ArticlePDF Available

The Real-Time Alert System for Prayers at Smart Masjid

Authors:

Abstract

Smart Masjid with embedded technologies is the key factor for the prayers to correctly pray without having mistakes. The technologies inside or outside the Masjid might be greatly helpful for the prayers. Arrange and monitor people in a crowded environment inside masjid is a critical task. The authors have proposed the solution of arranging the rows during pray in the Masjid. It is necessary to fill rows start from the first row behind the Imam. Most counting techniques depend on detecting individuals to count their numbers. Counting and arrangement become inefficient when it is required in real-time and when the crowd is dense. I am proposing a technique for monitoring and estimating the density of the crowd in real-time using infrared technology. The intelligent systems will be designed based on the number of people section wise. The mosque will be divided into sections and each section will be allocated an Infra-Red Camera. Each section will be programmed to contain a limited number of people. There will be an LED display allocated to each section. With the people coming into that section, the display will start becoming less GREEN. In other words, the intensity of the GREEN LED display will become weaker. As the section is filled, the display will turn red. This way, people could see the section from quite a distance and can easily decide whether to move forward or not. As soon as the people enter the mosque, they will have an overview of each section and can decide to go to suitable places to get settled easily into the rows. The pre-programmed thermal camera will recognize people based on their body temperature. The LED display will go less green as the system receives more thermograms. After reaching the highest level of thermograms received, the LED display will automatically go RED. This would naturally stop people to enter that section.
Scientific Journal of Informatics
Vol. 7, No. 2, November 2020
p-ISSN 2407-7658 http://journal.unnes.ac.id/nju/index.php/sji e-ISSN 2460-0040
166
The Real-Time Alert System for Prayers at Smart
Masjid
Tanweer Alam1, Moath Erqsous2
1Computer Science Department, Islamic University of Madinah, Saudi Arabia
1tanweer03@iu.edu.sa
2Information System Department, University of Bisha, Saudi Arabia
2Moatherqsous@gmail.com
Abstract
Smart Masjid with embedded technologies is the key factor for the prayers to correctly pray
without having mistakes. The technologies inside or outside the Masjid might be greatly
helpful for the prayers. Arrange and monitor people in a crowded environment inside masjid
is a critical task. The authors have proposed the solution of arranging the rows during pray
in the Masjid. It is necessary to fill rows start from the first row behind the Imam. Most
counting techniques depend on detecting individuals to count their numbers. Counting and
arrangement become inefficient when it is required in real-time and when the crowd is dense.
I am proposing a technique for monitoring and estimating the density of the crowd in real-
time using infrared technology. The intelligent systems will be designed based on the
number of people section wise. The mosque will be divided into sections and each section
will be allocated an Infra-Red Camera. Each section will be programmed to contain a limited
number of people. There will be an LED display allocated to each section. With the people
coming into that section, the display will start becoming less GREEN. In other words, the
intensity of the GREEN LED display will become weaker. As the section is filled, the
display will turn red. This way, people could see the section from quite a distance and can
easily decide whether to move forward or not. As soon as the people enter the mosque, they
will have an overview of each section and can decide to go to suitable places to get settled
easily into the rows. The pre-programmed thermal camera will recognize people based on
their body temperature. The LED display will go less green as the system receives more
thermograms. After reaching the highest level of thermograms received, the LED display
will automatically go RED. This would naturally stop people to enter that section.
Keywords: Counting Technique, Density of Crowed, Infrared Technology, Infrared Camera
Thermograms, LED, Red Light.
1. INTRODUCTION
Masjid is regarded as a place of worship; it is a very popular word and commonly
used by Muslims throughout the world. According to a report, the percentage of
the World Muslim population concerning the total World population has increased
steadily from 17% in 1950 to 26% by 2020 [1]. While the total European population
increased from 548 million in 1950 to 744 million by 2020, the percentage of
Muslims in Europe increased from 2% in 1950 to 6% by 2020. As of 2013, it was
predicted that the world's Muslim population will grow twice as fast as non-
Muslims over the next 20 years. By 2030, Muslims will make up more than a
quarter of the global population [1].
It is quite clear that the World Muslim population is increasing at a dramatic rate.
