Mohamed Jamal A Zemerly | KUSTAR (original) (raw)
Papers by Mohamed Jamal A Zemerly
Lecture Notes in Computer Science, 1998
This paper describes a performance-oriented environment for the design of portable parallel softw... more This paper describes a performance-oriented environment for the design of portable parallel software. The environment consists of a graphical design tool based on the PVM communication library for building parallel algorithms, a state-of-the-art simulation engine, a CPU characteriser and a visualisation tool for animation of program execution and visualisation of platform and network performance measures and statistics. The toolset is used to model a virtual machine composed of a cluster of workstations interconnected by a local area network. The simulation model used is modular and its components are interchangeable which allows easy re-configuration of the platform. Both communication and CPU models are validated.
Lecture Notes in Electrical Engineering, 2014
… of the 2006 international conference on …, 2006
Mobile learning is becoming an important research topic as people are increasingly connected thro... more Mobile learning is becoming an important research topic as people are increasingly connected through smart phones that combine telephony, computing, messaging, and multimedia. The process of designing, communicating and presenting learning resources ...
International Journal of Interactive Mobile Technologies (iJIM), 2012
Abstract Recommender systems currently used in many applications, including tourism, tend to simp... more Abstract Recommender systems currently used in many applications, including tourism, tend to simply be reactive to user request. The recommender system proposed in this paper uses multi-agents and multi-dimensional contextual information to achieve proactive behavior. User profile and behavior get implicitly incorporated and subsequently updated in the system. The recommender system has been developed and applied to the tourism domain. It was tested and evaluated by relatively large set of real users The evaluation conducted ...
Lecture Notes in Computer Science, 1998
Abstract. This paper describes a performance-oriented environment for the design of portable para... more Abstract. This paper describes a performance-oriented environment for the design of portable parallel software. The environment consists of a graphical design tool based on the PVM communication library for build-ing parallel algorithms, a state-of-the-art simulation engine, a CPU char- ...
2014 Ieee International Conference on Teaching Assessment and Learning For Engineering, Dec 1, 2014
Proceedings of the 13th Acm Siggraph International Conference, Nov 30, 2014
We present a novel virtual keyboard interface 'Augmented Keyboard' for a glass-type interface, i.... more We present a novel virtual keyboard interface 'Augmented Keyboard' for a glass-type interface, i.e., Smart glasses. An intuitive and easy-to-use interaction design is proposed in order to inherit the uses in QWERTY keyboard by employing the two features of hand: hand orientation and hand pose. We also address technical issues on the interface and present wrist estimation method and hand orientation method as the solutions. Extensive experiments show that the robust performance is achieved at 62 fps. Throughout this paper we demonstrated that the proposed interface is fully capable of the chat applications or the games for Smart glasses.
A geometrically parallel area-based stereo matcher (GPSM) has been developed at UCL, originally f... more A geometrically parallel area-based stereo matcher (GPSM) has been developed at UCL, originally for SPOT satellite imagery. It uses an adaptive least squares correlation (ALSC) combined with a region growing control strategy. This matcher works well for small-scale imagery, but has difficulty matching aerial images due to their higher resolution (O.6m-2m/pixel). At this resolution large depth discontinuities and low and periodic texture are present due to man-made structures. These can cause the stereo matcher to converge to false matches and impede region growing leading to a reduction in match coverage, this makes it unsatisfactory for the production of dense Digital Elevation Models {DEMs}. A multi-resolution (MR) approach to stereo matching was investigated to try to mitigate against the effect of discontinuities by reducing their resolution to that encountered in SPOT imagery. As the first step in the investigation, a stereo image pyramid was formed with the lower resolution pairs matched serially and the original resolution ones matched in parallel on a MIMD architecture (a Transputer array). The results obtained with 5 levels of resolution demonstrated an increase in match coverage of 16% in comparison with 1 level and reduced apparent blundering.
