About
112
Publications
171,720
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,312
Citations
Introduction
Prof. Adnan Nadeem received his Ph.D. degree from the Institute for Communication Systems, the University of Surrey in the U.K in 2011. He is a Professor & the Head of the Department of Computer Science in FCIS, Islamic University of Madinah. He has published more than 95 research papers in international journals and conferences including a patent & book chapter, its total Impact Factor is 101.17. He has more than 2440 citations of his work. He has also received several awards & Research Grants.
Current institution
Additional affiliations
January 2018 - present
April 2007 - January 2011
March 2014 - February 2015
Education
April 2007 - December 2010
Publications
Publications (112)
Mobile ad hoc networks (MANETs) are well known to be vulnerable to various attacks due to their lack of centralized control, and their dynamic topology and energy-constrained operation. Much research in securing MANETs has focused on proposals which detect and prevent a specific kind of attack such as sleep deprivation, black hole, grey hole, rushi...
Mobile Ad Hoc Networks are vulnerable to a variety of network layer attacks such as black hole, grey hole, sleep deprivation & rushing attacks. In this paper we present an intrusion detection & adaptive response mechanism for MANETs that detects a range of attacks and provides an effective response with low network degradation. We consider the defi...
In the last decade, mobile ad hoc networks (MANETs) have emerged as a major next generation wireless networking technology. However, MANETs are vulnerable to various attacks at all layers, including in particular the network layer, because the design of most MANET routing protocols assumes that there is no malicious intruder node in the network. In...
Most of the research in securing mobile ad hoc networks (MANETs) has focused on proposals which detect and prevent a specific kind of attack such as sleep deprivation, black hole, grey hole and rushing attacks. In this paper we broaden our previously developed algorithm AIDP and propose a generalized intrusion detection and prevention mechanism. We...
The Internet of Things (IoT) technology facilitates real-time data collection through sensors, enhancing disease detection and management accuracy and crop efficiency. Pest infestations in cotton crops adversely impact its production and ultimately affect the nation's economy which depends on agriculture. Previous research has primarily focused on...
Secure data transmission is critical in public video surveillance applications such as tracking missing persons in large crowd gatherings. It may help the security personnel to monitor & record the live feeds from multiple cameras. However, this live streaming could be falsified. Various cryptographic techniques have been proposed to ensure the int...
The Kingdom of Saudi Arabia is one of the world’s
leading fresh date producers. Identifying damaged date palm
trees on the farm is important for saving water and stopping
the spread of pest which has caused the damage. In this paper,
we aim to evaluate the performance of IoT-based thermal image
camera input for the automatic detection of damaged tr...
Considering the importance of cotton products, timely identification of pests (flying moths—being a significant threat to cotton crops) helps to protect cotton crops and improve their production and quality. This study proposes real-time detection of Cotton Flying Moths (CFMs) with the assistance of an Internet of Things (IoT)-based system in the a...
IoT technology and drones are indeed a step towards modernization. Everything from field monitoring to pest identification is being conducted through these technologies. In this paper, we consider the issue of smart pest detection and management of cotton plants which is an important crop for an agricultural country. We proposed an IoT framework to...
Augmented reality (AR) has gained enormous popularity and acceptance in the past few years. AR is indeed a combination of different immersive experiences and solutions that serve as integrated components to assemble and accelerate the augmented reality phenomena as a workable and marvelous adaptive solution for many realms. These solutions of AR in...
This paper presents a large gathering dataset of images extracted from publicly filmed videos by 24 cameras installed on the premises of Masjid Al-Nabvi, Madinah, Saudi Arabia. This dataset consists of raw and processed images reflecting a highly challenging and unconstrained
environment. The methodology for building the dataset consists of four co...
Citation: Syed, T.A.; Jan, S.; Siddiqui, M.S.; Alzahrani, A.; Nadeem, A.; Ali, A.; Ullah, A. CAR-Tourist: An Integrity-Preserved Collaborative Augmented Reality Framework-Tourism as a Use-Case.
The unprecedented growth in Augmented Reality (AR) has captured the focus of researchers and the industrial sector. The development of AR applications and their implementation in various domains is broadening. One of the advancements in the field of AR is Collaborative AR, which provides ample opportunities for the members of a team to work on a pa...