The increase in the Muslims around the world means the increase in the number of
Scientific Journal of Informatics, Vol. 7, No. 2, November 2020 167
pilgrims coming to the holy lands of Makkah and Madinah every year [2]. Several
problems are faced by pilgrims due to the overcrowding of people in Masjid at the
time of Hajj and Umrah in Saudi Arabia. We have focused on the problem of filling
gaps inside Masjid to deliver an even distribution of people inside the mosque [3].
Figure 1 shows the masjid al Nabawi Madinah.
Figure 1. Masjid Al-Nabawi, Madinah
This study mainly focuses on limiting the over-crowding of the people in rows
during prayers at Masjid and could be implemented anywhere else [4-5]. Because
of the huge area of the mosque [6], it becomes very difficult for the people whether
to go further to the next row or not. In most cases, people just don’t care and step
forward towards the front, resulting in overcrowding and hence inconvenience to
the people [7-9]. We are proposing a novel system that could be used to limit the
overcrowding of the people and create an even distribution of people inside the
mosque.
There have been a lot of discussions about the approach that should be used to solve
the problems. A lot of debate was carried out at the Faculty of Computer and
Information Sciences about this issue. Various ideas were proposed including the
use of microcontrollers, sensors, laser-cameras, etc. After some critical reviews put
forward by some faculty members, we came up with a solution that was accepted
as an appropriate approach towards the solution to the problem [10-13]. We are
proposing Infra-Red technology to be used in this project as the best suitable tool
to solve the problem.
2. METHODS
2.1 Working Of The Infra-Red Camera
Most Infrared Security System will be able to capture clear images during the day
which is exactly what we want. The overall effectiveness of a camera is marred
if you are not also fully protected at night-time. Night-time security is vital to have
because criminals will often choose to act under the cover of darkness [14].
Scientific Journal of Informatics, Vol. 7, No. 2, November 2020 168
Therefore infrared CCTV is a great all-round surveillance choice it gets good
picture coverage no matter the time of day or night.
As CCTV becomes more commonly used, the systems become more sophisticated,
infrared CCTV for example, is now an affordable way of protecting a low-light
area. Infrared closed-circuit television cameras make this a reality, effectively
monitoring the darkness for your surveillance system [15]. This technology has
been used for the surveillance purpose so far, but here we are using it for a whole
new concept.
2.2 Thermal Imaging
The process used by infrared CCTV cameras for night-vision is known as thermal
imaging. People and objects constantly emit a level of heat referred to as thermal
energy. Thermal energy resides in the electromagnetic spectrum which in turn
occupies the top of the infrared light spectrum [16]. Thermal energy is invisible to
the naked eye because it is emitted from a source, as opposed to being reflected by
light. Infrared CCTV cameras use thermal imaging to capture various levels of
thermal energy and convert it to a light-based image that is visible to the human
eye [17]. This process of revealing the invisible occurs over several steps:
i. Infrared Lens - The specially designed lens of an infrared camera is used
to focus the levels of invisible infrared radiation within its view [18].
ii. Thermogram - Infrared detectors review the radiation focused by the lens
and proceed to create a temperature map known as a "thermogram." The
completed thermogram is then translated into a series of electric impulses
[19].
iii. Signal-Processing - Once converted into electric impulses, the
thermogram is sent to a chip on the camera or server known as the signal-
processing unit. This unit rebuilds the electric impulses as usable data
[20].
iv. Display - Once translated, the user data is sent to the display, where it
appears as a graphic rendition of the contrasting heat emissions that were
originally captured [21], [22]. These images exist in the visible spectrum,
allowing the human eye to see the subject via its thermal energy.
3. RESULTS AND DISCUSSION
The researchers themselves involved gathering most of the data for analysis.
Various strategies are applied for gathering data such as questionnaires,
assessment, and reporting. Analysis of the accuracy of the information requires
implementation through the use of tools and concepts. It includes the importance
of flexibility for collecting the data. This research has been carried out across
interconnected operations such as data elimination, application method/analysis
found, and completion.
The mosque will be divided into sections and each section will be allocated an
Infra-Red Camera. Figure 3 shows the rows of peoples and infrared cameras.
Scientific Journal of Informatics, Vol. 7, No. 2, November 2020 169
Figure 2. Coloring displayed by LED
Figure 3. Example of three rows and four columns in the Masjid
Each section will be programmed to contain a limited number of people. There will
be an LED display allocated to each section. Figure 2 shows the coloring produced
by the LED.
