Adnan Nadeem Al Hassan

Adnan Nadeem Al Hassan
Islamic University of Medina · Department of Information Technology

PhD (University of Surrey, UK), MCS, FHEA(UK), BSc (CS)

About

98
Publications
101,288
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,119
Citations
Introduction
Dr. Adnan Nadeem received his Ph.D. degree from the Institute for Communication Systems, the University of Surrey in the U.K in 2011. He is an associate professor in the Faculty of Computer and Information System (FCIS), Islamic University of Madinah. He has published more than 75 research papers in international journals and conferences and one registered patent, its total Impact Factor is 54.17. He has more than 1200 citations of his work. He has also received several awards & Research Grants.
Additional affiliations
January 2018 - present
Islamic University of Medina
Position
  • Professor (Associate)
March 2014 - February 2015
Federal Urdu University of Arts, Science and Technology
Position
  • In Charge Department
April 2007 - January 2011
University of Surrey
Position
  • PhD Student
Education
April 2007 - December 2010
University of Surrey
Field of study
  • Centre for Communication Systems Resaerch

Publications

Publications (98)
Article
Full-text available
Mobile ad hoc networks (MANETs) are well known to be vulnerable to various attacks due to their lack of centralized control, and their dynamic topology and energy-constrained operation. Much research in securing MANETs has focused on proposals which detect and prevent a specific kind of attack such as sleep deprivation, black hole, grey hole, rushi...
Article
Full-text available
Mobile Ad Hoc Networks are vulnerable to a variety of network layer attacks such as black hole, grey hole, sleep deprivation & rushing attacks. In this paper we present an intrusion detection & adaptive response mechanism for MANETs that detects a range of attacks and provides an effective response with low network degradation. We consider the defi...
Article
Full-text available
In the last decade, mobile ad hoc networks (MANETs) have emerged as a major next generation wireless networking technology. However, MANETs are vulnerable to various attacks at all layers, including in particular the network layer, because the design of most MANET routing protocols assumes that there is no malicious intruder node in the network. In...
Conference Paper
Full-text available
Most of the research in securing mobile ad hoc networks (MANETs) has focused on proposals which detect and prevent a specific kind of attack such as sleep deprivation, black hole, grey hole and rushing attacks. In this paper we broaden our previously developed algorithm AIDP and propose a generalized intrusion detection and prevention mechanism. We...
Article
Full-text available
Locating a missing child or elderly person in a large gathering through face recognition in videos is still challenging because of various dynamic factors. In this paper, we present an intelligent mechanism for tracking missing persons in an unconstrained large gathering scenario of Al-Nabawi Mosque, Madinah, KSA. The proposed mechanism in this pap...
Article
Full-text available
The probability of losing vulnerable companions, such as children or older ones, in large gatherings is high, and their tracking is challenging. We proposed a novel integration of face-recognition algorithms with a soft voting scheme, which was applied, on low-resolution cropped images of detected faces, in order to locate missing persons in a chal...
Article
During the time of the pandemic, travel restrictions have impacted the tourism industry with an estimated loss of more than a trillion USD; however, at the same time, we have seen a significant increase in profits for the industries which empower remote connectivity. Various studies have identified the positive impact of virtual tourism, in which t...
Article
Full-text available
In the last few years, the wireless body area network (WBAN) has emerged as an appealing and viable option in the e-health application domain. WBAN technology is primarily used to offer continuous screening of health data to patients, independent of their location, time, or activity. A WBAN, on the other hand, is vulnerable to different cyberattack...
Article
Full-text available
Abstract—Social media has become one of the most important sources of news in our lives, but the process of validating news and limiting rumors remains an open research issue. Many researchers have suggested using Blockchain to solve this problem, but it has traditionally failed due to the large volume of data and users in such environments. In thi...
Article
Full-text available
The history of the world during the pandemic era shows a worse kind of treatment to the effected people. The year 2020 is known as a terrifying year due to pandemics in the world. It badly exposes the healthcare system's weakness especially in the developing countries like Pakistan. Ambulance services played a major role in transporting affected pe...
