Salama A. Mostafa
Universiti Tun Hussin Onn Malaysia

Published : 5 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 5 Documents
Search

Social networking mobile apps framework for organizing and facilitating charitable and voluntary activities in Malaysia Salama A. Mostafa; Aida Mustapha; Palaniappan Shamala; Omar Ibrahim Obaid; Bashar Ahmed Khalaf
Bulletin of Electrical Engineering and Informatics Vol 9, No 2: April 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (272.887 KB) | DOI: 10.11591/eei.v9i2.2075

Abstract

Numerous non-profit driven establishments depend on volunteers to help achieve their administrative targets. Despite the fact that volunteers work side-by-side or now and again substitute representatives in delivering services, inputting volunteer work into non-profit ventures of delivering services presents remarkable difficulties. Understanding these difficulties provides a significant fundamental building step in comprehending the influence these challenges have on service developmental plans and operations when utilizing volunteers. In this study, the paper brings forward a Charity Fundraising Information System (CFIS) framework and presents the modelling and evaluation of a plan and operational variables applicable to volunteer fulfilment in non-profit driven organizations. Discoveries indicate that fulfilled volunteers are bound to stay longer with the same establishment, give monetarily to the non-profit driven organization, and prescribe the volunteer involvement to other people. Every one of these results guarantees the continuous sustenance of the non-profit driven establishment.
A low complexity partial transmit sequence approach based on hybrid segmentation scheme Ali Hussein Fadel; Hasanain H. Razzaq; Salama A. Mostafa
Bulletin of Electrical Engineering and Informatics Vol 9, No 6: December 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v9i6.2520

Abstract

The partial transmit sequences (PTS) is regarded as a promising scheme for inhibiting ‎the high peak-to-average power ratio (PAPR) problem in the orthogonal frequency division ‎multiplexing (OFDM) systems. The PTS scheme relies on partitioning the ‎data sequence into subsets and weighting these subsets by a group of the phase rotation ‎factors. Although the PTS can efficiently reduce the high PAPR value, a great ‎computational complexity (CC) level restricts the utilization of the PTS scheme in practical ‎applications. In PTS, there are three common types of segmentation schemes; ‎interleaving (IL-PTS), pseudo-random (PR-PTS), and adjacent (Ad-PTS) schemes. This ‎paper presents a new algorithm named hybrid pseudo-random and interleaving cosine wave shape ‎‎(H-PRC-PTS) by combining the PR-PTS scheme and the symmetrical ‎interleaving cosine wave shape (S-IL-C-PTS) scheme which was proposed in our previous ‎work. The results indicate that the suggested algorithms can ‎diminish the PAPR value like the PR-PTS scheme, whereas the CC level is reduced significantly.
An enhanced fireworks algorithm to generate prime key for multiple users in fingerprinting domain Hussein Ali Ismael; Jamal Mustafa Abbas; Salama A. Mostafa; Ali Hussein Fadel
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2521

Abstract

This work presents a new method to enhance the performance of fireworks algorithm to generate a prime key for multiple users. A threshold technique in image segmentation is used as one of the major steps. It is used processing the digital image. Some useful algorithms and methods for dividing and sharing an image, including measuring, recognizing, and recognizing, are common. In this research, we proposed a hybrid technique of fireworks and camel herd algorithms (HFCA), where Fireworks are based on 3-dimension (3D) logistic chaotic maps. Both, the Otsu method and the convolution technique are used in the pre-processing image for further analysis. The Otsu is employed to segment the image and find the threshold for each image, and convolution is used to extract the features of the used images. The sample of the images consists of two images of fingerprints taken from the Biometric System Lab (University of Bologna). The performance of the anticipated method is evaluated by using FVC2004 dataset. The results of the work enhanced algorithm, so quick response code (QRcode) is used to generate a stream key by using random text or number, which is a class of symmetric-key algorithm that operates on individual bits or bytes.
Mobile ad-hoc network routing protocols of time-critical events for search and rescue missions Marwan Hamid Hassan; Salama A. Mostafa; Hairulnizam Mahdin; Aida Mustapha; Azizul Azhar Ramli; Mustafa Hamid Hassan; Mohammed Ahmed Jubair
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2506

Abstract

The most important experiences we discovered from several disasters are that cellular networks were vulnerable, and the loss of the communication system may have a catastrophic consequence. Mobile ad-hoc networks (MANETs) play a significant role in the construction of campus, resident, battlefield and search/rescue region. MANET is an appropriate network for supporting a communication where is no permanent infrastructure. MANET is an effective network that uses to establishing urgent communication between rescue members in critical situations like, disaster or natural calamities. The sending and receiving data in MANET is depending on the routing protocols to adapt the dynamic topology and maintain the routing information. Consequently, This paper evaluates the performance of three routing protocols in MANET: ad-hoc on-demand distance vector (AODV), destination sequenced distance vector (DSDV), and ad-hoc on-demand multipath distance vector (AOMDV). These protocols are inherent from different types of routing protocols: single-path, multi-path, reactive and proactive mechanisms. The NS2 simulator is utilized to evaluate the quality of these protocols. Several metrics are used to assess the performance of these protocols such: packet delivery ratio (PDR), packet loss ratios (PLR), throughput (TP), and end-to-end delay (E2E delay). The outcomes reveal the AOMDV is the most suitable protocol for time-critical events of search and rescue missions.
Analyzing the impact of the number of nodes on the performance of the routing protocols in manet environment Hussein M. Haglan; Salama A. Mostafa; Noor Zuraidin Mohd Safar; Aida Mustapha; Mohd. Zainuri Saringatb; Hosam Alhakami; Wajdi Alhakami
Bulletin of Electrical Engineering and Informatics Vol 10, No 1: February 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i1.2516

Abstract

Mobile Ad-hoc Networks (MANETs) are independent systems that can work without the requirement for unified controls, pre-setup to the paths/routes or advance communication structures. The nodes/hubs of a MANET are independently controlled, which permit them to behave unreservedly in a randomized way inside the MANET. The hubs can leave their MANET and join different MANETs whenever the need arises. These attributes, in any case, may contrarily influence the performance of the routing conventions (or protocols) and the general topology of the systems. Along these lines, MANETs include uniquely planned routing conventions that responsively as well as proactively carry out the routing. This paper assesses and looks at the effectiveness (or performance) of five directing conventions which are AOMDV, DSDV, AODV, DSR and OLSR in a MANET domain. The research incorporates executing a simulating environment to look at the operation of the routing conventions dependent on the variable number of hubs. Three evaluation indices are utilized: Throughput (TH), Packet Delivery Ratio (PDR), and End-to-End delay (E2E). The assessment outcomes indicate that the AODV beats other conventions in the majority of the simulated scenarios.