With the people coming into that section, the display will start becoming less
GREEN. In other words, the intensity of the GREEN LED display will become
weaker. As the section is filled, the display will turn red. This way, people could
see the section from quite a distance and can easily decide whether to move forward
or not. As soon as the people enter the mosque, they will have an overview of each
section and can decide to go to suitable places to get settled easily into the rows.
Algorithm-1 (count number of people in image)
Step 1: Read the Image
Step 2: Convert the Image to Grayscale
Step 3: Threshold the image
Step 4: Complement the image
Step 5: Find the Boundaries of the Objects
Program in Matlab
image1=imread('count.jpg');
imshow(image1) image1=rgb2gray(image1);
imshow(image1) image2=im2bw(image1, graythresh(image1));
imshow(image2) image2=~image2;
Scientific Journal of Informatics, Vol. 7, No. 2, November 2020 170
imshow(image2) t1 = bwboundaries(image2);
imshow(image2) text(10, 10, strcat('\color{green} Objects Found:', num2str
(length(t1))))
Algorithm-2 (output algorithm)
Step-1: Find the total number of persons from algorithm 1 say n.
Step 2: if n<Max goes to step 3 otherwise go to step 4.
Step 3: GREEN light will ON and the RED light will OFF.
Step 4: RED light will ON and GREEN light will OFF.
Our pre-programmed thermal camera will recognize people based on their body
temperature. Since the normal human body temperature is 38 C (98.6 F), this
system would create a thermogram of a human being. The LED display will go less
green as the system receives more thermograms. After reaching the highest level
of thermograms received, the LED display will automatically go RED. This would
naturally stop people to enter into that section. Figure 4 shows the real-time people
counting and display the color green because space is available in the rows.
Figure 4. Real-Time people counting and shows color
The output of the research shows that green indicator because the number of people
in a row is less than the maximum number. If the row is full then the red indicator
will be on.
5. CONCLUSION
This study aims to find the solution to the space finding problem in the Masjid and
continuous improvement of the ongoing research on Smart Masjid. The algorithm
is implemented that reads the thermogram which is captured by an Infra-Red
camera. Each thermogram is processed and the human images are defined making
Scientific Journal of Informatics, Vol. 7, No. 2, November 2020 171
it easy for the system to count the number of persons in each section and identify
the space between two prayers. Based on the input data, the output algorithm
responds. The output algorithm notifies whether there is any space left inside the
section or not using an LED display. The prayers will know the available space
inside the Masjid using the lighting system. Greenlight indicated "the space is
available" and red light indicated "the space is not available". In the future, this
study can be implemented in smart Masjids in whole the world.
REFERENCES
[1] Kettani, H. (2010). Muslim population in europe: 1950-2020.
International Journal of Environmental Science and Development, 1(2),
154.
[2] Al-Kodmany, K. (2009). Planning for the Hajj: political power,
pragmatism, and participatory GIS. Journal of Urban Technology, 16(1),
5-45.
[3] Haase, K., Al Abideen, H. Z., Al-Bosta, S., Kasper, M., Koch, M., Müller,
S., & Helbing, D. (2016). Improving pilgrim safety during the hajj: an
analytical and operational research approach. Interfaces, 46(1), 74-90.
[4] Aqel, M. O., Issa, A., Nada, D. A., & Draz, S. (2018, October).
Development of Smart Masjid Display Using Raspberry Pi. In 2018
International Conference on Promising Electronic Technologies (ICPET)
(pp. 118-123). IEEE.
[5] Yusarelan, M. N. A., Hamid, S. Z. A., Rashid, R. A., & Ibrahim, A. K. M.
(2020, July). IoT Based Temperature Control for Smart Mosque. In IOP
Conference Series: Materials Science and Engineering (Vol. 884, No. 1,
p. 012079). IOP Publishing.
[6] Alamri, R. J., Alkhuriji, M. S., Alshamani, M. S., Ibrahim, O. Y., &
Haron, F. (2018, April). Al-Masjid An-Nabawi Crowd Adviser Crowd
Level Estimation Using Head Detection. In 2018 1st International
Conference on Computer Applications & Information Security
(ICCAIS) (pp. 1-4). IEEE.
