scispace - formally typeset
Search or ask a question
Author

Mohamed Elhoseny

Bio: Mohamed Elhoseny is an academic researcher from Mansoura University. The author has contributed to research in topics: Computer science & Encryption. The author has an hindex of 49, co-authored 240 publications receiving 7044 citations. Previous affiliations of Mohamed Elhoseny include Maharaja Agrasen Institute of Technology & Cairo University.

Papers published on a yearly basis

Papers
More filters
Posted ContentDOI
TL;DR: This work proposes the reliable, energy-efficient opportunistic protocol known as Density Clustering Opportunistic Routing Protocol (DCOR), which sends information opportunistically in emergencies and disasters through a density-clustering protocol.
Abstract: Due to the massive use of wireless Internet of Things (IoT), the advent of multimedia-big-data in recent decades poses numerous obstacles for successful contact with the virtual era. Mobile Adhoc Network-based IoT (MANET IoT) framework is increasingly common in this regard owing to its increased communication protocols and economic efficiency. MANET comprises arbitrary, battery-driven, roaming nodes that do not have architecture that can handle the traffic and control the IoT network. In MANET-IoT, energy usage and traffic management for the handling of MBD information are significant issues. For rapid and precise response, it is essential to route or forward information like the locations of happenings and defected in a disaster. However, it is difficult to transfer this information to the Wireless Sensor Network in disaster areas because the current networks are a disaster that has been removed. In these situations, the transmission of opportunistic knowledge may play a vital role. Current opportunistic protocols need large messages for the restoration of the cluster that leads to more energy consumption and packet loss. To overcome these issues, this work proposes the reliable, energy-efficient opportunistic protocol known as Opportunistic Density Clustering Routing Protocol. This method sends information opportunistically in emergencies and disasters through a density-clustering protocol. Results from simulations demonstrate that the designed protocol exceeds several well-known current routing mechanisms for network energy usage and dissemination of information.

4 citations

Journal ArticleDOI
TL;DR: A Tillage Operations Quality Optimization (TOQO) model is proposed that aims to improve the efficiency of tillage operations through integrating the Internet of Things (IoT) technology and a dynamic Decision Support System (DSS) for tillage machinery operation and process optimization.

4 citations

Journal ArticleDOI
TL;DR: In this article , an autonomous robot is designed to operate autonomously to extract useful information from the plants based on precise GPS localization using an RGB camera for plant detection and a multispectral camera for extracting the different special bands for processing, and an embedded architecture integrating a Nvidia Jetson Nano, which allows to perform the required processing.
Abstract: Our work is focused on developing an autonomous robot to monitor greenhouses and large fields. This system is designed to operate autonomously to extract useful information from the plants based on precise GPS localization. The proposed robot is based on an RGB camera for plant detection and a multispectral camera for extracting the different special bands for processing, and an embedded architecture integrating a Nvidia Jetson Nano, which allows us to perform the required processing. Our system uses a multi-sensor fusion to manage two parts of the algorithm. Therefore, the proposed algorithm was partitioned on the CPU-GPU embedded architecture. This allows us to process each image in 1.94 s in a sequential implementation on the embedded architecture. The approach followed in our implementation is based on a Hardware/Software Co-Design study to propose an optimal implementation. The experiments were conducted on a tomato farm, and the system showed that we can process different images in real time. The parallel implementation allows to process each image in 36 ms allowing us to satisfy the real-time constraints based on 5 images/s. On a laptop, we have a total processing time of 604 ms for the sequential implementation and 9 ms for the parallel processing. In this context, we obtained an acceleration factor of 66 for the laptop and 54 for the embedded architecture. The energy consumption evaluation showed that the prototyped system consumes a power between 4 W and 8 W. For this raison, in our case, we opted a low-cost embedded architecture based on Nvidia Jetson Nano.

4 citations

Book ChapterDOI
01 Jan 2019
TL;DR: The proposed idea attempts to monitor file integrity and acquire live data in a way that minimizes risk to the systems services and aims to help Forensic investigators by guarantee early data acquisition after incident and digital evidence validity as well.
Abstract: SCADA systems are network presence systems that face significant threats and attacks. After an attack occurred, SCADA requires forensic investigation to understand the cause and effects of the intrusion or disruption on the systems services. However, forensic investigators cannot turn it off during acquiring the live data that is required for the investigation and analysis process. That is because the systems services need to be continuously operational. Despite the great efforts to acquire live data on SCADA systems, the continuously change of this type of data and the risk on the systems services make it a big challenge. In this proposal, we suggest a new method to acquire live data on a SCADA system using wireless sensor network. The proposed idea attempts to monitor file integrity and acquire live data in a way that minimizes risk to the systems services. In addition, it aims to help Forensic investigators by guarantee early data acquisition after incident and digital evidence validity as well.

4 citations


Cited by
More filters
01 Jan 2004
TL;DR: Comprehensive and up-to-date, this book includes essential topics that either reflect practical significance or are of theoretical importance and describes numerous important application areas such as image based rendering and digital libraries.
Abstract: From the Publisher: The accessible presentation of this book gives both a general view of the entire computer vision enterprise and also offers sufficient detail to be able to build useful applications. Users learn techniques that have proven to be useful by first-hand experience and a wide range of mathematical methods. A CD-ROM with every copy of the text contains source code for programming practice, color images, and illustrative movies. Comprehensive and up-to-date, this book includes essential topics that either reflect practical significance or are of theoretical importance. Topics are discussed in substantial and increasing depth. Application surveys describe numerous important application areas such as image based rendering and digital libraries. Many important algorithms broken down and illustrated in pseudo code. Appropriate for use by engineers as a comprehensive reference to the computer vision enterprise.

3,627 citations

01 Jun 2005

3,154 citations

01 Sep 2008
TL;DR: The Methodology used to Prepare the Guideline Epidemiology Incidence Etiology and Recommendations for Assessing Response to Therapy Suggested Performance Indicators is summarized.
Abstract: Executive Summary Introduction Methodology Used to Prepare the Guideline Epidemiology Incidence Etiology Major Epidemiologic Points Pathogenesis Major Points for Pathogenesis Modifiable Risk Factors Intubation and Mechanical Ventilation Aspiration, Body Position, and Enteral Feeding Modulation of Colonization: Oral Antiseptics and Antibiotics Stress Bleeding Prophylaxis, Transfusion, and Glucose Control Major Points and Recommendations for Modifiable Risk Factors Diagnostic Testing Major Points and Recommendations for Diagnosis Diagnostic Strategies and Approaches Clinical Strategy Bacteriologic Strategy Recommended Diagnostic Strategy Major Points and Recommendations for Comparing Diagnostic Strategies Antibiotic Treatment of Hospital-acquired Pneumonia General Approach Initial Empiric Antibiotic Therapy Appropriate Antibiotic Selection and Adequate Dosing Local Instillation and Aerosolized Antibiotics Combination versus Monotherapy Duration of Therapy Major Points and Recommendations for Optimal Antibiotic Therapy Specific Antibiotic Regimens Antibiotic Heterogeneity and Antibiotic Cycling Response to Therapy Modification of Empiric Antibiotic Regimens Defining the Normal Pattern of Resolution Reasons for Deterioration or Nonresolution Evaluation of the Nonresponding Patient Major Points and Recommendations for Assessing Response to Therapy Suggested Performance Indicators

2,961 citations