- Advanced Steganography and Watermarking Techniques
- Digital Media Forensic Detection
- Network Security and Intrusion Detection
- Chaos-based Image/Signal Encryption
- Anomaly Detection Techniques and Applications
- Security in Wireless Sensor Networks
- IoT and Edge/Fog Computing
- Wireless Body Area Networks
- Energy Efficient Wireless Sensor Networks
- Advanced Malware Detection Techniques
- Air Quality Monitoring and Forecasting
- Advanced Chemical Sensor Technologies
- Internet Traffic Analysis and Secure E-voting
- Biometric Identification and Security
- Software-Defined Networks and 5G
- Caching and Content Delivery
- Indoor and Outdoor Localization Technologies
- Image and Video Quality Assessment
- User Authentication and Security Systems
- Smart Grid Energy Management
- Solar-Powered Water Purification Methods
- Spam and Phishing Detection
- Automated Road and Building Extraction
- Advanced Authentication Protocols Security
- Face recognition and analysis
Saudi Electronic University
2020-2024
Umm al-Qura University
2019
University of Technology Sydney
2014-2018
Information Technology University
2017
Wireless Sensor Networks (WSNs) play a critical role in numerous applications, and the accurate localization of sensor nodes is vital for their effective operation. In recent years, optimization algorithms have garnered significant attention as means to enhance WSN node localization. This paper presents an in-depth exploration necessity offers comprehensive review used this purpose. The encompasses diverse range techniques, including evolutionary algorithms, swarm intelligence, metaheuristic...
Software-defined networking (SDN) is an innovative architecture that separates the control plane from data to simplify and speed up management of large networks. This means logic has been moved network hardware level centralized level. Therefore, use OpenFlow Discovery Protocol (OFDP) one most common protocols used discover topology in a then transmit it for management. However, OFDP various shortcomings its performance such as exchanging too many messages between both levels (control data),...
Information security is considered one of the most important issues in various infrastructures related to field data communication where modern studies focus on finding effective and low-weight secure approaches. Digital watermarking a trend techniques that hides by using embedding extraction processes. Watermarking technology integrated into different frames without adding an overheard as conventional encryption. Therefore, it efficient be used encryption for applications run over limited...
Digital healthcare applications are part of the Industry 4.0 which is based on smart devices and trustworthy communications technology. The concept Digital-care providing a permanent connection between patient medical department (medical staff), ability to analyze patient's data automatically. With existence modern wireless networks, support, for example, Internet Things (IoT), cloud computing, virtual reality, machine, low-power networks it possible achieve this while maintaining...
In stenography, embedding data within an image has a trade-off between quality and capacity. Specifically, the more are concealed carrier image, further distortion suffers, causing decline in resultant stego quality. Embedding high capacity of into while preserving can be seen as optimization problem. this paper, we propose novel spatial steganography scheme using genetic algorithms (GAs). Our utilizes new operations to increase least significant bits (LSB) matching which results increased...
Energy and security remain the main two challenges in Wireless Sensor Networks (WSNs). Therefore, protecting these WSN networks from Denial of Service (DoS) Distributed DoS (DDoS) is one tasks. Traditional packet deep scan systems that rely on open field inspection transport layer packets encryption trend are making machine learning-based only viable choice for types attacks. This paper contributes to evaluation use learning algorithms nodes traffic their effect network life time. We...
Wireless Sensor Networks (WSNs) continue to face two major challenges: energy and security. As a consequence, one of the WSN-related security tasks is protect them from Denial Service (DoS) Distributed DoS (DDoS) attacks. Machine learning-based systems are only viable option for these types attacks, as traditional packet deep scan depend on open field inspection in transport layer packets encryption trend. Moreover, network data traffic will become more complex due increases amount...