In today’s world, the strong economy of a country plays an important role in the journey of development. Many factors help improve the economy and one of these factors is tourism. There are many countries in which their economy is based on tourism. Saudi Arabia is also targeting that their major economic reliance should shift to tourism. Based on t...
Electricity is still a highly demanding resource in developing countries, especifically in rural areas. Local communities in developing countries are now focusing on generating their own electricity using solar and trading the energy which is in access to the supplier. Energy trading at the peer-to-peer level is a novel paradigm. It allows customer...
Locating a missing child or elderly person in a large gathering through face recognition in videos is still challenging because of various dynamic factors. In this paper, we present an intelligent mechanism for tracking missing persons in an unconstrained large gathering scenario of Al-Nabawi Mosque, Madinah, KSA. The proposed mechanism in this pap...
The probability of losing vulnerable companions, such as children or older ones, in large gatherings is high, and their tracking is challenging. We proposed a novel integration of face-recognition algorithms with a soft voting scheme, which was applied, on low-resolution cropped images of detected faces, in order to locate missing persons in a chal...
During the time of the pandemic, travel restrictions have impacted the tourism industry with an estimated loss of more than a trillion USD; however, at the same time, we have seen a significant increase in profits for the industries which empower remote connectivity. Various studies have identified the positive impact of virtual tourism, in which t...
Virtual Tourism (VT) is a booming business with
potential perspectives in the entertainment and financial
industry. Due to travel restrictions, safety concerns, and
expensive travelling the younger generation is showing interest in
virtual tourism instead of traditional tourism. However, virtual
tourism does not financially benefit the service prov...
In the last few years, the wireless body area network (WBAN) has emerged as an appealing and viable option in the e-health application domain. WBAN technology is primarily used to offer continuous screening of health data to patients, independent of their location, time, or activity. A WBAN, on the other hand, is vulnerable to different cyberattack...
Abstract—Social media has become one of the most important
sources of news in our lives, but the process of validating news
and limiting rumors remains an open research issue. Many
researchers have suggested using Blockchain to solve this
problem, but it has traditionally failed due to the large volume of
data and users in such environments. In thi...
The history of the world during the pandemic era shows a worse kind of treatment to the effected people. The year 2020 is known as a terrifying year due to pandemics in the world. It badly exposes the healthcare system's weakness especially in the developing countries like Pakistan. Ambulance services played a major role in transporting affected pe...
Blockchain is a revolutionary technology that is making a great impact on modern society due to its transparency, decentralization, and security properties. Blockchain gained considerable attention due to its very first application of Cryptocurrencies e.g., Bitcoin. In the near future, Blockchain technology is determined to transform the way we liv...
With the rapid growth and commercialization of wearable sensor technology, the research community foresees great potential of Body Area Sensor Network (BASN) applications in the healthcare industry, including elderly healthcare. We consider the issue of fall in elderly, which has severe consequences including death. Most of the related proposals in...
More than two millions of pilgrims visit the holy cities of Makkah and Madinah, in Kingdom of Saudi Arabia, to perform Hajj and Umrah rituals every year. Ensuring safety of the pilgrims is the top priority of Saudi government. Therefore, kingdom considers health, safety and security a red line that is not supposed to be crossed at any extent, consi...
In huge crowd gatherings such as Hajj, the probability of losing personal belongings of the pilgrim is relatively high. The consequences are also severe in some cases for example when someone loses his passport or valuables without which it is difficult to travel back to his country. Therefore, in this paper, we propose modeling and prototype appli...
Performing various transactions on real estate records in the government organization is a cumbersome task and has many pitfalls. There are a number of problems with the existing land registry systems. First, the process of land registry and transferring of a land is currently manual. Even though, some of the processes and records are digitized, ho...
Key Management in Delay Tolerant Networks (DTN) still remains an unsolved complex problem. Due to peculiar characteristics of DTN, important challenges that make it difficult to design key management architecture are: 1) no systematic requirement analysis is undertaken to define its components, their composition and prescribed functions; and 2) no...
