I am highly motivated in the specialized areas of wireless sensor networks for distributed systems, I.T., programming and web based systems. This is supported by an excellent academic background, and a strong ability to acquire and implement new methods, or techniques within my chosen areas. One of my strengths is having a flexible approach towards working arrangements, especially within a team based environment. Throughout my career I have shown to be a conscientious and a very approachable individual. Such qualities provide me with excellent communication skills with people of all levels and backgrounds. My research interest includes the following: Sensor Technology, Mobile Adhock Networks, Videos over Sensor Networks. Programming languages: C, C++, C#, Java, Scala, Pascal, Visual basic, Prolog, SML,. Web Programming based languages such s PHP, JSP, ect. Simulation tools :NS2, Castalia, Omint++, ect. IDEs: Netbean,Eclips. Compiler Design Based Language: JavaCC.
Monitoring older bridges using Wireless Sensor Networks (WSNs) has had a lot of attention in recent years. In much of this research tasks like sensor data processing, environment states and events decision making are done by a remote server. A Structural Health Monitoring (SHM) application using WSNs to provide the data collection necessary for rapid structural assessment after an event such as a natural disaster has been simulated in this paper. Efficient MAC and routing protocols must be designed for the proposed application to offer a guarantee for the reliability of the data delivered from source nodes to a sink. The number of delivered reports, delay and the lifetime of the network are considered in the proposed application. As a result, a new cross layer protocol based on MAC and routing protocols is designed and simulated for SHM application taking different scenarios into consideration and results are presented in this paper. Simulation results show that the proposed protocol increases performance of the target application, in varies scenarios.
2015-04
Network Protocols and Algorithms
(Issue : 3)
(Volume : 6)
Routing protocols and quality of services for security based applications using wireless video sensor networks
Wireless video sensor networks have been a hot topic in recent years; the monitoring capability is the central feature of the services offered by a wireless video sensor network can be classified into three major categories: monitoring, alerting, and information on-demand. These features have been applied to a large number of applications related to the environment (agriculture, water, forest and fire detection), military, buildings, health (elderly people and home monitoring), disaster relief, area and industrial monitoring. Security applications oriented toward critical infrastructures and disaster relief are very important applications that many countries have identified as critical in the near future. This paper aims to design a cross layer based protocol to provide the required quality of services for security related applications using wireless video sensor networks. Energy saving, delay and reliability for the delivered data are crucial in the proposed application. Simulation results show that the proposed cross layer based protocol offers a good performance in term of providing the required quality of services for the proposed application.
2014-08
International Journal of Advanced Smart Sensor Network Systems (IJASSN)
(Issue : 2)
(Volume : 4)
A cross layer protocol based on mac and routing protocols for healthcare applications using wireless sensor networks
Using Wireless Sensor Networks (WSNs) in healthcare systems has had a lot of attention in recent years. In much of this research tasks like sensor data processing, health states decision making and emergency message sending are done by a remote server. Many patients with lots of sensor data consume a great deal of communication resources, bring a burden to the remote server and delay the decision time and notification time. A healthcare application for elderly people using WSN has been simulated in this paper. A WSN designed for the proposed healthcare application needs efficient MAC and routing protocols to provide a guarantee for the reliability of the data delivered from the patients to the medical centre. Based on these requirements, A cross layer based on the modified versions of APTEEN and GinMAC has been designed and implemented, with new features, such as a mobility module and routes discovery algorithms have been added. Simulation results show that the proposed cross layer based protocol can conserve energy for nodes and provide the required performance such as life time of the network, delay and reliability for the proposed healthcare application.
