DOI QR코드

DOI QR Code

Autonomous Mobile-Based Model for Tawaf / Sa'ay Rounds Counting with Supported Supplications from the Quran and Sunna'a

  • Nashwan, Alromema (King Abdulaziz University, Faculty of Computing and information technology)
  • 투고 : 2022.12.05
  • 발행 : 2022.12.30

초록

Performing the rituals of Hajj and Umrah is an obligation of Allah Almighty to all Muslims from all over the world. Millions of Muslims visit the holy mosques in Makkah every year to perform Hajj and Umrah. One of the most important pillars in Performing Hajj/Umrah is Tawaf and Sa'ay. Tawaf finished by seven rounds around the holy house (Al-Kabaa) and Sa'ay is also seven runs between As-Safa and Al-Marwa. Counting/knowing the number of runs during Tawaf/Sa'ay is one of the difficulties that many pilgrims face. The pilgrim's confusing for counting (Tawaf/Sa'ay) rounds finished at a specific time leads pilgrims to stay more time in Mataff bowl or Masa'a run causing stampedes and more crowded as well as losing the desired time for prayers to get closer to Almighty Allah in this holy place. These issues can be solved using effective crowd management systems for Tawaf/Sa'ay pillars, which is the topic of this research paper. While smart devices and their applications are gaining popularity in helping pilgrims for performing Hajj/Umrah activities efficiently, little has been dedicated for solving these issues. We present an autonomous Mobile-based framework for guiding pilgrims during Tawaf/Sa'ay pillars with the aid of GPS for points tracking and rounds counting. This framework is specially designed to prevent and manage stampedes during Tawaf/Sa'ay pillars, by helping pilgrims automatically counting the rounds during Tawaf/Sa'ay with supported Supplications (in written/audio form with different languages) from the Quran and Sunna'a.

키워드

과제정보

This project was funded by the Deanship of Scientific Research (DSR) at king Abdulaziz University, Jeddah under grant no. G- 827-830-1441. The authors, therefore, acknowledge with thanks to DSR's technical and financial support.

참고문헌

  1. E. A. Khan and M. K. Y. Shambour, "An analytical study of mobile applications for Hajj and Umrah services," Appl. Comput. Informatics, vol. 14, no. 1, pp. 37-47, 2018, doi: 10.1016/j.aci.2017.05.004.
  2. S. Nagaraj, G. S. V. P. Raju, and K. Koteswara Rao, "Image encryption using elliptic curve cryptograhy and matrix," in Procedia Computer Science, 2015, vol. 48, no. C, doi: 10.1016/j.procs.2015.04.182.
  3. M. Yamin, A. M. Basahel, and A. A. Abi Sen, "Managing Crowds with Wireless and Mobile Technologies," Wirel. Commun. Mob. Comput., vol. 2018, 2018, doi: 10.1155/2018/7361597.
  4. M. Rodrigues, L. Moitinho De Almeida, J. Von Schreeb, and P. Arcos Gonzalez, "Human Stampedes: A Scoping Review," 2016, [Online]. Available: https://digibuo.uniovi.es/dspace/handle/10651/39115.
  5. Lee Soomaroo and Virginia Murray, "Disasters at Mass Gatherings: Lessons from History," PLoS Curr., vol. 4, 2012, [Online]. Available: https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3 271949/.
  6. A. Owaidah, D. Olaru, M. Bennamoun, F. Sohel, and N. Khan, "Reviewof modelling and simulating crowds at mass gathering events: Hajj as a case study," JASSS, vol. 22, no. 2, Mar. 2019, doi: 10.18564/jasss.3997.
  7. A. A. M. Ahmed Sheikh A. Al-Aidaroos, "Multiple input modality mobile application for pilgrims," in Knowledge Management International Conference (KMICe), Langkawi, Malaysia, pp. 512-517.
  8. J. J. P. C. R. Orlando R.E. Pereira, "Survey and analysis of current mobile learning applications and technologies," ACM Comput. Surv, vol. 46, no. 2, 2013, [Online]. Available: http://dx.doi.org/10.1145/2543581.2543594, .
  9. S. H. Chang and Z. R. Chen, "Protecting Mobile Crowd Sensing against Sybil Attacks Using Cloud Based Trust Management System," Mob. Inf. Syst., 2016, doi: 10.1155/2016/6506341.
  10. Catharine Reese Bomhold, "Educational use of smart phone technology: a survey of mobile phone application use by undergraduate university students, Program 47 (4) (2013) ," vol. 47, no. 4, pp. 424-436, 2013, [Online]. Available: http://dx.doi.org/10.1108/PROG-01-2013-%0A0003.
  11. A. Chanal, "Expansion defending a development idea, https://www.youtube.com/watch?v=LIi2mDSPHCg&list=PLWCDz8gCDCyPgxg-rTfgJMqxQBwOM40Z&index=5," Saudi, 2017.
  12. N. Nguyen, Q. C. Nguyen, and M. T. Le, "A novel autonomous wireless sensor node for IoT applications," Telkomnika (Telecommunication Comput. Electron. Control., vol. 17, no. 5, 2019, doi: 10.12928/TELKOMNIKA.v17i5.12811.
  13. Y. Fan, Q. Zhu, and Y. Liu, "Cloud/fog computing system architecture and key technologies for southnorth water transfer project safety," Wirel. Commun. Mob. Comput., vol. 2018, 2018, doi: 10.1155/2018/7172045.
  14. P. Mach and Z. Becvar, "Mobile Edge Computing: A Survey on Architecture and Computation Offloading," IEEE Communications Surveys and Tutorials. 2017, doi: 10.1109/COMST.2017.2682318.