Papers by Ghada Abdelhady
With the vast amount of goods being shipped around the world, there is a need to track and manage... more With the vast amount of goods being shipped around the world, there is a need to track and manage various types of assets, particularly shipping containers. Logistics industries dealing with small facilities, shipments, equipment, and vehicles must be tracked. There are many applied asset tracking systems such as Radio-Frequency Identification (RFID), Bluetooth Low Energy (BLE) Beacon, and Long-Range Radio (LoRa). This paper presents these systems and focuses on locating assets using LoRaWAN technology, which has a positive impact on the responsive and sustainable cities in Egypt. IoT-based Long Range (LoRa) is a low-power, wide-area communication technology that uses radio frequencies to transmit data over long distances. The extended range, low power consumption, low maintenance, and the ability to store location data when the end node that needs to connect to the asset is out of the gateway's coverage make LoRa a good choice for developing asset-tracking applications. This pa...
Zenodo (CERN European Organization for Nuclear Research), Dec 26, 2022
Education is considered one of the most essential fields; it is the profession of the prophets; i... more Education is considered one of the most essential fields; it is the profession of the prophets; it acquires special management for teacher roles addressed in terms of teaching, learning, and guidance, transferring experiences, and contributing to preparing human beings to live in dignity in societies where security, peace, love, harmony, justice, mercy and other Islamic virtues of socialization prevail in its various dimensions. The old methods of education relied on personal or voluntary efforts. It focused on content such as religion and language teaching in most of its tracks and learning craft professions in other ways until different countries adopted formal education and established institutions for it that is concerned only with teaching professionally. The teacher is considered the central pillar in the educational process development, as he contributes very effectively to developing students' performance and guiding them in the right direction towards good citizenship. It also deals with their minds and ideas, refining and training them in all aspects of knowledge and technological progress. This paper clarifies the concept of teacher preparation-old and new. It explains and extracts the idea of teacher preparation in the light of constructivism theory. It sheds light on teachers' views in the light of constructivism theory, the 4MAT model and traditional learning styles.
International Journal of Multidisciplinary Studies in Architecture and Cultural Heritage
Because of a lack of awareness about the history and heritage of ancient Egyptian civilization. T... more Because of a lack of awareness about the history and heritage of ancient Egyptian civilization. Tourists sometimes suffer from the lack of knowledge of historical information about statues and hieroglyphic language inside museums. The forgotten Egyptian Museums need some actions and excitement to bring them back to life. Egypt has a treasure of museums that hide the beauty of history and cultural heritage.
3rd Smart Cities Symposium (SCS 2020), 2021
3rd Smart Cities Symposium (SCS 2020), 2021
Banks use encryption methods all around the world to process financial transactions and to protec... more Banks use encryption methods all around the world to process financial transactions and to protect their customers ID numbers at bank automated teller machines (ATM). Banks, all over the world, use symmetric ciphering algorithms like TDES to process financial transactions. These involve transfer of huge amount of money from one bank to another. Recently, Biometric ATM's are the latest inventions to help us avoid fraud and duplication. If somebody steals our card and knows our PIN, they can easily withdraw cash from our account. In case of biometric ATM's they cannot. Usually the PIN for bio ATM's is the finger print of the cardholder or his eye retina scan etc. These cannot be duplicated and hence they are very safe and secure. This paper will present a multimodal system for encryption and decryption data, any types of data received via a network in Banks. So by the end of this paper we get a biometric ATM prototype including different levels of security using biometric encryption. Besides that, our module presents a new symmetric system that will bring the simplest symmetric algorithm (DES, Data Encryption Standard) to the life. This system is called DES-EC as it is modified DES using the elliptic Curve (EC).
