Ayman Haggag

Ayman Haggag
Helwan University · Faculty of Technology and Education

Associate Professor

About

92
Publications
35,738
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
340
Citations
Introduction
Ayman Haggag was born in Cairo, Egypt in 1971. He received his B.Sc. degree from Ain Shams University, Egypt, in June 1994, M.Sc. degree from Eindhoven University of Technology, The Netherlands, in December 1997, and Ph.D. degree from Chiba University, Japan, in September 2008. Since March 1996, he has been with the Electronics Technology Dept., Faculty of Industrial Education, Helwan University, Egypt. His current research interests are in the fields of Network Security and Wireless Security.
Additional affiliations
October 2008 - present
Helwan University
Position
  • Professor (Assistant)
January 1996 - June 1997
Eindhoven University of Technology
Position
  • Master's Student
October 2008 - present
Helwan University
Position
  • Professor (Assistant)
Education
September 1989 - June 1994
Ain Shams University
Field of study
  • Electronics and Communication

Publications

Publications (92)
Article
Full-text available
Software Defined Networking (SDN) has a great impact on networks and data communication. The future of the infrastructure for networks will be different. Network administrators will no longer need to configure every router or switch, and it will be unnecessary to program or write their configurations individually. A central control device is used t...
Article
Full-text available
This paper aims to provide a fast method to decrypt short encrypted messages that consist of 10 letters by using the technique of trained Feed-Forward Artificial Neural Network (FF-ANN). The use of artificial neural network is one of the methods of artificial intelligence, a method that mainly depends on increasing the training of the network on ma...
Article
Full-text available
In this paper, an effective multimodal biometric identification approach for human authentication tool based on face and voice recognition fusion is proposed. Cepstral coefficients and statistical coefficients are employed to extract features of voice recognition and these two coefficients are compared. Face recognition features are extracted utili...
Article
Full-text available
The authentication of the Wireless Body Area Networks (WBANs) nodes is a vital factor in its medical applications. This paper, investigates methods of authentication over these networks. Also, an effective unimodal and multimodal biometrics identification approaches based on individual face and voice recognition or combined using different fusion t...
Article
Full-text available
A compact ultra-wideband (UWB) Multiple-Input-Multiple-Output (MIMO) antenna with a notched band is presented. The proposed design consists of four unipolar UWB radiators, and these monopole radiators are placed perpendicular to each other to exploit polarization diversity, where the four-element ultra-wideband (UWB) Multiple-Input-Multiple-Output...
Article
Full-text available
In today’s digital age, there is an increasing demand for integrated wireless and wired technologies; however, there is a difficulty in achieving secure and reliable communications within buildings and facilities. This paper presents a proposal for maintaining the infrastructure while expanding it to implement communication technologies with high t...
Article
In today's digital age, there is an increasing demand for integrated wireless and wired technologies; however, there is a difficulty in achieving secure and reliable communications within buildings and facilities. This paper presents a proposal for maintaining the infrastructure while expanding it to implement communication technologies with high t...
Article
Full-text available
The researcher conducted a study with the aim of studying the role of educational software in developing e-learning skills ‬for the Faculty of Technology and Education.
Article
Full-text available
Due to the essential using of mask face in various fields and critical situations, there is urgent need to develop techniques for identifying personality to be more effective in presence the mask face. Also, Muslim women who wear Hijab and multiheme man, they suffer from the traditional identifying processes. Facial recognition techniques have beco...
Article
Full-text available
The pivotal role of electrochemistry in biologically relevant systems is underscored by its ability to elucidate the chemical interactions occurring in neural networks of the brain. This has been significantly enhanced by advancements in electrochemical principles, spurred by the mid-20th-century technological revolution. Recent advancements in ele...
Article
Full-text available
Low-power wireless sensing-based networks suffer from many constraints and challenges. In this research work, efficient power source has been designed to provide the need of energy for the Wireless Sensor Networks (WSNs) and Wireless Body Area Networks (WBANs). The energy sources are the main challenge and constraint these wireless networks applica...
Preprint
Full-text available
Due to the essential using of mask face in various fields and critical situations, there is urgent need to develop techniques for identifying personality to be more effective in presence the mask face. Also, Muslim women who wear Higab, they suffer from the traditional identifying processes. Facial recognition techniques have become ineffective wit...
Article
Full-text available
The researchers aimed to evaluate the competencies of digital learning among teachers of industrial technical secondary education in light of Egypt's vision 2030 AD , and the researchers used the descriptive approach on a sample in a deliberate way of industrial technical education teachers in secondary industrial technical education schools in the...
Preprint
Full-text available
The proposed visions for the sixth generation wireless communications network indicate that it will have the ability to transmit massive amounts of data in a very short time. These visions require the sixth-generation network to have a high level of security. This paper focuses on the confidentiality and privacy of data on the sixth-generation wire...
