
Ayman HaggagHelwan University · Faculty of Technology and Education
Ayman Haggag
Associate Professor
About
92
Publications
35,738
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
340
Citations
Introduction
Ayman Haggag was born in Cairo, Egypt in 1971. He received his B.Sc. degree from Ain Shams University, Egypt, in June 1994, M.Sc. degree from Eindhoven University of Technology, The Netherlands, in December 1997, and Ph.D. degree from Chiba University, Japan, in September 2008. Since March 1996, he has been with the Electronics Technology Dept., Faculty of Industrial Education, Helwan University, Egypt. His current research interests are in the fields of Network Security and Wireless Security.
Additional affiliations
October 2008 - present
January 1996 - June 1997
October 2008 - present
Education
September 1989 - June 1994
Publications
Publications (92)
Software Defined Networking (SDN) has a great impact on networks and data communication. The future of the infrastructure for networks will be different. Network administrators will no longer need to configure every router or switch, and it will be unnecessary to program or write their configurations individually. A central control device is used t...
This paper aims to provide a fast method to decrypt short encrypted messages that consist of 10 letters by using the technique of trained Feed-Forward Artificial Neural Network (FF-ANN). The use of artificial neural network is one of the methods of artificial intelligence, a method that mainly depends on increasing the training of the network on ma...
In this paper, an effective multimodal biometric identification approach for human authentication tool based on face and voice recognition fusion is proposed. Cepstral coefficients and statistical coefficients are employed to extract features of voice recognition and these two coefficients are compared. Face recognition features are extracted utili...
The authentication of the Wireless Body Area Networks (WBANs) nodes is a vital factor in its medical applications. This paper, investigates methods of authentication over these networks. Also, an effective unimodal and multimodal biometrics identification approaches based on individual face and voice recognition or combined using different fusion t...
A compact ultra-wideband (UWB) Multiple-Input-Multiple-Output (MIMO) antenna with a notched band is presented. The proposed design consists of four unipolar UWB radiators, and these monopole radiators are placed perpendicular to each other to exploit polarization diversity, where the four-element ultra-wideband (UWB) Multiple-Input-Multiple-Output...
In today’s digital age, there is an increasing demand for integrated wireless and wired technologies; however, there is a difficulty in achieving secure and reliable communications within buildings and facilities. This paper presents a proposal for maintaining the infrastructure while expanding it to implement communication technologies with high t...
In today's digital age, there is an increasing demand for integrated wireless and wired technologies; however, there is a difficulty in achieving secure and reliable communications within buildings and facilities. This paper presents a proposal for maintaining the infrastructure while expanding it to implement communication technologies with high t...
The researcher conducted a study with the aim of studying the role of educational software in developing e-learning skills for the Faculty of Technology and Education.
Due to the essential using of mask face in various fields and critical situations, there is urgent need to develop techniques for identifying personality to be more effective in presence the mask face. Also, Muslim women who wear Hijab and multiheme man, they suffer from the traditional identifying processes. Facial recognition techniques have beco...
The pivotal role of electrochemistry in biologically relevant systems is underscored by its ability to elucidate the chemical interactions occurring in neural networks of the brain. This has been significantly enhanced by advancements in electrochemical principles, spurred by the mid-20th-century technological revolution. Recent advancements in ele...
Low-power wireless sensing-based networks suffer from many constraints and challenges. In this research work, efficient power source has been designed to provide the need of energy for the Wireless Sensor Networks (WSNs) and Wireless Body Area Networks (WBANs). The energy sources are the main challenge and constraint these wireless networks applica...
Due to the essential using of mask face in various fields and critical situations, there is urgent need to develop techniques for identifying personality to be more effective in presence the mask face. Also, Muslim women who wear Higab, they suffer from the traditional identifying processes. Facial recognition techniques have become ineffective wit...
The researchers aimed to evaluate the competencies of digital learning among teachers of industrial technical secondary education in light of Egypt's vision 2030 AD , and the researchers used the descriptive approach on a sample in a deliberate way of industrial technical education teachers in secondary industrial technical education schools in the...
The proposed visions for the sixth generation wireless communications network indicate that it will have the ability to transmit massive amounts of data in a very short time. These visions require the sixth-generation network to have a high level of security. This paper focuses on the confidentiality and privacy of data on the sixth-generation wire...
