- Wireless Body Area Networks
- User Authentication and Security Systems
- Cognitive Radio Networks and Spectrum Sensing
- UAV Applications and Optimization
- IoT and Edge/Fog Computing
- Network Security and Intrusion Detection
- Smart Grid Security and Resilience
- Advanced Authentication Protocols Security
- Advanced Malware Detection Techniques
- Wireless Networks and Protocols
- Blockchain Technology Applications and Security
- Advanced MIMO Systems Optimization
- Cryptography and Data Security
- Chaos-based Image/Signal Encryption
- Power Line Communications and Noise
- Wireless Communication Networks Research
- Molecular Communication and Nanonetworks
- Video Surveillance and Tracking Methods
- Advanced Steganography and Watermarking Techniques
- Advanced Neural Network Applications
- Electricity Theft Detection Techniques
- IoT-based Smart Home Systems
- Wireless Communication Security Techniques
- Robotics and Sensor-Based Localization
- Anomaly Detection Techniques and Applications
Qatar University
2016-2025
Technology Innovation Institute
2020-2024
Zarqa University
2024
Abu Dhabi National Oil (United Arab Emirates)
2018
Northeastern University
2013-2014
The Internet of Things (IoT) integrates billions smart devices that can communicate with one another minimal human intervention. IoT is the fastest developing fields in history computing, an estimated 50 billion by end 2020. However, crosscutting nature systems and multidisciplinary components involved deployment such have introduced new security challenges. Implementing measures, as encryption, authentication, access control, network application for their inherent vulnerabilities...
The rapid evolutions in micro-computing, mini-hardware manufacturing, and machine to (M2M) communications have enabled novel Internet of Things (IoT) solutions reshape many networking applications. Healthcare systems are among these applications that been revolutionized with IoT, introducing an IoT branch known as the Medical (IoMT) systems. IoMT allow remote monitoring patients chronic diseases. Thus, it can provide timely patients' diagnostic save their life case emergencies. However,...
Unmanned aerial vehicles (UAVs) have recently rapidly grown to facilitate a wide range of innovative applications that can fundamentally change the way cyber-physical systems (CPSs) are designed. CPSs modern generation with synergic cooperation between computational and physical potentials interact humans through several new mechanisms. The main advantages using UAVs in CPS application is their exceptional features, including mobility, dynamism, effortless deployment, adaptive altitude,...
Abstract Navigation systems help users access unfamiliar environments. Current technological advancements enable to encapsulate these in handheld devices, which effectively increases the popularity of navigation and number users. In indoor environments, lack Global Positioning System (GPS) signals line sight with orbiting satellites makes more challenging compared outdoor Radio frequency (RF) signals, computer vision, sensor-based solutions are suitable for tracking This article provides a...
Modern technology has pushed us into the information age, making it easier to generate and record vast quantities of new data. Datasets can help in analyzing situation give a better understanding, more importantly, decision making. Consequently, datasets, uses which they be put, have become increasingly valuable commodities. This article describes DroneRF dataset: radio frequency (RF) based dataset drones functioning different modes, including off, on connected, hovering, flying, video...
In recent years, unmanned aerial vehicles (UAVs) have become increasingly accessible to the public due their high availability with affordable prices while being equipped better technology. However, this raises a great concern from both cyber and physical security perspectives since UAVs can be utilized for malicious activities in order exploit vulnerabilities by spying on private properties, critical areas or carry dangerous objects such as explosives which makes them threat society. Drone...
This study examined engineering students' initial readiness to transition emergency online learning in response COVID-19 Qatar. A theoretical framework is proposed for understanding the factors influencing change. Sequential explanatory mixed-method research was conducted, with 140 participants completing an survey, of which 68 also contributed written reflections and 8 participated semi-structured interviews. Exploratory factor analysis displayed a four-factor structure, including...
Drones are becoming increasingly popular not only for recreational purposes but in day-to-day applications engineering, medicine, logistics, security and others. In addition to their useful applications, an alarming concern regard the physical infrastructure security, safety privacy has arisen due potential of use malicious activities. To address this problem, we propose a novel solution that automates drone detection identification processes using drone’s acoustic features with different...
Mobile devices have become an essential element in our day-to-day lives. The chances of mobile attacks are rapidly increasing with the growing use devices. Exploiting vulnerabilities from as well stealing personal information, principal targets attackers. Researchers also developing various techniques for detecting and analyzing malware to overcome these issues. As new gets introduced frequently by developers, it is very challenging come up comprehensive algorithms detect this malware. There...
The Internet of Things (IoT) integrates billions smart devices that can communicate with one another minimal human intervention. It is the fastest developing fields in history computing, an estimated 50 billion by end 2020. On hand, IoT play a crucial role enhancing several real-life applications improve life quality. other crosscutting nature systems and multidisciplinary components involved deployment such introduced new security challenges. Implementing measures, as encryption,...
Blockchain is a distributed secure ledger that eliminates the need for centralized authority to store data. The approach has several limitations as it Single-Point-of-Failure and third-party might be needed. Blockchain, on other hand, provides decentralized, trustless framework third party enhances fault tolerance. In this paper, we investigate potentials of customizing behavior network based applications' requirements. particular, conduct experiments evaluate performance Hyperledger Fabric...
Deep brain stimulators (DBSs), a widely used and comprehensively acknowledged restorative methodology, are type of implantable medical device which uses electrical stimulation to treat neurological disorders. These devices diseases such as Parkinson, movement disorder, epilepsy, psychiatric Security in plays vital role since it can directly affect the mental, emotional, physical state human bodies. In worst-case situations, even lead patient's death. An adversary devices, for instance,...
Background: While improved student engagement has been highlighted as an essential goal and a major outcome of Problem Project-Based learning (PBL), little empirical evidence provided regarding types forms engagement. Material method: The study explored in PBL settings, drawing on data observations group interviews with 23 project teams (116 students) four different undergraduate civil engineering courses at Qatar University. Results: identified patterns setting. Participants reported...
Unmanned Aerial Vehicles (UAVs) have attracted great interest in the last few years owing to their ability cover large areas and access difficult hazardous target zones, which is not case of traditional systems relying on direct observations obtained from fixed cameras sensors. Furthermore, thanks advancements computer vision machine learning, UAVs are being adopted for a broad range solutions applications. However, Deep Neural Networks (DNNs) progressing toward deeper complex models that...
Smart health presents an ever-expanding attack surface due to the continuous adoption of a broad variety Internet Medical Things (IoMT) devices and applications. IoMT is common approach smart city solutions that deliver long-term benefits critical infrastructures, such as healthcare. Many in cities use Bluetooth technology for short-range communication its flexibility, low resource consumption, flexibility. As healthcare applications rely on distributed control optimization, artificial...
STEM (science, technology, engineering, and math) has taken center stage as a priority policy agenda for Qatar’s leadership. At present, stands fundamental catalyst sustainable economic, environmental, human, social development goals, is outlined in the Qatar National Vision 2030. The aim of this exploratory study was to investigate determinants students’ interest pursuing Science, Technology, Engineering, Mathematics (STEM) studies eventual careers Qatar. This used survey involving...
Recent advances in mobile technology have created a shift towards using battery-driven devices remote monitoring settings and smart homes. Clinicians are carrying out diagnostic screening procedures based on the electrocardiogram (ECG) signals collected remotely for outpatients who need continuous monitoring. High-speed transmission analysis of large recorded ECG essential, especially with increased use battery-powered devices. Exploring low-power alternative compression methodologies that...