SlideShare a Scribd company logo
Presented
By
Dr. Mohamed Torky
Assistant Professor of Computer Science
Culture & Science City Academy.
Senior Member in Scientific Research Group in Egypt (SRGE)
1
• Introduction
2
• The Problem Statement
3
• The Proposed Blockchain Frame work
4
• Implementation
5
• Conclusion
Introduction
Artificial Intelligence: the smart aide against COVID-19
3D Printing: for Printing important Medical tools
Smartphone Tracking: for contact tracing
Virtual Reality Is already Changing Healthcare
Introduction
1) Face Mask Detection using AI
Uses existing IP cameras and Closed-
Circuts Television (CCTV) cameras
combined with Computer Vision to detect
people without masks.
• Facial recognition to identify individuals
without mask.
• Real-time monitoring and alerts
• Work on the existing CCTV and IP cameras
Introduction
2) Contactless Attendance System
Uses computer vision and facial recognition
to recognize faces and mark attendance by
looking at face bio-metrics. It can work with
Real Time Streaming Protocol (RTSP)-
enabled CCTV or IP cameras.
• Computer Vision
• Real-time attendance tracking
• Attendance reports generation
Introduction
3) Telemedicine Solution for
Healthcare Institutes
Doctors, patients and pharmacists can use the
telemedicine application for connecting with patients
remotely. Patients can consult doctors via online
video. So, it can reduces the spread of the virus to
mass populations. Doctors can order the prescription
on behalf of the patient to avoid the mishandling of
the prescription.
• Doctor calendar scheduling
• Consultation using Video calling
• Prescription handling
Introduction
4) Social Distancing Alert System Using
Artificial Intelligence
Uses existing IP cameras and CCTV cameras
combined with Computer Vision to detect if people
are at a specific distance and adhere to social
distancing or not.
• Real-time tracking and alerts.
• Measuring distance between two or more
people.
• Voice alarms.
Introduction
5) Hotspot Zone Detection using
Computer Vision
Using existing IP or CCTV cameras, Hotspot Zone
Detection can identify if people are touching unknown
physical objects frequently in a specific area. If the
number of touches exceeds the limit, the area is
identified as a hotspot zone.
• Using existing IP/CCTV cameras.
• Colored pattern analytics for identification of
hotspot zones.
• Real-time alerts and notifications.
Introduction
6) Human Presence Detection System
Human Presence System is designed to monitor
patients remotely. It uses IP cameras and AI to track
patients and report any missing people. The system is
helpful in contact tracing and identifying the infected
person movement.
• Remote monitoring.
• Missing People Report.
• Quarantined People location tracking.
The Problem Statement
1
• Introduction
2
• The Problem Statement
3
• The Proposed Blockchain Frame work
4
• Implementation
5
• Conclusion
The Problem Statement
 The greatest challenge that most governments are
currently suffering from is the lack of a precise
and automated mechanism for automatically
detecting the infected cases of COVID-19 and
provides alerts about the infected persons .
Similar Systems
Singapore Trace Together
Google/Apple Contact Tracing
• Notifies you quickly if you’ve been
exposed to COVID-19 through close
contact with other Trace Together users.
• The app allows the Ministry of Health
(MOH) to give you timely care and
guidance, protecting you and those
around you • Use “exposure notification” tool and
Bluetooth radios within smartphones to
notify public when they may have come
in contact with infected person .
• But this app didn’t work properly
because of restrictions the companies
place on smartphones and poor
communications between the phones
running Google and Apple.
Similar Systems
UK NHS Contact Tracing
• Ensures that anyone who develops
symptoms of (COVID-19) can
quickly be tested to find out if they
have the virus.
• The app helps trace close recent
contacts of anyone who tests
positive for coronavirus and, if
necessary, notifies them that they
must self-isolate at home to help
stop the spread of the virus
China Health Code System
• dictates whether citizens should be
quarantined or allowed into
subways, malls and other public
spaces based on relational cross-
match by scanning the QR code
Similar Systems (Limitations)
 There are some important limitations of
Bluetooth technology used in the recent
Covid-19 Apps:
 Mobile phones can lose connection in certain conditions.
 Bluetooth has low bandwidth as compared to Wi-Fi.
 Bluetooth allows only short range communication
between devices.
 Security is a very key challenge, where Bluetooth
connections can be hacked.
 QR code may become distorted, which can lead to
improper reading by a device. Also , improper designs
and formatting can make QR codes un-scanble
The Proposed Blockchain Framework
The Proposed Blockchain Framework
1
• Introduction
2
• The Problem Statement
3
• The Proposed Blockchain Frame work
4
• Implementation
5
• Conclusion
Preliminary
 Represent the confirmed cases
using regular expression in the
form of the infection patterns
 This pattern can generates many
infection instances which
digitally represent the infected
persons and infected buildings
The Blockchain Platform
𝑩𝑯𝑪 = 𝑯𝒂𝒔𝒉(𝑴𝑹 + 𝑷 + 𝑰𝑺 𝑪𝒐𝒅𝒆) (1)
Where BHC is the block hash code, MR
is the Markle rote value (i.e. unique
fingerprint for all inserted data in the
block in the form Markle root code ), P
is the previous block’s hash code, and
IS Code is a random value represents
random value of an infection code
𝑰𝑺 𝑪𝒐𝒅𝒆 = 𝑯𝒂𝒔𝒉−𝟏
(𝑴𝑹 + 𝑷 + 𝑩𝑯𝑪) (2)
Mass Surveillance System
1) Detection and Tracking Function: using
this function, Mass-Surveillance System can
track last behaviors of the confirmed COVID-19
cases for detecting the set of close contact
persons who interacted with, and the set of
places which COVID-19-patients has been
accessed during the last few days.
2) Blockchain Feedback Function: Mass-
Surveillance System calls this function to
send the detected the set of probable infected
persons as well as the set of infected places
to blockchain which map the set of infected
persons and places with the corresponding
confirmed COVID-19 cases.
The Infection Verifier system
 Verifying the infection instances (i.e. Contact persons)
to confirm the infection transferee from a confirmed
COVID-19 case to a contact person can be
implemented by a Finite Automaton Model.
The P2P Mobile Application
1) Self-estimation of COVID-19
infection probability
𝑷 𝑿 =
𝑵!
𝑿!× 𝑵−𝑿 !
× 𝑷 𝑿
× 𝑸 𝑵−𝑿
(3)
Where, 𝑷 𝑿 is the infection probability
function, 𝑵 is the total number of infection
codes in the inbox of each user . 𝑿 is the
number of infection occurs , such that 𝑋
= 0,1,2,3, … … 𝑁 , 𝑷 𝑿
is the probability of
succeeded infection occurrences , and 𝑸 𝑵−𝑿
is
the probability of un-succeeded infection
occurrences.
The P2P Mobile Application
2) Detection of unknown infected cases
within a Cluster of people
Implementation
1
• Introduction
2
• The Problem Statement
3
• The Proposed Blockchain Frame work
4
• Implementation
5
• Conclusion
Implementation
Software Tools :
Ethereum for Developing Blockchain system
in our proposed framework
Java and firebase Real time Database for
Developing the P2P Mobile App, and store and
sync data between different users in the real-
time.
Paython and MonogoDB for data
simulation and GPS data analytics
Implementation
Implementation
Conclusion
1
• Introduction
2
• The Problem Statement
3
• The Proposed Blockchain Frame work
4
• Implementation
5
• Conclusion
Conclusion
 This study introduced the first blockchain-based framework which
can be used for helping persons, health authorities, and governments
for fighting COVID-19 coronavirus in an innovative way.
 This study set out with the aim of developing a novel blockchain
framework for implementing an integrated system able to tracking and
detecting the unknown infected cases of COVID-19 coronavirus.
 Estimating COVID-19 infection probability rates for persons, and
detecting the unknown infected cases within various clusters of
people.
Dr. Mohamed Torky
Culture & Science City Academy
Email:mtorky86@gmail.com
Prof.Dr. Aboul Ella Hassanein
Cairo University
Scientific Research Group in Egypt (SRGE)