In huge crowd gatherings such as Hajj, the probability of losing personal belongings of the pilgrim is relatively high. The consequences are also severe in some cases for example when someone loses his passport or valuables without which it is diffi cult to travel back to his country. Therefore, in this paper, we propose modeling and prototype appl...
In huge crowd gatherings such as Hajj, the probability of losing personal belongings of the pilgrim is relatively high. The consequences are also severe in some cases for example when someone loses his passport or valuables without which it is diffi cult to travel back to his country. Therefore, in this paper, we propose modeling and prototype appl...
Transactions related to vehicles include manufacturing, buying, selling, paying insurance(takaful), obtaining regular inspection, leasing a vehicle from banks, getting in an accident, engaging in a traffic violation, calculating price predictions and renting a vehicle. Many people perform transactions related to vehicles in their daily life; transp...
Data tracking is of great significance and a central part in digital forensics. In today's complex network design, Internet of Things (IoT) devices communicate with each other and require strong security mechanisms. In maintaining an audit trail of IoT devices or provenance of IoT device data, it is important to know the origins of requests to ensu...
In the past few years, the implementation of blockchain technology for various applications has been widely discussed in the research community and the industry. There are sufficient number of articles that discuss the possibility of applying blockchain technology in various areas, such as, healthcare, IoT, and business. However, in this article, w...
Improved Hajj and Umrah pilgrim's services is a major target areas in vision 2030 • Huge no of Pilgrims increase chances of loosing their personal belonging or companion • A pilgrim may loose passport without which he/ she cannot travel • No online system is available for reporting lost item and persons • We Propose modelling and prototype applicat...
This paper defines two major data sets 1) from wearable inertial measurement sensors and 2) wearable ECG SHIMMER™ sensors. The first dataset is devised to benchmark techniques dealing with human behavior analysis based on multimodal inertial measurement wearable SHIMMER™ sensors unit during research studies “Fall Detection System for the Elderly Ba...
The annual Islamic pilgrimage, Hajj has become very easy and planned in this era. Authorities in the Kingdom considering to make this Holy event more secure, convenient and controlled by planning strategically and comprehensively. For this, Government launched a program, called Vision 2030. This program intends to facilitate and serve Muslims who g...
Main focus of any organization functioning in today's competitive marketplace is to gain and sustain competitive advantage. With the huge volumes of data stored in databases, data marts and data warehouses coupled with advanced data analysis tools, managers are now in a better position to make smart and effective decisions which result in competiti...
Main focus of any organization functioning in today's competitive marketplace is to gain and sustain competitive advantage. With the huge volumes of data stored in databases, data marts and data warehouses coupled with advanced data analysis tools, managers are now in a better position to make smart and effective decisions which result in competiti...
This is the list of top Elsevier journals [1] related to the research areas of computer science with details of various important parameters including review speed, impact factor, acceptance rate etc. Reference: [1] M. Fanany, "Elsevier computer science Journals list with key parameters" , university Indonesia.
Everything is connected in one way or another in this universe and forms a network such as the internet, biological network (genome network, neural network), physical networks (infrastructure based networks of roads, trains and other communication networks), plant and ecological network, social networks (friendship, coworker, coauthor etc.). Comple...
Fall is one of the major cause of deaths in elderly along with other chronic diseases in all over the world. Therefore, it is important
to find a cost effective, non-intrusive and lightweight solution for early fall detection and prevention in elderly. Several fall
detection systems have been proposed, using the different types of sensors and techn...
Fall is one of the major cause of deaths in elderly along with other chronic diseases in all over the world. Therefore, it is important to find a cost effective, non-intrusive and lightweight solution for early fall detection and prevention in elderly. Several fall detection systems have been proposed, using the different types of sensors and techn...
Internet of Things (IoT) network are considered the future in monitoring and surveillance. With the advent of autonomous organization, and network and service management, conventional networks are fast integrated with IoT networks. With minimal human interaction, the security of IoT data travelling through the networks becomes more critical. Data P...
Wireless sensor network technology is widely used in the western world for improving agriculture output. However, in the developing countries, the adaptation of technology is very slow due to various factors such as cost and unawareness of farmers with the technology. There are reports in the literature related to the precision agriculture and hope...
