Mohamed Jamal A Zemerly | KUSTAR (original) (raw)

Papers by Mohamed Jamal A Zemerly

Research paper thumbnail of EDPEPPS: A toolset for the design and performance evaluation of parallel applications

Lecture Notes in Computer Science, 1998

This paper describes a performance-oriented environment for the design of portable parallel softw... more This paper describes a performance-oriented environment for the design of portable parallel software. The environment consists of a graphical design tool based on the PVM communication library for building parallel algorithms, a state-of-the-art simulation engine, a CPU characteriser and a visualisation tool for animation of program execution and visualisation of platform and network performance measures and statistics. The toolset is used to model a virtual machine composed of a cluster of workstations interconnected by a local area network. The simulation model used is modular and its components are interchangeable which allows easy re-configuration of the platform. Both communication and CPU models are validated.

Research paper thumbnail of A Novel Hybrid Cellular Automata Based Cipher System for Internet of Things

Lecture Notes in Electrical Engineering, 2014

Research paper thumbnail of Ontology-based framework for context-aware mobile learning

… of the 2006 international conference on …, 2006

Mobile learning is becoming an important research topic as people are increasingly connected thro... more Mobile learning is becoming an important research topic as people are increasingly connected through smart phones that combine telephony, computing, messaging, and multimedia. The process of designing, communicating and presenting learning resources ...

Research paper thumbnail of Pro-active Multi-Dimensional Recommender System using Multi-Agents

International Journal of Interactive Mobile Technologies (iJIM), 2012

Abstract Recommender systems currently used in many applications, including tourism, tend to simp... more Abstract Recommender systems currently used in many applications, including tourism, tend to simply be reactive to user request. The recommender system proposed in this paper uses multi-agents and multi-dimensional contextual information to achieve proactive behavior. User profile and behavior get implicitly incorporated and subsequently updated in the system. The recommender system has been developed and applied to the tourism domain. It was tested and evaluated by relatively large set of real users The evaluation conducted ...

Research paper thumbnail of EDPEPPS: A toolset for the design and performance evaluation of parallel applications

Lecture Notes in Computer Science, 1998

Abstract. This paper describes a performance-oriented environment for the design of portable para... more Abstract. This paper describes a performance-oriented environment for the design of portable parallel software. The environment consists of a graphical design tool based on the PVM communication library for build-ing parallel algorithms, a state-of-the-art simulation engine, a CPU char- ...

Research paper thumbnail of iARBook: An Immersive Augmented Reality system for education

2014 Ieee International Conference on Teaching Assessment and Learning For Engineering, Dec 1, 2014

Research paper thumbnail of Augmented keyboard (a virtual keyboard interface for smart glasses)

Proceedings of the 13th Acm Siggraph International Conference, Nov 30, 2014

We present a novel virtual keyboard interface 'Augmented Keyboard' for a glass-type interface, i.... more We present a novel virtual keyboard interface 'Augmented Keyboard' for a glass-type interface, i.e., Smart glasses. An intuitive and easy-to-use interaction design is proposed in order to inherit the uses in QWERTY keyboard by employing the two features of hand: hand orientation and hand pose. We also address technical issues on the interface and present wrist estimation method and hand orientation method as the solutions. Extensive experiments show that the robust performance is achieved at 62 fps. Throughout this paper we demonstrated that the proposed interface is fully capable of the chat applications or the games for Smart glasses.

Research paper thumbnail of A Multi-Resolution Approach to Parallel Stereo Matching of Airborne Imagery

A geometrically parallel area-based stereo matcher (GPSM) has been developed at UCL, originally f... more A geometrically parallel area-based stereo matcher (GPSM) has been developed at UCL, originally for SPOT satellite imagery. It uses an adaptive least squares correlation (ALSC) combined with a region growing control strategy. This matcher works well for small-scale imagery, but has difficulty matching aerial images due to their higher resolution (O.6m-2m/pixel). At this resolution large depth discontinuities and low and periodic texture are present due to man-made structures. These can cause the stereo matcher to converge to false matches and impede region growing leading to a reduction in match coverage, this makes it unsatisfactory for the production of dense Digital Elevation Models {DEMs}. A multi-resolution (MR) approach to stereo matching was investigated to try to mitigate against the effect of discontinuities by reducing their resolution to that encountered in SPOT imagery. As the first step in the investigation, a stereo image pyramid was formed with the lower resolution pairs matched serially and the original resolution ones matched in parallel on a MIMD architecture (a Transputer array). The results obtained with 5 levels of resolution demonstrated an increase in match coverage of 16% in comparison with 1 level and reduced apparent blundering.

