- Network Security and Intrusion Detection
- Energy Efficient Wireless Sensor Networks
- Advanced Malware Detection Techniques
- Energy Harvesting in Wireless Networks
- Vehicular Ad Hoc Networks (VANETs)
- Advanced Battery Technologies Research
- Advanced Authentication Protocols Security
- Cryptography and Data Security
- Speech Recognition and Synthesis
- EEG and Brain-Computer Interfaces
- Natural Language Processing Techniques
- User Authentication and Security Systems
- Digital Media Forensic Detection
- Underwater Vehicles and Communication Systems
- Advancements in Battery Materials
- Spam and Phishing Detection
- Electric Vehicles and Infrastructure
- Music and Audio Processing
- Cloud Data Security Solutions
- Cryptographic Implementations and Security
- IoT and Edge/Fog Computing
- Gaze Tracking and Assistive Technology
- Privacy-Preserving Technologies in Data
- Speech and Audio Processing
- Robotics and Sensor-Based Localization
University of Malaya
2016-2025
ORCID
2022
Information Technology University
2006-2018
Universiti Sains Islam Malaysia
2008-2009
With the increasing demand for Lithium-ion batteries in an electric vehicle (EV), it is always crucial to develop a highly accurate and low-cost state estimation method battery management system (BMS). Presently, dual extended Kalman filter (DEKF) extensively utilized online SOC estimation. However, problem of model parameter divergence from true value greatly affects accuracy under realistic dynamic loading conditions. In this paper, new forgetting factor-based adaptive (DFFAEKF) proposed...
Internet of Drones (IoD) is a decentralized network and management framework that links drones' access to the controlled airspace provides inter-location navigation services. The interconnection drones in IoD through Things (IoT). Hence vulnerable all security privacy threats affect IoT networks. It highly required safeguard good atmosphere free from get desired performance applications. Security issues have significantly restricted overall influence paradigm. There are existing survey...
Fog computing is a paradigm that extends cloud and services to the edge of network in order address inherent problems cloud, such as latency lack mobility support location-awareness. The fog decentralized platform capable operating processing data locally can be installed heterogeneous hardware which makes it ideal for Internet Things (IoT) applications. Intrusion Detection Systems (IDSs) are an integral part any security system IoT networks ensure quality service. Due resource limitations...
Prior 6LoWPAN intrusion detection system (IDS) utilized several features to detect various malicious activities. However, these IDS methods only specific attack but fails when the attacks are combined. In this paper, we propose an known as compression header analyzer (CHA-IDS) that analyzes data mitigate individual and combination routing attacks. CHA-IDS is a multi-agent framework capture manage raw for collection, analysis, actions. The proposed utilize best first greedy stepwise with...
Internet of Things (IoT) facilitates the integration between objects and different sensors to provide communication among them without human intervention. However, extensive demand for IoT its various applications has continued grow, coupled with need achieve foolproof security requirements. produces a vast amount data under several constraints such as low processor, power, memory. These constraints, along invaluable produced by devices, make vulnerable attacks. This paper presents an...
In developing an efficient battery management system (BMS), accurate and computationally states estimation algorithm is always required. this work, the highly model-based state of X (SOX) method proposed to concurrently estimate different such as charge (SOC), energy (SOE), power (SOP), health (SOH). First, SOC SOE performed using a new joint method, developed multi-time scale dual extended Kalman filter (DEKF). Then, SOP T-method 2RC model evaluate non-instantaneous peak during...
Purpose The purpose of this paper is to highlight the advantages a simplified algorithm solve problem heat and mass transfer in porous medium by reducing number partial differential equations from four three. Design/methodology/approach approach present develop reduce involved conjugate medium. Findings Developed algorithm/method has many over conventional method solution for Research limitations/implications current work applicable problem. Practical implications developed useful be solved,...
The current work highlights the effect of radiation on conjugate heat and mass transfer in a square porous cavity having solid wall. wall is placed at center cavity. left surface maintained higher temperature Tw concentration Cw whereas right Tc Cc such that Tw>Tc Cw>Cc. top bottom surfaces are adiabatic. governing equations solved with help finite element method by making use triangular elements. results discussed respect to two different heights inside medium along parameter.
Security and privacy are among the most critical challenges on internet of drones (IoD) network. The communication entities IoD network can communicate securely with use authenticated key agreement (AKA) based techniques. However, design such techniques must balance tradeoff between security lightweight features. Recently, Chen et al. proposed an authentication sharing scheme for deployment. It is, however, realized after scrutiny that technique is vulnerable to attacks under well-accepted...
This paper proposes a new meta-heuristic optimization approach, called "Sperm Swarm Optimization (SSO)". The underlying ideas and concepts behind the proposed method are inspired by sperm motility to fertilize egg. In SSO, swarm moves forward from low-temperature zone Cervix. During this direction, searches for high-temperature Fallopian Tubes where egg is waiting fertilization in zone, which area considered as optimal solution. SSO tested with optimizing several objective functions that...
In this article, a Host-Based Intrusion Detection System (HIDS) using Modified Vector Space Representation (MVSR) N-gram and Multilayer Perceptron (MLP) model for securing the Internet of Things (IoT), based on lightweight techniques Fog Computing devices, is proposed. The Australian Defence Force Academy Linux Dataset (ADFA-LD), which contains exploits attacks various applications, employed analysis. proposed method divided into feature extraction stage, selection classification modeling....
The vehicular network is a collection of vehicles and other components facilitated with versatile sensors to communicate, which backboned by authentication. Present authentication protocols focus on either the lightweight feature or security. On hand, privacy during essential. Moreover, existing schemes are dependent trusted authority for checking legitimacy communicating node, suffers from infrastructure-less scenario. Alternatively, secure communication channel registration phase. To...
In recent years, wireless sensor networks (WSNs) have been growing rapidly because of their ability to sense data, communicate wirelessly, and compute data efficiently. These contain small low-powered nodes that organize configure themselves carry out functions. Even though WSNs are cheap, easy deploy, flexible, efficient, there some challenges in terms energy efficiency network lifetime. Clustering is the most reliable solution for challenges, which grouped into few clusters, a cluster head...
Technological advancement of various video and image processing tools has made tempering digital easy faster. This review paper focuses on passive techniques that are employed for detecting forgeries in a video. Passive forgery detection methods used the authenticity without depending pre-embedded information. The exploit use statistical or mathematical properties distorted as result detection. approach great prospect multimedia security, information security pattern recognition. In this...