Human behavior inference through smart pervasive technologies is a new research avenue. Sophistication in interaction modalities with self-customization based on context makes interaction easier in natural settings. Despite greater sophistication, disabled and elderly person still face difficulties in interaction with smart devices. The interaction...
Wireless Body Area Sensors Networks (BAN) have
emerged as new applied wireless networking technology
with the development of wearable and implanted sensors.
BAN has novel application in healthcare, sports, human
activity monitoring, disability assistance and entertain-
ment. BAN is now using for real time monitoring and as-
sistance of the patients...
One of main reason of road-side accidents (RSA) is the negligence by the driver. Drivers do not concentrate on the
road and their surroundings, which would result in deadly accidents both on road and off the road. Using a mobile phone, eating
while driving, talking or looking back, and sleeping are some of the activities by drivers that cause these...
Assistive technology has the potential to support persons with dementia (PWDs) in their daily life activities and provide them quality of life services. This paper proposes a novel mechanism in order to manage disorientation or time and place problem of PWD through the use of Bluetooth low energy devices, smart watch and smart phone/ tablet. The pr...
A Microgrid (MG) is a viable and scalable approach to integrate distributed sources, ensure reliable and secure energy supply to the remote and the mission critical grid. Smarter monitoring, control and energy management is required to ensure economical and reliable operation of the MG. Equipping an MG with smarter sensor for monitoring along with...
MANETs (Mobile Ad-hoc Networks) applications in various walks of life in the last two decades have resulted in introduction of its sub technologies such as VANETs (Vehicular Ad-hoc Network). In this paper, we focus on new ad hoc networking technology called FANET (Flying Ad-hoc Network). FANET introduces the ad hoc networking of flying UAVs to allo...
Programming is one of the career rewarding skills; however, learning programming skill is extremely hard and arduous as supported by several studies. The first programming language has an everlasting impact on the programmer’s program’s development abilities. In most of the universities the imperative paradigm is used for introductory programming c...
Smart monitoring of critical components of Microgrids is required to ensure their economic and reliable operation. We implement a working MG as a test bed which is controlled by an advance distributed control system (DCS). We integrate a smart sensors network supporting internet of things (IoT) into the DCS for real-time as well as time lapsed cond...
Everything in this world is encapsulated by space and time fence. Our daily life activities are utterly
linked and related with other objects in vicinity. Therefore, a strong relationship exist with our current
location, time (including past, present and future) and event through with we are moving as an object
also affect our activities in life. O...
Everything in this world is encapsulated by space and time fence. Our daily life activities are utterly linked and related with other objects in vicinity. Therefore, a strong relationship exist with our current location, time (including past, present and future) and event through with we are moving as an object also affect our activities in life. O...
Dysgraphia, a learning disability associated with writing skills, hinders students to put their thought on paper and write correctly. Writing problems hit students most frequently that one third students become failed to acquire writing skill. Different IT based assistance solutions available for dysgraphia students but most of them are accommodati...
Objectives: Falling in the elderly is considered a major cause of death. In recent years, ambient and wireless sensor platforms
have been extensively used in developed countries for the detection of falls in the elderly. However, we believe extra efforts are
required to address this issue in developing countries, such as Pakistan, where most deaths...
Objectives: Falling in the elderly is considered a major cause of death. In recent years, ambient and wireless sensor platforms
have been extensively used in developed countries for the detection of falls in the elderly. However, we believe extra efforts are
required to address this issue in developing countries, such as Pakistan, where most deaths...
In today's world the rapid advancements in Micro-Electromechanical Systems (MEMS) and Nano technology have improved almost all the aspects of daily life routine with the help of different smart devices such as smart phones, compact electronic devices etc. The prime example of these emerging developments is the development of wireless sensors for he...
Underwater wireless sensor network is an emerging wireless networking technology (UWSN). UWSN has various applications for example it can be used for monitoring seismic activities, underwater animal, pipeline etc. UWSN face challenges in their MAC later operations. Different energy efficient MAC protocols have been proposed for underwater wireless...
