Preferred Language
Articles
/
pUILppsBMeyNPGM3Vt5p
IoT-Based Low-Cost Smart Health Monitoring System using Raspberry Pi Pico W and Blynk Application
...Show More Authors

في السنوات الأخيرة، أدى التقدم التكنولوجي في إنترنت الأشياء (IoT) وأجهزة الاستشعار الذكية إلى فتح اتجاهات جديدة وإعطاء حلول عملية في مختلف قطاعات الحياة. يتم التعرف على إنترنت الأشياء كتنولوجيا حديثة تربط بين مختلف انواع الشبكات. تم تحسين أنواع مختلفة من قطاعات الرعاية الصحية في المجال الطبي بناءً على هذه التكنولوجيا. أحد هذه القطاعات الهامة هو نظام مراقبة الصحة (HMS). تعتبر مراقبة المريض عن بعد لاسلكيًا وبتكلفة منخفضة أمرًا بالغ الأهمية في هذا المجال. في هذا العمل، تم اقتراح نظام مراقبة صحة المريض في الوقت الحقيقي وبتكلفة منخفضة. يتم دمج أنواع مختلفة من أجهزة الاستشعار في شبكة اتصالات لاسلكية لجمع الإشارات الفسيولوجية للمريض عن بعد وإرسالها إلى المختص في أسرع وقت ممكن. يتكون االنظام المقترح من عدد من أجهزة الاستشعار الذكية التي تقيس معلمات مختلفة وهي: عدد نبضات القلب بالدقيقة، درجة حرارة الجسم، وSPO2 (تشبع الأكسجين). تُستخدم هذه الحساسات لحساب معدل ضربات قلب المريض ودرجة حرارة الجسم ونسبة تشبع الأكسجين للمريض على التوالي. يتم عرض حالة المريض اما على شاشة OLED اوباستخدام تطبيق Blynk. في هذا النظام نستخدم لوحة Raspberry Pi Pico W كوحدة تحكم دقيقة مع مفهوم الحوسبة السحابية. بحيث يتم استخدام لوحة Raspberry Pi Pico W لنقل البيانات لاسلكيًا على تقنية إنترنت الأشياء باستخدام تطبيق Blynk. يتم نقل المعلمات الحيوية للمريض عن بعد عبر شبكة Wi-Fi مما يساعد في مراقبة المعلومات الصحية للمرضى لاسلكيًا وفي الوقت الحقيقي. من خلال النتائج التي تم الحصول عليها وجد ان البيانات التي تم الحصول عليها من المريض يتم نقلها بسرعة كبيرة ويمكننا فحص العديد من المرضى عن بعد من خلال الحفاظ على مسافة مناسبة مع المرضى. تم مقارنة النظام المقترح مع الانظمة الموجودة عن طريق قياس العلامات الحيوية لعدد من الأشخاص وأظهرت النتائج أن البيانات التي تم الحصول عليها من الأشخاص متقاربة جدا. علاوة على ذلك، فقد وجد أن النظام المقترح ذو تكلفة منخفضة مقارنة بالأجهزة الأخرى المتوفرة تجاريا.

Crossref
View Publication
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Matching Algorithms for Intrusion Detection System based on DNA Encoding
...Show More Authors

Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o

... Show More
Scopus (5)
Scopus
Publication Date
Tue Sep 01 2020
Journal Name
Al-khwarizmi Engineering Journal
Arduino-Based Controller for Sequence Development of Automated Manufacturing System
...Show More Authors

It has become necessary to change from a traditional system to an automated system in production processes, because it has high advantages. The most important of them is improving and increasing production. But there is still a need to improve and develop the work of these systems.

The objective of this work is to study time reduction by combining multiple sequences of operations into one process. To carry out this work, the pneumatic system is designed to decrease\ increase the time of the sequence that performs a pick and place process through optimizing the sequences based on the obstacle dimensions. Three axes are represented using pneumatic cylinders that move according to the sequence used. The system is implemented and con

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series
Modified PRESENT Encryption algorithm based on new 5D Chaotic system
...Show More Authors

Cryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti

... Show More
Scopus (9)
Crossref (7)
Scopus Crossref
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Al-khwarizmi Engineering Journal
Remote Patient Healthcare surveillance system based real-time vital signs
...Show More Authors

Today many people suffering from health problems like dysfunction in lungs and cardiac. These problems often require surveillance and follow up to save a patient's health, besides control diseases before progression. For that, this work has been proposed to design and developed a remote patient surveillance system, which deals with 4 medical signs (temperature, SPO2, heart rate, and Electrocardiogram ECG. An adaptive filter has been used to remove any noise from the signal, also, a simple and fast search algorithm has been designed to find the features of  ECG signal such as Q,R,S, and T waves.  The system performs analysis for medical signs that are used to detected abnormal values. Besides, it sends data to the Base-Stati

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Fri May 17 2019
Journal Name
Lecture Notes In Networks And Systems
Features Selection for Intrusion Detection System Based on DNA Encoding
...Show More Authors

Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system

... Show More
Scopus (5)
Scopus
Publication Date
Tue Jul 01 2025
Journal Name
Mastering The Minds Of Machines
The Intersection of AI and the Internet of Things (IoT): Transforming Data into Intelligence
...Show More Authors

View Publication
Scopus (2)
Crossref (3)
Scopus Crossref
Publication Date
Thu Aug 21 2025
Journal Name
Computers
A Comprehensive Review of Sensor Technologies in IoT: Technical Aspects, Challenges, and Future Directions
...Show More Authors

The rapid advancements in wireless technology and digital electronics have led to the widespread adoption of compact, intelligent devices in various aspects of daily life. These advanced systems possess the capability to sense environmental changes, process data, and communicate seamlessly within interconnected networks. Typically, such devices integrate low-power radio transmitters and multiple smart sensors, hence enabling efficient functionality across wide ranges of applications. Alongside these technological developments, the concept of the IoT has emerged as a transformative paradigm, facilitating the interconnection of uniquely identifiable devices through internet-based networks. This paper aims to provide a comprehensive ex

... Show More
View Publication
Scopus (13)
Crossref (18)
Scopus Crossref
Publication Date
Fri Mar 22 2019
Journal Name
Journal Of Pharmaceutical Sciences And Research
Evaluation of the efficacy of caries removal using papain gel (Brix 3000) and smart preparation bur (in vivo comparative study)‏
...Show More Authors

Publication Date
Tue Jan 31 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor

... Show More
View Publication