scispace - formally typeset
Search or ask a question
Author

Salah Haj Ismail

Bio: Salah Haj Ismail is an academic researcher from Yıldırım Beyazıt University. The author has contributed to research in topics: Refugee & Flexibility (engineering). The author has an hindex of 4, co-authored 12 publications receiving 127 citations. Previous affiliations of Salah Haj Ismail include Universiti Sains Malaysia & University of Aleppo.

Papers
More filters
Proceedings ArticleDOI
15 Mar 2016
TL;DR: The paper demonstrates the feasibility of realizing a complete end-to-end smart health system responding to the real health system design requirements by taking in consideration wider vital human health parameters such as respiration rate, nerves signs ... etc.
Abstract: Health monitoring systems have rapidly evolved recently, and smart systems have been proposed to monitor patient current health conditions, in our proposed and implemented system, we focus on monitoring the patient's blood pressure, and his body temperature. Based on last decade statistics of medical records, death rates due to hypertensive heart disease, shows that the blood pressure is a crucial risk factor for atherosclerosis and ischemic heart diseases; thus, preventive measures should be taken against high blood pressure which provide the ability to track, trace and save patient's life at appropriate time is an essential need for mankind. Nowadays, Globalization demands Smart cities, which involves many attributes and services, such as government services, Intelligent Transportation Systems (ITS), energy, health care, water and waste. This paper proposes a system architecture for smart healthcare based on GSM and GPS technologies. The objective of this work is providing an effective application for Real Time Health Monitoring and Tracking. The system will track, trace, monitor patients and facilitate taking care of their health; so efficient medical services could be provided at appropriate time. By Using specific sensors, the data will be captured and compared with a configurable threshold via microcontroller which is defined by a specialized doctor who follows the patient; in any case of emergency a short message service (SMS) will be sent to the Doctor's mobile number along with the measured values through GSM module. furthermore, the GPS provides the position information of the monitored person who is under surveillance all the time. Moreover, the paper demonstrates the feasibility of realizing a complete end-to-end smart health system responding to the real health system design requirements by taking in consideration wider vital human health parameters such as respiration rate, nerves signs … etc. The system will be able to bridge the gap between patients — in dramatic health change occasions- and health entities who response and take actions in real time fashion.

84 citations

Journal ArticleDOI
TL;DR: This work presents a MAC protocol that is suitable for WSN where its nodes are assigned to a linear topology and demonstrates the validity of the MAC by building a complete end-to-end road traffic monitoring system using 4 Jennic nodes deployed in an indoor environment.
Abstract: Wireless Sensor Networks (WSNs) consist of large number of sensor nodes. Each node is empowered by a com-munication interface that is mainly characterized by low power, short transmission distance and minimal data rate such as the maximum data rate in ZigBee technology is 256 kbps, while approximately the physical transmission range between 10 to 20 meters. Currently, WSN Technology is being distributed over a large roadway of areas, in order to monitor traffic and environmental data. This approach allows several Intelligent Transport Systems (ITSs) applications to exploit the primary collected data in order to generate intelligent decisions based on earlier valuable selected information. Therefore, in this work we present a MAC protocol that is suitable for WSN where its nodes are assigned to a linear topology. The investigated protocol is realized by adapting an already existing Jennic MAC protocol. We demonstrate the validity of the MAC by building a complete end-to-end road traffic monitoring system using 4 Jennic nodes deployed in an indoor environment with the aim to prove the MAC potential in meeting the expectations of ITS applications. It is appropriate to mention that the proposed implementation just considers stationary WSN nodes.

6 citations

01 Jan 2018
TL;DR: A method to find out public social media accounts of refugees, and trace them back to infer temporal and spatial events to lead to better understanding of the obstacles they face which they fear to express in direct interviews and inquests.
Abstract: In this paper, we propose a method to find out public social media accounts of refugees, and trace them back to infer temporal and spatial events.These data will have many future applications in planning and design of solutions for their problems and needs, starting from legislations and social ones, to architectural and housing needs.It will lead to better understanding of the obstacles they face which they fear to express in direct interviews and inquests. In this first application, we present our method to retrieve information from social media, share the characteristics of the data gathered and perform initial analysis with a discussion of future opportunities and difficulties.