Radio Frequency Identification (RFID) and Wireless Sensor Network (WSN) are the combined technolo... more Radio Frequency Identification (RFID) and Wireless Sensor Network (WSN) are the combined technologies that will spread in the near future to enter all of our everyday activities. However, the security of these technologies is very much vulnerable. Adding some security measures to small computation powered devices that cannot handle the available security algorithms is considered a challenge. However, even low powered devices must be protected in ways that will present sufficient computational challenges to adversaries. This paper introduces suggested steps to build a secure protocol for the combined RFID and WSN technology application systems. Moreover, it demonstrates the possible attacks and threats on these combined technologies by analyzing their system environment and finally it discusses the possible threats that may occur.
The major drawbacks of existing Distributed Knowledge Management Architectures (DKMAs) are highli... more The major drawbacks of existing Distributed Knowledge Management Architectures (DKMAs) are highlighted and a new organic reference architecture, which solves most of those drawbacks, is presented. The proposed reference architecture is based on a well-known organic model, the Viable Systems Model (VSM). The viable systems architecture provides a structure for the design and implementation of distributed enterprise systems using existing hardware and software components. This is done by building filters into the layers, and by adding critical success factors to components. Thus the information system can evolve based on responses from a feedback loop, and request actions from users where necessary.
2014 International Conference on Virtual Systems & Multimedia (VSMM), 2014
The RFID technology is recently predicted to spread in most of our daily lives. However, it is ve... more The RFID technology is recently predicted to spread in most of our daily lives. However, it is very much vulnerable as it faces some major security challenges and threats. Thus, RFID technology also provides the solutions for the security threats concerned with security, privacy, and authentication. This paper not only addresses security privacy and authentication but also proposes a lightweight mutual authentication suitable to be implemented for passive RFID tag. The proposed protocol is simple, low cost and low power consumption as well as efficient computation since it uses the simple and low cost shrinking generator that can be considered an alternative for the use of the one time pad algorithm.
This paper describes a mobile application with several features which can be used to teach Arabic... more This paper describes a mobile application with several features which can be used to teach Arabic sign language and to communicate using it. These features include translating from Arabic text to Arabic sign language, video chatting where two users can use the application to chat in Arabic sign language, SMS messaging and translating SMS messages to Arabic sign language, in addition to other features such as easy indexing for Arabic words and recording own sentence. The system is also evaluated in terms of performance and cost against other similar systems.
This paper presents a service based mobile application that assists tourists traveling to a count... more This paper presents a service based mobile application that assists tourists traveling to a country. The application provides tourists with context-aware information adapted to their personalized requirements. Detecting the real needs of the tourist is based on context management which is a key element in our system – Murshid. Advice to tourists is proposed after sensing the context and a fine analysis of its ingredients. Murshid is designed as client-server architecture and it uses GPS based location to provide a visual aid using UAE map. Murshid is flexible, user-friendly, portable, and support dynamic information. The application offers a set of services to tourists through their mobile handsets, namely: special event notification, sightseeing, weather forecasting, currency exchange, language translation, and location bookmarking and sharing. Each of the services recommends tourism guidance according to the user's context that is constantly changing since we are dealing with ...
[Proceedings] IGARSS'91 Remote Sensing: Global Monitoring for Earth Management, 1991
Area-Based Stereo Matching techniques such as the Adaptive Least-Squares Correlation Region Growi... more Area-Based Stereo Matching techniques such as the Adaptive Least-Squares Correlation Region Growing (ALSCRG) method [1,, require an initial set of corresponding points (seed points) in the left and right images to begin stereo matching. This set of initial seed points has, until now, usually been generated manually using a special purpose visual display program. This paper describes three interest operator based methods for automatic generation of seed points for SPOT satellite imagery (class l), aerial photographs digitised on a kern DSR-11 analytical plotter (class 2), and any other imagery with stereo-overlap (class 3.) Results for the three methods and a comparison of interest operators are also presented.
2009 International Conference for Internet Technology and Secured Transactions, (ICITST), 2009
The RFID technology is recently predicted to spread in most of our daily lives. However, it is ve... more The RFID technology is recently predicted to spread in most of our daily lives. However, it is very much vulnerable as it faces some major security challenges and threats. Thus, RFID technology also provides the solutions for the security threats concerned with security, privacy, and authentication. This paper not only addresses security privacy and authentication but also proposes a lightweight mutual authentication suitable to be implemented for passive RFID tag. The proposed protocol is simple, low cost and low power consumption as well as efficient computation since it uses the simple and low cost Shrinking Generator that can be considered an alternative for the use of the One Time Pad algorithm.