More Related Content

What's hot

SMART HEALTH AND Internet of Things (IoT) - RESEARCH Opportunities
SMART HEALTH AND Internet of Things (IoT) 	-  RESEARCH  OpportunitiesSMART HEALTH AND Internet of Things (IoT) 	-  RESEARCH  Opportunities
SMART HEALTH AND Internet of Things (IoT) - RESEARCH Opportunities
Tauseef Naquishbandi
 
PreScouter Internet of Medical Things: Industry Roundtable Webinar
PreScouter Internet of Medical Things: Industry Roundtable WebinarPreScouter Internet of Medical Things: Industry Roundtable Webinar
PreScouter Internet of Medical Things: Industry Roundtable Webinar
PreScouter
 
AED Final Project Abstract
AED Final Project AbstractAED Final Project Abstract
AED Final Project Abstract
Ramya Reddy
 
IoT, Big Data Healthcare Summit Western Canada - IoT Health - Enterprise - Ri...
IoT, Big Data Healthcare Summit Western Canada - IoT Health - Enterprise - Ri...IoT, Big Data Healthcare Summit Western Canada - IoT Health - Enterprise - Ri...
IoT, Big Data Healthcare Summit Western Canada - IoT Health - Enterprise - Ri...
Ingunn Grip Fjær
 
4. paper 10 nov 10, 2017 edit sat
4. paper 10 nov 10, 2017 edit sat4. paper 10 nov 10, 2017 edit sat
4. paper 10 nov 10, 2017 edit sat
IAESIJEECS
 
OnDemand Webinar: Key Considerations to Securing the Internet of Things (IoT)...
OnDemand Webinar: Key Considerations to Securing the Internet of Things (IoT)...OnDemand Webinar: Key Considerations to Securing the Internet of Things (IoT)...
OnDemand Webinar: Key Considerations to Securing the Internet of Things (IoT)...
Great Bay Software
 
Security in Medical Devices using Wireless Monitoring and Detection of Anomalies
Security in Medical Devices using Wireless Monitoring and Detection of AnomaliesSecurity in Medical Devices using Wireless Monitoring and Detection of Anomalies
Security in Medical Devices using Wireless Monitoring and Detection of Anomalies
IJMTST Journal
 
IoT in Health Care
IoT in Health CareIoT in Health Care
IoT in Health Care
Md. Sohag Miah
 
The internet of things for health care a comprehensive survey
The internet of things for health care a comprehensive surveyThe internet of things for health care a comprehensive survey
The internet of things for health care a comprehensive survey
redpel dot com
 
The latest three 5G applications
The latest three 5G applicationsThe latest three 5G applications
The latest three 5G applications
Antenna Manufacturer Coco
 
Wearable electronics in health care
Wearable electronics in health careWearable electronics in health care
Wearable electronics in health care
Parth Agrawal
 
ADVANCED HEALTH CARE SYSTEM USING IOT
ADVANCED HEALTH CARE SYSTEM USING IOTADVANCED HEALTH CARE SYSTEM USING IOT
ADVANCED HEALTH CARE SYSTEM USING IOT
D Y PATIL COLLEGE OF ENGINEERING PUNE
 
Fast and fire-walled IOT healthcare-Baseer
Fast and fire-walled  IOT healthcare-BaseerFast and fire-walled  IOT healthcare-Baseer
Fast and fire-walled IOT healthcare-Baseer
AbdulBaseer (Baseer) Mohammed
 
Cloud based wireless Body Area Network for Health management
Cloud based wireless Body Area Network for Health management Cloud based wireless Body Area Network for Health management
Cloud based wireless Body Area Network for Health management
Fantahun Yersaw
 
IOT HEALTH CARE
IOT HEALTH CAREIOT HEALTH CARE
IOT HEALTH CARE
Sarath K
 
ANALYSIS OF VARIOUS PROTOCOLS IN WIRELESS BODY AREA NETWORKS (WBAN)
ANALYSIS OF VARIOUS PROTOCOLS IN WIRELESS BODY AREA NETWORKS (WBAN) ANALYSIS OF VARIOUS PROTOCOLS IN WIRELESS BODY AREA NETWORKS (WBAN)
ANALYSIS OF VARIOUS PROTOCOLS IN WIRELESS BODY AREA NETWORKS (WBAN)
IAEME Publication
 