[7] Alshehri, A., Arif, M., & Felamban, E. (2016). Simulation of crowd in the
corridor of ziara in Masjid-e-Nabwi, Madinah. In Traffic and Granular
Flow'15 (pp. 353-360). Springer, Cham.
[8] Rossi, M., Cattari, S., & Lagomarsino, S. (2015). Performance-based
assessment of the Great Mosque of Algiers. Bulletin of Earthquake
Engineering, 13(1), 369-388.
[9] Shannahan, D. S. (2014). Gender, inclusivity and UK mosque
experiences. Contemporary Islam, 8(1), 1-16.
[10] Hakim, N. (2008). Mosque architecture past and present. In Sacred
Buildings. Birkhäuser Basel, Springer. pp. 46-53.
[11] Setiadi, H. (2015). Islam and Urbanism in Indonesia: The mosque as
urban identity in Javanese Cities. In The Changing World Religion Map
(pp. 2415-2436). Springer, Dordrecht.
[12] Yusarelan, M. N. A., Hamid, S. Z. A., Rashid, R. A., & Ibrahim, A. K. M.
(2020, July). IoT Based Temperature Control for Smart Mosque. In IOP
Scientific Journal of Informatics, Vol. 7, No. 2, November 2020 172
Conference Series: Materials Science and Engineering (Vol. 884, No. 1,
p. 012079). IOP Publishing.
[13] Sumaryanto, T. (2016). Planning for The Smart Mosque as Islamic
Learning Resources Center. Indonesian Journal of Islamic Literature and
Muslim Society, 1(2), 167-180.
[14] Ciampa, F., Mahmoodi, P., Pinto, F., & Meo, M. (2018). Recent advances
in active infrared thermography for non-destructive testing of aerospace
components. Sensors, 18(2), 609.
[15] Haurum, J. B., & Moeslund, T. B. (2020). A Survey on Image-Based
Automation of CCTV and SSET Sewer Inspections. Automation in
Construction, 111, 103061.
[16] McCarthy, A., Krichel, N. J., Gemmell, N. R., Ren, X., Tanner, M. G.,
Dorenbos, S. N., ... & Buller, G. S. (2013). Kilometer-range, high
resolution depth imaging via 1560 nm wavelength single-photon
detection. Optics express, 21(7), 8904-8915.
[17] Falco, C. M. (2009). Invited Article: High resolution digital camera for
infrared reflectography. Review of scientific instruments, 80(7), 071301.
[18] Ma, J., Ma, Y., & Li, C. (2019). Infrared and visible image fusion methods
and applications: A survey. Information Fusion, 45, 153-178.
[19] Nigam, R. K. (2018). Application of Thermal Imaging in Forensic Vision.
Indonesian Journal of Legal and Forensic Sciences, 8(1), 15-18.
[20] Yu, Y., Mariotti d’Alessandro, M., Tebaldini, S., & Liao, M. (2020).
Signal Processing Options for High Resolution SAR Tomography of
Natural Scenarios. Remote Sensing, 12(10), 1638.
[21] Aljohani, M., & Alam, T. (2017). Real time face detection in ad hoc
network of android smart devices. In Advances in Computational
Intelligence (pp. 245-255). Springer, Singapore.
[22] Alam, T. (2020). CMI Computing: A Cloud, MANET, and Internet of
Things Integration for Future Internet. Jambura Journal of Informatics,
2(1), 1-22.
... Devices like smartphones and tablets would be considered service nodes in this design. This strategy also covers the security, reliability, and vulnerability of the communication system [46], [47]. ...
Article
Full-text available
Devices linked to the internet of things (IoT) may communicate with one another in several settings. Furthermore, rather of relying on an existing centralized system, users may develop their own network by using wireless capabilities. This kind of network is known as a wireless mobile ad hoc network. The mobile ad-hoc network (MANET) enables IoT devices to connect with one another in an unstructured networked environment. IoT devices may connect, establish linkages, and share data on a continuous basis. In this system, the cloud's purpose is to store and analyze data acquired from IoT devices. One of the most significant challenges in cloud computing has been identified as information security, and its resolution will result in an even bigger increase in cloud computing usage and popularity in the future. Finally, the goal of this project is to create a framework for facilitating communication between IoT devices in a Cloud and MANET context. Our major contribution is a ground-breaking research initiative that combines cloud computing with the MANET and connects the internet of things. This research might be used to the IoT in the future.