Research paper thumbnail of Parallel stereo and motion estimation

Research paper thumbnail of Parallel stereo matching of SPOT satellite images

Research paper thumbnail of HAMLET Training Specifications

Research paper thumbnail of HAMLET Toolset: Problems and Remedies in Installation, Use and

Research paper thumbnail of Security Threats and Challenges for RFID and WSN Integration

Radio Frequency Identification (RFID) and Wireless Sensor Network (WSN) are the combined technolo... more Radio Frequency Identification (RFID) and Wireless Sensor Network (WSN) are the combined technologies that will spread in the near future to enter all of our everyday activities. However, the security of these technologies is very much vulnerable. Adding some security measures to small computation powered devices that cannot handle the available security algorithms is considered a challenge. However, even low powered devices must be protected in ways that will present sufficient computational challenges to adversaries. This paper introduces suggested steps to build a secure protocol for the combined RFID and WSN technology application systems. Moreover, it demonstrates the possible attacks and threats on these combined technologies by analyzing their system environment and finally it discusses the possible threats that may occur.

Research paper thumbnail of A n Organic Distributed Knowledge Information Management Architecture

The major drawbacks of existing Distributed Knowledge Management Architectures (DKMAs) are highli... more The major drawbacks of existing Distributed Knowledge Management Architectures (DKMAs) are highlighted and a new organic reference architecture, which solves most of those drawbacks, is presented. The proposed reference architecture is based on a well-known organic model, the Viable Systems Model (VSM). The viable systems architecture provides a structure for the design and implementation of distributed enterprise systems using existing hardware and software components. This is done by building filters into the layers, and by adding critical success factors to components. Thus the information system can evolve based on responses from a feedback loop, and request actions from users where necessary.

Research paper thumbnail of Real-time sensor-fusion based indoor localization for mobile Augmented Reality

2014 International Conference on Virtual Systems & Multimedia (VSMM), 2014

Research paper thumbnail of RFID lightweight mutual authentication using shrinking generator

The RFID technology is recently predicted to spread in most of our daily lives. However, it is ve... more The RFID technology is recently predicted to spread in most of our daily lives. However, it is very much vulnerable as it faces some major security challenges and threats. Thus, RFID technology also provides the solutions for the security threats concerned with security, privacy, and authentication. This paper not only addresses security privacy and authentication but also proposes a lightweight mutual authentication suitable to be implemented for passive RFID tag. The proposed protocol is simple, low cost and low power consumption as well as efficient computation since it uses the simple and low cost shrinking generator that can be considered an alternative for the use of the one time pad algorithm.

Research paper thumbnail of Mobile Arabic sign language

This paper describes a mobile application with several features which can be used to teach Arabic... more This paper describes a mobile application with several features which can be used to teach Arabic sign language and to communicate using it. These features include translating from Arabic text to Arabic sign language, video chatting where two users can use the application to chat in Arabic sign language, SMS messaging and translating SMS messages to Arabic sign language, in addition to other features such as easy indexing for Arabic words and recording own sentence. The system is also evaluated in terms of performance and cost against other similar systems.

