Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Mostafa El-Said is active.

Publication


Featured researches published by Mostafa El-Said.


international conference on information technology: new generations | 2014

An Economical Cluster Based System for Detecting Data Leakage from BYOD

Ira Woodring; Mostafa El-Said

The Bring Your Own Device (BYOD) model of technology in the workplace is becoming more and more common - leading to a variety of issues users, managers, and administrators have not had to deal with previously. Though there are many positive and negative issues surrounding BYOD, the issues of privacy and data loss are at the forefront, as business try to strike a balance between keeping technology costs low and protecting their data. This paper seeks to mitigate these issues with a low-cost monitoring system for wireless networks that uses existing, under-utilized office computers as its basic infrastructure.


IEEE Computer | 2012

Modeling and Simulation of Smart and Green Computing Systems

Kaushik R. Chowdhury; Dave Cavalcanti; Mostafa El-Said; Tommaso Mazza; Chittabrata Ghosh

Advanced modeling and simulation methodologies are an essential aspect of the comprehensive performance evaluation that precedes the costly prototyping activities required for complex, large-scale computing, control, and communication systems.


electro information technology | 2010

Implementation of wideband VoIP middleware using embedded systems

Dan Amarandei; Mostafa El-Said

Current Analog Telephone Adaptors (ATA) which are commonly used by small business and home offices to implement Internet telephony applications are designed to work with an audio bandwidth of 300 Hz to 3.4 KHz, a holdover from the one hundred year history of telephone companies trying to accommodate a high volume of calls over copper. Recent network improvements in the last decade allow for a wider bandwidth. However, existing work in wideband audio for telephony has been mainly focused either on mobile telephony or high end teleconferencing equipment but not on ATA devices. This paper proposes improvements to ATA devices that allow an audio bandwidth of 50 Hz to 7 KHz. An implementation is discussed where a minimal upgrade to an open source ATA based on GPL licensed hardware is modified to support wideband, and a middleware layer software is modified to also handle the wider bandwidth. Moreover, promising results when using the modified hardware and software were obtained. The results indicated that with slight CPU overloading, the modified hardware and software can be used for wideband telephony.


computer games | 2012

Building a bi-directional bridge between social presence and interaction in online games

Samah Mansour; Mostafa El-Said

While gaming environments represent various forms of interaction, entertainment and dynamism, they create short term interactions and long term relationships. Social presence and social interaction are two major design factors to ensure being involved in online multiplayers games (OMPG). This paper argued that there is a positive relationship between the perception of social interaction and the feeling of social presence in online multiplayer games. For the sake of improving the OMPG experience, the researchers presented and validated a framework called “Mutual Bi-Directional Reinforcement Relationship” that explains the nature of the relationship between social presence and social interaction. The validation process relies on an empirical analysis that focused on studying the relationship between social presence and social interaction. A positive significant relationship was found between the level of the perception of social interaction and the level of the feeling of social presence.


information technology interfaces | 2008

Lightweight RFID authentication protocol: An experimental study

Brandon Belcher; Mostafa El-Said; George S. Nezlek

The market for passive RFID tags has experienced significant growth in recent years. However, passive RFID tags suffer from having a limited physical memory space for strong cryptography. The rapid proliferation of the technology, combined with the technologypsilas physical limitations, encourages the development of a ldquolightweightrdquo authentication protocol. In this paper, a means to implement such an authentication protocol is presented. The protocol takes advantage of the password protected ldquokillrdquo function of a tag, to permit its alternative use as a simple password dialog. Experimental studies have been carried out to verify the effectiveness of the proposed approach, and promising results are obtained.


international conference on communications | 2005

A 4G guided universal base station carrier interferometry enabled infrastructure

Mostafa El-Said; Anup Kumar

The fourth generation wireless system provides the key technologies for the upcoming era of ubiquitous computing. Major obstacles facing 4G wireless system deployment involve (i) the mobile devices chipset for connecting to different frequencies and (ii) multi frequency base station units supporting various carrier frequencies communication. Some researchers have looked at the solutions for the first obstacle. Continuing on these efforts toward accommodating different radio interfaces with various carrier frequencies, a universal base station (UBS) with multi-carrier carrier interferometry (MC-CI) is introduced. The UBS customizes its radiation pattern by utilizing the principles of the (MC-CI) technology to match the mobile devices chipset carrier frequency. The proposed approach provides a novel framework to design a universal soft cell allowing interoperability between different wireless networks. Simulation studies have been carried out to verify the effectiveness of the proposed approach.


International Journal of Engineering Science | 2017

A Lightweight Message Authentication Framework in the Intelligent Vehicles System

Mostafa El-Said; Alexander Arendsen; Samah Mansour

--------------------------------------------------------ABSTRACT----------------------------------------------------------Intelligent Vehicles System (IVS) supports a wide variety of Advanced Driver Assistance System (ADAS) services such as vehicle visibility detection. In implementing this service, the message authentication is a vital design parameter that protects victim vehicles from being tricked into accepting false messages as legitimate ones and make a false decision based on the incoming message. However, implementing message authentication service is too expensive especially if vehicles, initially, don’t trust each others or there is no certificate of authority in place. In this research, we investigate the use of the Basic Safety Message (BSM) behavior over time as a metric to allow a receiving vehicle to anticipate at what distance it will continue to receive BSMs from within-range vehicles. Therefore, the victim vehicle would reject the BSM messages that fall outside its acceptance window. Simulation experiments are setup to study the realistic behavior of the BSM messages in different environment characteristics including changing the vehicle size, number of road lanes and vehicle speed. Research findings suggested that the lightweight message authentication can assist vehicles in estimating the duration for a trusted relationship among those that are located within range of each others.


Archive | 2008

The Impact of Multi-Players Serious Games on the Social Interaction among Online Students versus Face-to-Face Students

Samah Mansour; Mostafa El-Said


international conference on information technology: new generations | 2009

An Empirical Study for Protecting Passive RFID Systems against Cloning

Mostafa El-Said; Ira Woodring


international conference on communications | 2006

The interactive effect of avatar visual fidelity and behavioral fidelity in the collaborative virtual reality environment on the perception of social interaction

Samah Mansour; Mostafa El-Said; Carolyn Rude-Parkins; Jagadeesh Nandigam

Collaboration


Dive into the Mostafa El-Said's collaboration.

Top Co-Authors

Avatar

Samah Mansour

University of Louisville

View shared research outputs
Top Co-Authors

Avatar

Alexander Arendsen

Grand Valley State University

View shared research outputs
Top Co-Authors

Avatar

Vijay Bhuse

Grand Valley State University

View shared research outputs
Top Co-Authors

Avatar

Anup Kumar

University of Louisville

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ira Woodring

Grand Valley State University

View shared research outputs
Top Co-Authors

Avatar

Jagadeesh Nandigam

Grand Valley State University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Dan Amarandei

Grand Valley State University

View shared research outputs
Top Co-Authors

Avatar

George S. Nezlek

Grand Valley State University

View shared research outputs
Researchain Logo
Decentralizing Knowledge