... Devices like smartphones and tablets would be considered service nodes in this design. This strategy also covers the security, reliability, and vulnerability of the communication system [46], [47]. ...
Article
Full-text available
Devices linked to the internet of things (IoT) may communicate with one another in several settings. Furthermore, rather of relying on an existing centralized system, users may develop their own network by using wireless capabilities. This kind of network is known as a wireless mobile ad hoc network. The mobile ad-hoc network (MANET) enables IoT devices to connect with one another in an unstructured networked environment. IoT devices may connect, establish linkages, and share data on a continuous basis. In this system, the cloud's purpose is to store and analyze data acquired from IoT devices. One of the most significant challenges in cloud computing has been identified as information security, and its resolution will result in an even bigger increase in cloud computing usage and popularity in the future. Finally, the goal of this project is to create a framework for facilitating communication between IoT devices in a Cloud and MANET context. Our major contribution is a ground-breaking research initiative that combines cloud computing with the MANET and connects the internet of things. This research might be used to the IoT in the future.
... Internet of Things is based on a completely wireless network [32]. At the beginning of the Internet, it was developed to communicate from one device to another using access to browsers [37]. However, in the modern era, high-performance high-speed devices have many advanced technologies such as low power consumption etc. Available to communicate with others [10]. ...
Article
Full-text available
In the age of the next-generation computer, the role of the cloud, the internet, and smart devices will become stronger. These days we all know the word smart well. This word is often used in our daily lives. The Internet of Things (IoT) will generate a variety of information from a variety of resources. It can store big data in the cloud. Fog computing acts as a signal between the cloud and IoT. Fog extensions in this framework apply to the material under IoT. IoT devices are called Fog nodes, which can be accessed anywhere within the network range. A blockchain is a novel way of recording in a secure sequence. Creating a new framework in the development of the Internet of Things is one of the critical problems of wireless communication. Solving such a problem can lead to continued growth in the use and popularity of IoT. Proposed research creates a framework for providing a framework for middleware on the internet of smart devices network for using blockchains technology. Our great offering connects new research that integrates blockchains into the Internet of Things and provides a secure Internet connection for smart devices. Blockchain (BC) Internet of Things (IoT) is a new technology that works with low-level, distributed, public, and real-time leaders to maintain transactions between IoT sites. A blockchain is a series of blocks. Each block is linked to its previous blocks. All blocks have cryptographic hash code, previous block hash, and its data. Transactions in BC are the basic components used to transfer data between IoT nodes. IoT nodes are a variety of portable but smart devices with embedded sensors, actuators, systems, and the ability to communicate with other IoT nodes. The role of BC in IoT is to provide a process for processing secure data records using IoT nodes. BC is a protected technology that can be used publicly and openly. IoT requires this type of technology to allow secure communication between IoT nodes in different environments. Events in BC can be tracked and monitored by anyone who is certified to communicate within IoT.