Industry 4.0 technologies need to plan reactive and Preventive Maintenance (PM) strategies for their production lines. This applied research study aims to employ the Predictive Maintenance (PdM) technology with advanced automation technologies to counter all expected maintenance problems. Moreover, the deep learning based AI is employed to interpre...
The necessity for access to a high data rate has been the motivation behind expanding new technologies. The increasing of wireless devices has caused the radio wave spectrum to become congested. Additionally, radio waves cannot be used in EMI-vulnerable places. Hence, the interest in visible light communication (VLC) offers real alternatives to rad...
There is a large number of connected devices in the Internet of Things (IoT) networks that are typically several orders of magnitude bigger than enterprise networks and campus networks. The exponential increase in the number of interconnected smart devices is expected to exceed 60 billion smart objects shortly. The requirements needed for IoT netwo...
Neural computing systems (neural engineering) are the future of the technological revolution due to their low power consumption, high performance, adaptability and faster data processing compared to von Neumann architecture. So, it has become the new architecture for processing, neural computing is the mainstay of any kind of artificial neural netw...
Neuromorphic computing systems are the future of the technological revolution due to their containment of multiple processing layers, low energy consumption, high performance, adaptability, faster data processing and ability to work in parallel. Neuromorphic computing mimics the way information is processed inside the human brain compared to Von Ne...
Software-defined networks offer a new approach that attracts the attention of most academic and industrial circles due to the features it contains. However, some loopholes make such modern networks vulnerable to many types of attacks. Among the most important types of these attacks is the Distributed Denial of Service (DDoS) attack, which in turn a...
Electricity generation from the sun, the most important renewable energy source, has significant environmental, health, and economic benefits. As a result, many countries intend to invest heavily in improving this technology and constructing more solar power plants. Environmental conditions (such as temperature, humidity, solar radiation, and dust...
Industry 4.0 technologies need to plan reactive maintenance and Preventive Maintenance (PM) strategies for their production machines. However, preventive maintenance cannot predict the future faults or conditions of the machine components in advance to prevent halting the production cycle. This study aims to use a Predictive Maintenance (PdM) techn...
Software-Defined Networks (SDN) is a modern networking model characterized by many features by which the network can be configured more easily and managed at lower cost and higher efficiency to cope with the requirements of the current era of technology, which requires much more network automation and flexibility than traditional networks. The tech...
Software-Defined Networking (SDN) is a computer network that promises to enhance the infrastructure and architecture of networks. SDN depends mainly on decoupling the control plane from the data plane. In SDN, the control plane is implemented outside the forwarding element (OpenFlow switch). The SDN controller is considered the basic component in t...
The utilization of the most recent Artificial Intelligence (AI) technologies in the process of making decisions on construction site operation techniques is proposed in this research. Knowledge Base System is one branch of AI that is based on Expert Systems as project management can be treated as an optimization and configuration problem. Computer...
Motivations: • An Integrated Multi criteria design proposed for the first solar city in Egypt • Considering the weather and the environmental factors in the design • Achieve the over-unity concept where the city produces energy more than its need • The design considerations; solar cell physics, environment, weather, energy, architecture in Egypt
This article proposes a design of the world's first complete solar city, where this city produces more energy than what it consumes. The architecture design of the city is accomplished by Sketchup software which was used to design buildings and facilities within this city integrated with Skelion solar design plugin renewable energy extension. The P...
Software-Defined Networks (SDN) have gained a great interest among both academic and industry professionals. As this direction has not yet reached maturity, there is still a lot of research needed to help make it a dominant industrial technology choice. This paper presents the current status and identifies the future trends of SDN networks. Several...
Repeaters are used in long optical fiber communications to post signal strength to compensate for the losses incurred during data transmission and to increase signal to power ratio. There are various parameters affecting spacing between repeaters used in fiber such as photodiode sensitivity, Stimulated Raman Scattering (SRS), Stimulated Brillouin S...
CLA adder performance analysis with considering the power efficiency and delay time.
In this paper, a triple-band U-shaped antenna is designed for better mobile communication performance to support 5G networks. The antenna is designed with dimensions of 91 x 92.5 mm and a thickness of 1.57 mm. The thickness of 1.57mm gives a design to the capacity of the GSM antenna and allows it to cover the multi-frequency band between 9.-2.4GHz....