MANETs (Mobile Ad Hoc Networks) have applications in various walks of life from rescue operations to
battle fieled operations, personal and commercial. However, routing operations in MANETs are still
vulnerable to anomalies and DoS (Denial of Service) attacks such as sleep deprivation. In SD (Sleep
Deprivation) attack malicious node exploits the vu...
Abstract: In today’s world the rapid advancements in Micro-Electromechanical Systems (MEMS) and Nano technology improved almost all the aspects of daily life routine with the help of different smart devices such as smart phones, compact electronic devices etc. The prime example of these emerging developments is the development of wireless sensors f...
Person with disability and older people need assistance in activities of daily living (ADL). Numerous models exist to view disability with a distinct perspective and provide/propose solution to address the effects and consequences caused by disability and limitation as a result of old age. Present study proposed and evaluated technological model of...
Today the field of wireless sensors have the dominance
in almost every person’s daily life. Therefore researchers are
exasperating to make these sensors more dynamic, accurate and
high performance computational devices as well as small in size,
and also in the application area of these small sensors. The wearable
sensors are the one type which are...
Wireless Body Area Sensor Network (WBAN) has emerged as special type of wireless sensor networks. This emerging networking technology has applications in healthcare, sports & fitness, activity monitoring and disability assistance. Most of the work in literature in WBAN focuses on MAC and Physical layer. In contrast to this, in this paper, we presen...
Today the field of wireless sensors have the dominance in almost every person’s daily life. Therefore researchers are exasperating to make these sensors more dynamic, accurate and high performance computational devices as well as small in size, and also in the application area of these small sensors. The wearable sensors are the one type which are...
Almost all the human being real life concerned domains are taking advantage of latest technologies for enhancing their process, procedures and operations. This integration of technological innovations provides ease of access, flexibility, transparency, reliability and speed for the concerned process and procedures. Rapid growth of ICT (Information...
People raise speaker volume during conversation on mobile phone as proximty become noisy, and do not lower it down when noise level decreases. Presented work help to mitigate hearing impairments, caused by excessive use of mobile phone users of all age groups. Work has been carried to automate in-call speaker volume with respect to comfortable hear...
Objective:
To analyse the frequency of different types of amblyopia and its association with gender.
Methods:
The cross-sectional study was conducted from March 2014 to October 2014 at the Department of Ophthalmology of a tertiary care hospital inKarachi. The patients were classified into different types of amblyopia like anisometropic, strabism...
An enormous amount of data is being pooled through the use of social media which is being mined to get
benefits in different areas such as healthcare, business, and learning. Providing care to elderly at their home
environment is understood as a complex problem and different types of systems are being proposed which can eliminate
the presence of ca...
Due to the availability of inexpensive, small and powerful wireless devices such as cell phones, tablet pc, PDAs, applications of Mobile Ad Hoc Network (MANETs) has increased exponentiallyin real life. Manet’s network layer operations are vulnerable to different attacks such as the Sybil. In Sybil attack the attacker use multiple identities during...
The dataset is devised to benchmark techniques dealing with human behavior analysis based on multimodal inertial measurement wearable shimmer sensors. The data set is available at http://adnan-nadeem.com/data-repository/ The dataset comprises body motion recordings for several volunteers of diverse profile while performing certain physical activiti...
Knowledge management is gaining more and more attention from business management with a consideration of knowledge as a critical intellectual resource for organization in getting successful competitive advantage. The aim of integrating of KM processes with business processes is to add value, provide supports and increase productivity. The role of t...
Gene ontology (GO) is a key initiative of bioinformatics to provide uniform description of gene product in different public databases. The GO project has initiated 3 (three) structured and organized controlled vocabularies (i.e. ontology) that describes gene products in term of cellular components, biological processes and functions in an independe...
Pakistan is an agricultural country which depends on agriculture and crops for its economic survival. WSN is an emerging technology all over the world and it is used in agriculture for monitoring different parameters. In this paper we review literature related to general agriculture monitoring, pest disease monitoring, and different pest control me...
Every year a huge amount of charity is collected in Pakistan which is then used to provide different basic needs to needy population. Charity organizations face difficulties when they manage their activities. One of the most challenging tasks for the organizations is to verify donor and needy both. This work proposes a charity model based on Archim...
