- Advanced Data Compression Techniques
- Image and Signal Denoising Methods
- Digital Filter Design and Implementation
- IoT and Edge/Fog Computing
- Video Coding and Compression Technologies
- User Authentication and Security Systems
- Cloud Data Security Solutions
- Security and Verification in Computing
- Mobile Ad Hoc Networks
- Biometric Identification and Security
- Network Security and Intrusion Detection
- Blockchain Technology Applications and Security
- Cloud Computing and Resource Management
- Advanced Malware Detection Techniques
- Multi-Agent Systems and Negotiation
- Advanced Steganography and Watermarking Techniques
- Electricity Theft Detection Techniques
- Internet Traffic Analysis and Secure E-voting
- Service-Oriented Architecture and Web Services
- Vehicular Ad Hoc Networks (VANETs)
- Security in Wireless Sensor Networks
- Wireless Networks and Protocols
- Imbalanced Data Classification Techniques
- Energy Efficient Wireless Sensor Networks
- Vehicle License Plate Recognition
Xi'an Jiaotong University
2025
University of Babylon
2024
Qassim University
2017-2023
Buraydah Colleges
2021
Applied Science Private University
2011
Zarqa University
2008
Microsoft (United States)
2003
University of California, Santa Barbara
1999-2003
Cairo University
2002
Nokia (United States)
1999
Cloud computing brings for higher educational institution a wide range of benefits with new capabilities to incorporate in the process.However, cloud services are vulnerable variety security challenges.One key challenges that institutions face adopting technologies is provisioning secure infrastructure.In this paper, authors discover some education sector and discuss limitations main as well highlight when utilizing technologies.The survey was conducted study views stakeholders on...
Objectives: To identify the main challenges and security issues of virtualization in cloud computing environments. It reviews alleviation techniques for improving systems. Methods/ Statistical Analysis: Virtualization is a fundamental technology computing, this reason, any vulnerabilities threats affect virtualization. In study, systematic literature review performed to find out risks threats, attacks result from those vulnerabilities. Furthermore, we discover analyze effective mitigation...
Abstract This paper presents a novel, sequentially executed supervised machine learning‐based electric theft detection framework using Jaya‐optimized combined Kernel and Tree Boosting (KTBoost) classifier. It utilizes the intelligence of XGBoost algorithm to estimate missing values in acquired dataset during data pre‐processing phase. An oversampling based on Robust‐SMOTE technique is utilized avoid unbalanced class distribution issue. Afterward, with aid few very significant statistical,...
User authentication is a critical security requirement for accessing resources in cloud computing systems. A text-based password standard user way and it still extensively used so far. However, textual passwords are difficult to remember, which forces users write down compromise security. In recent years, graphical methods have been proposed as an alternative verify the identity of users. The most challenges cloud-computing face post their sensitive data on external servers that not directly...
The increasing number of security holes in the Internet Things (IoT) networks creates a question about reliability existing network intrusion detection systems. This problem has led to developing research area focused on improving network-based system (NIDS) technologies. According analysis different businesses, most researchers focus classification results NIDS datasets by combining machine learning and feature reduction techniques. However, these techniques are not suitable for every type...
The basic vector quantization (VQ) technique employed in video coding belongs to the category of predictive (PVQ), as it involves (motion compensated) frame prediction error. It is well known that design PVQ suffers from fundamental difficulties, due loop, which have an impact on convergence and stability procedure. We propose approach enjoys open-loop while ensures ultimate optimization closed-loop system. method derived for general quantization, we demonstrate compression at low bit rates,...
This study presents a novel feature-engineered-natural gradient descent ensemble-boosting (NGBoost) machine-learning framework for detecting fraud in power consumption data. The proposed was sequentially executed three stages: data pre-processing, feature engineering, and model evaluation. It utilized the random forest algorithm-based imputation technique initially to impute missing entries acquired smart meter dataset. In second phase, majority weighted minority oversampling (MWMOTE)...
