- Network Security and Intrusion Detection
- Anomaly Detection Techniques and Applications
- Advanced Malware Detection Techniques
- Brain Tumor Detection and Classification
- IoT and Edge/Fog Computing
- Smart Grid Energy Management
- Hand Gesture Recognition Systems
- AI in cancer detection
- Video Surveillance and Tracking Methods
- IoT-based Smart Home Systems
- Functional Brain Connectivity Studies
- Human Pose and Action Recognition
- Machine Fault Diagnosis Techniques
- Internet Traffic Analysis and Secure E-voting
- Microgrid Control and Optimization
- Gait Recognition and Analysis
- Electric Vehicles and Infrastructure
- Antenna Design and Analysis
- Generative Adversarial Networks and Image Synthesis
- Context-Aware Activity Recognition Systems
- Energy Efficient Wireless Sensor Networks
- Fire Detection and Safety Systems
- Fuzzy Logic and Control Systems
- Digital Imaging for Blood Diseases
- Face and Expression Recognition
Princess Nourah bint Abdulrahman University
2019-2025
Benha University
2020
Edinburgh Napier University
2020
Yes Technologies (United States)
2020
Gautam Buddha University
2019-2020
University of Southampton
2014
To prolong the function of wireless sensor networks (WSNs), lifetime system has to be increased. WSNs can calculated by using a few generic parameters, such as time until death first node and other parameters according application. Literature indicates that choosing most appropriate cluster head clustering is one successful ways improve lifespan WSN. The drawback protocols based on probabilistic model. Sometimes they select two heads for different clusters which are very close each results...
Currently, the amount of Internet Things (IoT) applications is enhanced for processing, analyzing, and managing created big data from smart city. Certain other cities were location-based services, transportation management, urban design, amongst others. There are several challenges under these containing privacy, security, mining, visualization. The blockchain-assisted IoT application (BIoT) offering new computing to secure cities. blockchain a transparent data-sharing decentralized...
The application of Internet Things (IoT) has been emerging as a new platform in wireless technologies primarily the field designing electric vehicles. To overcome all issues existing vehicles and for protecting environment, should be introduced by integrating an intellectual device called sensor over body vehicle with less cost. Therefore, this article confers need importance introducing IoT based technology which monitors battery life Since are implemented internet, online monitoring system...
A planar, microstrip line-fed, quad-port, multiple-input-multiple-output (MIMO) antenna with dual-band rejection features is proposed for ultra-wideband (UWB) applications. The MIMO design consists of four identical octagonal-shaped radiating elements, which are placed orthogonally to each other. property (3.5 GHz and 5.5 corresponding Wi-MAX WLAN bands) was obtained by introducing a hexagonal-shaped complementary split-ring resonator (HCSRR) in the radiators designed antenna. etched on...
A compact, low-profile, coplanar waveguide (CPW)-fed quad-port multiple-input-multiple-output (MIMO)/diversity antenna with triple band-notched (Wi-MAX, WLAN, and X-band) characteristics is proposed for super-wideband (SWB) applications. The design contains four similar truncated-semi-elliptical-self-complementary (TSESC) radiating patches, which are excited through tapered CPW feed lines. complementary slot matching the patch introduced in ground plane of truncated semi-elliptical element...
Breast cancer is a common cause of female mortality in developing countries. Screening and early diagnosis can play an important role the prevention treatment these cancers. This study proposes ensemble learning-based voting classifier that combines logistic regression stochastic gradient descent with deep convoluted features for accurate detection cancerous patients. Deep are extracted from microscopic fed to classifier. idea provides optimized framework accurately classifies malignant...
Prostate cancer is the main cause of death over globe. Earlier detection and classification highly important to improve patient health. Previous studies utilized statistical machine learning (ML) techniques for prostate detection. However, several challenges that exist in investigation process are existence high dimensionality data less number training samples. Metaheuristic algorithms can be used resolve curse rate artificial intelligence (AI) techniques. With this motivation, article...
Among the most prominent field in human-computer interface (HCI) is emotion recognition using facial expressions. Posed variations, accessories, and non-uniform illuminations are some of difficulties field. Emotion detection with help traditional methods has shortcoming mutual optimization feature extraction classification. Computer vision (CV) technology improves HCI by visualizing natural world a digital platform like human brain. In CV technique, advances machine learning artificial...
