- Network Security and Intrusion Detection
- Advancements in Semiconductor Devices and Circuit Design
- Mobile Ad Hoc Networks
- Translation Studies and Practices
- Microgrid Control and Optimization
- Optical Network Technologies
- Low-power high-performance VLSI design
- Advanced Malware Detection Techniques
- Smart Grid Security and Resilience
- Quantum-Dot Cellular Automata
- Electricity Theft Detection Techniques
- Photonic and Optical Devices
- Energy Efficient Wireless Sensor Networks
- Smart Grid Energy Management
- Security in Wireless Sensor Networks
- Software-Defined Networks and 5G
- Advanced Photonic Communication Systems
Lebanese University
2024
Beirut Arab University
2015-2024
American University of Kuwait
2022
Lifetime of a node is critical concern in wireless sensor network (WSN). Nowadays networks are becoming large, so data collected even larger, which all consume great amount energy leading to an early death node. Therefore, researches done minimize the used sampling and collection prolong life time network. Through years several routing protocols proposed enhanced. In this paper we introduce factors consider before choosing implementing protocol.
Electricity or what some call as the miracle of modern technology is considered a nightmare in Lebanon due to shortage supply, high cost and environmental impact. This indignation can be treated by new trend power systems integrating hybrid sources, smart meters, reliable grid, fair fees efficient management. development facing lot challenges throughout its modules layers. Different artificial intelligent algorithms techniques are introduced integrate generation control & management system...
This work proposes models for a L-trit TMUL (Ternary Multiplier) and THA (Half-Adder) using TMUXs Multiplexers) unary operators. The target of the proposed designs is to minimize energy consumption in nanoscale embedded circuits improve their battery usage. To achieve that, different techniques are used: 32-nm CNTFET tranisistor, Multiple-Valued Logic (MVL), two voltage supplies <tex xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">$(V_{dd},\...
This paper presents a novel approach to detect SYN flood Distributed Denial of Service (DDoS) attacks using the ResNet-50 architecture. DDoS attacks, known for their ability disrupt normal network traffic through overwhelming floods, have evolved in complexity, rendering traditional detection methods inadequate. Our methodology is threefold: data acquisition from both simulated and real-world environments, processing where converted into 2D images, attack Convolutional Neural Network model....
Software-Defined Networking (SDN) revolutionizes network management by decoupling control plane functionality from data devices, enabling the centralized and programmability of behavior. This paper uses ternary system to improve Central Processing Unit (CPU) inside SDN controller enhance management. The Multiple-Valued Logic (MVL) circuit shows remarkable improvement compared binary regarding chip area, propagation delay, energy consumption. Moreover, Carbon Nanotube Field-Effect Transistor...
The study reported on here used a corpus approach to identify approaches the translation of English nonfiction titles into Arabic. quantitative analysis shows that literal takes first seat featuring 76% in corpus. other include employment related words (9%), paraphrase/explication (7%), transliteration alone and adaptation (1%). qualitative revealed title can be critical challenging task bounded by linguistic socio-cultural factors, as well commercial interests ethical considerations...
deep neural network driven architecture for real time posture rectification Implementation of a WGAN-GP Human Pose Transfer using 3-channel pose representation Traffic sign recognition and distance estimation with YOLOv3 model Deep, Vikas