- Energy Efficient Wireless Sensor Networks
- Energy Harvesting in Wireless Networks
- Advanced Malware Detection Techniques
- IoT and Edge/Fog Computing
- Cutaneous Melanoma Detection and Management
- Digital Transformation in Industry
- Security in Wireless Sensor Networks
- Wireless Body Area Networks
- AI in cancer detection
- Underwater Vehicles and Communication Systems
- Spam and Phishing Detection
- Mobile Ad Hoc Networks
- Bone health and osteoporosis research
- Machine Learning in Healthcare
- Cholesterol and Lipid Metabolism
- Flexible and Reconfigurable Manufacturing Systems
- COVID-19 diagnosis using AI
- Cybercrime and Law Enforcement Studies
- Distributed Sensor Networks and Detection Algorithms
- Artificial Intelligence in Healthcare and Education
- Wireless Sensor Networks and IoT
- Nonmelanoma Skin Cancer Studies
- Cloud Data Security Solutions
- Cell Image Analysis Techniques
- Advanced Fiber Optic Sensors
Universiti Malaysia Sarawak
2019-2024
Jouf University
2013-2024
University of Derby
2024
An increasing number of genetic and metabolic anomalies have been determined to lead cancer, generally fatal. Cancerous cells may spread any body part, where they can be life-threatening. Skin cancer is one the most common types its frequency worldwide. The main subtypes skin are squamous basal cell carcinomas, melanoma, which clinically aggressive responsible for deaths. Therefore, screening necessary. One best methods accurately swiftly identify using deep learning (DL). In this research,...
One of the most prevalent cancers worldwide is skin cancer, and it becoming more common as population ages. As a general rule, earlier cancer can be diagnosed, better. result success deep learning (DL) algorithms in other industries, there has been substantial increase automated diagnosis systems healthcare. This work proposes DL method for extracting lesion zone with precision. First, image enhanced using Enhanced Super-Resolution Generative Adversarial Networks (ESRGAN) to improve image's...
Tremendous growth of ransom malware demands valuable security methods to protect individuals and organizations. Ransomware or is a type that restricts users from accessing their files system payment get back access files. The hacked are encrypted asked for decrypt redeliver the user. To regain one has make digital payment. this dangerous as it hacks all fails available on also possibility retrieving your file zero percent. Even if done still cannot be sure will delivered earliest ransomware...
The semantically complicated Arabic natural vocabulary, and the shortage of available techniques skills to capture emotions from text hinder sentiment analysis (ASA). Evaluating idioms that do not follow a conventional linguistic framework, such as contemporary standard (MSA), complicates an incredibly difficult procedure. Here, we define novel lexical approach for studying language tweets (TTs) specialized digital media platforms. Many elements comprising emoji, intensifiers, negations,...
Digital Twin infrastructure is an evolving phenomenon that has become the center of focus for industries and in more current institutions. The advances industry 4.0 technologies have encouraged its development, especially automotive industry. characterized widely but typically as flawless insight between a virtual physical environment any way. An analysis literature relevant to Twins conducted, providing declarative overview previous research. Experts contributors technology are still not...
The sheer volume of movies generated these days requires an automated analytics for efficient classification, query-based search, and extraction desired information. These tasks can only be efficiently performed by a machine learning based algorithm. We address the same issue in this paper proposing deep technique predicting relevant tags movie segmenting with respect to predicted tags. construct tag vocabulary create corresponding dataset order train model. Subsequently, we propose shot...
The wireless body sensor network (WBSN) is a communication that might enable 24/7 patient monitoring and health findings through the online platform. Although BSN design becoming simpler, building secure seems to be more challenging than designing conventional solutions, recent study provides little guidance designers developers. proposed summarizes multivocal literature of security mechanisms for BSN. investigation found 10,871 academic publications 697 grey content; duplicates were...
Abstract The value of data to a company means that it must be protected. When comes safeguarding their local and worldwide databases, businesses face number challenges. To systematically review the literature highlight difficulties in establishing, implementing, maintaining secure databases. In order better understand database system problems, we did systematic mapping study (SMS). We’ve analyzed 100 research publications from different digital libraries found 20 issues after adopting...
Due to the energy resource restriction, sensor nodes drain out their power. Therefore routing mechanism among and sink need consider balanced utilization. Low-Energy Adaptive Clustering Hierarchy (LEACH) direct data communication from source cluster head sink, which results unbalanced consumption of heads CHs leads holes in network. For maximum network lifetime an Energy efficient Least Edge Computation protocol (ELEC) is proposed literature. The simulation show better performance ELEC as...
The time-critical Internet of Things (IoT) use cases such as driverless cars and robotic surgical arms need high bandwidth low latency for real-time intelligent data processing trained machine learning inference. Latency in is influenced by many factors artificial intelligence (AI) computing algorithm, device capabilities, the frameworks, also distance from cloud infrastructure. However, geographical between origin one major contributing to network IoT cases. In this paper, we analyzed a...
To minimize the communication overhead with help of optimal path selection in Wireless Sensor Network (WSN) routing protocols is challenging issue. Hierarchical optimizes energy utilization by distributing workload among different clusters. But many-to-one multi-hop hierarchical will result excessive expenditure near sink and leads to early exhaustion nodes. Due this hole problem can be caused around base station. Data routed along boundary nodes lead premature energy. This maximize size...
In underwater acoustic networks (UANs), an modem is one of the key elements that governs communications. The major demerit existing surveys conducted on modems such do not comprise novel and state-of-the-art modems. addition, described characteristics specify full potential capabilities designed This, in consequence, makes it difficult to identify parameters for improvement future investigation. Also, does provide optimal choice a various applications. To overcome these challenges, this...
Pain is a sensation humans sense as protective mechanism against physical injury. This closely related to inflammation. It ranges from mild highly obnoxious. well-known that the levels of inflammatory biomarker, C-reactive protein (CRP), increase manifold in acute inflammation and pain. Olive oil, known have many phytochemicals, has been traditionally used alleviate Amongst major phenolic compounds olive oil are oleuropein (OLE), hydroxytyrosol (HT), tyrosol, oleocanthal. Whether analgesic...
Understanding the fracture mechanics of bone is very important in both medical and bioengineering field. Bone a hierarchical natural composite material nanoscale collagen fibers inorganic material.This study investigates presents toughness bovine cortical by using elastic plastic mechanics.The J-integral was used as parameter to calculate energies utilized deformation (Jel) (Jpl) hipbone fracture. Twenty four different types specimens, i.e. longitudinal compact tension (CT) transverse CT...
Wireless Sensor Networks (WSNs) that monitor individuals' physical and medical conditions are called Body Area (BANs). This technology uses wireless sensors to vital signs from the human body. In order overcome processing storage limitations, BAN is often connected cloud. Network (WBAN), however, opens up possibility of various security threats when using The digital twin (DT) can provide users with hundreds thousands interpretations device without interfering its normal functionality. It...
The energy of nodes in Wireless Sensor Networks (WSNs) is usually limited, which has to be consumed economically order prolong the lifetime network.The imbalanced use degrades sensor node quickly and leads voids, further cause routing hole problem.The problem ultimately affects network performance.To solve problem, an Energy Efficient Least Edge Computation protocol (ELEC) proposed literature.The simulation results show that ELEC achieves nearly double by equal consumption various parts as...