Recently, Internet of Things (IoT) devices produces massive quantity data from distinct sources that get transmitted over public networks. Cybersecurity becomes a challenging issue in the IoT environment where existence cyber threats needs to be resolved. The development automated tools for threat detection and classification using machine learning (ML) artificial intelligence (AI) become essential accomplish security environment. It is needed minimize issues related gadgets effectively....
Automated facial emotion recognition (FER) is one of the important fields human-computer interaction (HCI). FER remains challenging due to accessories, non-uniform illumination, pose variation, etc. Emotion detection exploiting conventional algorithms has demerit mutual optimization classification and feature extraction. Artificial intelligence (AI) techniques can be employed identify automatically. Deep learning (DL) driven models have recently allowed for designing an end-to-end process....
Artificial intelligence (AI) in music improvisation offers promising new avenues for developing human creativity. The difficulty of writing dynamic, flexible musical compositions real time is discussed this article. We explore using reinforcement learning (RL) techniques to create more interactive and responsive creation systems. Here, the structures train an RL agent navigate complex space possibilities provide improvisations. melodic framework input data initially identified bi-directional...
In the rapidly evolving landscape of artificial intelligence (AI) and Internet Things (IoT), significance device diagnostics prognostics is paramount for guaranteeing dependable operation upkeep intricate systems. The capacity to precisely diagnose preemptively predict potential failures holds considerably amplify maintenance efficiency, diminish downtime, optimize resource allocation. wealth information offered by telemetry data gathered from IoT devices presents an opportunity...
Object detection is a computer vision based technique which used to detect instances of semantic objects particular class in digital images and videos. Crowd density analysis one the commonly utilized applications object detection. Since crowd classification techniques face challenges like non-uniform density, occlusion, inter-scene, intra-scene deviations, convolutional neural network (CNN) models are useful. This paper presents Metaheuristics with Deep Transfer Learning Enabled Intelligent...
Nowadays, there are ample amounts of Internet Things (IoT) devices interconnected to the networks, and with technological improvement, cyberattacks security threads, for example, botnets, rapidly evolving emerging high-risk attacks. A botnet is a network compromised that controlled by cyber attackers, frequently employed perform different cyberattacks. Such attack disrupts IoT evolution disrupting services networks devices. Detecting botnets in an environment includes finding abnormal...
Among various biometric methods, palm vein authentication has taken significant attention because of its uniqueness, stability and non-intrusiveness. In this paper, we propose a model using convolutional neural networks (CNN), which is the most popular deep learning architecture Bayesian optimization. First foremost, region interest (ROI) extracted as an image filtered by Jerman enhancement filter to enhance gray levels patterns. The proposed CNN allows different numbers layers be added...
The Internet of Things (IoT) has gained more popularity in research because its large-scale challenges and implementation. But security was the main concern when witnessing fast development applications size. It a dreary task to independently set systems every IoT gadget upgrade them according newer threats. Additionally, machine learning (ML) techniques optimally use colossal volume data generated by devices. Deep Learning (DL) related were modelled for attack detection IoT. current address...
Effective intelligent fault diagnosis of rotating machinery using its vibrational signals has a considerable influence on certain analysis factors such as the reliability, performance, and productivity variety modern manufacturing machines. Traditional approaches lack generalization schemes add burden extracting features from data-driven cases. On other hand, Deep Learning (DL) studies have reported capabilities higher than expectations researchers' objectives. In this context, paper...
Sign language has played a crucial role in the lives of impaired people having hearing and speaking disabilities. They can send messages via hand gesture movement. Arabic Language (ASL) recognition is very difficult task because its high complexity increasing intraclass similarity. may be utilized for communication sentences, letters, or words using diverse signs hands. Such helps to bridge gap between with impairment other also makes it easy express their opinions. Recently, large number...
The problem of producing a natural language description an image for describing the visual content has gained more attention in processing (NLP) and computer vision (CV). It can be driven by applications like retrieval or indexing, virtual assistants, understanding, support visually impaired people (VIP). Though VIP uses other senses, touch hearing, recognizing objects events, quality life those persons is lower than standard level. Automatic Image captioning generates captions that will...
Mobile edge computing (MEC) provides effective cloud services and functionality at the device, to improve quality of service (QoS) end users by offloading high computation tasks. Currently, introduction deep learning (DL) hardware technologies paves a method in detecting current traffic status, data offloading, cyberattacks MEC. This study introduces an artificial intelligence with metaheuristic based technique for Secure MEC (AIMDO-SMEC) systems. The proposed AIMDO-SMEC incorporates...