Advancement requires efficient technologies help learners to be active and responsive in learning and practicing. Virtual laboratories can be utilized to promote educational and training skills and can be used in the future as the primary instructional instruments. In this paper, we propose a mechanism depends on the use of LabVIEW simulation tool...
During the pandemic spread of COVID-19, it is very essential to develop modern and technology-based alternatives for traditional education. Virtual laboratories promote education and will be used in the future as the primary instructional instruments. Learning in a virtual laboratory minimizes teachers' worries about time, expenses, or hazards invo...
This research studies the problem of poor practical skills that qualify for the labor market related to the course of electronic communications for industrial high school students in electronics. This is due to the lack of electronic communication curricula for electronics specialization to the modern technologies for communication devices, which i...
There is a recent explosion of interest around blockchains. The aim of this presentation is to investigate the current state of blockchain technology and its applications and to highlight how specific characteristics of this new technology can revolutionise researches. We identify various research gaps and future directions that are expected to be...
This study proposes a simulation model for the PV module based on a precise mathematical model extracted from a simplified equivalent circuit for the PV module. The proposed simulation uses two input variable signals (sun radiation and temperature) to get the P-V and V-I characteristics. For the practical application of this proposed simulation mod...
This research work presents a study of applying Thermo-Electric Generator (TEG) in different regions in the Egyptian environment. The difference in the temperatures between the hot side and the cold side of the TEG generates electricity with an efficiency that reaches about 5% of the thermal energy. This study is beneficial for floating solar stati...
This article presents ultra-wideband (UWB) rectangular microstrip antennas centered at 6GHz. For obtaining UWB, enhancement gain, a double layer microstrip antenna is proposed. The lower layer was etched by rectangular microstrip patch and two slots cutting in the metal ground plane. The patch acts as an exciter and the slots as a radiator, and sec...
Software defined Network (SDN) has shown a great interest since its emergence. The extreme efficiency in comparison with traditional networks and its agility introduced by separating control and data planes provided many benefits to the market. Yet, there are many challenges accompanied with this agility, leading to many security concerns and threa...
Research works of Wireless Sensor Networks (WSNs) applications and its constraints solutions occupy wide area around the world and attract many researchers. In this paper, an important one of environmental WSN applications is presented that is the water monitoring applications. An efficient approach for monitoring and controlling water parameters i...
In this paper, the design of a band notched Ultra Wide Band (UWB) antenna for achieving optimum performances like wide bandwidth, good matching impedance, and small antenna size is presented. The designed antenna is fabricated on a compact substrate with a size of 30mm by 30mm and 1.57mm thickness. The antenna covers the UWB range from 3.1 GHz to 1...
Dissolved Gas Analysis (DGA) of liquid insulation is an effective means for diagnosing power transformers. The gas contents in insulating oil can be gathered on-line and off-line to indicate the health condition of the transformers, thereafter there are many interpretations of the gas contents. In this work, Seven-fuzzy interpretation modules are i...
Enhancement of Power Transformer State of Health Diagnostics Based on Fuzzy Logic System of DGA
Design efficient an interactive system for water pollution monitoring and quality control is proposed in this paper utilizing different sensors and employing Information Communication Technology (ICT). The presented system is built based on the pH and temperature water parameters. The system consists of sensors, Arduino controller and designed Grap...
Design efficient an interactive system for water pollution monitoring and quality control is proposed in this paper utilizing different sensors and employing Information Communication Technology (ICT). The presented system is built based on the pH and temperature water parameters. The system consists of sensors, Arduino controller and designed Grap...
This paper proposes a multimodal biometric scheme for human authentication based on fusion of voice and face recognition. For voice recognition, three categories of features (statistical coefficients, cepstral coefficients and voice timbre) are used and compared. The voice identification modality is carried out using Gaussian Mixture Model (GMM). F...
In this study, converting acoustic to electric energy was achieved via the Disk Jockey (DJ) model TG5000, which worked as a noise source, and the piezoelectric model 7BB-41–2, which worked as a transducer. We proposed different states of piezoelectric transducer’s mounting on DJ and examined the results to determine the optimum state for maximizati...
Electric Vehicles (EVs) are considered to be one of the most promising advancements to decarbonise the road transport. However, the realisation and sustainability of this technology demand the availability of public electrical chargers and fast charging techniques to substantially reduce the long charging time of conventional charging techniques. T...