Iot, cloud and healthcare - Challenges and Opportunities
Iot, cloud and healthcare - Challenges and OpportunitiesIot, cloud and healthcare - Challenges and Opportunities
Iot, cloud and healthcare - Challenges and Opportunities
Arash Ghadar
 
Iaetsd io t based advanced smart health care system
Iaetsd io t based advanced smart health care systemIaetsd io t based advanced smart health care system
Iaetsd io t based advanced smart health care system
Iaetsd Iaetsd
 
Security Requirements in IoT Architecture
Security	Requirements	in	IoT	Architecture Security	Requirements	in	IoT	Architecture
Security Requirements in IoT Architecture
Vrince Vimal
 
The Role of Internet-of-Things (IoT) in Healthcare
The Role of Internet-of-Things (IoT) in HealthcareThe Role of Internet-of-Things (IoT) in Healthcare
The Role of Internet-of-Things (IoT) in Healthcare
Luís Rita
 

What's hot (20)

SMART HEALTH AND Internet of Things (IoT) - RESEARCH Opportunities
SMART HEALTH AND Internet of Things (IoT) 	-  RESEARCH  OpportunitiesSMART HEALTH AND Internet of Things (IoT) 	-  RESEARCH  Opportunities
SMART HEALTH AND Internet of Things (IoT) - RESEARCH Opportunities
 
PreScouter Internet of Medical Things: Industry Roundtable Webinar
PreScouter Internet of Medical Things: Industry Roundtable WebinarPreScouter Internet of Medical Things: Industry Roundtable Webinar
PreScouter Internet of Medical Things: Industry Roundtable Webinar
 
AED Final Project Abstract
AED Final Project AbstractAED Final Project Abstract
AED Final Project Abstract
 
IoT, Big Data Healthcare Summit Western Canada - IoT Health - Enterprise - Ri...
IoT, Big Data Healthcare Summit Western Canada - IoT Health - Enterprise - Ri...IoT, Big Data Healthcare Summit Western Canada - IoT Health - Enterprise - Ri...
IoT, Big Data Healthcare Summit Western Canada - IoT Health - Enterprise - Ri...
 
4. paper 10 nov 10, 2017 edit sat
4. paper 10 nov 10, 2017 edit sat4. paper 10 nov 10, 2017 edit sat
4. paper 10 nov 10, 2017 edit sat
 
OnDemand Webinar: Key Considerations to Securing the Internet of Things (IoT)...
OnDemand Webinar: Key Considerations to Securing the Internet of Things (IoT)...OnDemand Webinar: Key Considerations to Securing the Internet of Things (IoT)...
OnDemand Webinar: Key Considerations to Securing the Internet of Things (IoT)...
 
Security in Medical Devices using Wireless Monitoring and Detection of Anomalies
Security in Medical Devices using Wireless Monitoring and Detection of AnomaliesSecurity in Medical Devices using Wireless Monitoring and Detection of Anomalies
Security in Medical Devices using Wireless Monitoring and Detection of Anomalies
 
IoT in Health Care
IoT in Health CareIoT in Health Care
IoT in Health Care
 
The internet of things for health care a comprehensive survey
The internet of things for health care a comprehensive surveyThe internet of things for health care a comprehensive survey
The internet of things for health care a comprehensive survey
 
The latest three 5G applications
The latest three 5G applicationsThe latest three 5G applications
The latest three 5G applications
 
Wearable electronics in health care
Wearable electronics in health careWearable electronics in health care
Wearable electronics in health care
 
ADVANCED HEALTH CARE SYSTEM USING IOT
ADVANCED HEALTH CARE SYSTEM USING IOTADVANCED HEALTH CARE SYSTEM USING IOT
ADVANCED HEALTH CARE SYSTEM USING IOT
 
Fast and fire-walled IOT healthcare-Baseer
Fast and fire-walled  IOT healthcare-BaseerFast and fire-walled  IOT healthcare-Baseer
Fast and fire-walled IOT healthcare-Baseer
 
Cloud based wireless Body Area Network for Health management
Cloud based wireless Body Area Network for Health management Cloud based wireless Body Area Network for Health management
Cloud based wireless Body Area Network for Health management
 
IOT HEALTH CARE
IOT HEALTH CAREIOT HEALTH CARE
IOT HEALTH CARE
 
ANALYSIS OF VARIOUS PROTOCOLS IN WIRELESS BODY AREA NETWORKS (WBAN)
ANALYSIS OF VARIOUS PROTOCOLS IN WIRELESS BODY AREA NETWORKS (WBAN) ANALYSIS OF VARIOUS PROTOCOLS IN WIRELESS BODY AREA NETWORKS (WBAN)
ANALYSIS OF VARIOUS PROTOCOLS IN WIRELESS BODY AREA NETWORKS (WBAN)
 
Iot, cloud and healthcare - Challenges and Opportunities
Iot, cloud and healthcare - Challenges and OpportunitiesIot, cloud and healthcare - Challenges and Opportunities
Iot, cloud and healthcare - Challenges and Opportunities
 
Iaetsd io t based advanced smart health care system
Iaetsd io t based advanced smart health care systemIaetsd io t based advanced smart health care system
Iaetsd io t based advanced smart health care system
 
Security Requirements in IoT Architecture
Security	Requirements	in	IoT	Architecture Security	Requirements	in	IoT	Architecture
Security Requirements in IoT Architecture
 
The Role of Internet-of-Things (IoT) in Healthcare
The Role of Internet-of-Things (IoT) in HealthcareThe Role of Internet-of-Things (IoT) in Healthcare
The Role of Internet-of-Things (IoT) in Healthcare
 

Similar to Blockchain framework for detecting the infected cases of covid 19 pandemic

Introduction to contact tracing apps and privacy issues
Introduction to contact tracing apps and privacy issuesIntroduction to contact tracing apps and privacy issues
Introduction to contact tracing apps and privacy issues
Christian Spolaore
 
6’APART – A STEP TO PREVENT COVID-19
6’APART – A STEP TO PREVENT COVID-196’APART – A STEP TO PREVENT COVID-19
6’APART – A STEP TO PREVENT COVID-19
IRJET Journal
 
