Hussain Al-Aqrabi

ORCID: 0000-0003-1920-7418
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cloud Data Security Solutions
  • Big Data and Business Intelligence
  • IoT and Edge/Fog Computing
  • Blockchain Technology Applications and Security
  • Cloud Computing and Resource Management
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Digital Transformation in Industry
  • Industrial Vision Systems and Defect Detection
  • Security and Verification in Computing
  • Advanced Database Systems and Queries
  • User Authentication and Security Systems
  • Advanced Authentication Protocols Security
  • Energy Efficient Wireless Sensor Networks
  • Photovoltaic System Optimization Techniques
  • Cryptography and Data Security
  • Mobile Ad Hoc Networks
  • Advanced Memory and Neural Computing
  • Smart Agriculture and AI
  • Caching and Content Delivery
  • Advanced Neural Network Applications
  • Mobile Agent-Based Network Management
  • Neuroscience and Neural Engineering
  • Privacy-Preserving Technologies in Data
  • Opportunistic and Delay-Tolerant Networks
  • Peer-to-Peer Network Technologies

Higher Colleges of Technology
2022-2025

University of Huddersfield
2018-2024

University of Derby
2012-2020

Pallet racking is an essential element within warehouses, distribution centers, and manufacturing facilities. To guarantee its safe operation as well stock protection personnel safety, pallet requires continuous inspections timely maintenance in the case of damage being discovered. Conventionally, a rack inspection manual quality process completed by certified inspectors. The results operational down-time certification costs undiscovered due to human error. Inspired trend toward smart...

10.3390/s22186927 article EN cc-by Sensors 2022-09-13

10.1016/j.jcss.2014.06.013 article EN publisher-specific-oa Journal of Computer and System Sciences 2014-06-25

Abstract Widespread adoption of smart IoT devices is accelerating research for new techniques to make applications secure, scalable, energy-efficient, and capable working in mission-critical use cases, which require an ability function offline. In this context, the novel combination distributed ledger technology (DLT) intelligence (DI) seen as a practical route towards decentralisation architectures. This paper surveys DI commences by briefly explaining need DI, proposing comprehensive...

10.1007/s42979-021-00677-7 article EN cc-by SN Computer Science 2021-05-19

The search algorithm based on symbiotic organisms' interactions is a relatively recent bio-inspired of the swarm intelligence field for solving numerical optimization problems. It meant to optimize applications simulation relationship among distinct species in ecosystem. task scheduling problem NP complete, which makes it hard obtain correct solution, especially large-scale tasks. This paper proposes modified organisms search-based efficient mapping heterogeneous tasks access cloud resources...

10.3390/s22041674 article EN cc-by Sensors 2022-02-21

The Internet of Things (IoT) has had a tremendous impact on the evolution and adoption information communication technology. In modern world, data are generated by individuals collected automatically physical objects that fitted with electronics, sensors, network connectivity. IoT sensor networks have become integral aspects environmental monitoring systems. However, from devices usually incomplete due to various reasons such as failures, drifts, faults other operational issues. presence or...

10.3390/fi14050143 article EN cc-by Future Internet 2022-05-06

This paper presents a framework for photovoltaic (PV) fault detection based on statistical, supervised, and unsupervised machine learning (ML) approaches. The research is motivated by need to develop cost-effective solution that detects the types within PV systems real dataset with minimum number of input features. We discover appropriate conditions method selection establish how minimize computational demand from different ML Subsequently, labeled as result clustering classification....

10.3390/en15155492 article EN cc-by Energies 2022-07-29

Photovoltaic cell manufacturing is a rigorous process involving many stages where the surface exposed to external pressure and temperature differentials. This provides fertile ground for micro-cracks develop on surface. At present, domain experts carry out manual inspection of judge if any are present. research looks overcome issue data scarcity through proposed filter-induced augmentations, thus providing developers with an effective, cost-free mechanism generating representative samples....

10.3390/en15228667 article EN cc-by Energies 2022-11-18

This paper presents a framework for the automated detection of Exudates, an early sign Diabetic Retinopathy. The introduces classification-extraction-superimposition (CES) mechanism enabling generation representative exudate samples based on limited open-source samples. demonstrates how manipulation Yolov5M output vector can be utilized extraction and super-imposition, segueing into development custom CNN architecture focused classification in retinal fundus images. performance proposed is...

