Zaid Bassfar

ORCID: 0000-0003-1172-885X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Chaos-based Image/Signal Encryption
  • Cryptographic Implementations and Security
  • Advanced Steganography and Watermarking Techniques
  • Coding theory and cryptography
  • Cryptography and Residue Arithmetic
  • IoT and Edge/Fog Computing
  • Fuzzy Logic and Control Systems
  • Virtual Reality Applications and Impacts
  • Internet of Things and AI
  • Computational Drug Discovery Methods
  • Multi-Criteria Decision Making
  • Cellular Automata and Applications
  • Smart Agriculture and AI
  • Rough Sets and Fuzzy Logic
  • Software Engineering Research
  • Cryptography and Data Security
  • Software Engineering Techniques and Practices
  • COVID-19 diagnosis using AI
  • Plant Toxicity and Pharmacological Properties
  • AI in cancer detection
  • Digital Media Forensic Detection
  • Nonlinear Optical Materials Studies
  • Internet Traffic Analysis and Secure E-voting
  • Phytochemistry and Biological Activities
  • Digital Imaging for Blood Diseases

University of Tabuk
2016-2025

Quaid-i-Azam University
2024

King Khalid University
2024

Information Technology University
2023

Internet of Medical Things (IoMT) is an emerging subset (IoT), often called as IoT in healthcare, refers to medical devices and applications with internet connectivity, exponentially gaining researchers' attention due its wide-ranging applicability biomedical systems for Smart Healthcare systems. IoMT facilitates remote health system plays a crucial role within the healthcare industry enhance precision, reliability, consistency productivity electronic used various purposes. It comprises...

10.1016/j.jiph.2024.01.013 article EN cc-by-nc-nd Journal of Infection and Public Health 2024-01-22

Robot navigation in indoor environments has become an essential task for several applications, including situations which a mobile robot needs to travel independently certain location safely and using the shortest path possible. However, faces challenges, such as obstacles dynamic environment. This paper addresses problem of social environments, through developing efficient SLAM-based localization system service robots Pepper platform. In addition, this discusses issue way that allows...

10.3390/machines11020158 article EN cc-by Machines 2023-01-23

Both the act of keeping information secret and research on how to achieve it are included in broad category cryptography. When people refer “information security,” they referring study use methods that make data transfers harder intercept. we talk about this is what have mind. Using private keys encrypt decode messages a part procedure. Because its vital role modern theory, computer security, engineering, cryptography now considered be branch both mathematics science. mathematical...

10.3390/s23063287 article EN cc-by Sensors 2023-03-20

Substitution boxes are the key factor in symmetric-key cryptosystems that determines their ability to resist various cryptanalytic attacks. Creating strong substitution have multiple cryptographic properties at same time is a challenging task for cryptographers. A significant amount of research has been conducted on S-boxes past few decades, but resulting found be vulnerable cyberattacks. This paper proposes new method creating robust exhibit superior performance and possess high scores...

10.3390/math11102322 article EN cc-by Mathematics 2023-05-16

The incidence of COVID-19, a virus that is responsible for infections in the upper respiratory tract and lungs, witnessed daily rise fatalities throughout pandemic. timely identification COVID-19 can contribute to formulation strategies control disease selection an appropriate treatment pathway. Given necessity broader diagnosis, researchers have developed more advanced, rapid, efficient detection methods. By conducting initial comparative analysis various widely used convolutional neural...

10.1007/s10278-024-01077-y article EN Deleted Journal 2024-03-18

Wireless body area networks ( <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">WBAN</i> ) are essential components of intelligent healthcare monitoring techniques. Especially, when the number and datatype in increases. In , secure multidimensional data aggregation received a lot attention. However, related schemes consume more computational communication overhead to encrypt/decrypt health reports. this paper, blockchain-assisted scalable...

10.1109/access.2024.3351844 article EN cc-by-nc-nd IEEE Access 2024-01-01

Researchers concentrate on data security using cryptography, different approaches to protect confidential data, such as digital images holding private information. They use cryptography techniques, frequently elliptic curves and chaotic structures for secure transmission. This paper introduces a novel technique constructing S-boxes their application in color image encryption. The utilization of discrete maps results low computational complexity, which is crucial high-speed communication...