6’APART – A STEP TO PREVENT COVID-19
6’APART – A STEP TO PREVENT COVID-196’APART – A STEP TO PREVENT COVID-19
6’APART – A STEP TO PREVENT COVID-19
IRJET Journal
 
ROLES OF TECHNOLOGY AGAINST NOVEL CORONA VIRUS
ROLES OF TECHNOLOGY AGAINST NOVEL CORONA VIRUS 	ROLES OF TECHNOLOGY AGAINST NOVEL CORONA VIRUS
ROLES OF TECHNOLOGY AGAINST NOVEL CORONA VIRUS
Arpita Banerjee
 
A Social Distancing Monitoring System Using OpenCV to Ensure Social Distancin...
A Social Distancing Monitoring System Using OpenCV to Ensure Social Distancin...A Social Distancing Monitoring System Using OpenCV to Ensure Social Distancin...
A Social Distancing Monitoring System Using OpenCV to Ensure Social Distancin...
IRJET Journal
 
ITU Standardization of Telebiometric applications
ITU Standardization of Telebiometric applications ITU Standardization of Telebiometric applications
ITU Standardization of Telebiometric applications
ITU
 
Main Page new.pdf
Main Page new.pdfMain Page new.pdf
Main Page new.pdf
Johnson132600
 
L017326972
L017326972L017326972
L017326972
IOSR Journals
 
Face expressions, facial features, kinect sensor, face tracking SDK, neural n...
Face expressions, facial features, kinect sensor, face tracking SDK, neural n...Face expressions, facial features, kinect sensor, face tracking SDK, neural n...
Face expressions, facial features, kinect sensor, face tracking SDK, neural n...
iosrjce
 
A new system to detect coronavirus social distance violation
A new system to detect coronavirus social distance violation A new system to detect coronavirus social distance violation
A new system to detect coronavirus social distance violation
IJECEIAES
 
Social Distance Detector Using Computer Vision, OpenCV and YOLO Deep Learning...
Social Distance Detector Using Computer Vision, OpenCV and YOLO Deep Learning...Social Distance Detector Using Computer Vision, OpenCV and YOLO Deep Learning...
Social Distance Detector Using Computer Vision, OpenCV and YOLO Deep Learning...
IRJET Journal
 
Internet of things, and rise of ibeacons
Internet of things, and rise of ibeaconsInternet of things, and rise of ibeacons
Internet of things, and rise of ibeacons
Janusz Chudzynski
 
Ijirstv1 i6029
Ijirstv1 i6029Ijirstv1 i6029
Ijirstv1 i6029
anuj87420
 
NEW CORONA VIRUS DISEASE 2022: SOCIAL DISTANCING IS AN EFFECTIVE MEASURE (COV...
NEW CORONA VIRUS DISEASE 2022: SOCIAL DISTANCING IS AN EFFECTIVE MEASURE (COV...NEW CORONA VIRUS DISEASE 2022: SOCIAL DISTANCING IS AN EFFECTIVE MEASURE (COV...
NEW CORONA VIRUS DISEASE 2022: SOCIAL DISTANCING IS AN EFFECTIVE MEASURE (COV...
IRJET Journal
 
COVID-19 FACE MASK DETECTION
COVID-19 FACE MASK DETECTIONCOVID-19 FACE MASK DETECTION
COVID-19 FACE MASK DETECTION
IRJET Journal
 
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IRJET Journal
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
sanjaymps
 
Face Mask Detection and Contactless Body Temperature Sensing
Face Mask Detection and Contactless Body Temperature SensingFace Mask Detection and Contactless Body Temperature Sensing
Face Mask Detection and Contactless Body Temperature Sensing
IRJET Journal
 
Nodeflux ai for covid19 adhiguna mahendra phd
Nodeflux ai for covid19 adhiguna mahendra phdNodeflux ai for covid19 adhiguna mahendra phd
Nodeflux ai for covid19 adhiguna mahendra phd
Adhiguna Mahendra
 
finger print based door lock.pptx
finger print based door lock.pptxfinger print based door lock.pptx
finger print based door lock.pptx
Pooja541216
 

Similar to Blockchain framework for detecting the infected cases of covid 19 pandemic (20)

Introduction to contact tracing apps and privacy issues
Introduction to contact tracing apps and privacy issuesIntroduction to contact tracing apps and privacy issues
Introduction to contact tracing apps and privacy issues
 
6’APART – A STEP TO PREVENT COVID-19
6’APART – A STEP TO PREVENT COVID-196’APART – A STEP TO PREVENT COVID-19
6’APART – A STEP TO PREVENT COVID-19
 
6’APART – A STEP TO PREVENT COVID-19
6’APART – A STEP TO PREVENT COVID-196’APART – A STEP TO PREVENT COVID-19
6’APART – A STEP TO PREVENT COVID-19
 
ROLES OF TECHNOLOGY AGAINST NOVEL CORONA VIRUS
ROLES OF TECHNOLOGY AGAINST NOVEL CORONA VIRUS 	ROLES OF TECHNOLOGY AGAINST NOVEL CORONA VIRUS
ROLES OF TECHNOLOGY AGAINST NOVEL CORONA VIRUS
 
A Social Distancing Monitoring System Using OpenCV to Ensure Social Distancin...
A Social Distancing Monitoring System Using OpenCV to Ensure Social Distancin...A Social Distancing Monitoring System Using OpenCV to Ensure Social Distancin...
A Social Distancing Monitoring System Using OpenCV to Ensure Social Distancin...
 
ITU Standardization of Telebiometric applications
ITU Standardization of Telebiometric applications ITU Standardization of Telebiometric applications
ITU Standardization of Telebiometric applications
 
Main Page new.pdf
Main Page new.pdfMain Page new.pdf
Main Page new.pdf
 
L017326972
L017326972L017326972
L017326972
 
Face expressions, facial features, kinect sensor, face tracking SDK, neural n...
Face expressions, facial features, kinect sensor, face tracking SDK, neural n...Face expressions, facial features, kinect sensor, face tracking SDK, neural n...
Face expressions, facial features, kinect sensor, face tracking SDK, neural n...
 
