Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Shihab A. Hameed is active.

Publication


Featured researches published by Shihab A. Hameed.


international conference on computer and communication engineering | 2010

Car monitoring, alerting and tracking model: Enhancement with mobility and database facilities

Shihab A. Hameed; Othman Omran Khalifa; Mohd Ershad; Fauzan Zahudi; Bassam Sheyaa; Waleed Asender

Statistics show that the number of cars is increasing rapidly and so is the number of car theft attempts, locally and internationally. Although there are a lot of car security systems that had been produced lately, but the result is still disappointing as the number of car theft cases still increases. The thieves are inventing cleverer and stronger stealing techniques that need more powerful security systems. This project “Car Monitoring and Tracking System” is being proposed to solve the issue. It introduces the integration between monitoring and tracking system. Both elements are very crucial in order to have a powerful security system. The system can send SMS and MMS to the owner to have fast response especially if the car is nearby. This paper focuses on using MMS and database technology, the picture of the intruder will be sent via local GSM/GPRS service provider to user (and/or) police. The Database offers the required information about car and owner, which will help the police or security authorities in their job. Moreover, in the event of theft local police and user can easily track the car using GPS system that can be link to Google Earth and other mapping software. The implementation and testing results show the success of prototype in sending MMS to owner within 40 seconds and receiving acknowledgment to the database (police or security unit) within 4 minutes. The timing and results are suitable to owner and police to take suitable action against intruder.


international association of computer science and information technology | 2009

Approved Undetectable-Antivirus Steganography for Multimedia Information in PE-File

A Z Aos; Ahmed Wathik Naji; Shihab A. Hameed; Fazida Othman; B. B. Zaidan

The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. In addition, there are no formal methods to be followed to discover the hidden data. For this reason, the task of this paper becomes difficult. In this paper a new method is suggested to hide a file in .EXE file undetectable antivirus system. The aims of this paper is to study the different types of steganography systems, design and implementation of steganography system which embeds information in an .EXE files and proposed system to be undetectable with anti virus softwares and making it imperceptible by any anti-virus software, for the reason that the antivirus programmed consider one of software used to find information hiding inside secret cover file.


international conference on computer and communication engineering | 2008

Electronic medical record for effective patient monitoring database

Shihab A. Hameed; Shazana Mustapha; Aina Mardhiyah; Vladimer Miho

Patient monitoring systems still suffer from problems such as: lost of information, blur images, paper-based, and large number of patient with less staff in both local and foreign hospitals. In Malaysia, patient monitoring systems are implemented only at certain hospitals and wards. This research paper is focusing on developing Electronic Patients Medical Records (EPRM) system that will help make patient monitoring more effective. A prototype of the proposed system is implemented using open source tools and technologies. Sample of implementation results are shown in this paper. It shows that EPRM offers suitable searching capabilities and assists doctors and nurses in managing patientspsila medical records as well as help doctors and nurses in making quick decision.


ieee conference on open systems | 2011

An investigation of femtocell network synchronization

Mohammad Kamrul Hasan; Rashid A. Saeed; Aisha-Hassan Abdalla; Shayla Islam; Omer Mahmoud; Othman Omran Khalifah; Shihab A. Hameed; Ahmad Fadzil Ismail

Currently, Femtocell technology emerged for cellular wireless networks, which has rapidly engrossed cellular industry. The principle of femtocell to the mobile operators is to reduce cost and improve signal quality in indoor coverage which is also considered a possible path to the fixed-mobile convergence (FMC) goal. Femtocell extends network coverage and delivers high-quality mobile services inside residential and business buildings through broadband network, i.e. ADSL. Femtocell access point (FAP) or home base station (HBS) intends to serve small number of users, i.e. 4 users and covers about 30 meter square similar to existing WiFi access points. However, femtocell introduces new challenges to the telecom industries in terms of handoff between femto and macrocells, interference management, localization and synchronization. Among all of these challenges, synchronization is considered corner stone for proper working for femtocell. The problematic issue in femtocell synchronization is that all the data and control traffics travel through IP broadband network. The IP broadband network is usually owned and managed by third party and not by the mobile operator, which is complicated the synchronization. Unsynchronized FAPs may cause harm interferences and wrong handover dictions. In this study we investigate and overview the current femtocell synchronization techniques and compare between them. Possible improvements and recommendation for each method is identified. Proposed schemes and indicated future research areas are also discussed.


