Rabie Α. Ramadan

ORCID: 0000-0002-0281-9381
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Energy Efficient Wireless Sensor Networks
  • Network Security and Intrusion Detection
  • Energy Harvesting in Wireless Networks
  • Security in Wireless Sensor Networks
  • Indoor and Outdoor Localization Technologies
  • Mobile Ad Hoc Networks
  • IoT-based Smart Home Systems
  • IoT and Edge/Fog Computing
  • EEG and Brain-Computer Interfaces
  • Anomaly Detection Techniques and Applications
  • Traffic control and management
  • Water Quality Monitoring Technologies
  • Blockchain Technology Applications and Security
  • Distributed Sensor Networks and Detection Algorithms
  • Vehicular Ad Hoc Networks (VANETs)
  • Transportation Planning and Optimization
  • Gaze Tracking and Assistive Technology
  • Fuzzy Logic and Control Systems
  • Image Retrieval and Classification Techniques
  • Underwater Vehicles and Communication Systems
  • Wireless Communication Networks Research
  • Advanced Image and Video Retrieval Techniques
  • Context-Aware Activity Recognition Systems
  • Cryptographic Implementations and Security
  • Traffic Prediction and Management Techniques

University of Ha'il
2016-2024

Cairo University
2015-2024

University of Nizwa
2024

King Faisal University
2022

University of Petroleum and Energy Studies
2022

Ain Shams University
2014-2021

ORCID
2020

Geospatial Research (United Kingdom)
2020

Al-Azhar University
2017-2018

Al-Azhar University
2007-2018

Nowadays, there is a strong demand for increasing the protection of resource-constrained devices such as Radio frequency identification (RFID) systems. Current cryptographic algorithms are sufficient high-resource desktop computers. RFID systems commonly used in high-security applications access control systems, transaction banking and payment The attacker attempts to mislead RFIDs unauthorized services without or circumvent security mechanisms by detecting secret password. biggest challenge...

10.1109/access.2020.3036589 article EN cc-by IEEE Access 2020-01-01

Flying Ad Hoc Network (FANET) or drones’ technologies have gained much attraction in the last few years due to their critical applications. Therefore, various studies been conducted on facilitating FANET applications different fields. In fact, civil airspaces gradually adopted technology systems. However, FANET’s special roles made it complex support emerging security threats, especially intrusion detection. This paper is a step forward towards advances detection techniques. It investigates...

10.3390/electronics10212633 article EN Electronics 2021-10-28

With the emergence of one this century’s deadliest pandemics, coronavirus disease (COVID-19) has an enormous effect globally with a quick spread worldwide. This made World Health Organization announce it as pandemic. COVID-19 pushed countries to follow new behaviors such social distancing, hand washing, and remote work shut down organizations, businesses, airports. At same time, white hats are doing their best accommodate However, while protecting people, black taking advantage situation,...

10.1155/2021/6627264 article EN cc-by Journal of Advanced Transportation 2021-02-16

Internet of things (IoT) is one the leading technologies that have been used in many fields, such as environmental monitoring, healthcare, and smart cities. The core IoT sensors; sensors form an autonomous network able to route messages from place another base station or sink. Recently, due rapid technological development sensors, wireless sensor networks (WSNs) become important part IoT. However, applications cities, WSNs with sink might not be suitable limited communication range wide area...

10.3390/app13010605 article EN cc-by Applied Sciences 2023-01-02

Internet of Things (IoT) has become an emerging trend in the information and engineering industries, which is inevitable to impact our lives various ways. The advancement IoT as intelligent system facing a number challenges such security privacy. This paper aims establish starting point towards addressing this challenge by suggesting implementation data provenance IoT. However, complexity brings for utilizing data. discusses seven main that influence systems. expected contribute literature...

10.1016/j.procs.2017.05.436 article EN Procedia Computer Science 2017-01-01

Summary Background Warts, or verrucae, are benign epithelial profilerations of skin and mucosa caused by infection with HPV poses a challenge to treat. Objective To compare between single microneedling‐assisted multipuncture techniques intralesional application in treatment plantar warts. Methods The study included 60 Patients who were divided into two groups (A&B). Each group consisted (30) patients. Group (A) subjects received bleomycin injection using syringe needle. For (B) subjects,...

10.1111/jocd.12537 article EN Journal of Cosmetic Dermatology 2018-04-23

Query by Image Content (QBIC), subsequently known as Content-Based Retrieval (CBIR) systems, may offer a more advantageous solution in variety of applications, including medical, meteorological, search image, and others. Such systems primarily use similarity matching algorithms to compare image content get their relevance from databases. They are essentially measuring the spatial distance between extracted visual features query correspondence dataset. One most challenging retrieval problems...

