Ahmad Almogren

ORCID: 0000-0002-8253-9709
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • IoT and Edge/Fog Computing
  • Blockchain Technology Applications and Security
  • Energy Efficient Wireless Sensor Networks
  • Network Security and Intrusion Detection
  • Caching and Content Delivery
  • Smart Grid Security and Resilience
  • Cloud Data Security Solutions
  • Smart Grid Energy Management
  • Advanced Malware Detection Techniques
  • Privacy-Preserving Technologies in Data
  • Vehicular Ad Hoc Networks (VANETs)
  • Opportunistic and Delay-Tolerant Networks
  • Microgrid Control and Optimization
  • Security in Wireless Sensor Networks
  • Mobile Ad Hoc Networks
  • Monoclonal and Polyclonal Antibodies Research
  • Cooperative Communication and Network Coding
  • Distributed systems and fault tolerance
  • Context-Aware Activity Recognition Systems
  • User Authentication and Security Systems
  • Internet Traffic Analysis and Secure E-voting
  • Cloud Computing and Resource Management
  • Energy Load and Power Forecasting
  • Anomaly Detection Techniques and Applications
  • Wireless Body Area Networks

King Saud University
2016-2025

King Saud bin Abdulaziz University for Health Sciences
2025

National Guard Health Affairs
2025

King Abdullah International Medical Research Center
2025

University of Haripur
2021-2024

ORCID
2017-2021

National University of Sciences and Technology
2021

Universidade Federal do Piauí
2021

King Saud Medical City
2019

King Khalid University Hospital
2005-2015

Supply chains are evolving into automated and highly complex networks becoming an important source of potential benefits in the modern world. At same time, consumers now more interested food product quality. However, it is challenging to track provenance data maintain its traceability throughout supply chain network. The traditional centralized they depend on a third party for trading. These systems lack transparency, accountability auditability. In our proposed solution, we have presented...

10.1109/access.2020.2986257 article EN cc-by IEEE Access 2020-01-01

Traditional power grid and its demand-side management (DSM) techniques are centralized mainly focus on industrial consumers. The ignorance of residential commercial sectors in DSM activities degrades the overall performance a conventional grid. Therefore, concept demand response (DR) via sector makes smart (SG) superior over traditional In this context, paper proposes an optimized home energy system (OHEMS) that not only facilitates integration renewable source (RES) storage (ESS) but also...

10.3390/en10040549 article EN cc-by Energies 2017-04-17

Wireless sensor networks (WSNs) have demonstrated research and developmental interests in numerous fields, like communication, agriculture, industry, smart health, monitoring, surveillance. In the area of agriculture production, IoT-based WSN has been used to observe yields condition automate precision using various sensors. These sensors are deployed agricultural environment improve production through intelligent farming decisions obtain information regarding crops, plants, temperature...

10.3390/s20072081 article EN cc-by Sensors 2020-04-07

Nowadays, telemedicine is an emerging healthcare service where the professionals can diagnose, evaluate, and treat a patient using telecommunication technology. To diagnose evaluate patient, need to access electronic medical record (EMR) of which might contain huge multimedia big data including X-rays, ultrasounds, CT scans, MRI reports. For efficient supporting mobility for both as well patients, EMR needs be kept in storage cloud. In spite popularity cloud, it faces different security...

10.1109/access.2017.2757844 article EN cc-by-nc-nd IEEE Access 2017-01-01

In this paper, a blockchain-based data sharing and access control system is proposed, for communication between the Internet of Things (IoT) devices. The proposed intended to overcome issues related trust authentication in IoT networks. Moreover, objectives are achieve trustfulness, authorization, Multiple smart contracts such as Access Control Contract (ACC), Register (RC), Judge (JC) used provide efficient management. Where ACC manages overall system, RC authenticate users JC implements...

10.3390/app10020488 article EN cc-by Applied Sciences 2020-01-09

Local energy generation and peer to (P2P) trading in the local market can reduce consumption cost, emission of harmful gases (as renewable sources are used generate at user's premises) increase smart grid resilience. However, with peers have trust privacy issues. A centralized system be manage this but it increases overall cost also faces several In paper, implement a hybrid P2P market, blockchain-based is proposed. It fully decentralized allows members interact each other trade without...

10.1109/access.2020.2979051 article EN cc-by IEEE Access 2020-01-01

Abstract The volume of data transferred across communication infrastructures has recently increased due to technological advancements in cloud computing, the Internet Things (IoT), and automobile networks. network systems transmit diverse heterogeneous dispersed environments as technology develops. communications using these networks daily interactions depend on security provide secure reliable information. On other hand, attackers have their efforts render susceptible. An efficient...

