- Energy Efficient Wireless Sensor Networks
- Network Security and Intrusion Detection
- Energy Harvesting in Wireless Networks
- Security in Wireless Sensor Networks
- Indoor and Outdoor Localization Technologies
- Mobile Ad Hoc Networks
- IoT-based Smart Home Systems
- IoT and Edge/Fog Computing
- EEG and Brain-Computer Interfaces
- Anomaly Detection Techniques and Applications
- Traffic control and management
- Water Quality Monitoring Technologies
- Blockchain Technology Applications and Security
- Distributed Sensor Networks and Detection Algorithms
- Vehicular Ad Hoc Networks (VANETs)
- Transportation Planning and Optimization
- Gaze Tracking and Assistive Technology
- Fuzzy Logic and Control Systems
- Image Retrieval and Classification Techniques
- Underwater Vehicles and Communication Systems
- Wireless Communication Networks Research
- Advanced Image and Video Retrieval Techniques
- Context-Aware Activity Recognition Systems
- Cryptographic Implementations and Security
- Traffic Prediction and Management Techniques
University of Ha'il
2016-2024
Cairo University
2015-2024
University of Nizwa
2024
King Faisal University
2022
University of Petroleum and Energy Studies
2022
Ain Shams University
2014-2021
ORCID
2020
Geospatial Research (United Kingdom)
2020
Al-Azhar University
2017-2018
Al-Azhar University
2007-2018
Nowadays, there is a strong demand for increasing the protection of resource-constrained devices such as Radio frequency identification (RFID) systems. Current cryptographic algorithms are sufficient high-resource desktop computers. RFID systems commonly used in high-security applications access control systems, transaction banking and payment The attacker attempts to mislead RFIDs unauthorized services without or circumvent security mechanisms by detecting secret password. biggest challenge...
Flying Ad Hoc Network (FANET) or drones’ technologies have gained much attraction in the last few years due to their critical applications. Therefore, various studies been conducted on facilitating FANET applications different fields. In fact, civil airspaces gradually adopted technology systems. However, FANET’s special roles made it complex support emerging security threats, especially intrusion detection. This paper is a step forward towards advances detection techniques. It investigates...
With the emergence of one this century’s deadliest pandemics, coronavirus disease (COVID-19) has an enormous effect globally with a quick spread worldwide. This made World Health Organization announce it as pandemic. COVID-19 pushed countries to follow new behaviors such social distancing, hand washing, and remote work shut down organizations, businesses, airports. At same time, white hats are doing their best accommodate However, while protecting people, black taking advantage situation,...
Internet of things (IoT) is one the leading technologies that have been used in many fields, such as environmental monitoring, healthcare, and smart cities. The core IoT sensors; sensors form an autonomous network able to route messages from place another base station or sink. Recently, due rapid technological development sensors, wireless sensor networks (WSNs) become important part IoT. However, applications cities, WSNs with sink might not be suitable limited communication range wide area...
Internet of Things (IoT) has become an emerging trend in the information and engineering industries, which is inevitable to impact our lives various ways. The advancement IoT as intelligent system facing a number challenges such security privacy. This paper aims establish starting point towards addressing this challenge by suggesting implementation data provenance IoT. However, complexity brings for utilizing data. discusses seven main that influence systems. expected contribute literature...
Summary Background Warts, or verrucae, are benign epithelial profilerations of skin and mucosa caused by infection with HPV poses a challenge to treat. Objective To compare between single microneedling‐assisted multipuncture techniques intralesional application in treatment plantar warts. Methods The study included 60 Patients who were divided into two groups (A&B). Each group consisted (30) patients. Group (A) subjects received bleomycin injection using syringe needle. For (B) subjects,...
Query by Image Content (QBIC), subsequently known as Content-Based Retrieval (CBIR) systems, may offer a more advantageous solution in variety of applications, including medical, meteorological, search image, and others. Such systems primarily use similarity matching algorithms to compare image content get their relevance from databases. They are essentially measuring the spatial distance between extracted visual features query correspondence dataset. One most challenging retrieval problems...
Smart cities, as well smart homes research, are becoming of concern, especially in the field energy consumption and production. However, there is a lack dataset that can be used to simulate city prediction or even homes. Therefore, this paper provides carefully generated for home management simulation. Five datasets analysed ensure suitability, including 20, 50, 100, 200 across 365 days. For more accurate data, production 50 based on real input taken from Saudi Arabia. Due unavailability...
In this paper, an analytical model of a proposed low-cost high efficiency NPN silicon-based solar cell structure is presented. The based on using low cost heavily doped commercially available silicon wafers and to be fabricated by the same steps as conventional cells except extra deep trench etch step. Moreover, has been engineered react UV spectrum, resulting in greater conversion performance. presented takes electrical optical characteristics into account. Thus, influence both physical...
Water scarcity is considered a major problem in dry regions, such as the northern areas of Saudi Arabia and especially city Hail. resources this region come mainly from groundwater aquifers, which are currently suffering high demand severe climatic conditions. Forecasting water consumption accurately possible may contribute to level sustainability resources. This study investigated different Machine Learning (ML) algorithms, namely Support Vector (SVM), Random Forest (RF), Linear Regression...
Wireless Sensor Networks (WSNs) is the base for many critical applications where a large number of nodes are deployed in monitored field. Those suffer from limited processing capabilities as well energy. They also required to live long time; sensors send their data sink node through multi-hop routing. The responsible making appropriate decision based on received data. This shows how information fusion process at node. Such affected by quality collected sensors. In addition, handling WSN...
Nowadays, IoT has been widely used in different applications to improve the quality of life. However, becomes increasingly an ideal target for unauthorized attacks due its large number objects, openness, and distributed nature. Therefore, maintain security systems, there is a need efficient Intrusion Detection System (IDS). IDS implements detectors that continuously monitor network traffic. There are various IDs methods proposed literature security. existing had disadvantages terms detection...
Many industrial wireless sensor network (IWSN) applications require real-time communications in which bounded delay requirements need to be satisfied. IWSN lossy links and limited resources of nodes pose significant challenges for supporting applications. routing algorithms focus on being energy efficient extend the lifetime, but wasn't main concern. However, these are unable deal with data packets delivered sink node within a predefined information. On other hand, most existing schemes...
The world is experiencing the new development of smart cities. Smart cities’ infrastructure in its core based on wireless sensor networks (WSNs) and internet things (IoT). WSNs consist tiny devices (Motes) that are restricted terms memory, storage, processing capabilities, sensing communication ranges. Those limitations pose many security issues where regular cryptography algorithms not suitable to be used. Besides, such capabilities might degraded case cheap sensors deployed with very large...
Sentiment analysis using stemmed Twitter data from various languages is an emerging research topic. In this paper, we address three augmentation techniques namely Shift, Shuffle, and Hybrid to increase the size of training data; then use key types deep learning (DL) models recurrent neural network (RNN), convolution (CNN), hierarchical attention (HAN) classify Turkish for sentiment analysis. The performance these DL has been compared with existing traditional machine (TML) models. TML...
An electric grid consists of transformers, generation centers, communication links, control stations, and distributors. Collectively these components help in moving power from one electricity station to commercial domestic consumers. Traditional stations can’t predict the dynamic need consumers’ electricity. Furthermore, traditional grids are not sufficiently strong adaptable. This is driving force for transition towards a smart grid. A modern self-healing, long-lasting electrical system...