Due to the rise in power electronic based appliances and loads in distribution systems, grave concerns about the harmonic distortion level in the power system network are growing. Consequently, it became essential for the sustainable and robust design of a distribution system that the intensity of the harmonic pollution caused by different non-line...
Optimum Charging Rate for a Lithium-ion Battery using COMSOL LiveLink for Matlab Model
Analysis and Mitigation of Harmonics Caused by Air Conditioners in a Distribution System
In this study, converting acoustic to electric energy is achieved via the Disk Jockey (DJ) model of TG 5000 which works as a noise source and the piezoelectric model number of 7BB-41-2 as a transducer element. We propose different states of piezoelectric transducer's mounting on DJ and test them to maximize the converted power. The best results for...
In this study a new noise source is proposed as a one of renewable energy sources in energy harvesting. Disk Jokey (DJ) is a common device in celebrations and other events. Converting the produced noise from DJ to electric energy by using a suitable piezoelectric transducer is the main aim of this study. Piezoelectric sensors are used to convert th...
Acoustic Energy Conversion into Useful Electric Energy from Disk Jockey by Using Piezoelectric Transducers
An important aspect of the building services system which can have a major effect on the provision of occupant comfort within a building is the adopted control strategy. This paper investigates the use of a supervised fuzzy controller as a means of achieving good standards of comfort provision for occupants while maintaining or improving energy and...
Channel Quality Driven Data Rate (CQDDR) play main role in the throughput factor over IEEE 802.15.1 Bluetooth network. CQDDR is employed to selects the packet size by Received Signal Strength Indicator (RSSI) over Bluetooth network according to channel conditions. This paper tries to improve the throughput over Bluetooth system in classic and Enhan...
Some of applications need multi-level security. The paper proposes a novel approach IEEE 802.15.1 Bluetooth network to provide better secure link for essential applications. It proposes a new approach for audio watermarking using the singular value decomposition (SVD) mathematical technique. This approach is based on embedding the encrypted image i...
Channel Quality Driven Data Rate (CQDDR) is employed to selects the packet size by Received Signal Strength Indicator (RSSI) over Bluetooth network according to channel conditions. This paper tries to improve the throughput over Bluetooth system in classic and Enhanced Data Rate (EDR) packets. The paper studies the adaptive Bluetooth packet format...
In this paper, we propose the transmission of audio signals over the asynchronous connectionless (ACL) link in Bluetooth systems. In traditional Bluetooth systems, audio signals are transmitted over the synchronous connection-oriented (SCO) link, which has a limited data rate. The SCO link requires the transmission of two, four, or six slots for tr...
In this paper, a throughput improvement for wireless Bluetooth link by using adaptive packets is presented. Channel Quality Driven Data Rate (CQDDR) is employed to select the packet size by Received Signal Strength Indicator (RSSI) over Bluetooth network according to channel conditions. In this paper we improve the throughput over Bluetooth system...
Security of data exchanged over networks and data communication systems has always been a great concern. While many network security techniques have been developed and used, security and flexible handling of media, including adaptation, are traditionally conflicting goals, and security is often incorporated in a media distribution system in a media...
Security and flexible adaptation of media are traditionally conflicting goals. JPEG 2000 is a scalable and flexible image encoding standard that contains a set of protocols for interactive access called the JPEG 2000 Interactive Protocol (JPIP). In this paper, we propose an image encryption and access control method that preserves the structure of...
Content Aware Network Security for Scalable JPEG 2000 Multimedia
Security of data exchanged over networks and data communication systems has always been a great concern. While many network security techniques have been developed and used, security and flexible handling of media, including adaptation, are traditionally conflicting goals, and security is often incorporated in a media distribution system in a media...
This paper proposes a control method for buck converters using an adaptive sliding mode control (SMC) with simple adaptive control (SAC). The controller is designed to monitor the output voltage of the buck converter, and to use it and its derivations to adaptively change the control parameters to keep the output voltage error minimal corresponding...
Security and flexible adaptation of media are traditionally conflicting goals. JPEG 2000 is a scalable and flexible image encoding standard that contains a set of protocols for interactive access called JPEG 2000 Interactive Protocol (JPIP). In this paper we propose an image encryption and access control method that preserves the structure of JPEG...