International Journal of Engineering & Technology, 2015
In this paper, a multipurpose Secured Transparent Computerized Voting System (STCVS) is proposed.... more In this paper, a multipurpose Secured Transparent Computerized Voting System (STCVS) is proposed. STCVS introduces an improvement methodology to the regular election systems. It could handle electronic ballots with multiple scopes at the same time, e.g., presidential, parliamentary, local, amongst others. STCVS's design warrants well-secured identification and authentication processes for the voter via using voter's digital signatures, certificates. Also, it guarantees voting data protection via encryption. Tallying of the voting counts is achieved automatically; candidates recorded percentages are displayed as charts for the supervision trusted parties. STCVS eliminates counting errors, voting duplication, and vote attack raised in paper-based elections systems. Voting transparency is achieved through the election process steps to assure voting credibility. This is confirmed by a feedback e-mail that the voter receives after finalizing the voting process. In addition, the proposed system saves the huge budget required for authentication devices, Electronic Voting Machines (EVM) that consist similar voting systems. To evaluate the robustness and reliability of the proposed system, performance measurements were achieved by applying the Avalanche Effect (AE) tests. Results of these measurements show the degree of security and the performance of the proposed system.
Aiding the user to have secured voting system is a must. Early regular voting systems have many d... more Aiding the user to have secured voting system is a must. Early regular voting systems have many drawbacks like the overcrowding of people in the polling stations and hence the traffic problems. The need for great amount of documents that are vulnerable, exposed to forgery, also the difficulty of achieving votes counting, analysis are considered as drawbacks for regular voting systems. This work presents a new smart system for voting process to be secured and transparent. We will call it "Secured and Transparent Computerized Voting system (STCVS)". "STCVS" system could eliminate counterfeiting, hacking. Also, while accessing it from any location, this would save the time spent for voting processes and countries economic performance would be better. Finally, "STCVS" system assures that user's vote will be his own opinion, not influenced by any others. [Enas Elbarbary, Ghada Abdelhady, Hussam Elbehiery, Abdelhahim Zekry. Secured and Transparent Computerized Voting System accessible everywhere. J Am Sci 2014;10(1):151-157]. (ISSN: 1545-1003). http://www.jofamericanscience.org. 24
Journal of Discrete Mathematical Sciences and Cryptography, 2011
It is known that symmetric encryption algorithms are fast and easy to implement in hardware. Also... more It is known that symmetric encryption algorithms are fast and easy to implement in hardware. Also elliptic curves have proved to be a good choice for building encryption system. Although most of the symmetric systems have been broken, we can create a hybrid system that has the same properties of the symmetric encryption systems and in the same time, it has the strength of elliptic curves in encryption. As DES algorithm is considered the core of all successive symmetric encryption systems, we modi ed DES using elliptic curves and built a new DES algorithm that is hard to be broken and will be the core for all other symmetric systems.
Public transit whether it is buses, trains, or metros can be particularly frustrating for passeng... more Public transit whether it is buses, trains, or metros can be particularly frustrating for passengers. Although public transit is typically cheaper and more green than traveling by a private vehicle, public transit may not be as comfortable, convenient, or as quick as a private vehicle, passengers will have to plan their schedules around the public transit timetables, and unforeseen circumstances may disrupt public transit operations. However, the drawbacks of public transportation is slowly being eliminated; public transit is starting to become more comfortable, districts are offering more amenities for passengers such as internet access, and districts are starting to improve service by offering more trips and express service. Designing a computerized system has been introduced in this research which is based on the Internet to remotely reserve all types of tickets for the most important and essential types of transportation in Egypt. The covered transportation types in the suggeste...
It is widely recognized that data security will play a central role in the design of future IT sy... more It is widely recognized that data security will play a central role in the design of future IT systems. Many of those IT applications will be realized as embedded systems, which rely heavily on security mechanisms. Examples include security for wireless phones, wireless computing, and ATM security system in Banks. All modern security protocols use symmetrickey and public-key algorithms. This contribution presents a ciphering module that surveys several important cryptographic concepts and their relevance to embedded system applications. This study presents a module that includes three different symmetric ciphering algorithms: DES, DES-EC and AES based on microcontroller. Depending on the application and the data type, each user can select the suitable algorithm from the presented module. This study provides a comparison between the regular DES and the presented new DES. A comparison has been conducted for those encryption algorithms at different settings such as the key size, block size, speed, security, and the execution time.
Uploads
Papers by Ghada Abdelhady