Article
Full-text available
Blockchain is a revolutionary technology that is making a great impact on modern society due to its transparency, decentralization, and security properties. Blockchain gained considerable attention due to its very first application of Cryptocurrencies e.g., Bitcoin. In the near future, Blockchain technology is determined to transform the way we liv...
Article
With the rapid growth and commercialization of wearable sensor technology, the research community foresees great potential of Body Area Sensor Network (BASN) applications in the healthcare industry, including elderly healthcare. We consider the issue of fall in elderly, which has severe consequences including death. Most of the related proposals in...
Article
Full-text available
More than two millions of pilgrims visit the holy cities of Makkah and Madinah, in Kingdom of Saudi Arabia, to perform Hajj and Umrah rituals every year. Ensuring safety of the pilgrims is the top priority of Saudi government. Therefore, kingdom considers health, safety and security a red line that is not supposed to be crossed at any extent, consi...
Article
Full-text available
In huge crowd gatherings such as Hajj, the probability of losing personal belongings of the pilgrim is relatively high. The consequences are also severe in some cases for example when someone loses his passport or valuables without which it is difficult to travel back to his country. Therefore, in this paper, we propose modeling and prototype appli...
Conference Paper
Full-text available
Performing various transactions on real estate records in the government organization is a cumbersome task and has many pitfalls. There are a number of problems with the existing land registry systems. First, the process of land registry and transferring of a land is currently manual. Even though, some of the processes and records are digitized, ho...
Conference Paper
Key Management in Delay Tolerant Networks (DTN) still remains an unsolved complex problem. Due to peculiar characteristics of DTN, important challenges that make it difficult to design key management architecture are: 1) no systematic requirement analysis is undertaken to define its components, their composition and prescribed functions; and 2) no...
Article
Full-text available
In huge crowd gatherings such as Hajj, the probability of losing personal belongings of the pilgrim is relatively high. The consequences are also severe in some cases for example when someone loses his passport or valuables without which it is diffi cult to travel back to his country. Therefore, in this paper, we propose modeling and prototype appl...
Article
Full-text available
In huge crowd gatherings such as Hajj, the probability of losing personal belongings of the pilgrim is relatively high. The consequences are also severe in some cases for example when someone loses his passport or valuables without which it is diffi cult to travel back to his country. Therefore, in this paper, we propose modeling and prototype appl...
Article
Full-text available
Transactions related to vehicles include manufacturing, buying, selling, paying insurance(takaful), obtaining regular inspection, leasing a vehicle from banks, getting in an accident, engaging in a traffic violation, calculating price predictions and renting a vehicle. Many people perform transactions related to vehicles in their daily life; transp...
Article
Full-text available
In the past few years, the implementation of blockchain technology for various applications has been widely discussed in the research community and the industry. There are sufficient number of articles that discuss the possibility of applying blockchain technology in various areas, such as, healthcare, IoT, and business. However, in this article, w...
Poster
Full-text available
Improved Hajj and Umrah pilgrim's services is a major target areas in vision 2030 • Huge no of Pilgrims increase chances of loosing their personal belonging or companion • A pilgrim may loose passport without which he/ she cannot travel • No online system is available for reporting lost item and persons • We Propose modelling and prototype applicat...
Article
Full-text available
This paper defines two major data sets 1) from wearable inertial measurement sensors and 2) wearable ECG SHIMMER™ sensors. The first dataset is devised to benchmark techniques dealing with human behavior analysis based on multimodal inertial measurement wearable SHIMMER™ sensors unit during research studies “Fall Detection System for the Elderly Ba...
Article
Full-text available
The annual Islamic pilgrimage, Hajj has become very easy and planned in this era. Authorities in the Kingdom considering to make this Holy event more secure, convenient and controlled by planning strategically and comprehensively. For this, Government launched a program, called Vision 2030. This program intends to facilitate and serve Muslims who g...