A new system to detect coronavirus social distance violation
A new system to detect coronavirus social distance violation A new system to detect coronavirus social distance violation
A new system to detect coronavirus social distance violation
 
Social Distance Detector Using Computer Vision, OpenCV and YOLO Deep Learning...
Social Distance Detector Using Computer Vision, OpenCV and YOLO Deep Learning...Social Distance Detector Using Computer Vision, OpenCV and YOLO Deep Learning...
Social Distance Detector Using Computer Vision, OpenCV and YOLO Deep Learning...
 
Internet of things, and rise of ibeacons
Internet of things, and rise of ibeaconsInternet of things, and rise of ibeacons
Internet of things, and rise of ibeacons
 
Ijirstv1 i6029
Ijirstv1 i6029Ijirstv1 i6029
Ijirstv1 i6029
 
NEW CORONA VIRUS DISEASE 2022: SOCIAL DISTANCING IS AN EFFECTIVE MEASURE (COV...
NEW CORONA VIRUS DISEASE 2022: SOCIAL DISTANCING IS AN EFFECTIVE MEASURE (COV...NEW CORONA VIRUS DISEASE 2022: SOCIAL DISTANCING IS AN EFFECTIVE MEASURE (COV...
NEW CORONA VIRUS DISEASE 2022: SOCIAL DISTANCING IS AN EFFECTIVE MEASURE (COV...
 
COVID-19 FACE MASK DETECTION
COVID-19 FACE MASK DETECTIONCOVID-19 FACE MASK DETECTION
COVID-19 FACE MASK DETECTION
 
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Face Mask Detection and Contactless Body Temperature Sensing
Face Mask Detection and Contactless Body Temperature SensingFace Mask Detection and Contactless Body Temperature Sensing
Face Mask Detection and Contactless Body Temperature Sensing
 
Nodeflux ai for covid19 adhiguna mahendra phd
Nodeflux ai for covid19 adhiguna mahendra phdNodeflux ai for covid19 adhiguna mahendra phd
Nodeflux ai for covid19 adhiguna mahendra phd
 
finger print based door lock.pptx
finger print based door lock.pptxfinger print based door lock.pptx
finger print based door lock.pptx
 

More from Aboul Ella Hassanien

الأطر والمبادئ الاخلاقية للذكاء الاصطناعي التوليدى.pdf
الأطر والمبادئ الاخلاقية  للذكاء الاصطناعي التوليدى.pdfالأطر والمبادئ الاخلاقية  للذكاء الاصطناعي التوليدى.pdf
الأطر والمبادئ الاخلاقية للذكاء الاصطناعي التوليدى.pdf
Aboul Ella Hassanien
 
دعوة للاستخدام المسؤول للذكاء الاصطناعي التوليدي في الأوساط الأكاديمية المعر...
دعوة للاستخدام المسؤول للذكاء الاصطناعي التوليدي في الأوساط الأكاديمية  المعر...دعوة للاستخدام المسؤول للذكاء الاصطناعي التوليدي في الأوساط الأكاديمية  المعر...
دعوة للاستخدام المسؤول للذكاء الاصطناعي التوليدي في الأوساط الأكاديمية المعر...
Aboul Ella Hassanien
 
حوار مع الأستاذ الدكتور أبو العلا عطيفى حسنين - تقنية الذكاء الاصطناعي تحول م...
حوار مع الأستاذ الدكتور أبو العلا عطيفى حسنين - تقنية الذكاء الاصطناعي تحول م...حوار مع الأستاذ الدكتور أبو العلا عطيفى حسنين - تقنية الذكاء الاصطناعي تحول م...
حوار مع الأستاذ الدكتور أبو العلا عطيفى حسنين - تقنية الذكاء الاصطناعي تحول م...
Aboul Ella Hassanien
 
الطاقة من الفضاء: علماء ينقلون الطاقة الشمسية إلى الأرض عن طريق الفضاء لأول م...
الطاقة من الفضاء: علماء ينقلون الطاقة الشمسية إلى الأرض عن طريق الفضاء لأول م...الطاقة من الفضاء: علماء ينقلون الطاقة الشمسية إلى الأرض عن طريق الفضاء لأول م...
الطاقة من الفضاء: علماء ينقلون الطاقة الشمسية إلى الأرض عن طريق الفضاء لأول م...
Aboul Ella Hassanien
 
Intelligent Avatars in the Metaverse.pptx
Intelligent Avatars in the Metaverse.pptxIntelligent Avatars in the Metaverse.pptx
Intelligent Avatars in the Metaverse.pptx
Aboul Ella Hassanien
 
دليل البحث العلمى .pdf
دليل البحث العلمى .pdfدليل البحث العلمى .pdf
دليل البحث العلمى .pdf
Aboul Ella Hassanien
 
SRGE photo.pdf
SRGE photo.pdfSRGE photo.pdf
SRGE photo.pdf
Aboul Ella Hassanien
 
الذكاء الإصطناعى وافاقه فى التعليم على مستوى الوطن العربى: مستوى السياسات
الذكاء الإصطناعى وافاقه فى التعليم على مستوى الوطن العربى: مستوى السياسات الذكاء الإصطناعى وافاقه فى التعليم على مستوى الوطن العربى: مستوى السياسات
الذكاء الإصطناعى وافاقه فى التعليم على مستوى الوطن العربى: مستوى السياسات
Aboul Ella Hassanien
 
الصحافة والإعلام الرقمى فى عصر الذكاء الاصطناعي
الصحافة والإعلام الرقمى  فى عصر الذكاء الاصطناعي  الصحافة والإعلام الرقمى  فى عصر الذكاء الاصطناعي
الصحافة والإعلام الرقمى فى عصر الذكاء الاصطناعي
Aboul Ella Hassanien
 
الميتافيرس و مستقبل التعليم فى الوطن العربى
الميتافيرس و مستقبل التعليم فى الوطن العربى الميتافيرس و مستقبل التعليم فى الوطن العربى
الميتافيرس و مستقبل التعليم فى الوطن العربى
Aboul Ella Hassanien
 