The word ‘Climate Change” is not as simple and small in meaning as it seen. It exhibits dangerous and alarming
consequences. Climate changes is continuous process from East to West, North to South, Soil to Sky, Water to Air, Forest to
Desert, Ocean to Mountains, in fact everywhere. Climate change Monitoring (CCM) is the phenomena to observe and
rec...
In recent years the task of recognizing human face with the help of a machine has acquired a significant attention among
researchers. A wide range of commercial and law enforcement applications largely accounts for this developing trend.
Although current face recognition systems have reached a certain maturity level they are still far away from the...
Wireless Body Area Sensor Networks (WBASNs) applications have emerged as major type of Wireless Sensor Networks (WSN). Ample research work has already carried out to improve the QoS in WSN. However, QoS provision in WBASN needs further investigation. Majority of the research work in WBASN improves the QoS considering timeliness, latency or energy a...
Mobile ad hoc Networks and Vehicular Ad Hoc networks have emerged as advanced wireless networks. These networks have their applications in various walks of life. Mobility of nodes in these networks is a major benefit for the end users. However, modeling the mobility of the nodes in these networks is a key for the researcher. In this paper, we first...
People with disability of any kind i.e. physical, mental or psychological may still be able to actively participate in society and
spend a better life by using Assistive Technology devices/appliances. Assistive technology refers to the technology that
provides assistance to disable person in reducing the effects of disability and enabling them to t...
The most important concern in the medical domain is to consider the interpretation of data and perform accurate diagnosis. To improve diagnostic process and avoid misdiagnosis, many e-Health systems use artificial intelligence method and especially artificial neural network to manipulate diverse type of clinical data. A common bone disease ‘osteopo...
Since the data or information has become an asset of any organizations, therefore revealing, misusing and sharing the personal data of any individual or company are considered as a type of cyber crime. Therefore acts are there in different regions of the world to address this crime. The countries where acts are approved need to improve it by indulg...
Wireless Body Area Sensor Networks (WBASNs) applications have emerged as major type of Wireless Sensor Networks (WSN). It has a wide range of applications and plays a vital role in a society, particularly in health care system. Healthcare applications using WBASN required uninterrupted and reliable communication. In healthcare applications particul...
Wireless Body area sensor networks (WBASN) are an interesting and emerging application of wireless sensor networks.
WBASN has a wide range of applications but health care is most beneficiary of this technology, which requires uninterrupted
and reliable communication between sensors, Sinks and outside WBASN. This paper introduces the reliability asp...
Mobile Ad hoc Networks are one of the fast growing self organized networks, which has application in wider domains such as crisis management, battlefield, personal networking. However, due to cooperative nature of the network MANETs are vulnerable to various types of misbehaviour from both legitimate and malicious users. It is tricky to distinguish...
Wireless Body Area Sensor Networks (WBASNs) applications have emerged as major type of Wireless Sensor Networks (WSN). It has a wide range of applications and plays a vital role in a society, particularly in health care system. Healthcare applications using WBASN required uninterrupted and reliable communication. In healthcare applications particul...
This poster introduce these emerging wireless networking technologies
and highlight current research trends in these areas.
In this poster discussed the Rushing Attack in Manet, and different
techniques to reduce the harmful effect of Rushing Attack.
In the future, we will deduct some new techniques to prevent the Rushing
attack in Manet.
BASN consists of sensors placed in and around the human body for monitoring a different body functions.This poster introduces the existing WBASN applications and suggests some future applications of WBASN
Questions
Questions (4)
Kindly provide your feedback, experience, research on using chirp spread spectrum based equipment/ devices for tracking.
Adnan
There are various obvious questions that are asked these days about the next generation of Energy trading, their technological challenges and beneficiaries. Do you foresee that at micro-level home consumers will be able to take advantage through trading their reserve energies?
The integration of this feature with existing off the shelf CCTV surveillance solutions.
Research community has aggressively exploring the potential of blockchain technology for the last few years. This technology has made people think of mitigating the role of central authority. Could blockchain replace central banks in a practical and legal terms! (What do you think?)
Regards
Dr Adnan Nadeem