5 citations

Journal ArticleDOI
01 Oct 2017
TL;DR: In this article, the authors proposed a concept for transitional single-family housing for IDPs based upon the adobe tradition in the rural areas of Aleppo, which integrated as much of the local building materials in the Aleppo region as possible using existing regional building traditions.
Abstract: The scale of destruction caused by seven years of on-going war in Syria has caused mass migration of the Syrian people within and outside of Syria. The situation calls for a means to provide the internally displaced persons (IDPs) within Syria with humane post-war affordable housing that can be quickly and easily built with few resources. Fossil fuel resources are not only scarce because of the war, but are also being used as a valuable commodity to finance the war economy, and thus, housing should minimize consumption of energy for heating and cooling because of the fossil fuel scarcity while providing high thermal comfort to the inhabitants. The housing parameters for the proposed solution are to integrate as much of the local building materials in the Aleppo region as possible using existing regional building traditions. Imported products such as building materials, machinery, equipment, as well as foreign labour and knowhow are to be kept to a minimum while incorporating recycled rubble from destroyed buildings. A comparative study of current disaster relief housing illustrates the appropriateness of each design solution in relation to the above-proposed housing parameters. A detailed analysis of the physical properties of an existing case study building in Dabiq, a town 40 km northeast of Aleppo, outlines the strengths and weaknesses of the building tradition to determine which aspects of the construction may be improved for better thermal comfort and resistance against earthquakes. The simulation results from WUFI Plus show the building behaviour of the case study house. This paper offers a concept for transitional single-family housing for IDPs based upon the adobe tradition in the rural areas of Aleppo. Reducing the heating and cooling loads can also drastically reduce fossil fuel requirements during the construction and operation phases of the single-family homes while maintaining a high level of indoor thermal comfort. Traditional construction techniques can potentially employ more craftspeople combined with manual labour instead of using automated systems. The relative safety of the rural areas can thus be increased, as storage and use of fossil fuels in the villages will be decreased allowing for quicker resettlement with less disruption from war.

4 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: This survey will help the industry and research community synthesize and identify the requirements for Fog computing and present some open issues, which will determine the future research direction for the Fog computing paradigm.
Abstract: Emerging technologies such as the Internet of Things (IoT) require latency-aware computation for real-time application processing. In IoT environments, connected things generate a huge amount of data, which are generally referred to as big data. Data generated from IoT devices are generally processed in a cloud infrastructure because of the on-demand services and scalability features of the cloud computing paradigm. However, processing IoT application requests on the cloud exclusively is not an efficient solution for some IoT applications, especially time-sensitive ones. To address this issue, Fog computing, which resides in between cloud and IoT devices, was proposed. In general, in the Fog computing environment, IoT devices are connected to Fog devices. These Fog devices are located in close proximity to users and are responsible for intermediate computation and storage. One of the key challenges in running IoT applications in a Fog computing environment are resource allocation and task scheduling. Fog computing research is still in its infancy, and taxonomy-based investigation into the requirements of Fog infrastructure, platform, and applications mapped to current research is still required. This survey will help the industry and research community synthesize and identify the requirements for Fog computing. This paper starts with an overview of Fog computing in which the definition of Fog computing, research trends, and the technical differences between Fog and cloud are reviewed. Then, we investigate numerous proposed Fog computing architectures and describe the components of these architectures in detail. From this, the role of each component will be defined, which will help in the deployment of Fog computing. Next, a taxonomy of Fog computing is proposed by considering the requirements of the Fog computing paradigm. We also discuss existing research works and gaps in resource allocation and scheduling, fault tolerance, simulation tools, and Fog-based microservices. Finally, by addressing the limitations of current research works, we present some open issues, which will determine the future research direction for the Fog computing paradigm.

376 citations

Book
01 Jan 1933

235 citations

Journal ArticleDOI
TL;DR: In the early 20th century, graphic design was almost entirely conventionalized as mentioned in this paper and layouts were symmetrical, centered, and symmetric, with a welter of decorative rules and borders.
Abstract: Before the first World War, graphic design was almost entirely conventionalized. Layouts were symmetrical, centered. Variety and interest were achieved by using different type faces, different sizes and weights of type (bold, italic etc.), and by employing a welter of decorative rules and borders. Illustrations and vignettes, either drawings or photographs, might accompany the printed text; but they were rarely integrated, essential parts of typographic compositions.

202 citations

Journal ArticleDOI
TL;DR: A comprehensive survey on state-of-the-art IoT literature over the period 2008–2018 is presented and the FECIoT framework which covers the enabling technologies, services, and open research issues is proposed, progressing from basic to more advanced concepts within the IoT domain.
Abstract: The Internet-of-Things (IoT) is the future of the Internet, where everything will be connected. Studies have revealed that fog/edge computing-based services will play a major role in extending the cloud by carrying out intermediary services at the edge of the network. Fog/edge computing-based IoT’s (FECIoT) distributed architecture enhances service provisioning along the Cloud-to-Things continuum, thereby making it suitable for mission-critical applications. Furthermore, the proximity of fog/edge devices to where the data is produced makes it stand-out in terms of resource allocation, service delivery, and privacy. From the business perspective, FECIoT will lead to a boom and spring up of small-to-medium-sized enterprises, thereby encouraging inclusion for all. To this end, we present a comprehensive survey on state-of-the-art IoT literature over the period 2008–2018 and propose the FECIoT framework which covers the enabling technologies, services, and open research issues. A tutorial approach is employed, progressing from basic to more advanced concepts within the IoT domain. Lastly, we show how FECIoT can be deployed in real-life cyber-physical systems, such as the intelligent transportation system, smart grid, smart health-care, smart homes, and smart environment.

188 citations

Journal ArticleDOI
TL;DR: A generic IoMT framework that consists of three main components, data acquisition, communication gateways, and servers/cloud, to meet the aforementioned challenges is shown.

179 citations