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنية
الذكاء الأصطناعى المسؤول ومستقبل  الأمن المناخى وانعكاساته الاجتماعية والأمنيةالذكاء الأصطناعى المسؤول ومستقبل  الأمن المناخى وانعكاساته الاجتماعية والأمنية
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنية
Aboul Ella Hassanien
 
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنية
الذكاء الأصطناعى المسؤول ومستقبل  الأمن المناخى وانعكاساته الاجتماعية والأمنيةالذكاء الأصطناعى المسؤول ومستقبل  الأمن المناخى وانعكاساته الاجتماعية والأمنية
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنية
Aboul Ella Hassanien
 
التغير المناخى للاطفال
التغير المناخى للاطفالالتغير المناخى للاطفال
التغير المناخى للاطفال
Aboul Ella Hassanien
 
الذكاء الاصطناعى للاطفال
الذكاء الاصطناعى للاطفالالذكاء الاصطناعى للاطفال
الذكاء الاصطناعى للاطفال
Aboul Ella Hassanien
 
إستراتيجية مصر للتنمية المستدامة: نحو جائزة الإبتكار والإبداع المؤسسى
إستراتيجية مصر للتنمية المستدامة: نحو جائزة الإبتكار والإبداع المؤسسىإستراتيجية مصر للتنمية المستدامة: نحو جائزة الإبتكار والإبداع المؤسسى
إستراتيجية مصر للتنمية المستدامة: نحو جائزة الإبتكار والإبداع المؤسسى
Aboul Ella Hassanien
 
الإقتصاد الأخضر لمواجهة التغيرات المناخية
الإقتصاد الأخضر لمواجهة التغيرات المناخية  الإقتصاد الأخضر لمواجهة التغيرات المناخية
الإقتصاد الأخضر لمواجهة التغيرات المناخية
Aboul Ella Hassanien
 
الإستخدام المسؤول للذكاء الإصطناعى فى سياق تغيرالمناخ خارطة طريق فى عال...
   الإستخدام المسؤول للذكاء الإصطناعى  فى سياق تغيرالمناخ   خارطة طريق فى عال...   الإستخدام المسؤول للذكاء الإصطناعى  فى سياق تغيرالمناخ   خارطة طريق فى عال...
الإستخدام المسؤول للذكاء الإصطناعى فى سياق تغيرالمناخ خارطة طريق فى عال...
Aboul Ella Hassanien
 
الذكاء الإصطناعي والتغيرات المناخية والبيئية:الفرص والتحديات والأدوات السياسية
الذكاء الإصطناعي والتغيرات المناخية والبيئية:الفرص والتحديات والأدوات السياسيةالذكاء الإصطناعي والتغيرات المناخية والبيئية:الفرص والتحديات والأدوات السياسية
الذكاء الإصطناعي والتغيرات المناخية والبيئية:الفرص والتحديات والأدوات السياسية
Aboul Ella Hassanien
 
الذكاء الاصطناعى:أسلحة لا تنام وآفاق لا تنتهى
الذكاء الاصطناعى:أسلحة لا تنام وآفاق لا تنتهى الذكاء الاصطناعى:أسلحة لا تنام وآفاق لا تنتهى
الذكاء الاصطناعى:أسلحة لا تنام وآفاق لا تنتهى
Aboul Ella Hassanien
 
اقتصاد ميتافيرس
اقتصاد ميتافيرساقتصاد ميتافيرس
اقتصاد ميتافيرس
Aboul Ella Hassanien
 

More from Aboul Ella Hassanien (20)

الأطر والمبادئ الاخلاقية للذكاء الاصطناعي التوليدى.pdf
الأطر والمبادئ الاخلاقية  للذكاء الاصطناعي التوليدى.pdfالأطر والمبادئ الاخلاقية  للذكاء الاصطناعي التوليدى.pdf
الأطر والمبادئ الاخلاقية للذكاء الاصطناعي التوليدى.pdf
 
دعوة للاستخدام المسؤول للذكاء الاصطناعي التوليدي في الأوساط الأكاديمية المعر...
دعوة للاستخدام المسؤول للذكاء الاصطناعي التوليدي في الأوساط الأكاديمية  المعر...دعوة للاستخدام المسؤول للذكاء الاصطناعي التوليدي في الأوساط الأكاديمية  المعر...
دعوة للاستخدام المسؤول للذكاء الاصطناعي التوليدي في الأوساط الأكاديمية المعر...
 
حوار مع الأستاذ الدكتور أبو العلا عطيفى حسنين - تقنية الذكاء الاصطناعي تحول م...
حوار مع الأستاذ الدكتور أبو العلا عطيفى حسنين - تقنية الذكاء الاصطناعي تحول م...حوار مع الأستاذ الدكتور أبو العلا عطيفى حسنين - تقنية الذكاء الاصطناعي تحول م...
حوار مع الأستاذ الدكتور أبو العلا عطيفى حسنين - تقنية الذكاء الاصطناعي تحول م...
 
الطاقة من الفضاء: علماء ينقلون الطاقة الشمسية إلى الأرض عن طريق الفضاء لأول م...
الطاقة من الفضاء: علماء ينقلون الطاقة الشمسية إلى الأرض عن طريق الفضاء لأول م...الطاقة من الفضاء: علماء ينقلون الطاقة الشمسية إلى الأرض عن طريق الفضاء لأول م...
الطاقة من الفضاء: علماء ينقلون الطاقة الشمسية إلى الأرض عن طريق الفضاء لأول م...
 