Forest fires caused by different environmental and human factors are responsible for the extensive destruction of natural economic resources. Modern machine learning techniques have become popular in developing very accurate precise susceptibility maps various disasters to help reduce occurrence such calamities. The present study has applied tested multiple algorithms map areas susceptible wildfire Mediterranean Region Turkey. Besides, performance XGBoost, CatBoost, Gradient Boost, AdaBoost,...
The increasing use of low-cost sensors in monitoring the surrounding environment requires efficient handling sensor drift and errors. Therefore, there is a pressing need to develop lightweight methods determine calibrate sensor's readings accurately. This article focuses on calibration using techniques effectively detect correct drifts. proposed approach combines clustering, which offloads computational burdens cluster heads, with temporal spatial estimation among neighboring sensors, such...
Wireless Sensor Networks (WSNs) are the core of Internet Things (IoT) technology, as they will be used in various applications near future. The issue security and power consumption is still one most important challenges facing this type network. 6LoWPAN protocol was developed to meet these networks with limited resources. uses a hierarchical topology traditional method encryption key management, keeping levels high. Therefore, paper, technique has been that helps balancing energy by...
Wireless Sensor Networks (WSNs) have become instrumental in environmental monitoring, healthcare, agriculture, and industrial automation. In WSNs, the precise localization of sensor nodes is crucial for informed decision-making network efficiency. This study explores context focusing on 6LoWPAN Zigbee protocols. These protocols are vital integrating WSNs into Internet Things (IoT). We highlight significance spatial node distribution WSNs' challenges, such as resource limitations signal...
Accurately delineating building footprints from optical satellite imagery presents a formidable challenge, particularly in urban settings characterized by intricate and diverse structures. Consequently, enhancing the utility of these images for geospatial data updates demands meticulous refinement. Machine learning algorithms have made notable contributions this context, yet pursuit precision remains an ongoing challenge. This paper aims to enhance accuracy footprint extraction through...
Computer scientists and engineers work with increasing amounts of information. These data are used for knowledge retrieval, management decision support so on. Sorting algorithms important procedures that if efficiently composed implemented can increase speed processing correctness. Many various sorting their modifications applicable in large computer systems. However, as the architectures more efficient each release software is complex version there need to improve methods applied big computation.
The global pandemic of novel coronavirus that started in 2019 has seriously affected daily lives and placed everyone a panic condition. Widespread led to the adoption social distancing people avoiding unnecessary physical contact with each other. present situation advocates requirement contactless biometric system could be used future authentication systems which makes fingerprint-based person identification ineffective. Periocular is solution because it does not require able identify...
As soon as digital artifacts have become a part and parcel of everyday life, the need for media archives with capacity preserving given metadata has risen impressively. The process converting to archives, however, is fraught number difficulties, key one concerning methodology embedding high payload information into multimedia at same time retains quality image. paper will consider steganography possible solution aforementioned issue. Allowing detecting genetic algorithm boosting PSNR value...
Vision 2030 requires a new generation of people with wide variety abilities, talents, and skills. The adoption augmented reality (AR) virtual is one possible way to align education 2030. Immersive technologies like AR are rapidly becoming powerful versatile enough be adopted in achieve this goal. Technologies such as could beneficial tools enhance maintainable growth education. We reviewed the most recent studies check its appropriateness aligning educational goals First, various...
The main goal of hiding data is to conceal the very existence hidden information, therefore there a significant demand for steganographic approaches that can ensure imperceptibility such infromation. However, limited corresponding evaluation parameters available. Most studies use Peak Signal Noise Ratio (PSNR) as metric evaluation, although it could provide less accurate results than Human Visual System (HVS) evaluation. This paper provides review existent metrics are used assess quality...
Abstract The report revolve on building construction engineering and management, in which there are a lot of requirements such as well supervision accuracy being position to forecast uncertainties that may arise mechanisms solve them. It also focuses the way can minimise cost wastages materials. project will be based heuristic methods Artificial Intelligence (AI). There various evolution methods, but focus two experiments Pattern Recognition Travelling Salesman Problem (TSP). Evolutionary...