There has been an increase in the adoption of mobile payment systems worldwide past few years. However, poor Internet connection rural regions continues to be obstacle widespread use such technologies. On top that, there are significant problems with currently available offline wallets; for instance, payee cannot verify number coins received without access Internet. Additionally, it demonstrated that some existing susceptible false token generation, and do not even permit user divide into...
<span>Decision support systems (DSS) are useful business intelligence (BI) tools as they help managers in large organizations make the best out of many decisions. Decisions based on various types raw data, models, documents, knowledge, and past experiences. This paper examines numerous criteria decision educational environment. Two effective methods were discovered applied this research, analytic hierarchy process (AHP) simple multi-attribute rating technique (SMART). These selected...
Virtualization has become a widely and attractive employed technology in cloud computing environments.Sharing of single physical machine between multiple isolated virtual machines leading to more optimized hardware usage, as well make the migration management system efficiently than its counterpart.Virtualization is fundamental environment.However, presence an additional abstraction layer among software causes new security issues.Security issues related virtualization have significant...
A new approach is proposed for predictive vector quantizer (PVQ) design, which inherently probabilistic, and based on ideas from information theory analogies to statistical physics. The effectively resolves three longstanding fundamental shortcomings of standard PVQ design. first complication due the prediction loop, has a detrimental impact convergence stability design procedure. second shortcoming piecewise constant nature function, makes it difficult optimize predictor with respect...
The Internet of Things technology opens the horizon for a broader scope intelligent applications in smart cities. However, massive amount traffic exchanged among devices may cause security risks, significantly when are compromised or vulnerable to cyber-attack. An intrusion detection system is most powerful tool detect unauthorized attempts access systems. It identifies malicious and benign by analyzing network traffic. In cases, only fraction can be considered malicious. As result, it...
Internet of Things technology opens the horizon to a broader scope intelligent applications in smart cities. However, massive amount traffic exchanged among devices may cause security risks, especially when are compromised or vulnerable cyberattack. An intrusion detection system is most powerful tool detect unauthorized attempts access systems. It identifies malicious and benign by analyzing network traffic. In cases, only fraction can be considered malicious. As result, it difficult for an...
Three-dimensional (3-D) video compression using wavelets decomposition along the temporal axis dictates that a number of frames must be buffered to allow for decomposition. Buffering allows correlation made use of, and larger buffer more effective One problem inherent in such set up interactive applications as conferencing, is buffering translates into corresponding time delay. We show 3-D coding image sequences can achieved true sense direction but with much less requirements. For practical...
The basic vector quantization (VQ) technique employed in video coding belongs to the category of predictive (PVQ), as it involves (motion compensated) frame prediction error. It is well known that design PVQ suffers from fundamental difficulties, due loop, which have an impact on convergence and stability procedure. We propose approach enjoys open-loop while ensures ultimate optimization closed-loop system. method derived for general quantization, we demonstrate compression at low bit rates,...
Traditional wavelet packet (WP) optimization techniques neglect information about the structure of lossy part compression scheme. Such information, however, can help guide procedure so as to result in efficient WP structures. We propose a algorithm with constrained rate-distortion which makes it suited subsequent tree-structured coding such set partitioning hierarchical trees (SPMT) algorithm. The (octave-band) transform lends itself simple and coherent tree-shaped spatial relations then be...
The design of predictive quantizers generally suffers from difficulties due to the prediction loop, which have an impact on convergence and stability procedure. We previously proposed asymptotically closed-loop approach quantizer for coding applications, benefits open-loop while optimizing actual system. In this paper, we present enhancement where joint optimization both predictor is performed within framework. method tested synthetic sources (first-order Gauss Laplacian-Markov sequences),...
A multistage vector quantizer (MSVQ) based coding system is source-channel optimized for packet networks. Resilience to loss enhanced by a proposed interleaving approach that ensures single lost only eliminates subset of the stages. The design while taking into account compression efficiency, rate, and technique in use. new source-channel-optimized MSVQ tested on memoryless speech line spectral frequency (LSF) parameter quantization as well block-based image compression. With LSF coding,...