Lecture Notes in Computer Science, 1998
This paper describes a performance-oriented environment for the design of portable parallel softw... more This paper describes a performance-oriented environment for the design of portable parallel software. The environment consists of a graphical design tool based on the PVM communication library for building parallel algorithms, a state-of-the-art simulation engine, a CPU characteriser and a visualisation tool for animation of program execution and visualisation of platform and network performance measures and statistics. The toolset is used to model a virtual machine composed of a cluster of workstations interconnected by a local area network. The simulation model used is modular and its components are interchangeable which allows easy re-configuration of the platform. Both communication and CPU models are validated.
Lecture Notes in Electrical Engineering, 2014
… of the 2006 international conference on …, 2006
Mobile learning is becoming an important research topic as people are increasingly connected thro... more Mobile learning is becoming an important research topic as people are increasingly connected through smart phones that combine telephony, computing, messaging, and multimedia. The process of designing, communicating and presenting learning resources ...
International Journal of Interactive Mobile Technologies (iJIM), 2012
Abstract Recommender systems currently used in many applications, including tourism, tend to simp... more Abstract Recommender systems currently used in many applications, including tourism, tend to simply be reactive to user request. The recommender system proposed in this paper uses multi-agents and multi-dimensional contextual information to achieve proactive behavior. User profile and behavior get implicitly incorporated and subsequently updated in the system. The recommender system has been developed and applied to the tourism domain. It was tested and evaluated by relatively large set of real users The evaluation conducted ...
Lecture Notes in Computer Science, 1998
Abstract. This paper describes a performance-oriented environment for the design of portable para... more Abstract. This paper describes a performance-oriented environment for the design of portable parallel software. The environment consists of a graphical design tool based on the PVM communication library for build-ing parallel algorithms, a state-of-the-art simulation engine, a CPU char- ...
2014 Ieee International Conference on Teaching Assessment and Learning For Engineering, Dec 1, 2014
Proceedings of the 13th Acm Siggraph International Conference, Nov 30, 2014
We present a novel virtual keyboard interface 'Augmented Keyboard' for a glass-type interface, i.... more We present a novel virtual keyboard interface 'Augmented Keyboard' for a glass-type interface, i.e., Smart glasses. An intuitive and easy-to-use interaction design is proposed in order to inherit the uses in QWERTY keyboard by employing the two features of hand: hand orientation and hand pose. We also address technical issues on the interface and present wrist estimation method and hand orientation method as the solutions. Extensive experiments show that the robust performance is achieved at 62 fps. Throughout this paper we demonstrated that the proposed interface is fully capable of the chat applications or the games for Smart glasses.
A geometrically parallel area-based stereo matcher (GPSM) has been developed at UCL, originally f... more A geometrically parallel area-based stereo matcher (GPSM) has been developed at UCL, originally for SPOT satellite imagery. It uses an adaptive least squares correlation (ALSC) combined with a region growing control strategy. This matcher works well for small-scale imagery, but has difficulty matching aerial images due to their higher resolution (O.6m-2m/pixel). At this resolution large depth discontinuities and low and periodic texture are present due to man-made structures. These can cause the stereo matcher to converge to false matches and impede region growing leading to a reduction in match coverage, this makes it unsatisfactory for the production of dense Digital Elevation Models {DEMs}. A multi-resolution (MR) approach to stereo matching was investigated to try to mitigate against the effect of discontinuities by reducing their resolution to that encountered in SPOT imagery. As the first step in the investigation, a stereo image pyramid was formed with the lower resolution pairs matched serially and the original resolution ones matched in parallel on a MIMD architecture (a Transputer array). The results obtained with 5 levels of resolution demonstrated an increase in match coverage of 16% in comparison with 1 level and reduced apparent blundering.
Radio Frequency Identification (RFID) and Wireless Sensor Network (WSN) are the combined technolo... more Radio Frequency Identification (RFID) and Wireless Sensor Network (WSN) are the combined technologies that will spread in the near future to enter all of our everyday activities. However, the security of these technologies is very much vulnerable. Adding some security measures to small computation powered devices that cannot handle the available security algorithms is considered a challenge. However, even low powered devices must be protected in ways that will present sufficient computational challenges to adversaries. This paper introduces suggested steps to build a secure protocol for the combined RFID and WSN technology application systems. Moreover, it demonstrates the possible attacks and threats on these combined technologies by analyzing their system environment and finally it discusses the possible threats that may occur.