10.1186/s13677-024-00685-x article EN cc-by Journal of Cloud Computing Advances Systems and Applications 2024-07-17

In recent years, demand side management (DSM) techniques have been designed for residential, industrial and commercial sectors. These are very effective in flattening the load profile of customers grid area networks. this paper, a heuristic algorithms-based energy controller is residential smart grid. essence, five algorithms (the genetic algorithm (GA), binary particle swarm optimization (BPSO) algorithm, bacterial foraging (BFOA), wind-driven (WDO) our proposed hybrid (GWD) algorithm)...

10.3390/en10030319 article EN cc-by Energies 2017-03-07

The infrastructure of wireless sensor networks (WSN) is structured in an ad-hoc manner and organized nodes reporting the events to Base Station (BS). A WSN integrated with smart technologies develop fast Internet Things (IoT) communications among different applications. Recently, many researchers proposed their solutions optimize IoT data transmissions energy efficient cost effective support. However, most have focused on design development static topologies overlooked dynamic structure...

10.1109/access.2019.2960633 article EN cc-by IEEE Access 2019-01-01

For the last few years, computer-aided diagnosis (CAD) has been increasing rapidly. Numerous machine learning algorithms have developed to identify different diseases, e.g., leukemia. Leukemia is a white blood cells- (WBC-) related illness affecting bone marrow and/or blood. A quick, safe, and accurate early-stage of leukemia plays key role in curing saving patients' lives. Based on developments, consists two primary forms, i.e., acute chronic Each form can be subcategorized as myeloid...

10.1155/2020/6648574 article EN cc-by Journal of Healthcare Engineering 2020-12-03

Emotional health plays very vital role to improve people's quality of lives, especially for the elderly. Negative emotional states can lead social or mental problems. To cope with problems caused by negative emotions in daily life, we propose efficient facial expression recognition system contribute healthcare system. Thus, expressions play a key our communications, and recent years have witnessed great amount research works reliable (FER) systems. Therefore, evaluation analysis from video...

10.1109/access.2017.2676238 article EN cc-by-nc-nd IEEE Access 2017-01-01

The current cellular technology and vehicular networks cannot satisfy the mighty strides of network demands. Resource management has become a complex challenging objective to gain expected outcomes in environment. 5G promises provide ultra-high-speed, reduced delay, reliable communications. development new technologies such as function virtualization (NFV) software defined networking (SDN) are critical enabling leveraging 5G. SDN-based can an excellent platform for autonomous vehicles...

10.1109/access.2020.2964697 article EN cc-by IEEE Access 2020-01-01

Internet of Things (IoT) enables modern improvements in smart sensors, RFID, technologies, and communication protocols. Sensor nodes are treated as devices widely used to gather forward sensed information. However, besides intrinsic constraints on sensor nodes, they vulnerable a variety security threats. This paper presents an energy-aware secure multi-hop routing (ESMR) protocol by using secret sharing scheme increase the performance energy efficiency with data against malicious actions....

10.1109/access.2019.2922971 article EN cc-by-nc-nd IEEE Access 2019-01-01

The trustworthiness of an industrial Internet Things (IIoT) network is important stakeholder expectation. Maintaining the such a crucial to void loss lives. A trustworthy IIoT system combines security characteristics IT trustworthiness-safety, security, privacy, reliability, and resilience. Conventional tools techniques are not enough safeguard platform due difference in protocols, limited upgrade opportunities, mismatch older versions operating used system. In this article, we propose...

10.1109/tii.2020.2970074 article EN IEEE Transactions on Industrial Informatics 2020-01-28

Social networking sites engage millions of users around the world. The users' interactions with these social sites, such as Twitter and Facebook have a tremendous impact occasionally undesirable repercussions for daily life. prominent turned into target platform spammers to disperse huge amount irrelevant deleterious information. Twitter, example, has become one most extravagantly used platforms all times therefore allows an unreasonable spam. Fake send undesired tweets promote services or...

10.1109/access.2019.2918196 article EN cc-by-nc-nd IEEE Access 2019-01-01

The pervasiveness of newly introduced Internet-of-Things (IoT) devices has opened up new opportunities in healthcare systems, for example facilitating remote patient monitoring. There are, however, security and privacy considerations the transmission data from these to backend server, across heterogeneous IoT networks. In this study, we propose a novel privacy-preserving scheme which is based on blockchain swarm exchange techniques facilitate seamless secure user (e.g., electronic health...

10.1109/jiot.2021.3050703 article EN IEEE Internet of Things Journal 2021-01-13

In the promising time of Internet, connected things have ability to communicate and share information. The Internet Things (IoT) cannot be implemented unless security-related concerns been resolved. Sharing information among different devices can compromise private users. Thus, a suitable mechanism is needed exclude risk malicious compromised nodes. As follows, trust has proposed in literature as useful technology maintain users' security. Prior studies diverse management mechanisms achieve...

10.1109/access.2019.2916340 article EN cc-by-nc-nd IEEE Access 2019-01-01
Coming Soon ...