international association of computer science and information technology | 2009

Stego-Analysis Chain, Session One Investigations on Steganography Weakness vs Stego-Analysis System for Multimedia File

Ahmed Wathik Naji; Teddy Surya Gunawan; Shihab A. Hameed; B. B. Zaidan; A.A. Zaidan

This paper give an overview on hidden data in a different carrier, in particular the paper overview different technique for steganography and giving a brief explain about each one, in order to implements stego-analysis system, this paper highlight the weak on the hidden data technique (disadvantage, weak point, type of attacker, stage of attacking the massage, ..etc). This paper also appoint the name of attackers on the data hidden and the passable way they follow for against that data, the review have gone through the Characterization of Steganography Systems, it also disscuse many features on this area, which it may somehow give proper idea about immplement some stego-analysis systems.


international conference on computer and communication engineering | 2012

Route optimization scenario of a new scheme based on nested mobile network

Shayma Senan; Aisha Hassan Abdalla Hashim; Rashid A. Saeed; Shihab A. Hameed; Akram M. Zeki; Jamal Ibrahim Daoud

With the rapid growth of wireless technologies and increasing number of mobile digital devices, mobility has been an important element on the Internet. NEMO Basic Support, designed by the Internet Engineering Task Force (IETF) to provide network mobility, is not efficient to offer low latency handoff in the case of nested mobile networks because it produces a long transfer delay and excessively large packet sizes due to non-optimal routes and multiple encapsulations. This paper presents a route optimization scenario for nested mobile network using hierarchical structure with Binding Update Tree (BUT). This scheme should reduce packet overhead, handoff latency, packet transmission delay, and achieve optimal routing.


international association of computer science and information technology | 2009

Stego-Analysis Chain, Session Two Novel Approach of Stego-Analysis System for Image File

Ahmed Wathik Naji; Shihab A. Hameed; Rafiqul Islam; B. B. Zaidan; Teddy Surya Gunawan; A. A. Zaidan

Stenography systems has too many approaches, it has a lot of applications and different ways, too many type of attackers have been tried to attacked the information that already embed in the carrier, however there is not yet a real stego- analysis system offered, the goal of this chain is to have too many investigations on the stego analysis systems, this paper will focus on the image file, the earlier tests showing that we may use the histogram habits to classify the image in to image carried data hidden and original image, the study will focus in to two main idea, the first idea, on the colour image, the colour start become grouping parallel with the increasing of the data hidden and the second feature on the gray level image, the histogram in the original image was pure without colours, after the embedding method has been applied there are many colour start to appears as shown down in the histogram, we will try through this paper to offer a new stego-analysis system though study the habits of the histogram.


ieee international power engineering and optimization conference | 2013

Smart Zigbee/IEEE 802.15.4 MAC for wireless sensor multi-hop mesh networks

Hikma Shabani; Musse Mohamud Ahmed; Sheroz Khan; Shihab A. Hameed; Mohamed Hadi Habaebi