Preprint
Full-text available
p>In the age of next-generation computer, the role of the cloud, the internet and smart devices will become stronger. These days we all know the word smart well. This word is often used in our daily lives. The Internet of Things (IoT) will generate a variety of information from a variety of resources. It can store big data in the cloud. Fog computing acts as a signal between cloud and IoT. Fog extensions in this framework apply to material under IoT. IoT devices are called Fog nodes, which can be accessed anywhere within the network range. A blockchain is a novel way of recording in a secure sequence. Creating a new framework in the development of Internet of Things is one of the critical problems of wireless communication where solving such a problem can lead to continued growth in the use and popularity of IoT. Proposed research creates a framework for providing a framework for middleware on the internet of smart devices network for the internet of things using blockchains technology. Our great offering connects new research that integrates blockchains into the Internet of Things and provides secure Internet connection for smart devices. Blockchain (BC) Internet of Things (IoT) is a new technology that works with low-level, distributed, public and real-time leaders to maintain transactions between IoT sites. A blockchain is a series of blocks, each block being linked to its previous blocks. All blocks have cryptographic hash code, previous block hash, and its data. Transactions in BC are the basic components used to transfer data between IoT nodes. IoT nodes are a variety of portable but smart devices with embedded sensors, actuators, systems and the ability to communicate with other IoT nodes. The role of BC in IoT is to provide a process for processing secure data records using IoT nodes. BC is a protected technology that can be used publicly and openly. IoT requires this type of technology to allow secure communication between IoT nodes in different environments. Events in BC can be tracked and monitored by anyone who is certified to communicate within IoT.</p
Preprint
In the age of next-generation computer, the role of the cloud, the internet and smart devices will become stronger. These days we all know the word smart well. This word is often used in our daily lives. The Internet of Things (IoT) will generate a variety of information from a variety of resources. It can store big data in the cloud. Fog computing acts as a signal between cloud and IoT. Fog extensions in this framework apply to material under IoT. IoT devices are called Fog nodes, which can be accessed anywhere within the network range. A blockchain is a novel way of recording in a secure sequence. Creating a new framework in the development of Internet of Things is one of the critical problems of wireless communication where solving such a problem can lead to continued growth in the use and popularity of IoT. Proposed research creates a framework for providing a framework for middleware on the internet of smart devices network for the internet of things using blockchains technology. Our great offering connects new research that integrates blockchains into the Internet of Things and provides secure Internet connection for smart devices. Blockchain (BC) Internet of Things (IoT) is a new technology that works with low-level, distributed, public and real-time leaders to maintain transactions between IoT sites. A blockchain is a series of blocks, each block being linked to its previous blocks. All blocks have cryptographic hash code, previous block hash, and its data. Transactions in BC are the basic components used to transfer data between IoT nodes. IoT nodes are a variety of portable but smart devices with embedded sensors, actuators, systems and the ability to communicate with other IoT nodes. The role of BC in IoT is to provide a process for processing secure data records using IoT nodes. BC is a protected technology that can be used publicly and openly. IoT requires this type of technology to allow secure communication between IoT nodes in different environments. Events in BC can be tracked and monitored by anyone who is certified to communicate within IoT.
Preprint
Full-text available
p>In the age of next-generation computer, the role of the cloud, the internet and smart devices will become stronger. These days we all know the word smart well. This word is often used in our daily lives. The Internet of Things (IoT) will generate a variety of information from a variety of resources. It can store big data in the cloud. Fog computing acts as a signal between cloud and IoT. Fog extensions in this framework apply to material under IoT. IoT devices are called Fog nodes, which can be accessed anywhere within the network range. A blockchain is a novel way of recording in a secure sequence. Creating a new framework in the development of Internet of Things is one of the critical problems of wireless communication where solving such a problem can lead to continued growth in the use and popularity of IoT. Proposed research creates a framework for providing a framework for middleware on the internet of smart devices network for the internet of things using blockchains technology. Our great offering connects new research that integrates blockchains into the Internet of Things and provides secure Internet connection for smart devices. Blockchain (BC) Internet of Things (IoT) is a new technology that works with low-level, distributed, public and real-time leaders to maintain transactions between IoT sites. A blockchain is a series of blocks, each block being linked to its previous blocks. All blocks have cryptographic hash code, previous block hash, and its data. Transactions in BC are the basic components used to transfer data between IoT nodes. IoT nodes are a variety of portable but smart devices with embedded sensors, actuators, systems and the ability to communicate with other IoT nodes. The role of BC in IoT is to provide a process for processing secure data records using IoT nodes. BC is a protected technology that can be used publicly and openly. IoT requires this type of technology to allow secure communication between IoT nodes in different environments. Events in BC can be tracked and monitored by anyone who is certified to communicate within IoT.</p
Article
Full-text available
Synthetic Aperture Radar (SAR) Tomography is a technique to provide direct three-dimensional (3D) imaging of the illuminated targets by processing SAR data acquired from different trajectories. In a large part of the literature, 3D imaging is achieved by assuming mono-dimensional (1D) approaches derived from SAR Interferometry, where a vector of pixels from multiple SAR images is transformed into a new vector of pixels representing the vertical profile of scene reflectivity at a given range, azimuth location. However, mono-dimensional approaches are only suited for data acquired from very closely-spaced trajectories, resulting in coarse vertical resolution. In the case of continuous media, such as forests, snow, ice sheets and glaciers, achieving fine vertical resolution is only possible in the presence of largely-spaced trajectories, which involves significant complications concerning the formation of 3D images. The situation gets even more complicated in the presence of irregular trajectories with variable headings, for which the one theoretically exact approach consists of going back to raw SAR data to resolve the targets by 3D back-projection, resulting in a computational burden beyond the capabilities of standard computers. The first aim of this paper is to provide an exhaustive discussion of the conditions under which high-quality tomographic processing can be carried out by assuming a 1D, 2D, or 3D approach to image formation. The case of 3D processing is then further analyzed, and a new processing method is proposed to produce high-quality imaging while largely reducing the computational burden, and without having to process the original raw data. Furthermore, the new method is shown to be easily parallelized and implemented using GPU processing. The analysis is supported by results from numerical simulations as well as from real airborne data from the ESA campaign AlpTomoSAR.