Article
Full-text available
Main focus of any organization functioning in today's competitive marketplace is to gain and sustain competitive advantage. With the huge volumes of data stored in databases, data marts and data warehouses coupled with advanced data analysis tools, managers are now in a better position to make smart and effective decisions which result in competiti...
Article
Full-text available
Main focus of any organization functioning in today's competitive marketplace is to gain and sustain competitive advantage. With the huge volumes of data stored in databases, data marts and data warehouses coupled with advanced data analysis tools, managers are now in a better position to make smart and effective decisions which result in competiti...
Data
This is the list of top Elsevier journals [1] related to the research areas of computer science with details of various important parameters including review speed, impact factor, acceptance rate etc. Reference: [1] M. Fanany, "Elsevier computer science Journals list with key parameters" , university Indonesia.
Article
Everything is connected in one way or another in this universe and forms a network such as the internet, biological network (genome network, neural network), physical networks (infrastructure based networks of roads, trains and other communication networks), plant and ecological network, social networks (friendship, coworker, coauthor etc.). Comple...
Article
Full-text available
Fall is one of the major cause of deaths in elderly along with other chronic diseases in all over the world. Therefore, it is important to find a cost effective, non-intrusive and lightweight solution for early fall detection and prevention in elderly. Several fall detection systems have been proposed, using the different types of sensors and techn...
Article
Full-text available
Fall is one of the major cause of deaths in elderly along with other chronic diseases in all over the world. Therefore, it is important to find a cost effective, non-intrusive and lightweight solution for early fall detection and prevention in elderly. Several fall detection systems have been proposed, using the different types of sensors and techn...
Article
Full-text available
Internet of Things (IoT) network are considered the future in monitoring and surveillance. With the advent of autonomous organization, and network and service management, conventional networks are fast integrated with IoT networks. With minimal human interaction, the security of IoT data travelling through the networks becomes more critical. Data P...
Article
Full-text available
Wireless sensor network technology is widely used in the western world for improving agriculture output. However, in the developing countries, the adaptation of technology is very slow due to various factors such as cost and unawareness of farmers with the technology. There are reports in the literature related to the precision agriculture and hope...
Article
Human behavior inference through smart pervasive technologies is a new research avenue. Sophistication in interaction modalities with self-customization based on context makes interaction easier in natural settings. Despite greater sophistication, disabled and elderly person still face difficulties in interaction with smart devices. The interaction...
Article
Full-text available
Wireless Body Area Sensors Networks (BAN) have emerged as new applied wireless networking technology with the development of wearable and implanted sensors. BAN has novel application in healthcare, sports, human activity monitoring, disability assistance and entertain- ment. BAN is now using for real time monitoring and as- sistance of the patients...
Article
Full-text available
One of main reason of road-side accidents (RSA) is the negligence by the driver. Drivers do not concentrate on the road and their surroundings, which would result in deadly accidents both on road and off the road. Using a mobile phone, eating while driving, talking or looking back, and sleeping are some of the activities by drivers that cause these...
Article
Assistive technology has the potential to support persons with dementia (PWDs) in their daily life activities and provide them quality of life services. This paper proposes a novel mechanism in order to manage disorientation or time and place problem of PWD through the use of Bluetooth low energy devices, smart watch and smart phone/ tablet. The pr...
Conference Paper
Full-text available
A Microgrid (MG) is a viable and scalable approach to integrate distributed sources, ensure reliable and secure energy supply to the remote and the mission critical grid. Smarter monitoring, control and energy management is required to ensure economical and reliable operation of the MG. Equipping an MG with smarter sensor for monitoring along with...
Article
Full-text available
MANETs (Mobile Ad-hoc Networks) applications in various walks of life in the last two decades have resulted in introduction of its sub technologies such as VANETs (Vehicular Ad-hoc Network). In this paper, we focus on new ad hoc networking technology called FANET (Flying Ad-hoc Network). FANET introduces the ad hoc networking of flying UAVs to allo...
