- Optical Network Technologies
- Advanced Fiber Optic Sensors
- Advanced Optical Network Technologies
- Photonic Crystal and Fiber Optics
- Advanced Photonic Communication Systems
- Photonic and Optical Devices
- Plasmonic and Surface Plasmon Research
- IoT and Edge/Fog Computing
- Advanced Fiber Laser Technologies
- Blockchain Technology Applications and Security
- Software-Defined Networks and 5G
- Multi-Criteria Decision Making
- Smart Grid Energy Management
- Thermal Radiation and Cooling Technologies
- Privacy-Preserving Technologies in Data
- Advanced biosensing and bioanalysis techniques
- Gold and Silver Nanoparticles Synthesis and Applications
- Orbital Angular Momentum in Optics
- Photonic Crystals and Applications
- Energy Load and Power Forecasting
- Advanced Wireless Network Optimization
- Wireless Body Area Networks
- Artificial Intelligence in Healthcare
- Advanced MIMO Systems Optimization
- Software Reliability and Analysis Research
Umm al-Qura University
2006-2025
King Fahd University of Petroleum and Minerals
2022
ORCID
2020
Al Baha University
2008
Colorado State University
2004-2006
Supply chains are evolving into automated and highly complex networks becoming an important source of potential benefits in the modern world. At same time, consumers now more interested food product quality. However, it is challenging to track provenance data maintain its traceability throughout supply chain network. The traditional centralized they depend on a third party for trading. These systems lack transparency, accountability auditability. In our proposed solution, we have presented...
In a research community, data sharing is an essential step to gain maximum knowledge from the prior work. Existing platforms depend on trusted third party (TTP). Due involvement of TTP, such systems lack trust, transparency, security, and immutability. To overcome these issues, this paper proposed blockchain-based secure platform by leveraging benefits interplanetary file system (IPFS). A meta uploaded IPFS server owner then divided into n secret shares. The scheme achieves security access...
Almost 17.9 million people are losing their lives due to cardiovascular disease, which is 32% of total death throughout the world. It a global concern nowadays. However, it matter joy that mortality rate heart disease can be reduced by early treatment, for early‐stage detection crucial issue. This study aimed at building potential machine learning model predict in stage employing several feature selection techniques identify significant features. Three different approaches were applied such...
The development of web applications essentially relies on users’ demands who expect highly efficacious but cost effective software services. Managing time and so as to develop that cater the need is a challenge for developers at present. Moreover, low-cost maintenance can only be achieved by enhancing durability applications. Identifying characteristics complex task because different experts have opinions regarding significance determine quotient As established best practices undertaken in...
With the increase in local energy generation from Renewable Energy Sources (RESs), concept of decentralized peer-to-peer Local Market (LEM) is becoming popular. In this paper, a blockchain-based LEM investigated, where consumers and prosumers small community trade without need for third party. proposed model, Home Management (HEM) system demurrage mechanism are introduced, which allow both to optimize their consumption minimize electricity costs. This method also allows end-users shift load...
Abstract Background Today’s healthcare organizations want to implement secure and quality software as cyber-security is a significant risk factor for data. Considering security requirements during trustworthy development process an essential part of the development. There are several Security Requirements Engineering (SRE) methodologies, framework, process, standards available today. Unfortunately, there still necessity improve these engineering approaches. Determining most suitable method...
In the smart grid (SG) environment, consumers are enabled to alter electricity consumption patterns in response prices and incentives. This results that may differ from initial price pattern. Electricity demand forecasting play a vital role reliability sustainability of SG. Forecasting using big data has become new hot research topic as massive amount is being generated stored SG environment. users, having advanced knowledge electricity, can manage their load efficiently. this paper,...
Power communication network is an indispensable unit to maintain power operation. The application of optical fiber nanotechnology in transmission studied this paper. applied the (optical technology main technology), and functional model device node established. form terminal multiplexing function module, electrical cross photoelectric hybrid module analyzed. multiplex section using technology. data transmitted by strong third-order nonlinearity soliton communication. experimental results...
This study presented a novel shape photonic crystal fiber based gas sensor for the first time. Perfectly circular air hole are arranged to form core and cladding region. Based on full vector finite element method (FV-FEM) perfectly matched layer (PML) designed has been investigated. The model field, effective mode index, sensitivity, confinement loss, area, nonlinearity, V parameter of fundamental investigated through FEM commercial software package COMSOL Multiphysics. Numerical simulations...
The majority of medical equipment in use today does not have built-in security features. As a result, whether linked to hospital system or the cloud, these devices’ weaknesses make them vulnerable variety cyberattacks. In hospitals and clinics, hackers can breach equipment, manipulate data, disrupt facilities, putting patients’ health as well their lives jeopardy. A professional manage cybersecurity threats by lowering attack surface system. Security analysis, means detect possible...
Site selection for an institute or a university is challenging task. The of sites setting up new depends on multiple criteria. In backward, under privileged area people’s perception towards the co-educational universities and women are different. Poor families with their conservative mentality possess inhibitions while sending girl child to as they have concerns about safety, security family honor. Hence many attributes which not so important more pertinent university. this research paper,...
The current research efforts in the security domain are essentially inspired by intention to ensure both healthcare software's and usability. Practitioners continuously working on techniques that can optimise while affording ease of use. Inspite numerous developers experts this context, level usability-security is not same as it should be. Furthermore, important do more work most effective strategies for evaluating increasing usable-security technology. Quantitative usability assessment an...
In this work, a modified square photonic crystal fiber (MS-PCF) architecture is exposed with ultra-high negative dispersion for communication window. The validation of the model successfully performed by applying an efficient full-vector finite element method (FV-FEM) anisotropic perfectly matched layers (PMLs) precise simulation PCFs. Additionally, waveguide engineering accomplished tuning structural parameters MS-PCF. From numerical investigation, behavior permits remarkable suppression...
In modern times, many individuals, businesses and the Internet of Things (IoT) integrated industries collect huge amounts meaningful data daily, which may be beneficial for other individuals as well. By utilizing this data, future trends to make right decisions on bases facts figures are analyzed efficiently. addition that, new ways paved researchers utilize in their upcoming research. However, due some major issues like security, privacy access control owners avoid sharing among themselves....
Over the last decades, load forecasting is used by power companies to balance energy demand and supply. Among several methods, medium-term necessary for grid's maintenance planning, settings of electricity prices, harmonizing sharing arrangement. The month ahead electrical loads provides information required interchange among companies. For accurate forecasting, this paper proposes a model that uses hourly temperature data predict loads. preprocessing, modified entropy mutual...
The contribution of this paper is two fold. It first analyses the flooding strategies for Wireless Multihop Networks (WMNs) then it enhances reactive and proactive routing protocols. For analysis purpose, we select four widely used techniques routing: i. traditional flooding, ii. Time-To-Live based Expanding Ring Search (TTL-based ERS) scheme, iii. TTL-based Scope Routing (SR) iv. Multi-Point Relays (MPR) flooding. These play a vital role act as backbone Therefore, compare efficiency these...