The major drawbacks of existing Distributed Knowledge Management Architectures (DKMAs) are highli... more The major drawbacks of existing Distributed Knowledge Management Architectures (DKMAs) are highlighted and a new organic reference architecture, which solves most of those drawbacks, is presented. The proposed reference architecture is based on a well-known organic model, the Viable Systems Model (VSM). The viable systems architecture provides a structure for the design and implementation of distributed enterprise systems using existing hardware and software components. This is done by building filters into the layers, and by adding critical success factors to components. Thus the information system can evolve based on responses from a feedback loop, and request actions from users where necessary.
2014 International Conference on Virtual Systems & Multimedia (VSMM), 2014
The RFID technology is recently predicted to spread in most of our daily lives. However, it is ve... more The RFID technology is recently predicted to spread in most of our daily lives. However, it is very much vulnerable as it faces some major security challenges and threats. Thus, RFID technology also provides the solutions for the security threats concerned with security, privacy, and authentication. This paper not only addresses security privacy and authentication but also proposes a lightweight mutual authentication suitable to be implemented for passive RFID tag. The proposed protocol is simple, low cost and low power consumption as well as efficient computation since it uses the simple and low cost shrinking generator that can be considered an alternative for the use of the one time pad algorithm.
This paper describes a mobile application with several features which can be used to teach Arabic... more This paper describes a mobile application with several features which can be used to teach Arabic sign language and to communicate using it. These features include translating from Arabic text to Arabic sign language, video chatting where two users can use the application to chat in Arabic sign language, SMS messaging and translating SMS messages to Arabic sign language, in addition to other features such as easy indexing for Arabic words and recording own sentence. The system is also evaluated in terms of performance and cost against other similar systems.
This paper presents a service based mobile application that assists tourists traveling to a count... more This paper presents a service based mobile application that assists tourists traveling to a country. The application provides tourists with context-aware information adapted to their personalized requirements. Detecting the real needs of the tourist is based on context management which is a key element in our system – Murshid. Advice to tourists is proposed after sensing the context and a fine analysis of its ingredients. Murshid is designed as client-server architecture and it uses GPS based location to provide a visual aid using UAE map. Murshid is flexible, user-friendly, portable, and support dynamic information. The application offers a set of services to tourists through their mobile handsets, namely: special event notification, sightseeing, weather forecasting, currency exchange, language translation, and location bookmarking and sharing. Each of the services recommends tourism guidance according to the user's context that is constantly changing since we are dealing with ...
[Proceedings] IGARSS'91 Remote Sensing: Global Monitoring for Earth Management, 1991
Area-Based Stereo Matching techniques such as the Adaptive Least-Squares Correlation Region Growi... more Area-Based Stereo Matching techniques such as the Adaptive Least-Squares Correlation Region Growing (ALSCRG) method [1,, require an initial set of corresponding points (seed points) in the left and right images to begin stereo matching. This set of initial seed points has, until now, usually been generated manually using a special purpose visual display program. This paper describes three interest operator based methods for automatic generation of seed points for SPOT satellite imagery (class l), aerial photographs digitised on a kern DSR-11 analytical plotter (class 2), and any other imagery with stereo-overlap (class 3.) Results for the three methods and a comparison of interest operators are also presented.
2009 International Conference for Internet Technology and Secured Transactions, (ICITST), 2009
The RFID technology is recently predicted to spread in most of our daily lives. However, it is ve... more The RFID technology is recently predicted to spread in most of our daily lives. However, it is very much vulnerable as it faces some major security challenges and threats. Thus, RFID technology also provides the solutions for the security threats concerned with security, privacy, and authentication. This paper not only addresses security privacy and authentication but also proposes a lightweight mutual authentication suitable to be implemented for passive RFID tag. The proposed protocol is simple, low cost and low power consumption as well as efficient computation since it uses the simple and low cost Shrinking Generator that can be considered an alternative for the use of the One Time Pad algorithm.