10.1109/access.2024.3354170 article EN cc-by IEEE Access 2024-01-01

In recent years, numerous image encryption schemes have been developed that demonstrate different levels of effectiveness in terms robust security and real-time applications. While a few them outperform security, others perform well for applications where less processing time is required. Balancing these two aspects poses challenge, aiming to achieve efficient without compromising security. To address this the proposed research presents data approach encrypting grayscale images, comprising...

10.1038/s41598-024-62260-3 article EN cc-by Scientific Reports 2024-05-29

As the Internet becomes increasingly popular, number of users connected to it grows significantly. Consequently, packet processing speed network systems, such as routers, must be enhanced. IP lookup is a critical task used find next hop address by searching for longest prefix match in forwarding information base (FIB). The binary trie one most popular software-based approaches lookup. Prefix compression techniques can improve both time and space complexity lookups, thereby enhancing overall...

10.1038/s41598-024-84221-6 article EN cc-by-nc-nd Scientific Reports 2025-01-17

Preference analysis is a significant component in decision-making (DM) when selecting an optimal alternative. By comparing any two alternatives pairwise, preference relations (PRs) effectively depict the degrees of decision-makers (DMrs). The rough set theory (RST) has been applied to cope with by swapping equivalence relation (Er) dominance (DR). In this study, we propose new transfer functions construct alternatives' upward/downward fuzzy degree (FPD) for evaluating upward and downward PRs...

10.1109/access.2024.3396526 article EN cc-by-nc-nd IEEE Access 2024-01-01

Modern wheelchairs, with advanced and robotic technologies, could not reach the life of millions disabled people due to their high costs, technical limitations, safety issues. This paper proposes a gesture-controlled smart wheelchair system an IoT-enabled fall detection mechanism overcome these problems. It can recognize gestures using Convolutional Neural Network (CNN) model along computer vision algorithms control automatically by utilizing gestures. maintains users performing IoT-based...

10.3390/s22228716 article EN cc-by Sensors 2022-11-11

Polynomial multiplications based on the number theoretic transform (NTT) are critical in lattice-based post-quantum cryptography algorithms. Therefore, this paper presents a platform-agnostic unified hardware accelerator design (Unif-NTT) to compute forward and inverse operations of NTT for CRYSTALS-Kyber algorithm. Moreover, (Unif-BU) Cooley-Tukey Gentleman-Sande butterflies is presented using two adders, multipliers, subtractors, routing multiplexers barret-based modular reduction units....

10.1109/access.2024.3425813 article EN cc-by-nc-nd IEEE Access 2024-01-01

The importance of network security has increased with the emergence networked systems in contemporary computing, making it an essential aspect protecting digital assets and safeguarding against cyber threats. current mechanisms, which rely on cryptographic keys, may be susceptible to a number attacks, such as media access control (MAC) spoofing, might provide unauthorized users resources. This study introduces new approach, namely zero-trust framework quantum fingerprinting for devices...

10.3390/math11122653 article EN cc-by Mathematics 2023-06-10

Elliptic curve (EC) based cryptographic systems are more trustworthy than the currently used approaches since they require less computational work while providing good security. This paper shows how to use an EC make a cryptosystem for encrypting digital audio. As preliminary step, system uses of particular type over binary extension field distort audio pixel position. It reduces inter-correlation between pixels in original audio, making resistant statistical attacks. In creating confusion...

10.3390/math11183824 article EN cc-by Mathematics 2023-09-06

Acetaminophen (APAP) is the most commonly used nonprescription antipyretic-analgesic drug. This medication thought to be safe at suggested dosage (4 g/24 h), but its overdose (up 2.5 g/kg) can cause severe injuries human body, including renal injury. APAP has various toxic effects on nephrons, as it leads an excessive free radical generation that, in turn, results a disturbance redox homeostasis of cells, causing oxidative stress. To replenish this stress, there ultimate urge for natural...