The future of Smart Grid is based on grid-integrated real-time communications between the grid elements of generation, transmission, distribution and loads. Due to Zigbee/IEEE 802.15.4 standards features such as low cost, low power, low data rate, short range, simplicity and free licensed spectrum which makes Zigbee-based wireless sensor networks (WSNs) the wireless technology of choice for smart grid applications. This paper focuses on the electricity distribution layer, ranging from Advanced Metering Infrastructure (AMI) gateways at the house-hold to the distribution point where a multi-hop mesh network is built for large coverage data exchanges. Although beacon-based mode of operation is adopted in IEEE802.15.4 standard, it does not, however, specify any mechanism to enable beacon mode in mesh networks. Therefore, in this paper, the Zigbee/IEEE 802.15.4 MAC protocol is modified to suit the beacon-based wireless sensor multi-hop mesh networks application. Such network configuration is expected to proliferate in is smart grid auto-metering scenarios. A simulation model was built and validated using the network simulator (NS-2) and the preliminary results showed considerable enhancements as expected for the ZigBee/IEEE 802.15.4 MAC protocol.


conference on industrial electronics and applications | 2009

Implementation of Internet based remote control and monitoring

Khalid A. Saeed Al-Khateeb; Wajdi Fawzi Mohammed Al-Khateeb; Shihab A. Hameed

Remote monitoring and control of a multiunit industrial facility can be achieved by utilizing the Internet. Electrical, mechanical and a variety of devices are switched on, off, and regulated from distant terminals. Commercially available components were used to build the system. Various aspects related to the method of access, security, standards, and current trends are discussed. An eight unit system has been implemented and tested. The system proved to be effective and easy to operate with a user friendly program, which can be readily adapted to deal with 256 units simultaneously. The wiring is reduced by using the ordinary power lines of the building to convey messages to and from the respective units. The system is also suitable for implementation by security and SCADA systems.


international conference on computer and communication engineering | 2012

Controlling computers and electronics waste: Toward solving environmental problems

Shihab A. Hameed

Environment problem becomes an essential issue associated modern life in this century. Advancement in electronic production and cost reduction in the last few decades leads to rapid growing of computers and electronic productions (e-devices). This was associated with flood of advertisements which affect customers decision on buying new products regardless of their real needs. Although e-devices improved human life but it created a serious environmental problem called e-waste. Millions of tons of e-waste generated worldwide yearly, which is more toxic and harmful than normal household garbage. E-waste contains toxic heavy metals including arsenic, antimony, lead, mercury, nickel and zinc. Increasing consumption of e-devices in developing countries and transferring e-waste from developed to developing countries make the problem worst. So we need an innovative and creative engineers and effective recycling system to produce eco-friendly products that are easier to recycle and handle in their end-of-life. Several developing countries in Asia, Africa and Latin America still suffer from lack of advance recycling and disposal treatment experience. Workers in recycling are exposed to hazardous chemicals and material when braking e-products and extracting its valuable contents besides the polluting of water, air and soil. This paper studying the e-waste status and proposes a framework for guidance solution to control and eliminate e-waste, protecting workers and environment in developing world as step toward green environment.

Collaboration


Dive into the Shihab A. Hameed's collaboration.

Top Co-Authors

Avatar

Othman Omran Khalifa

International Islamic University Malaysia

View shared research outputs
Top Co-Authors

Avatar

Aisha Hassan Abdalla Hashim

International Islamic University Malaysia

View shared research outputs
Top Co-Authors

Avatar

Mohamed Hadi Habaebi

International Islamic University Malaysia

View shared research outputs
Top Co-Authors

Avatar

Abdulfattah A. Aboaba

International Islamic University Malaysia

View shared research outputs
Top Co-Authors

Avatar

Sheroz Khan

International Islamic University Malaysia

View shared research outputs
Top Co-Authors

Avatar

Jamal Ibrahim Daoud

International Islamic University Malaysia

View shared research outputs
Top Co-Authors

Avatar

Ahmed Wathik Naji

International Islamic University Malaysia

View shared research outputs
Top Co-Authors

Avatar

Wajdi Fawzi Mohammed Al-Khateeb

International Islamic University Malaysia

View shared research outputs
Top Co-Authors

Avatar

Rashid A. Saeed

Sudan University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Musse Mohamud Ahmed

International Islamic University Malaysia

View shared research outputs
Researchain Logo
Decentralizing Knowledge