Article
Full-text available
Industry 4.0 technologies need to plan reactive and Preventive Maintenance (PM) strategies for their production lines. This applied research study aims to employ the Predictive Maintenance (PdM) technology with advanced automation technologies to counter all expected maintenance problems. Moreover, the deep learning based AI is employed to interpre...
Article
Full-text available
The necessity for access to a high data rate has been the motivation behind expanding new technologies. The increasing of wireless devices has caused the radio wave spectrum to become congested. Additionally, radio waves cannot be used in EMI-vulnerable places. Hence, the interest in visible light communication (VLC) offers real alternatives to rad...
Article
Full-text available
There is a large number of connected devices in the Internet of Things (IoT) networks that are typically several orders of magnitude bigger than enterprise networks and campus networks. The exponential increase in the number of interconnected smart devices is expected to exceed 60 billion smart objects shortly. The requirements needed for IoT netwo...
Thesis
Full-text available
Neural computing systems (neural engineering) are the future of the technological revolution due to their low power consumption, high performance, adaptability and faster data processing compared to von Neumann architecture. So, it has become the new architecture for processing, neural computing is the mainstay of any kind of artificial neural netw...
Chapter
Full-text available
Neuromorphic computing systems are the future of the technological revolution due to their containment of multiple processing layers, low energy consumption, high performance, adaptability, faster data processing and ability to work in parallel. Neuromorphic computing mimics the way information is processed inside the human brain compared to Von Ne...
Article
Full-text available
Software-defined networks offer a new approach that attracts the attention of most academic and industrial circles due to the features it contains. However, some loopholes make such modern networks vulnerable to many types of attacks. Among the most important types of these attacks is the Distributed Denial of Service (DDoS) attack, which in turn a...
Article
Full-text available
Electricity generation from the sun, the most important renewable energy source, has significant environmental, health, and economic benefits. As a result, many countries intend to invest heavily in improving this technology and constructing more solar power plants. Environmental conditions (such as temperature, humidity, solar radiation, and dust...
Preprint
Full-text available
Industry 4.0 technologies need to plan reactive maintenance and Preventive Maintenance (PM) strategies for their production machines. However, preventive maintenance cannot predict the future faults or conditions of the machine components in advance to prevent halting the production cycle. This study aims to use a Predictive Maintenance (PdM) techn...
Article
Full-text available
Software-Defined Networks (SDN) is a modern networking model characterized by many features by which the network can be configured more easily and managed at lower cost and higher efficiency to cope with the requirements of the current era of technology, which requires much more network automation and flexibility than traditional networks. The tech...
Article
Full-text available
Software-Defined Networking (SDN) is a computer network that promises to enhance the infrastructure and architecture of networks. SDN depends mainly on decoupling the control plane from the data plane. In SDN, the control plane is implemented outside the forwarding element (OpenFlow switch). The SDN controller is considered the basic component in t...
Article
Full-text available
The utilization of the most recent Artificial Intelligence (AI) technologies in the process of making decisions on construction site operation techniques is proposed in this research. Knowledge Base System is one branch of AI that is based on Expert Systems as project management can be treated as an optimization and configuration problem. Computer...
Presentation
Full-text available
Motivations: • An Integrated Multi criteria design proposed for the first solar city in Egypt • Considering the weather and the environmental factors in the design • Achieve the over-unity concept where the city produces energy more than its need • The design considerations; solar cell physics, environment, weather, energy, architecture in Egypt
Conference Paper
Full-text available
This article proposes a design of the world's first complete solar city, where this city produces more energy than what it consumes. The architecture design of the city is accomplished by Sketchup software which was used to design buildings and facilities within this city integrated with Skelion solar design plugin renewable energy extension. The P...
Article
Full-text available
Software-Defined Networks (SDN) have gained a great interest among both academic and industry professionals. As this direction has not yet reached maturity, there is still a lot of research needed to help make it a dominant industrial technology choice. This paper presents the current status and identifies the future trends of SDN networks. Several...
Article
Full-text available
Repeaters are used in long optical fiber communications to post signal strength to compensate for the losses incurred during data transmission and to increase signal to power ratio. There are various parameters affecting spacing between repeaters used in fiber such as photodiode sensitivity, Stimulated Raman Scattering (SRS), Stimulated Brillouin S...
Presentation
Full-text available
CLA adder performance analysis with considering the power efficiency and delay time.
Article
Full-text available
In this paper, a triple-band U-shaped antenna is designed for better mobile communication performance to support 5G networks. The antenna is designed with dimensions of 91 x 92.5 mm and a thickness of 1.57 mm. The thickness of 1.57mm gives a design to the capacity of the GSM antenna and allows it to cover the multi-frequency band between 9.-2.4GHz....