Article
Full-text available
Wireless networks make it easier for users to connect with each other in the sense of the Internet of Things infrastructure. Smart devices are dynamically connected and set up a network on their own. But there are more barriers to secure connectivity within this own network. Mobile devices like smart home automation access point, smart washing machines, smart platforms, temperature controller, colour-changing smart Lights, smart mobile phones, smartwatches and smart gadgets etc. are prevalent in our everyday lives and is becoming useful tools with wireless networking capabilities that use different wireless protocols that are traditionally used with an IEEE 802.11 access point. On the realism of the Internet, security has been perceived as a prominent inhibitor of embracing the cloud paradigm. It is resource storage and management that may lay in any since the cloud environment is a distributed architecture, which place of the world, many concerns have been raised over its vulnerabilities, security threats and challenges. The involvement of various parties has widened these concerns based on each party's perspective and objective. The Cloud point of view we mainly discuss the causes of obstacles and challenges related to security, reliability, privacy and service availability. Communication Security has been raised as one of the most critical issues of cloud computing where resolving such an issue would result in constant growth in the use and popularity of cloud computing. Our purpose of this study is to create a framework of mobile ad hoc network mobility model using cloud computing for providing secure communication among smart devices network for the internet of things in 5G heterogeneous networks. Our main contribution links a new methodology for providing secure communication on the internet of smart devices in 5G. Our methodology uses the correct and efficient simulation of the desired study and can be implemented in a framework of the Internet of Things in 5G.
Article
Full-text available
Active infrared thermography is a fast and accurate non-destructive evaluation technique that is of particular relevance to the aerospace industry for the inspection of aircraft and helicopters' primary and secondary structures, aero-engine parts, spacecraft components and its subsystems. This review provides an exhaustive summary of most recent active thermographic methods used for aerospace applications according to their physical principle and thermal excitation sources. Besides traditional optically stimulated thermography, which uses external optical radiation such as flashes, heaters and laser systems, novel hybrid thermographic techniques are also investigated. These include ultrasonic stimulated thermography, which uses ultrasonic waves and the local damage resonance effect to enhance the reliability and sensitivity to micro-cracks, eddy current stimulated thermography, which uses cost-effective eddy current excitation to generate induction heating, and microwave thermography, which uses electromagnetic radiation at the microwave frequency bands to provide rapid detection of cracks and delamination. All these techniques are here analysed and numerous examples are provided for different damage scenarios and aerospace components in order to identify the strength and limitations of each thermographic technique. Moreover, alternative strategies to current external thermal excitation sources, here named as material-based thermography methods, are examined in this paper. These novel thermographic techniques rely on thermoresistive internal heating and offer a fast, low power, accurate and reliable assessment of damage in aerospace composites.
Chapter
Full-text available
Visitors to Saudi Arabia for Hajj and Umrah from around the globe are constantly increasing with each passing year and hence visitors to the Prophet Muhammad (S.A.W)’s mosque, in Madina Munawara are also increasing. This paper investigates numerically the corridor of Ziara Place which is the most congestion place in the mosque. In order to improve crowd management and minimise the occurrence of emergency situations or hazardous conditions necessary arrangements e.g. decreasing the waiting time, avoiding barriers, controlling the crowd size and optimising the queuing process, are suggested. Certain simulation scenarios are studied in helping to reduce the risk of people colliding into each other, as well as helping to reduce long waiting times in this particular area. Visitor’s behaviour, crowd density, and crowd flow around the Prophet (S.A.W)’s grave is analysed for varying crowd densities.