10.1109/access.2023.3241858 article EN cc-by IEEE Access 2023-01-01

Smart cities, as well smart homes research, are becoming of concern, especially in the field energy consumption and production. However, there is a lack dataset that can be used to simulate city prediction or even homes. Therefore, this paper provides carefully generated for home management simulation. Five datasets analysed ensure suitability, including 20, 50, 100, 200 across 365 days. For more accurate data, production 50 based on real input taken from Saudi Arabia. Due unavailability...

10.1016/j.dib.2024.110166 article EN cc-by Data in Brief 2024-02-10

In this paper, an analytical model of a proposed low-cost high efficiency NPN silicon-based solar cell structure is presented. The based on using low cost heavily doped commercially available silicon wafers and to be fabricated by the same steps as conventional cells except extra deep trench etch step. Moreover, has been engineered react UV spectrum, resulting in greater conversion performance. presented takes electrical optical characteristics into account. Thus, influence both physical...

10.1109/access.2020.3012657 article EN cc-by IEEE Access 2020-01-01

Water scarcity is considered a major problem in dry regions, such as the northern areas of Saudi Arabia and especially city Hail. resources this region come mainly from groundwater aquifers, which are currently suffering high demand severe climatic conditions. Forecasting water consumption accurately possible may contribute to level sustainability resources. This study investigated different Machine Learning (ML) algorithms, namely Support Vector (SVM), Random Forest (RF), Linear Regression...

10.48084/etasr.7020 article EN cc-by Engineering Technology & Applied Science Research 2024-04-02

Wireless Sensor Networks (WSNs) is the base for many critical applications where a large number of nodes are deployed in monitored field. Those suffer from limited processing capabilities as well energy. They also required to live long time; sensors send their data sink node through multi-hop routing. The responsible making appropriate decision based on received data. This shows how information fusion process at node. Such affected by quality collected sensors. In addition, handling WSN...

10.1109/access.2020.3003155 article EN cc-by IEEE Access 2020-01-01

Nowadays, IoT has been widely used in different applications to improve the quality of life. However, becomes increasingly an ideal target for unauthorized attacks due its large number objects, openness, and distributed nature. Therefore, maintain security systems, there is a need efficient Intrusion Detection System (IDS). IDS implements detectors that continuously monitor network traffic. There are various IDs methods proposed literature security. existing had disadvantages terms detection...

10.33166/aetic.2020.05.004 article EN Annals of Emerging Technologies in Computing 2020-12-20

Many industrial wireless sensor network (IWSN) applications require real-time communications in which bounded delay requirements need to be satisfied. IWSN lossy links and limited resources of nodes pose significant challenges for supporting applications. routing algorithms focus on being energy efficient extend the lifetime, but wasn't main concern. However, these are unable deal with data packets delivered sink node within a predefined information. On other hand, most existing schemes...

10.1109/access.2020.2980682 article EN cc-by IEEE Access 2020-01-01

The world is experiencing the new development of smart cities. Smart cities’ infrastructure in its core based on wireless sensor networks (WSNs) and internet things (IoT). WSNs consist tiny devices (Motes) that are restricted terms memory, storage, processing capabilities, sensing communication ranges. Those limitations pose many security issues where regular cryptography algorithms not suitable to be used. Besides, such capabilities might degraded case cheap sensors deployed with very large...

10.3390/jsan9030039 article EN cc-by Journal of Sensor and Actuator Networks 2020-08-19

Sentiment analysis using stemmed Twitter data from various languages is an emerging research topic. In this paper, we address three augmentation techniques namely Shift, Shuffle, and Hybrid to increase the size of training data; then use key types deep learning (DL) models recurrent neural network (RNN), convolution (CNN), hierarchical attention (HAN) classify Turkish for sentiment analysis. The performance these DL has been compared with existing traditional machine (TML) models. TML...

10.1109/access.2021.3071393 article EN cc-by IEEE Access 2021-01-01

An electric grid consists of transformers, generation centers, communication links, control stations, and distributors. Collectively these components help in moving power from one electricity station to commercial domestic consumers. Traditional stations can’t predict the dynamic need consumers’ electricity. Furthermore, traditional grids are not sufficiently strong adaptable. This is driving force for transition towards a smart grid. A modern self-healing, long-lasting electrical system...

10.34028/iajit/19/3/5 article EN The International Arab Journal of Information Technology 2022-01-01
Coming Soon ...