Article
Full-text available
Advancement requires efficient technologies help learners to be active and responsive in learning and practicing. Virtual laboratories can be utilized to promote educational and training skills and can be used in the future as the primary instructional instruments. In this paper, we propose a mechanism depends on the use of LabVIEW simulation tool...
Article
Full-text available
During the pandemic spread of COVID-19, it is very essential to develop modern and technology-based alternatives for traditional education. Virtual laboratories promote education and will be used in the future as the primary instructional instruments. Learning in a virtual laboratory minimizes teachers' worries about time, expenses, or hazards invo...
Article
Full-text available
This research studies the problem of poor practical skills that qualify for the labor market related to the course of electronic communications for industrial high school students in electronics. This is due to the lack of electronic communication curricula for electronics specialization to the modern technologies for communication devices, which i...
Presentation
Full-text available
There is a recent explosion of interest around blockchains. The aim of this presentation is to investigate the current state of blockchain technology and its applications and to highlight how specific characteristics of this new technology can revolutionise researches. We identify various research gaps and future directions that are expected to be...
Article
Full-text available
This study proposes a simulation model for the PV module based on a precise mathematical model extracted from a simplified equivalent circuit for the PV module. The proposed simulation uses two input variable signals (sun radiation and temperature) to get the P-V and V-I characteristics. For the practical application of this proposed simulation mod...
Article
Full-text available
This research work presents a study of applying Thermo-Electric Generator (TEG) in different regions in the Egyptian environment. The difference in the temperatures between the hot side and the cold side of the TEG generates electricity with an efficiency that reaches about 5% of the thermal energy. This study is beneficial for floating solar stati...
Article
Full-text available
This article presents ultra-wideband (UWB) rectangular microstrip antennas centered at 6GHz. For obtaining UWB, enhancement gain, a double layer microstrip antenna is proposed. The lower layer was etched by rectangular microstrip patch and two slots cutting in the metal ground plane. The patch acts as an exciter and the slots as a radiator, and sec...
Article
Full-text available
Software defined Network (SDN) has shown a great interest since its emergence. The extreme efficiency in comparison with traditional networks and its agility introduced by separating control and data planes provided many benefits to the market. Yet, there are many challenges accompanied with this agility, leading to many security concerns and threa...
Article
Full-text available
Research works of Wireless Sensor Networks (WSNs) applications and its constraints solutions occupy wide area around the world and attract many researchers. In this paper, an important one of environmental WSN applications is presented that is the water monitoring applications. An efficient approach for monitoring and controlling water parameters i...
Article
Full-text available
In this paper, the design of a band notched Ultra Wide Band (UWB) antenna for achieving optimum performances like wide bandwidth, good matching impedance, and small antenna size is presented. The designed antenna is fabricated on a compact substrate with a size of 30mm by 30mm and 1.57mm thickness. The antenna covers the UWB range from 3.1 GHz to 1...
Conference Paper
Full-text available
Dissolved Gas Analysis (DGA) of liquid insulation is an effective means for diagnosing power transformers. The gas contents in insulating oil can be gathered on-line and off-line to indicate the health condition of the transformers, thereafter there are many interpretations of the gas contents. In this work, Seven-fuzzy interpretation modules are i...
Presentation
Full-text available
Enhancement of Power Transformer State of Health Diagnostics Based on Fuzzy Logic System of DGA
Article
Full-text available
Design efficient an interactive system for water pollution monitoring and quality control is proposed in this paper utilizing different sensors and employing Information Communication Technology (ICT). The presented system is built based on the pH and temperature water parameters. The system consists of sensors, Arduino controller and designed Grap...
Article
Full-text available
Design efficient an interactive system for water pollution monitoring and quality control is proposed in this paper utilizing different sensors and employing Information Communication Technology (ICT). The presented system is built based on the pH and temperature water parameters. The system consists of sensors, Arduino controller and designed Grap...
Article
Full-text available
This paper proposes a multimodal biometric scheme for human authentication based on fusion of voice and face recognition. For voice recognition, three categories of features (statistical coefficients, cepstral coefficients and voice timbre) are used and compared. The voice identification modality is carried out using Gaussian Mixture Model (GMM). F...
Article
Full-text available
In this study, converting acoustic to electric energy was achieved via the Disk Jockey (DJ) model TG5000, which worked as a noise source, and the piezoelectric model 7BB-41–2, which worked as a transducer. We proposed different states of piezoelectric transducer’s mounting on DJ and examined the results to determine the optimum state for maximizati...
Conference Paper
Full-text available
Electric Vehicles (EVs) are considered to be one of the most promising advancements to decarbonise the road transport. However, the realisation and sustainability of this technology demand the availability of public electrical chargers and fast charging techniques to substantially reduce the long charging time of conventional charging techniques. T...