Research paper thumbnail of A Service-Based Mobile Tourist Advisor

This paper presents a service based mobile application that assists tourists traveling to a count... more This paper presents a service based mobile application that assists tourists traveling to a country. The application provides tourists with context-aware information adapted to their personalized requirements. Detecting the real needs of the tourist is based on context management which is a key element in our system – Murshid. Advice to tourists is proposed after sensing the context and a fine analysis of its ingredients. Murshid is designed as client-server architecture and it uses GPS based location to provide a visual aid using UAE map. Murshid is flexible, user-friendly, portable, and support dynamic information. The application offers a set of services to tourists through their mobile handsets, namely: special event notification, sightseeing, weather forecasting, currency exchange, language translation, and location bookmarking and sharing. Each of the services recommends tourism guidance according to the user's context that is constantly changing since we are dealing with ...

Research paper thumbnail of Automatic Seed Point Generation For Stereo Matching And Multi-image Registration

[Proceedings] IGARSS'91 Remote Sensing: Global Monitoring for Earth Management, 1991

Area-Based Stereo Matching techniques such as the Adaptive Least-Squares Correlation Region Growi... more Area-Based Stereo Matching techniques such as the Adaptive Least-Squares Correlation Region Growing (ALSCRG) method [1,, require an initial set of corresponding points (seed points) in the left and right images to begin stereo matching. This set of initial seed points has, until now, usually been generated manually using a special purpose visual display program. This paper describes three interest operator based methods for automatic generation of seed points for SPOT satellite imagery (class l), aerial photographs digitised on a kern DSR-11 analytical plotter (class 2), and any other imagery with stereo-overlap (class 3.) Results for the three methods and a comparison of interest operators are also presented.

Research paper thumbnail of RFID lightweight mutual authentication using shrinking generator

2009 International Conference for Internet Technology and Secured Transactions, (ICITST), 2009

The RFID technology is recently predicted to spread in most of our daily lives. However, it is ve... more The RFID technology is recently predicted to spread in most of our daily lives. However, it is very much vulnerable as it faces some major security challenges and threats. Thus, RFID technology also provides the solutions for the security threats concerned with security, privacy, and authentication. This paper not only addresses security privacy and authentication but also proposes a lightweight mutual authentication suitable to be implemented for passive RFID tag. The proposed protocol is simple, low cost and low power consumption as well as efficient computation since it uses the simple and low cost Shrinking Generator that can be considered an alternative for the use of the One Time Pad algorithm.

Research paper thumbnail of EDPEPPS: A toolset for the design and performance evaluation of parallel applications

Lecture Notes in Computer Science, 1998

This paper describes a performance-oriented environment for the design of portable parallel softw... more This paper describes a performance-oriented environment for the design of portable parallel software. The environment consists of a graphical design tool based on the PVM communication library for building parallel algorithms, a state-of-the-art simulation engine, a CPU characteriser and a visualisation tool for animation of program execution and visualisation of platform and network performance measures and statistics. The toolset is used to model a virtual machine composed of a cluster of workstations interconnected by a local area network. The simulation model used is modular and its components are interchangeable which allows easy re-configuration of the platform. Both communication and CPU models are validated.

Research paper thumbnail of A Novel Hybrid Cellular Automata Based Cipher System for Internet of Things

Lecture Notes in Electrical Engineering, 2014

Research paper thumbnail of Ontology-based framework for context-aware mobile learning

… of the 2006 international conference on …, 2006

Mobile learning is becoming an important research topic as people are increasingly connected thro... more Mobile learning is becoming an important research topic as people are increasingly connected through smart phones that combine telephony, computing, messaging, and multimedia. The process of designing, communicating and presenting learning resources ...

Research paper thumbnail of Pro-active Multi-Dimensional Recommender System using Multi-Agents

International Journal of Interactive Mobile Technologies (iJIM), 2012

Abstract Recommender systems currently used in many applications, including tourism, tend to simp... more Abstract Recommender systems currently used in many applications, including tourism, tend to simply be reactive to user request. The recommender system proposed in this paper uses multi-agents and multi-dimensional contextual information to achieve proactive behavior. User profile and behavior get implicitly incorporated and subsequently updated in the system. The recommender system has been developed and applied to the tourism domain. It was tested and evaluated by relatively large set of real users The evaluation conducted ...