2014-04
Journal of Emerging Trends in Computing and Information Sciences
(Issue : 4)
(Volume : 5)
Wireless sensor networks: MAC protocols and mobility management module for real-time applications
Wireless Sensor Networks (WSNs) detect events using one or more sensors, then collect data from detected events using these sensors. This data is aggregated and forwarded to a base station(sink) through wireless communication to provide the required operations. Different kinds of MAC and routing protocols need to be
designed for WSN in order to guarantee data delivery from
the source nodes to the sink. GinMAC has been simulated
for real time applications, where energy saving, delay
and reliability need to be considered. Mobility module
for GinMAC has been implemented. According to the
simulation results, GinMAC can be applied for real time
applications in both mobile and static scenarios. However,
GinMAC needs some improvement for its performance in
term of energy saving and also efficient routing protocols
needs to be designed to cooperate with GinMAC in order
to provide the required performances in the proposed
applications. Our future plans are given at the end of
this paper
2014-04
Thesis
2016-02-29
Cross layer based protocols for critical applications using WSNs
PhD thesis
2016
2009
Graph order implementation using jGraphT
Master thesis
2025
Conference
2019 International Conference on Advanced Science and Engineering (ICOASE),
2019-03
Video Information Hiding Based on Feature Points and Arnold Cat Algorithm
Information hiding has brought a lot of attention in recent years. In much of this research tasks, different techniques were considered where data could be prevented from stealing. This will avoid any possible risk it may happen to our data. Due to the challenges involved in designing different security algorithms using hiding based aspects such as the nature of wireless communication, literature has proposed new algorithms in order to increase the security of the data. Steganography has been used to hide data using media cover to deal with the right target. However, these techniques have different issues regarding the visual quality, capacity, and robustness. Based on this, we proposed a new method of steganography to make the balance between all factors by using the feature points. The proposed method also improves the layer of security for the hidden data due to applying Arnold Cat algorithm on secret message prior to the embedding stage
ICWMC 2013
2013-07
Wireless sensor networks: MAC protocols and mobility management module for real-time applications
Wireless Sensor Networks (WSNs) detect
events using one or more sensors, then collect data from
detected events using these sensors. This data is aggregated
and forwarded to a base station(sink) through wireless
communication to provide the required operations. Dif-
ferent kinds of MAC and routing protocols need to be
designed for WSN in order to guarantee data delivery from
the source nodes to the sink. GinMAC has been simulated
for real time applications, where energy saving, delay
and reliability need to be considered. Mobility module
for GinMAC has been implemented. According to the
simulation results, GinMAC can be applied for real time
applications in both mobile and static scenarios. However,
GinMAC needs some improvement for its performance in
term of energy saving and also efficient routing protocols
needs to be designed to cooperate with GinMAC in order
to provide the required performances in the proposed
applications. Our future plans are given at the end of
this paper.
PGNet2012
2012-06
Wireless sensor networks: MAC protocols and real time applications
Wireless Sensor Networks (WSNs) detect events using one or more sensors, then collect data from detected events using these sensors. This data is aggregated and forwarded to a base station (sink) through wireless communication to provide the required operations. Different kinds of MAC and routing protocols need to be designed for WSN in order to guarantee data delivery from the source nodes to the sink. Some of the proposed MAC protocols for WSN with their techniques, advantages and disadvantages in the terms of their suitability for real time applications are discussed in this paper. We have concluded that most of these protocols can not be applied to real time applications without improvement
ATVA, LNCS
2009-02
Automatic verification of dynamic data-dependent programs
We present a new approach for automatic verification of data-dependent programs manipulating dynamic heaps. A heap is encoded by a graph where the nodes represent the cells, and the edges reflect the pointer structure between the cells of the heap. Each cell contains a set of variables which range over the natural numbers. Our method relies on standard backward reachability analysis, where the main idea is to use a simple set of predicates, called signatures, in order to represent bad sets of heaps. Examples of bad heaps are those which contain either garbage, lists which are not well-formed, or lists which are not sorted. We present the results for the case of programs with a single next-selector, and where variables may be compared for equality or inequality. This allows us to verify for instance that a program, like bubble sort or insertion sort, returns a list which is well-formed and sorted, or that the merging of two sorted lists is a new sorted list. We will report on the result of running a prototype based on the method on a number of programs.