Conference Paper
Full-text available
Due to the rise in power electronic based appliances and loads in distribution systems, grave concerns about the harmonic distortion level in the power system network are growing. Consequently, it became essential for the sustainable and robust design of a distribution system that the intensity of the harmonic pollution caused by different non-line...
Presentation
Full-text available
Optimum Charging Rate for a Lithium-ion Battery using COMSOL LiveLink for Matlab Model
Presentation
Full-text available
Analysis and Mitigation of Harmonics Caused by Air Conditioners in a Distribution System
Article
Full-text available
In this study, converting acoustic to electric energy is achieved via the Disk Jockey (DJ) model of TG 5000 which works as a noise source and the piezoelectric model number of 7BB-41-2 as a transducer element. We propose different states of piezoelectric transducer's mounting on DJ and test them to maximize the converted power. The best results for...
Conference Paper
Full-text available
In this study a new noise source is proposed as a one of renewable energy sources in energy harvesting. Disk Jokey (DJ) is a common device in celebrations and other events. Converting the produced noise from DJ to electric energy by using a suitable piezoelectric transducer is the main aim of this study. Piezoelectric sensors are used to convert th...
Presentation
Full-text available
Acoustic Energy Conversion into Useful Electric Energy from Disk Jockey by Using Piezoelectric Transducers
Article
Full-text available
An important aspect of the building services system which can have a major effect on the provision of occupant comfort within a building is the adopted control strategy. This paper investigates the use of a supervised fuzzy controller as a means of achieving good standards of comfort provision for occupants while maintaining or improving energy and...
Conference Paper
Full-text available
Channel Quality Driven Data Rate (CQDDR) play main role in the throughput factor over IEEE 802.15.1 Bluetooth network. CQDDR is employed to selects the packet size by Received Signal Strength Indicator (RSSI) over Bluetooth network according to channel conditions. This paper tries to improve the throughput over Bluetooth system in classic and Enhan...
Conference Paper
Full-text available
Some of applications need multi-level security. The paper proposes a novel approach IEEE 802.15.1 Bluetooth network to provide better secure link for essential applications. It proposes a new approach for audio watermarking using the singular value decomposition (SVD) mathematical technique. This approach is based on embedding the encrypted image i...
Conference Paper
Full-text available
Channel Quality Driven Data Rate (CQDDR) is employed to selects the packet size by Received Signal Strength Indicator (RSSI) over Bluetooth network according to channel conditions. This paper tries to improve the throughput over Bluetooth system in classic and Enhanced Data Rate (EDR) packets. The paper studies the adaptive Bluetooth packet format...
Conference Paper
Full-text available
In this paper, we propose the transmission of audio signals over the asynchronous connectionless (ACL) link in Bluetooth systems. In traditional Bluetooth systems, audio signals are transmitted over the synchronous connection-oriented (SCO) link, which has a limited data rate. The SCO link requires the transmission of two, four, or six slots for tr...
Conference Paper
Full-text available
In this paper, a throughput improvement for wireless Bluetooth link by using adaptive packets is presented. Channel Quality Driven Data Rate (CQDDR) is employed to select the packet size by Received Signal Strength Indicator (RSSI) over Bluetooth network according to channel conditions. In this paper we improve the throughput over Bluetooth system...
Thesis
Full-text available
Security of data exchanged over networks and data communication systems has always been a great concern. While many network security techniques have been developed and used, security and flexible handling of media, including adaptation, are traditionally conflicting goals, and security is often incorporated in a media distribution system in a media...
Article
Full-text available
Security and flexible adaptation of media are traditionally conflicting goals. JPEG 2000 is a scalable and flexible image encoding standard that contains a set of protocols for interactive access called the JPEG 2000 Interactive Protocol (JPIP). In this paper, we propose an image encryption and access control method that preserves the structure of...
Presentation
Full-text available
Content Aware Network Security for Scalable JPEG 2000 Multimedia
Conference Paper
Full-text available
Security of data exchanged over networks and data communication systems has always been a great concern. While many network security techniques have been developed and used, security and flexible handling of media, including adaptation, are traditionally conflicting goals, and security is often incorporated in a media distribution system in a media...
Conference Paper
Full-text available
This paper proposes a control method for buck converters using an adaptive sliding mode control (SMC) with simple adaptive control (SAC). The controller is designed to monitor the output voltage of the buck converter, and to use it and its derivations to adaptively change the control parameters to keep the output voltage error minimal corresponding...
Conference Paper
Full-text available
Security and flexible adaptation of media are traditionally conflicting goals. JPEG 2000 is a scalable and flexible image encoding standard that contains a set of protocols for interactive access called JPEG 2000 Interactive Protocol (JPIP). In this paper we propose an image encryption and access control method that preserves the structure of JPEG...