- IoT and Edge/Fog Computing
- Network Security and Intrusion Detection
- Advanced Malware Detection Techniques
- IPv6, Mobility, Handover, Networks, Security
- Network Packet Processing and Optimization
- Blockchain Technology Applications and Security
- Context-Aware Activity Recognition Systems
- Internet of Things and AI
- User Authentication and Security Systems
- Information and Cyber Security
- Cloud Data Security Solutions
- Non-Invasive Vital Sign Monitoring
- ECG Monitoring and Analysis
- Digital Transformation in Industry
- Education Systems and Policy
- Security in Wireless Sensor Networks
- Wireless Networks and Protocols
- Dementia and Cognitive Impairment Research
- Physical Unclonable Functions (PUFs) and Hardware Security
- Higher Education Learning Practices
- Software-Defined Networks and 5G
- IoT-based Smart Home Systems
- Energy Efficient Wireless Sensor Networks
- Internet Traffic Analysis and Secure E-voting
- Machine Learning in Healthcare
Kingdom University
2024-2025
Universiti Sains Malaysia
2014-2022
University of Malaya
2021
Singapore University of Technology and Design
2018-2020
Iqra University
2012
In the coming years, technology will impact learning experience in many ways. Internet of Things (IoT) continues to confirm its important position context Information and Communication Technologies development society. With support IoT, institutions can enhance outcomes by providing more affluent experiences, improved operational efficiency, gaining real-time, actionable insight into student performance. The purpose this study is find out potential IoT higher education how maximize benefits...
Alzheimer's disease (AD) is a progressive, incurable condition leading to decline of nerve cells and cognitive functions over time. Early detection essential for improving quality life, as treatment strategies aim decelerate its progression. AD also impacts fine motor control, including handwriting. Utilizing machine learning (ML) with efficient data analysis methods early through handwriting holds considerable promise clinical diagnosis, albeit challenging undertaking. In this study, we...
In the context of Alzheimer's disease (AD), timely identification is paramount for effective management, acknowledging its chronic and irreversible nature, where medications can only impede progression. Our study introduces a holistic solution, leveraging hippocampus VGG16 model with transfer learning early AD detection. The hippocampus, pivotal affected region linked to memory, plays central role in classifying patients into three categories: cognitively normal (CN), representing...
As the world is moving towards Internet of Things, smart home now rapidly becoming a reality. Home appliances and devices are interconnected, i.e., area network, via proprietary or standard TCP/IP protocols allowing for better management monitoring. Nevertheless, as with any form also prone to security threats vulnerabilities. This paper aims at presenting importance in environment. Herein, we will discuss (a) concepts environment, (b) various communication mechanisms, (c) challenges...
The internet of things (IoT) technology can be nowadays used to track user activity in daily living and health-related quality life. IoT healthcare sensors play a great role reducing costs. It helps users assess their health progression. Nonetheless, these solutions add security challenges due direct access numerous personal information close integration into activities. As such, this is always viable target for cybercriminals. More importantly, any adversarial attacks on an individual node...
Stress negatively impacts health, contributing to hypertension, cardiovascular diseases, and immune dysfunction. While conventional diagnostic methods, such as self-reported questionnaires basic physiological measurements, often lack the objectivity precision needed for effective stress management, wearable devices present a promising avenue early detection management. This study conducts three-stage validation of technology monitoring, transitioning from controlled experimental data...
Alzheimer’s disease (AD) is a persistent neurologic disorder that has no cure. For successful treatment to be implemented, it essential diagnose AD at an early stage, which may occur up eight years before dementia manifests. In this regard, new predictive machine learning model proposed works in two stages and takes advantage of both unsupervised supervised approaches provide fast, affordable, yet accurate solution. The first stage involved fuzzy partitioning gold-standard dataset, DARWIN...
Botnet-based Distributed Denial of Service (DDoS) attacks are considered as the main concerns and problems today's Internet. The damage these very serious since number computers involved in is huge distributed worldwide. However, many protocols such Domain Name System (DNS) have several security vulnerabilities nowadays that utilized by botnet attackers. amplification most popular Internet which require robust hardware software for assurance. In this paper, we provide an overview...
The use of technology in healthcare is one the most critical application areas today. With development medical applications, people's quality life has improved. However, it impractical and unnecessary for medium-risk people to receive specialized daily hospital monitoring. Due their health status, they will be exposed a high risk severe damage or even life-threatening conditions without Therefore, remote, real-time, low-cost, wearable, effective monitoring ideal this problem. Many...
Internet Protocol version 6 (IPv6) is currently being deployed progressively around the world and soon will become de facto IP communication standard. Nevertheless, due to nature of protocol design IPv6, it has brought about various security issues. One issues relates leveraging vulnerability that exists in way Duplicate Address Detection (DAD) process carried out leading Denial or Service (DoS) attacks. Such attacks can render whole network non-functional. Several mechanisms have been...
Industry 4.0 as a driving force is making huge strides, particularly in the manufacturing sector, where all integral components involved production processes are getting digitally interconnected. Fused with improved automation and robotics, machine learning, artificial intelligence, big data, cloud computing, Internet of Things (IoT), this open network interconnectivity makes industrial systems increasingly vulnerable to cyber-attacks. While impacts intentions cyber-attacks vary, they always...
Cloud computing is the next revolution in Information and Communication Technology arena. It a model which delivered as commoditized service similar to electricity, water telecommunication. provides software, platform, infrastructure other hybrid models are subscription-based services customers pay based on usage. Nevertheless, security one of main factors that inhibit proliferation cloud computing. Economic Denial Sustainability (EDoS) new breed economical threats Unlike traditional...
From the days of ARPANET, with slightly over two hundred connected hosts involving five organizations to a massive global, always-on network connecting in billions, Internet has become as important need for electricity and water. Protocol version 4 (IPv4) could not sustain growth Internet. In ensuring is stunted, new protocol, i.e. 6 (IPv6) was introduced that resolves addressing issue IPv4 had. addition, IPv6 also laden features capabilities. One them being address auto-configuration. This...
In this paper, we compare problems of cluster formation and cluster-head selection between different protocols for data aggregation transmission. We focus on two aspects the problem: (i) how to guess number clusters required proficiently consume available sources a sensor network, (ii) select cluster-heads cover up networks more proficiently. A in Wireless Sensor Networks (WSNs) can communicate directly only with other sensors that are within radio range cluster. However, order enable...
Cloud computing (CC) is the next revolution in Information and Communication Technology arena. CC often provided as a service comparable to utility services such electricity, water, telecommunications. providers (CSP) offers tailored which are delivered subscription-based services, customers pay based on usage. Many organizations have started shifting from traditional server-cluster infrastructure cloud-based infrastructure. Nevertheless, security one of main factors that inhibit...
IPv6 deployment is currently under way at a rapid pace. introduced new features and capabilities lacking in IPv4 but as with any technology, there are always security risks challenges that need to be addressed. Duplicate Address Detection (DAD) part of IPv6’s Network Discovery Protocol vulnerable threats such as: Spoofing, Denial Service (DoS). This survey paper, aims present various techniques were mitigate highlight the limitations techniques. Herein, we will discuss a) concepts Neighbor...
IPv6 was designed to replace the existing Internet Protocol, that is, IPv4. The main advantage of over IPv4 is vastness address space. In addition, various improvements were brought drawbacks in Nevertheless, as with any new technology, suffers from security vulnerabilities. One vulnerabilities discovered allows Denial Service Attack using Duplicate Address Detection mechanism. order study and analyse this attack, an testbed implemented. This paper presents our experience deployment...