10.1109/access.2022.3205738 article EN cc-by IEEE Access 2022-09-12

Data visualization is a powerful skill for the demonstration of meaningful data insights in an interactive and effective way. In this survey article, we collected 70 articles from last five years (2017-2022) to identify, classify, investigate various scopes, aspects theories visualization. We also investigated applications domains fields such as apps health sector, Internet things (IoTs), business dashboards, urban traffic management, smart buildings environmental However, after thorough...

10.1109/access.2022.3205115 article EN cc-by IEEE Access 2022-01-01

Rice is a widely consumed food across the world. Whilst world recovers from COVID-19, manufacturers are looking to enhance their quality inspection processes for satisfying exportation requirements and providing safety assurance clients. cultivation significant process, yield of which can be significantly impacted in an adverse manner due plant disease. Yet, large portion rice takes place developing countries with less stringent protocols various reasons including cost labor. To address...

10.3390/foods11233914 article EN cc-by Foods 2022-12-04

The prediction of energy consumption plays a significant role in conservation and reducing the cost power generation, to improve sustainability economic stability. Current studies show an increased interest application Machine Learning algorithms forecast utilisation smart homes. performance these is evaluated using accuracy algorithms. process manually selecting best-performing still very challenging for data analysts decision makers because might not work well different use case or...

10.1109/access.2023.3287145 article EN cc-by-nc-nd IEEE Access 2023-01-01

The key security challenges and solutions on the cloud have been investigated in this paper with help of literature reviews an experimental model created OPNET that is simulated to produce useful statistics establish approach computing service providers should take provide optimal compliance. literatures recommend concept Security-as-a-Service using unified threat management (UTM) for ensuring secured services cloud. Through simulation results, has demonstrated UTM may not be a feasible...

10.1109/isorcw.2012.31 article EN 2012-04-01

As the World moves towards renewable energy, photovoltaic modules are a fundamental option due to their green nature. However, manufacturing process of solar cells is complex and vulnerable discrepancies which can impact overall performance system. Although human-led inspection seen as de-facto quality protocol, issues pertaining bias, cost time make it an expensive process. To this effect, paper focuses on development custom convolutional architecture that lightweight, hence deployable...

10.1109/itt59889.2023.10184236 article EN 2023-05-24

Cloud computing is gradually gaining popularity among businesses due to its distinct advantages over self-hosted IT infrastructures. The software-as-a-service providers are serving as the primary interfacing business users community. However, strategies and methods for hosting mission critical intelligence (BI) applications on cloud still being researched. BI a highly resource intensive system requiring large scale parallel processing significant storage capacities host data warehouses. OLAP...

10.1109/hpcc.2012.138 article EN 2012-06-01

Live virtual machine migration is a technique often used to migrate an entire OS with running applications in non-disruptive fashion. Prior works concerned one-to-one live many techniques have been proposed such as pre-copy, post-copy and log/replay. In contrast, we propose VMScatter, one-to-many method machines from one other hosts simultaneously. First, by merging the identical pages within or across machines, VMScatter multicasts only single copy of these associated target for avoiding...

10.1145/2451512.2451528 article EN 2013-03-16

In recent research developments, the application of mobile agents (MAs) has attracted extensive in wireless sensor networks (WSNs) due to unique benefits it offers, such as energy conservation, network bandwidth saving, and flexibility open usage for various WSN applications. The majority proposed ideas on dynamic itinerary planning agent-based algorithms are efficient when dealing with node failure a result depletion. However, they generate inefficient groups MAs itineraries, which...

10.3390/s22208037 article EN cc-by Sensors 2022-10-21

Business Intelligence (BI) has gained a new lease of life through Cloud computing as its demand for unlimited hardware and platform resources expandability is fulfilled by the elasticity features. BI can be seamlessly deployed on given that multilayered model coincides with models. It considered many service providers one prominent applications services public, outsourced private community Clouds. However, in shared domains computing, exposed to security privacy threats virtue exploits,...

10.1109/hpcc.2014.83 article EN 2014-08-01

Approaches to the provision of data analytics for businesses offer methods analyse and model data, enabling informed decision making improve business performance profitability. Typically, processing is an intensive task demand insight, on-demand, means that organisations make use elastic cloud provisioned resources host such services. However, within shared domains multi-tenant computing, models are exposed greater security threats compromised privacy, since unauthorised user may be able...

10.1109/hpcc/smartcity/dss.2018.00127 article EN 2018-06-01
Coming Soon ...