Papers by Ahmed A. Mostfa

Design and implementation of vehicles identification and tracking system
Proceedings of the International Conference on Information and Communication Technology, 2019
Iraq is one of the countries that face real security challenges. As a precautionary step, the gov... more Iraq is one of the countries that face real security challenges. As a precautionary step, the governmental authorities have installed cameras and computers at checkpoints to facilitate monitoring of vehicles. However, such solutions are inefficient because they run manually and suffer from a lack of automation. One of the main segments of intelligent transport systems is vehicle license plate recognition, which enables the identification of each vehicle by recognizing the characters on its license plate through various image processing and computer vision techniques. In this research, a system for automatic vehicles identification and tracking is proposed. The proposed system consists of a number of distributed plate recognition subsystems that supported with cameras. These subsystems are connected to a central database to store and manage vehicles information for further processing. The proposed system is tracking all vehicles that pass through checkpoints and map them on an interactive map. The system is designed and tested in a real environment and at different times of the day. Experiments show that the system can capture the vehicle's image and recognize the license plate effectively within 2 to 4 seconds.

arXiv (Cornell University), Sep 12, 2019
Much digital instrumentation and control systems embedded in the critical medical healthcare equi... more Much digital instrumentation and control systems embedded in the critical medical healthcare equipment, aerospace devices, and nuclear industry have obvious consequence of different failure modes. These failures can affect the behavior of the overall safety-critical digital system and its ability to deliver its dependability attributes if any defected area that could be a hardware component or software code embedded inside the digital system is not detected and repaired appropriately. The safety and reliability analysis of safety-critical systems can be accomplished with Markov modeling techniques which could express the dynamic and regenerative behavior of the digital control system. Certain states in the system represent system failure, while others represent fault free behavior or correct operation in the presence of faults. This paper presents the development of a safety and reliability modeling of a digital feedwater control system using Markov-based chain models. All the Markov states and the transitions between these states were assumed and calculated from the control logic for the digital control system. Finally, based on the simulation results of modeling the digital feedwater control system, the system does meet its reliability requirement with the probability of being in fully operational states is 0.99 over a 6 months' time.
In this paper, time spent and the repetition of using the Social Network Sites (SNS) in Android a... more In this paper, time spent and the repetition of using the Social Network Sites (SNS) in Android applications are investigated. In this approach, we seek to raise the awareness and limit, but not eliminate the repeated uses of SNS, by introducing AndroidTrack. This AndroidTrack is an android application that was designed to monitor and apply valid experimental studies in order to improve the impacts of social media on Iraqi users. Data generated from the app were aggregated and updated periodically at Google Firebase Real-time Database. The statistical factor analysis (FA) was presented as a result of the user’s interactions.

Neural networks’ design and training for safe human-robot cooperation
Journal of King Saud University: Engineering Sciences, 2021
In the present paper, a neural network (NN) is proposed for detecting the human-manipulator colli... more In the present paper, a neural network (NN) is proposed for detecting the human-manipulator collisions. Because of that purpose, three types of NNs are designed and trained named as; multilayer feedforward, cascaded forward, and recurrent NNs. The NN is designed based on the joints’ dynamics of the manipulator. In addition, the NN is trained using a dataset with and without the collisions using the algorithm of Levenberg-Marquardt to detect the collisions happened with the manipulator. During the design of the NN, only the intrinsic joint position sensor of the robot is used which enable the proposed method to be applied to any robot. The three designed neural networks are compared quantitatively and qualitatively to each other. Furthermore, the proposed method was evaluated with the KUKA LWR manipulator using one joint motion. The results of the designed systems achieve high effectiveness in detecting the collisions between human and robot.
Foremost, I would like to thank my great father, mother, and family for their prayers and support... more Foremost, I would like to thank my great father, mother, and family for their prayers and support. I also would like to appreciate my adviser Dr. Xiao who walked throughout my thesis project and understanding the various parts of it to make this project possible. His support and guidelines contributed to highlight the essential parts of development in both hardware and software and come up with satisfying results and outcomes.
AL-Rafidain Journal of Computer Sciences and Mathematics
Blood donation (BD) is one of the most significant contributions that a person can make towards t... more Blood donation (BD) is one of the most significant contributions that a person can make towards the society. The growing android technology has made the process of BD easier and hassle-free. The Nineveh blood bank is an android application made for such great and noble cause. The application connects the givers and the requesters of blood who live in the Nineveh province, Iraq. The blood requester can serach from a list of all donors who have the same blood group and directly contact them without any thirdparty involvement. The Nineveh Blood application creates giver's/requester's profile through the Google Firebase Real-time database. In which, a one WebSocket two-way channel can constantly send the data back-and-forth between the server and the clients, and store the data as a JavaScript Object Notation (JSON) file.
Uploads
Papers by Ahmed A. Mostfa