Intelligent Avatars in the Metaverse.pptx
Intelligent Avatars in the Metaverse.pptxIntelligent Avatars in the Metaverse.pptx
Intelligent Avatars in the Metaverse.pptx
 
دليل البحث العلمى .pdf
دليل البحث العلمى .pdfدليل البحث العلمى .pdf
دليل البحث العلمى .pdf
 
SRGE photo.pdf
SRGE photo.pdfSRGE photo.pdf
SRGE photo.pdf
 
الذكاء الإصطناعى وافاقه فى التعليم على مستوى الوطن العربى: مستوى السياسات
الذكاء الإصطناعى وافاقه فى التعليم على مستوى الوطن العربى: مستوى السياسات الذكاء الإصطناعى وافاقه فى التعليم على مستوى الوطن العربى: مستوى السياسات
الذكاء الإصطناعى وافاقه فى التعليم على مستوى الوطن العربى: مستوى السياسات
 
الصحافة والإعلام الرقمى فى عصر الذكاء الاصطناعي
الصحافة والإعلام الرقمى  فى عصر الذكاء الاصطناعي  الصحافة والإعلام الرقمى  فى عصر الذكاء الاصطناعي
الصحافة والإعلام الرقمى فى عصر الذكاء الاصطناعي
 
الميتافيرس و مستقبل التعليم فى الوطن العربى
الميتافيرس و مستقبل التعليم فى الوطن العربى الميتافيرس و مستقبل التعليم فى الوطن العربى
الميتافيرس و مستقبل التعليم فى الوطن العربى
 
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنية
الذكاء الأصطناعى المسؤول ومستقبل  الأمن المناخى وانعكاساته الاجتماعية والأمنيةالذكاء الأصطناعى المسؤول ومستقبل  الأمن المناخى وانعكاساته الاجتماعية والأمنية
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنية
 
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنية
الذكاء الأصطناعى المسؤول ومستقبل  الأمن المناخى وانعكاساته الاجتماعية والأمنيةالذكاء الأصطناعى المسؤول ومستقبل  الأمن المناخى وانعكاساته الاجتماعية والأمنية
الذكاء الأصطناعى المسؤول ومستقبل الأمن المناخى وانعكاساته الاجتماعية والأمنية
 
التغير المناخى للاطفال
التغير المناخى للاطفالالتغير المناخى للاطفال
التغير المناخى للاطفال
 
الذكاء الاصطناعى للاطفال
الذكاء الاصطناعى للاطفالالذكاء الاصطناعى للاطفال
الذكاء الاصطناعى للاطفال
 
إستراتيجية مصر للتنمية المستدامة: نحو جائزة الإبتكار والإبداع المؤسسى
إستراتيجية مصر للتنمية المستدامة: نحو جائزة الإبتكار والإبداع المؤسسىإستراتيجية مصر للتنمية المستدامة: نحو جائزة الإبتكار والإبداع المؤسسى
إستراتيجية مصر للتنمية المستدامة: نحو جائزة الإبتكار والإبداع المؤسسى
 
الإقتصاد الأخضر لمواجهة التغيرات المناخية
الإقتصاد الأخضر لمواجهة التغيرات المناخية  الإقتصاد الأخضر لمواجهة التغيرات المناخية
الإقتصاد الأخضر لمواجهة التغيرات المناخية
 
الإستخدام المسؤول للذكاء الإصطناعى فى سياق تغيرالمناخ خارطة طريق فى عال...
   الإستخدام المسؤول للذكاء الإصطناعى  فى سياق تغيرالمناخ   خارطة طريق فى عال...   الإستخدام المسؤول للذكاء الإصطناعى  فى سياق تغيرالمناخ   خارطة طريق فى عال...
الإستخدام المسؤول للذكاء الإصطناعى فى سياق تغيرالمناخ خارطة طريق فى عال...
 
الذكاء الإصطناعي والتغيرات المناخية والبيئية:الفرص والتحديات والأدوات السياسية
الذكاء الإصطناعي والتغيرات المناخية والبيئية:الفرص والتحديات والأدوات السياسيةالذكاء الإصطناعي والتغيرات المناخية والبيئية:الفرص والتحديات والأدوات السياسية
الذكاء الإصطناعي والتغيرات المناخية والبيئية:الفرص والتحديات والأدوات السياسية
 
الذكاء الاصطناعى:أسلحة لا تنام وآفاق لا تنتهى
الذكاء الاصطناعى:أسلحة لا تنام وآفاق لا تنتهى الذكاء الاصطناعى:أسلحة لا تنام وآفاق لا تنتهى
الذكاء الاصطناعى:أسلحة لا تنام وآفاق لا تنتهى
 
اقتصاد ميتافيرس
اقتصاد ميتافيرساقتصاد ميتافيرس
اقتصاد ميتافيرس
 

Recently uploaded

BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
LAXMAREDDY22
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
RamonNovais6
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
Anant Corporation
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
shadow0702a
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
UReason
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...
bijceesjournal
 
Software Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.pptSoftware Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.ppt
TaghreedAltamimi
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
171ticu
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
abbyasa1014
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
ydzowc
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
Gino153088
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 

Recently uploaded (20)

BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...
 
Software Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.pptSoftware Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.ppt
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 