10.3390/app13063925 article EN cc-by Applied Sciences 2023-03-20

&lt;abstract&gt; &lt;p&gt;Elliptic curve (EC) cryptography supplies an efficient, secure, and lightweight method for executing computer cryptographic protocols. Its widespread use in various applications, including secure communications, digital signatures, key agreement protocols, highlights its importance modern computing. Moreover, EC-based image encryption is gaining popularity as it offers strong protection with a relatively smaller size than other famous cryptosystems. Inspired by...

10.3934/math.2024278 article EN cc-by AIMS Mathematics 2024-01-01

The elliptic curve (EC) offers a well-organized and secure method for implementing cryptographic protocols in computer systems. Its broad utilization various applications, such as ensuring communications, digital signatures, key agreement protocols, underscores its significance contemporary computing. In this article, we employed EC over binary extension field (BEF), choice that not only maintains security but also reduces computational overhead when compared to the use of large prime...

10.1109/access.2024.3385677 article EN cc-by-nc-nd IEEE Access 2024-01-01

The deployment of Agriculture 4.0 depends heavily on the adoption Internet Things (IoT) and wireless sensors for increasing productivity reducing costs cultivation. Wearable plant (WPS), an IoT variant, can greatly optimize agricultural yields, sense early indications disease, reduce waste minimize environmental concerns. Nonetheless, induction WPS into fields always remains precarious its open nature. We witness many or insecure due to their vulnerability known attacks. Most these protocols...

10.1109/jsen.2024.3402538 article EN IEEE Sensors Journal 2024-05-23

Grape cultivation faces various challenges, such as pests, management, fertilizer quality, and diseases caused by bacteria, fungi, viruses. Notably, powdery mildew blotches are significant with different features, necessitating an accurate detection system to minimize crop losses. While traditional methods involve capturing images of diseased leaves, this research proposes a smart approach using deep learning machine algorithms analyze taken strategically placed cameras on farms. The aims...

10.1109/access.2024.3430190 article EN cc-by-nc-nd IEEE Access 2024-01-01

The final year project (FYP) is considered a capstone course in information technology (IT) programmes and involves the development of software product. Currently, students are using traditional life cycle approach to manage their FYPs. However, this can cause many difficulties. This paper proposes an alternative model for managing FYP IT IT-related degree study. First, benchmarking exercise was undertaken compare developed business purposes with that educational purposes, which took into...

10.3991/ijet.v15i21.15401 article EN International Journal of Emerging Technologies in Learning (iJET) 2020-11-16

&lt;abstract&gt;&lt;p&gt;This paper investigates the global asymptotic stability problem for a class of Takagi-Sugeno fuzzy Clifford-valued delayed neural networks with impulsive effects and leakage delays using system decomposition method. By applying theory, we first consider general form networks. Then, decompose considered $ n $-dimensional systems into 2^mn real-valued in order to avoid inconvenience caused by non-commutativity multiplication Clifford numbers. Lyapunov-Krasovskii...

10.3934/math.2023774 article EN cc-by AIMS Mathematics 2023-01-01

With the massive outbreak of coronavirus (COVID-19) disease, demand for automatic and quick detection COVID-19 has become a crucial challenge scientists around world. Many researchers are working on finding an automated effective system detecting COVID-19. They have found that computed tomography (CT-scan) X-ray images infected patients can provide more accurate faster results. In this paper, is proposed named as COV-CTX which detect from CT-scan images. The consists three different CNN...

10.3991/ijoe.v19i09.38147 article EN International Journal of Online and Biomedical Engineering (iJOE) 2023-07-07

In block ciphers, the nonlinear components, also known as substitution boxes (S-boxes), are used with purpose to induce confusion in cryptosystems.For last decade, most of work on designing S-boxes over points elliptic curves, chaotic maps, and Gaussian integers has been published.The main these studies is hide data improve security levels crypto algorithms.In this work, we design pair components a cipher residue class Eisenstein (EI).The fascinating features structure provide at time by...

10.32604/cmc.2023.039013 article EN Computers, materials & continua/Computers, materials & continua (Print) 2023-01-01
Coming Soon ...