Research paper thumbnail of EDPEPPS: A toolset for the design and performance evaluation of parallel applications

Lecture Notes in Computer Science, 1998

Abstract. This paper describes a performance-oriented environment for the design of portable para... more Abstract. This paper describes a performance-oriented environment for the design of portable parallel software. The environment consists of a graphical design tool based on the PVM communication library for build-ing parallel algorithms, a state-of-the-art simulation engine, a CPU char- ...

Research paper thumbnail of iARBook: An Immersive Augmented Reality system for education

2014 Ieee International Conference on Teaching Assessment and Learning For Engineering, Dec 1, 2014

Research paper thumbnail of Augmented keyboard (a virtual keyboard interface for smart glasses)

Proceedings of the 13th Acm Siggraph International Conference, Nov 30, 2014

We present a novel virtual keyboard interface 'Augmented Keyboard' for a glass-type interface, i.... more We present a novel virtual keyboard interface 'Augmented Keyboard' for a glass-type interface, i.e., Smart glasses. An intuitive and easy-to-use interaction design is proposed in order to inherit the uses in QWERTY keyboard by employing the two features of hand: hand orientation and hand pose. We also address technical issues on the interface and present wrist estimation method and hand orientation method as the solutions. Extensive experiments show that the robust performance is achieved at 62 fps. Throughout this paper we demonstrated that the proposed interface is fully capable of the chat applications or the games for Smart glasses.

Research paper thumbnail of A Multi-Resolution Approach to Parallel Stereo Matching of Airborne Imagery

A geometrically parallel area-based stereo matcher (GPSM) has been developed at UCL, originally f... more A geometrically parallel area-based stereo matcher (GPSM) has been developed at UCL, originally for SPOT satellite imagery. It uses an adaptive least squares correlation (ALSC) combined with a region growing control strategy. This matcher works well for small-scale imagery, but has difficulty matching aerial images due to their higher resolution (O.6m-2m/pixel). At this resolution large depth discontinuities and low and periodic texture are present due to man-made structures. These can cause the stereo matcher to converge to false matches and impede region growing leading to a reduction in match coverage, this makes it unsatisfactory for the production of dense Digital Elevation Models {DEMs}. A multi-resolution (MR) approach to stereo matching was investigated to try to mitigate against the effect of discontinuities by reducing their resolution to that encountered in SPOT imagery. As the first step in the investigation, a stereo image pyramid was formed with the lower resolution pairs matched serially and the original resolution ones matched in parallel on a MIMD architecture (a Transputer array). The results obtained with 5 levels of resolution demonstrated an increase in match coverage of 16% in comparison with 1 level and reduced apparent blundering.

Research paper thumbnail of Parallel stereo and motion estimation

Research paper thumbnail of Parallel stereo matching of SPOT satellite images

Research paper thumbnail of HAMLET Training Specifications

Research paper thumbnail of HAMLET Toolset: Problems and Remedies in Installation, Use and

Research paper thumbnail of Security Threats and Challenges for RFID and WSN Integration

Radio Frequency Identification (RFID) and Wireless Sensor Network (WSN) are the combined technolo... more Radio Frequency Identification (RFID) and Wireless Sensor Network (WSN) are the combined technologies that will spread in the near future to enter all of our everyday activities. However, the security of these technologies is very much vulnerable. Adding some security measures to small computation powered devices that cannot handle the available security algorithms is considered a challenge. However, even low powered devices must be protected in ways that will present sufficient computational challenges to adversaries. This paper introduces suggested steps to build a secure protocol for the combined RFID and WSN technology application systems. Moreover, it demonstrates the possible attacks and threats on these combined technologies by analyzing their system environment and finally it discusses the possible threats that may occur.

Research paper thumbnail of A n Organic Distributed Knowledge Information Management Architecture

The major drawbacks of existing Distributed Knowledge Management Architectures (DKMAs) are highli... more The major drawbacks of existing Distributed Knowledge Management Architectures (DKMAs) are highlighted and a new organic reference architecture, which solves most of those drawbacks, is presented. The proposed reference architecture is based on a well-known organic model, the Viable Systems Model (VSM). The viable systems architecture provides a structure for the design and implementation of distributed enterprise systems using existing hardware and software components. This is done by building filters into the layers, and by adding critical success factors to components. Thus the information system can evolve based on responses from a feedback loop, and request actions from users where necessary.