Article
Full-text available
Programming is one of the career rewarding skills; however, learning programming skill is extremely hard and arduous as supported by several studies. The first programming language has an everlasting impact on the programmer’s program’s development abilities. In most of the universities the imperative paradigm is used for introductory programming c...
Article
Full-text available
Smart monitoring of critical components of Microgrids is required to ensure their economic and reliable operation. We implement a working MG as a test bed which is controlled by an advance distributed control system (DCS). We integrate a smart sensors network supporting internet of things (IoT) into the DCS for real-time as well as time lapsed cond...
Article
Full-text available
Everything in this world is encapsulated by space and time fence. Our daily life activities are utterly linked and related with other objects in vicinity. Therefore, a strong relationship exist with our current location, time (including past, present and future) and event through with we are moving as an object also affect our activities in life. O...
Article
Full-text available
Everything in this world is encapsulated by space and time fence. Our daily life activities are utterly linked and related with other objects in vicinity. Therefore, a strong relationship exist with our current location, time (including past, present and future) and event through with we are moving as an object also affect our activities in life. O...
Article
Full-text available
Objectives: Falling in the elderly is considered a major cause of death. In recent years, ambient and wireless sensor platforms have been extensively used in developed countries for the detection of falls in the elderly. However, we believe extra efforts are required to address this issue in developing countries, such as Pakistan, where most deaths...
Article
Full-text available
Objectives: Falling in the elderly is considered a major cause of death. In recent years, ambient and wireless sensor platforms have been extensively used in developed countries for the detection of falls in the elderly. However, we believe extra efforts are required to address this issue in developing countries, such as Pakistan, where most deaths...
Article
Full-text available
In today's world the rapid advancements in Micro-Electromechanical Systems (MEMS) and Nano technology have improved almost all the aspects of daily life routine with the help of different smart devices such as smart phones, compact electronic devices etc. The prime example of these emerging developments is the development of wireless sensors for he...
Article
Full-text available
Underwater wireless sensor network is an emerging wireless networking technology (UWSN). UWSN has various applications for example it can be used for monitoring seismic activities, underwater animal, pipeline etc. UWSN face challenges in their MAC later operations. Different energy efficient MAC protocols have been proposed for underwater wireless...
Article
Full-text available
MANETs (Mobile Ad Hoc Networks) have applications in various walks of life from rescue operations to battle fieled operations, personal and commercial. However, routing operations in MANETs are still vulnerable to anomalies and DoS (Denial of Service) attacks such as sleep deprivation. In SD (Sleep Deprivation) attack malicious node exploits the vu...
Conference Paper
Full-text available
Abstract: In today’s world the rapid advancements in Micro-Electromechanical Systems (MEMS) and Nano technology improved almost all the aspects of daily life routine with the help of different smart devices such as smart phones, compact electronic devices etc. The prime example of these emerging developments is the development of wireless sensors f...
Article
Person with disability and older people need assistance in activities of daily living (ADL). Numerous models exist to view disability with a distinct perspective and provide/propose solution to address the effects and consequences caused by disability and limitation as a result of old age. Present study proposed and evaluated technological model of...
Article
Full-text available
Today the field of wireless sensors have the dominance in almost every person’s daily life. Therefore researchers are exasperating to make these sensors more dynamic, accurate and high performance computational devices as well as small in size, and also in the application area of these small sensors. The wearable sensors are the one type which are...
Article
Full-text available
Wireless Body Area Sensor Network (WBAN) has emerged as special type of wireless sensor networks. This emerging networking technology has applications in healthcare, sports & fitness, activity monitoring and disability assistance. Most of the work in literature in WBAN focuses on MAC and Physical layer. In contrast to this, in this paper, we presen...
Article
Full-text available
Today the field of wireless sensors have the dominance in almost every person’s daily life. Therefore researchers are exasperating to make these sensors more dynamic, accurate and high performance computational devices as well as small in size, and also in the application area of these small sensors. The wearable sensors are the one type which are...