Article
This survey presents an in-depth overview of the last 25 years of research within the field of image-based automation of Closed-Circuit Television (CCTV) and Sewer Scanner and Evaluation Technology (SSET) sewer inspection. The survey investigates both the algorithmic pipeline, and the datasets and corresponding evaluation protocols. As a result of the in-depth survey, several trends within the research field are revealed, discussed, and future research directions are proposed. Based on the conducted survey, we put forth a set of three recommendations, which we believe will further improve and open the research field, as well as make the future research more reproducible: 1) The introduction of free and public benchmark datasets, 2) Standardized evaluation metrics, and 3) Open-sourcing the associated code.
Article
The thermal imaging camera is a new emerging tool in forensic visionary technology for seeing in total darkness and takes an image of heat radiation from an object in diverse weather condition like rain, fog and smoke etc. The normal close circuit television (CCTV) cameras are blinded by the sun resulting they do not see too much in total darkness. All objects, regardless of temperature, emit some level of energy. IR cameras have the unique ability to capture this information and display it in a thermal image to be viewed and analyzed. This paper describes some of science behind this technology and its application.
Conference Paper
The five daily Muslim prayer times namely Fajr, Zuhr, Asr, Maghrib and Isha vary from place to place and from day to day and are uneven for locations with same time zones. The exact timing of each of the prayer is important, because it is obligatory for every Muslim to perform these prayers at the correct time. This paper presents a novel idea to develop a controlling unit using Raspberry Pi that can be connected to a TV or computer LCD monitor through VGA or HDMI port to convert it into a smart mosque (masjid) display. The smart masjid display is capable of displaying the prayer times, date, day, time and temperature. The prayer time schedule can be set and calculated based on the GPS coordinates of the place or the city. Moreover, it differs than the traditional dot matrix Masjid displays since it can display from time to time several Islamic prayers (Adzkar) of morning and evening, and audible and visual announcements as pictures and videos. Furthermore, the Imam of mosque, especially in the Taraweeh prayers, can display the pages of the Holy Quran on the smart display instead of carrying the Holy Quran by hand. The developed smart masjid display can be remotely controlled using a remote controller wearable as a ring on the finger of user/Imam which allows him to remotely flip the Quran's pages presented on the display even during the prayers. The developed controlling unit which convert any TV/ computer monitors to smart masjid display is a unique product, compact, portable, and most suitable for the special requirements of the Muslim communities throughout the world and can be placed in mosques, Islamic institutions or centers, schools, and universities and anywhere in the world have Muslim people.
Conference Paper
Crowd disasters are common in places of human gathering. Thousands of people gather at Al-Masjid An-Nabawi to perform their daily prayers. The mosque is packed with people and finding the right entrance is always an issue. The purpose of this study is to identify the most recent method in computer vision that could be used to estimate the level of crowdedness at these entrances based on the existing CCTV videos. The method will then be incorporated in a mobile application, which acts as a “crowd adviser” to direct the visitors of Al-Masjid An-Nabawi to less crowded doors (if any) using indoor built map. The system detects the heads in the crowd using Aggregate Channel Features (or Viola-Jones depending on the performance), count the detected objects to estimate the crowd level and present it to the the user on a mobile application.
Article
Infrared images can distinguish targets from their backgrounds based on the radiation difference, which works well in all-weather and all-day/night conditions. By contrast, visible images can provide texture details with high spatial resolution and definition in a manner consistent with the human visual system. Therefore, it is desirable to fuse these two types of images, which can combine the advantages of thermal radiation information in infrared images and detailed texture information in visible images. In this work, we comprehensively survey the existing methods and applications for the fusion of infrared and visible images. First, infrared and visible image fusion methods are reviewed in detail. Meanwhile, image registration, as a prerequisite of image fusion, is briefly introduced. Second, we provide an overview of the main applications of infrared and visible image fusion. Third, the evaluation metrics of fusion performance are discussed and summarized. Fourth, we select eighteen representative methods and nine assessment metrics to conduct qualitative and quantitative experiments, which can provide an objective performance reference for different fusion methods and thus support relative engineering with credible and solid evidence. Finally, we conclude with the current status of infrared and visible image fusion and deliver insightful discussions and prospects for future work. This survey can serve as a reference for researchers in infrared and visible image fusion and related fields.