Blockchain framework for detecting the infected cases of covid 19 pandemic

  • 1. Presented By Dr. Mohamed Torky Assistant Professor of Computer Science Culture & Science City Academy. Senior Member in Scientific Research Group in Egypt (SRGE)
  • 2. 1 • Introduction 2 • The Problem Statement 3 • The Proposed Blockchain Frame work 4 • Implementation 5 • Conclusion
  • 3. Introduction Artificial Intelligence: the smart aide against COVID-19 3D Printing: for Printing important Medical tools Smartphone Tracking: for contact tracing Virtual Reality Is already Changing Healthcare
  • 4. Introduction 1) Face Mask Detection using AI Uses existing IP cameras and Closed- Circuts Television (CCTV) cameras combined with Computer Vision to detect people without masks. • Facial recognition to identify individuals without mask. • Real-time monitoring and alerts • Work on the existing CCTV and IP cameras
  • 5. Introduction 2) Contactless Attendance System Uses computer vision and facial recognition to recognize faces and mark attendance by looking at face bio-metrics. It can work with Real Time Streaming Protocol (RTSP)- enabled CCTV or IP cameras. • Computer Vision • Real-time attendance tracking • Attendance reports generation
  • 6. Introduction 3) Telemedicine Solution for Healthcare Institutes Doctors, patients and pharmacists can use the telemedicine application for connecting with patients remotely. Patients can consult doctors via online video. So, it can reduces the spread of the virus to mass populations. Doctors can order the prescription on behalf of the patient to avoid the mishandling of the prescription. • Doctor calendar scheduling • Consultation using Video calling • Prescription handling
  • 7. Introduction 4) Social Distancing Alert System Using Artificial Intelligence Uses existing IP cameras and CCTV cameras combined with Computer Vision to detect if people are at a specific distance and adhere to social distancing or not. • Real-time tracking and alerts. • Measuring distance between two or more people. • Voice alarms.
  • 8. Introduction 5) Hotspot Zone Detection using Computer Vision Using existing IP or CCTV cameras, Hotspot Zone Detection can identify if people are touching unknown physical objects frequently in a specific area. If the number of touches exceeds the limit, the area is identified as a hotspot zone. • Using existing IP/CCTV cameras. • Colored pattern analytics for identification of hotspot zones. • Real-time alerts and notifications.
  • 9. Introduction 6) Human Presence Detection System Human Presence System is designed to monitor patients remotely. It uses IP cameras and AI to track patients and report any missing people. The system is helpful in contact tracing and identifying the infected person movement. • Remote monitoring. • Missing People Report. • Quarantined People location tracking.
  • 10. The Problem Statement 1 • Introduction 2 • The Problem Statement 3 • The Proposed Blockchain Frame work 4 • Implementation 5 • Conclusion
  • 11. The Problem Statement  The greatest challenge that most governments are currently suffering from is the lack of a precise and automated mechanism for automatically detecting the infected cases of COVID-19 and provides alerts about the infected persons .
  • 12. Similar Systems Singapore Trace Together Google/Apple Contact Tracing • Notifies you quickly if you’ve been exposed to COVID-19 through close contact with other Trace Together users. • The app allows the Ministry of Health (MOH) to give you timely care and guidance, protecting you and those around you • Use “exposure notification” tool and Bluetooth radios within smartphones to notify public when they may have come in contact with infected person . • But this app didn’t work properly because of restrictions the companies place on smartphones and poor communications between the phones running Google and Apple.
  • 13. Similar Systems UK NHS Contact Tracing • Ensures that anyone who develops symptoms of (COVID-19) can quickly be tested to find out if they have the virus. • The app helps trace close recent contacts of anyone who tests positive for coronavirus and, if necessary, notifies them that they must self-isolate at home to help stop the spread of the virus China Health Code System • dictates whether citizens should be quarantined or allowed into subways, malls and other public spaces based on relational cross- match by scanning the QR code
  • 14. Similar Systems (Limitations)  There are some important limitations of Bluetooth technology used in the recent Covid-19 Apps:  Mobile phones can lose connection in certain conditions.  Bluetooth has low bandwidth as compared to Wi-Fi.  Bluetooth allows only short range communication between devices.  Security is a very key challenge, where Bluetooth connections can be hacked.  QR code may become distorted, which can lead to improper reading by a device. Also , improper designs and formatting can make QR codes un-scanble
  • 16. The Proposed Blockchain Framework 1 • Introduction 2 • The Problem Statement 3 • The Proposed Blockchain Frame work 4 • Implementation 5 • Conclusion
  • 17. Preliminary  Represent the confirmed cases using regular expression in the form of the infection patterns  This pattern can generates many infection instances which digitally represent the infected persons and infected buildings
  • 18. The Blockchain Platform 𝑩𝑯𝑪 = 𝑯𝒂𝒔𝒉(𝑴𝑹 + 𝑷 + 𝑰𝑺 𝑪𝒐𝒅𝒆) (1) Where BHC is the block hash code, MR is the Markle rote value (i.e. unique fingerprint for all inserted data in the block in the form Markle root code ), P is the previous block’s hash code, and IS Code is a random value represents random value of an infection code 𝑰𝑺 𝑪𝒐𝒅𝒆 = 𝑯𝒂𝒔𝒉−𝟏 (𝑴𝑹 + 𝑷 + 𝑩𝑯𝑪) (2)
  • 19. Mass Surveillance System 1) Detection and Tracking Function: using this function, Mass-Surveillance System can track last behaviors of the confirmed COVID-19 cases for detecting the set of close contact persons who interacted with, and the set of places which COVID-19-patients has been accessed during the last few days. 2) Blockchain Feedback Function: Mass- Surveillance System calls this function to send the detected the set of probable infected persons as well as the set of infected places to blockchain which map the set of infected persons and places with the corresponding confirmed COVID-19 cases.
  • 20. The Infection Verifier system  Verifying the infection instances (i.e. Contact persons) to confirm the infection transferee from a confirmed COVID-19 case to a contact person can be implemented by a Finite Automaton Model.
  • 21. The P2P Mobile Application 1) Self-estimation of COVID-19 infection probability 𝑷 𝑿 = 𝑵! 𝑿!× 𝑵−𝑿 ! × 𝑷 𝑿 × 𝑸 𝑵−𝑿 (3) Where, 𝑷 𝑿 is the infection probability function, 𝑵 is the total number of infection codes in the inbox of each user . 𝑿 is the number of infection occurs , such that 𝑋 = 0,1,2,3, … … 𝑁 , 𝑷 𝑿 is the probability of succeeded infection occurrences , and 𝑸 𝑵−𝑿 is the probability of un-succeeded infection occurrences.
  • 22. The P2P Mobile Application 2) Detection of unknown infected cases within a Cluster of people
  • 23. Implementation 1 • Introduction 2 • The Problem Statement 3 • The Proposed Blockchain Frame work 4 • Implementation 5 • Conclusion
  • 24. Implementation Software Tools : Ethereum for Developing Blockchain system in our proposed framework Java and firebase Real time Database for Developing the P2P Mobile App, and store and sync data between different users in the real- time. Paython and MonogoDB for data simulation and GPS data analytics
  • 27. Conclusion 1 • Introduction 2 • The Problem Statement 3 • The Proposed Blockchain Frame work 4 • Implementation 5 • Conclusion
  • 28. Conclusion  This study introduced the first blockchain-based framework which can be used for helping persons, health authorities, and governments for fighting COVID-19 coronavirus in an innovative way.  This study set out with the aim of developing a novel blockchain framework for implementing an integrated system able to tracking and detecting the unknown infected cases of COVID-19 coronavirus.  Estimating COVID-19 infection probability rates for persons, and detecting the unknown infected cases within various clusters of people.
  • 29. Dr. Mohamed Torky Culture & Science City Academy Email:mtorky86@gmail.com Prof.Dr. Aboul Ella Hassanein Cairo University Scientific Research Group in Egypt (SRGE)