Research paper thumbnail of Real-time sensor-fusion based indoor localization for mobile Augmented Reality

2014 International Conference on Virtual Systems & Multimedia (VSMM), 2014

Research paper thumbnail of RFID lightweight mutual authentication using shrinking generator

The RFID technology is recently predicted to spread in most of our daily lives. However, it is ve... more The RFID technology is recently predicted to spread in most of our daily lives. However, it is very much vulnerable as it faces some major security challenges and threats. Thus, RFID technology also provides the solutions for the security threats concerned with security, privacy, and authentication. This paper not only addresses security privacy and authentication but also proposes a lightweight mutual authentication suitable to be implemented for passive RFID tag. The proposed protocol is simple, low cost and low power consumption as well as efficient computation since it uses the simple and low cost shrinking generator that can be considered an alternative for the use of the one time pad algorithm.

Research paper thumbnail of Mobile Arabic sign language

This paper describes a mobile application with several features which can be used to teach Arabic... more This paper describes a mobile application with several features which can be used to teach Arabic sign language and to communicate using it. These features include translating from Arabic text to Arabic sign language, video chatting where two users can use the application to chat in Arabic sign language, SMS messaging and translating SMS messages to Arabic sign language, in addition to other features such as easy indexing for Arabic words and recording own sentence. The system is also evaluated in terms of performance and cost against other similar systems.

Research paper thumbnail of A Service-Based Mobile Tourist Advisor

This paper presents a service based mobile application that assists tourists traveling to a count... more This paper presents a service based mobile application that assists tourists traveling to a country. The application provides tourists with context-aware information adapted to their personalized requirements. Detecting the real needs of the tourist is based on context management which is a key element in our system – Murshid. Advice to tourists is proposed after sensing the context and a fine analysis of its ingredients. Murshid is designed as client-server architecture and it uses GPS based location to provide a visual aid using UAE map. Murshid is flexible, user-friendly, portable, and support dynamic information. The application offers a set of services to tourists through their mobile handsets, namely: special event notification, sightseeing, weather forecasting, currency exchange, language translation, and location bookmarking and sharing. Each of the services recommends tourism guidance according to the user's context that is constantly changing since we are dealing with ...

Research paper thumbnail of Automatic Seed Point Generation For Stereo Matching And Multi-image Registration

[Proceedings] IGARSS'91 Remote Sensing: Global Monitoring for Earth Management, 1991

Area-Based Stereo Matching techniques such as the Adaptive Least-Squares Correlation Region Growi... more Area-Based Stereo Matching techniques such as the Adaptive Least-Squares Correlation Region Growing (ALSCRG) method [1,, require an initial set of corresponding points (seed points) in the left and right images to begin stereo matching. This set of initial seed points has, until now, usually been generated manually using a special purpose visual display program. This paper describes three interest operator based methods for automatic generation of seed points for SPOT satellite imagery (class l), aerial photographs digitised on a kern DSR-11 analytical plotter (class 2), and any other imagery with stereo-overlap (class 3.) Results for the three methods and a comparison of interest operators are also presented.

Research paper thumbnail of RFID lightweight mutual authentication using shrinking generator

2009 International Conference for Internet Technology and Secured Transactions, (ICITST), 2009

The RFID technology is recently predicted to spread in most of our daily lives. However, it is ve... more The RFID technology is recently predicted to spread in most of our daily lives. However, it is very much vulnerable as it faces some major security challenges and threats. Thus, RFID technology also provides the solutions for the security threats concerned with security, privacy, and authentication. This paper not only addresses security privacy and authentication but also proposes a lightweight mutual authentication suitable to be implemented for passive RFID tag. The proposed protocol is simple, low cost and low power consumption as well as efficient computation since it uses the simple and low cost Shrinking Generator that can be considered an alternative for the use of the One Time Pad algorithm.