous levels of the air quality index (AQI) or the particle per million (PPM) levels in the range of 0 to above 200 PPM. The developed GASDUINO system is considered as an essential environmental module in the development and sustainability of future smart cities.
△ Less
Submitted 8 May, 2020;
originally announced May 2020.
-
Application of Intelligent Multi Agent Based Systems For E-Healthcare Security
Authors:
Faizal Khan,
Omar Reyad
Abstract:
In recent years, availability and usage of extensive systems for Electronic Healthcare Record (EHR) is increased. In medical centers such hospitals and other laboratories, more health data sets were formed during the treatment process. In order to enhance the standard of the services provided in healthcare, these records where shared and can be used by various users depends on their requirements.…
▽ More
In recent years, availability and usage of extensive systems for Electronic Healthcare Record (EHR) is increased. In medical centers such hospitals and other laboratories, more health data sets were formed during the treatment process. In order to enhance the standard of the services provided in healthcare, these records where shared and can be used by various users depends on their requirements. As a result, notable issues in the security and privacy where obtained which should be monitored and removed in order to make the use of EHR more effectively. Various researches have been done in the past literature for improving the standards of the security and privacy in E-health systems. In spite of this, it is not completely enhanced. In this paper, a comprehensive analysis is done by selecting the existing approaches and models which were proposed for the security and privacy of the E-healthcare systems. Also, a novel Intelligent-based Access Control Security Model (IBAC) based on multi agents is proposed to maintain and support the security and privacy of E-healthcare systems. This system uses agents in order to maintain security and privacy while accessing the E-health data between the users.
△ Less
Submitted 2 April, 2020;
originally announced April 2020.
-
Novel Coronavirus COVID-19 Strike on Arab Countries and Territories: A Situation Report I
Authors:
Omar Reyad
Abstract:
The novel Coronavirus (COVID-19) is an infectious disease caused by a new virus called COVID-19 or 2019-nCoV that first identified in Wuhan, China. The disease causes respiratory illness (such as the flu) with other symptoms such as a cough, fever, and in more severe cases, difficulty breathing. This new Coronavirus seems to be very infectious and has spread quickly and globally. In this work, inf…
▽ More
The novel Coronavirus (COVID-19) is an infectious disease caused by a new virus called COVID-19 or 2019-nCoV that first identified in Wuhan, China. The disease causes respiratory illness (such as the flu) with other symptoms such as a cough, fever, and in more severe cases, difficulty breathing. This new Coronavirus seems to be very infectious and has spread quickly and globally. In this work, information about COVID-19 is provided and the situation in Arab countries and territories regarding the COVID-19 strike is presented. The next few weeks main expectations is also given.
△ Less
Submitted 20 March, 2020;
originally announced March 2020.
-
Random Bit Generator Mechanism Based on Elliptic Curves and Secure Hash Function
Authors:
O. Reyad,
M. E. Karar,
K. Hamed
Abstract:
Pseudorandom bit generators (PRBG) can be designed to take the advantage of some hard number theoretic problems such as the discrete logarithm problem (DLP). Such type of generators will have good randomness and unpredictability properties as it is so difficult to find an easy solution to the regarding mathematical dilemma. Hash functions in turn play a remarkable role in many cryptographic tasks…
▽ More
Pseudorandom bit generators (PRBG) can be designed to take the advantage of some hard number theoretic problems such as the discrete logarithm problem (DLP). Such type of generators will have good randomness and unpredictability properties as it is so difficult to find an easy solution to the regarding mathematical dilemma. Hash functions in turn play a remarkable role in many cryptographic tasks to achieve various security strengths. In this paper, a pseudorandom bit generator mechanism that is based mainly on the elliptic curve discrete logarithm problem (ECDLP) and hash derivation function is proposed. The cryptographic hash functions are used in consuming applications that require various security strengths. In a good hash function, finding whatever the input that can be mapped to any pre-specified output is considered computationally infeasible. The obtained pseudorandom bits are tested with NIST statistical tests and it also could fulfill the up-to-date standards. Moreover, a $256 \times 256$ grayscale images are encrypted with the obtained pseudorandom bits following by necessary analysis of the cipher images for security prove.
△ Less
Submitted 21 February, 2020;
originally announced February 2020.
-
A Novel Image Encryption Scheme Based on Different Block Sizes for Grayscale and Color Images
Authors:
Omar Reyad,
M. A. Mofaddel,
W. M. Abd-Elhafiez,
Mohamed Fathy
Abstract:
In this paper, two image encryption schemes are proposed for grayscale and color images. The two encryption schemes are based on dividing each image into blocks of different sizes. In the first scheme, the two dimension ($2$D) input image is divided into various blocks of size $N \times N$. Each block is transformed into a one dimensional ($1$D) array by using the Zigzag pattern. Then, the exclusi…
▽ More
In this paper, two image encryption schemes are proposed for grayscale and color images. The two encryption schemes are based on dividing each image into blocks of different sizes. In the first scheme, the two dimension ($2$D) input image is divided into various blocks of size $N \times N$. Each block is transformed into a one dimensional ($1$D) array by using the Zigzag pattern. Then, the exclusive or (XOR) logical operation is used to encrypt each block with the analogous secret key. In the second scheme, after the transformation process, the first block of each image is encrypted by the corresponding secret key. Then, before the next block is encrypted, it is XORed with the first encrypted block to become the next input to the encrypting routine and so on. This feedback mechanism depends on the cipher block chaining (CBC) mode of operation which considers the heart of some ciphers because it is highly nonlinear. In the case of color images, the color component is separated into blocks with the same size and different secret keys. The used secret key sequences are generated from elliptic curves (EC) over a \textit{binary} finite field $\mathbb{F}_{2^{m}}$. Finally, the experimental results are carried out and security analysis of the ciphered images are demonstrated that the two proposed schemes had a better performance in terms of security, sensitivity and robustness.
△ Less
Submitted 21 February, 2018;
originally announced February 2018.