
Aisha Hassan Abdalla HashimInternational Islamic University Malaysia | iium · Department of Electrical and Computer Engineering
Aisha Hassan Abdalla Hashim
About
316
Publications
76,375
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,706
Citations
Publications
Publications (316)
The paper presents a simplified yet innovative computational framework to enable secure routing for sensors within a vast and dynamic Internet of Things (IoT) environment. In the proposed design methodology, a unique trust evaluation scheme utilizing a modified version of Ant Colony Optimization (ACO) is introduced. This scheme formulates a manifol...
"Artificial Intelligence Enhanced Teaching Methods" is a comprehensive exploration of the transformative impact of artificial intelligence (AI) on the field of education. This book delves into the role of AI in revolutionizing teaching methods and enhancing the learning experience for students of all ages. It offers insights into AI-powered persona...
Sales enablement sensing-as-a-service (SESaaS) is an organisation’s future process management for any sales management operation. With an expanding base of dynamic customer demands and the adoption of multiple technological advancements, there is a high possibility that human-centric sales management will be transformed into a fully automated form...
Wireless community networks (WCNs) are considered another form of ownership of internet protocol (IP) networks, where community members manage and own every piece of equipment in a decentralized way, and routing for traffic is done in a cooperative manner. However, the current routing protocols for WCNs suffer from stability and scalability issues....
Low Power Wide Area Network (LPWAN) is one of the fastest growing network techniques provides efficient communciations for smart cities, e-Health, industry 4.0 and other applications. LPWAN enables long-rang communcaitons for M2M and cellular IoT networks. Narrowband-IoT (NB-IoT) is a type of LPWAN developed by 3GPP to connect a wide stream of IoT...
Vehicle detection in Intelligent Transportation Systems (ITS) is a key factor ensuring road safety, as it is necessary for the monitoring of vehicle flow, illegal vehicle type detection, incident detection, and vehicle speed estimation. Despite the growing popularity in research, it remains a challenging problem that must be solved. Hardware-based...
With the improvements in machine-to-machine (M2M) communication, ubiquitous computing, and wireless sensor networks, the Internet of Things (IoT) has become a notion that is constantly rising in importance. Using uniquely addressable IDs, the Internet of Things links diverse physical items and allows them to communicate with one another through the...
Online learning has gained substantial traction since the popularization of Massive Open Online Courses (MOOCs) over the last decade. After the dawn of the Covid-19 pandemic, online learning has become an indispensable mode of modern-day education. All educational institutions around the world are now compelled to switch to online classes as a phys...
As the Massive Open Online Courses (MOOC) became widely popular since the last decade, online learning has acquired substantial traction. Then, as the Covid-19 pandemic started, this method of education became indispensable. All educational institutes all around the world were compelled to switch to online classes as a safer and more flexible optio...
The recent increment of population in the urban areas requires well-operated and well-managed cities with lots of automation in various aspects of everyday life. The backbone of this smart city is the Internet-of-Things (IoT) technology. This paper outlines the fundamental idea of IoT, followed by its framework for successful smart city implementat...
This study aims to determine the potential of wind energy in the mediterranean coastal plain of Palestine. The parameters of the Weibull distribution were calculated on basis of wind speed data. Accordingly, two approaches were employed: analysis of a set of actual time series data and theoretical Weibull probability function. In this analysis, the...
Several models were proposed to predict the attenuation of microwave signals due to sand and dust storms. Those models were developed based on theoretical assumptions like Rayleigh approximation, Mie equations or numerical methods. This paper presents a comparison between attenuation predicted by three different theoretical models with measured att...
The importance of image security in the field of medical imaging is challenging. Several research works have been conducted to secure medical healthcare images. Encryption, not risking loss of data, is the right solution for image confidentiality. Due to data size limitations, redundancy, and capacity, traditional encryption techniques cannot be ap...
This paper proposes an anti-theft mechanism uses biometric Face Recognition to identify thief along with alarming. This can be used as security for ATMs, airport’s systems, medical records, identify customers, preventing fraud and providing VIP services as well as recognizing individuals with known shoplifting convictions and video surveillance. Th...
Emotion speech recognition is a developing field in machine learning. The main purpose of this field is to produce a convenient system that is able to effortlessly communicate and interact with humans. The reliability of the current speech emotion recognition systems is far from being achieved. However, this is a challenging task due to the gap bet...
Deep learning is an emerging technology that is one of the most promising areas of artificial intelligence. Great strides have been made in recent years which resulted in increased efficiency with regards to many applications, including speech. Despite this, an environmentally Robust Speech Recognition system is still far from being achieved. In th...
n this paper, a new technique has been proposed to solve the trade off
common problem in Hill Climbing Search algorithm (HCS) to reach
Maximum Power Point Tracking (MPPT). The main aim of the new
technique is to increase the power efficiency for the Wind Energy
Conversion System (WECS). The proposed technique has been combined the
three mode algori...
Abstract—This paper proposed novel Hill Climbing Search (HCS) algorithm to reach maximum power point tracking (MPPT). The proposed algorithm used two main techniques; the first one is power prediction mode and the second one is the two-mode HCS algorithm. The latter is used to achieve the maximum possible power from Wind Energy Conversion System (W...
Maximum Power Point Tracking (MPPT) is essential for the Wind Energy Conversion System (WECS) mainly for the small scale wind turbine. In order to captured the maximum possible power from wind turbine, it is very important to operate the WECS at MPPT and tracking the maximum power point in the power output signal. This paper presents a critical ana...
Mobile Router (MR) mobility supported by Network Mobility Basic Support Protocol (NEMO BS) is a Mobile IPv6 (MIPv6) extension that supports Host Mobility. Proposed Multihoming and Route Optimization for MANEMO (MROM) scheme is designed to provide Route Optimization (RO) and Multihomed in NEMO architectures. This paper proposes two novel schemes; MA...
The smart grid control applications necessitate real-time communication systems with time efficiency for real-time monitoring, measurement, and control. Time-efficient communication systems should have the ability to function in severe propagation conditions in smart grid applications. The data/packet communications need to be maintained by synchro...
Handoff management is an indispensable component in supporting network mobility. The handoff situation raises while the Mobile Router (MR) or Mobile Node (MN) crosses the different wireless communication access technologies. At the time of inter technology handoff the multiple interface based MR can accomplish multihoming features such as enhanced...
DMM (Distributed Mobility Management) is a present elective worldview for creating a mobility management scheme to discourse the centralized issues in present IP-based mobile environments. The main reason is to enable these schemes to adapt to the present increment in the number of mobile operators, as well as mobile information traffic size, just...
Late 2019 and a significant part of early 2020 have witnessed the outbreak of Coronavirus disease-19 (COVID-19) across the world. As a desperate attempt to control the virus spread, many countries are enforcing measures to restrict large concentration of people at one place and are implementing some form of contact tracing mobile application to qui...
Network mobility basic support (NEMO BS) protocol (RFC 3963) is an extension of Mobile IPv6. The NEMO BS embraced by the IETF working group to permit any node in the portable network to be accessible to the Internet despite the fact the network itself is roaming. This protocol likewise Mobile IPv6 does not deliver any kind of Quality of Service (Qo...
Internet of Things aims to automate and add intelligence into existing processes by introducing constrained devices such as sensors and actuators. These constrained devices lack in computation and memory resources and are usually battery powered for ease of deployments. Due to their limited capabilities, the constrained devices usually host proprie...
This study originates a new model, the Feature Parallelism Model (FPM), and compares it to deep learning models along depth, which is the number of layers that comprises a machine learning model. It is the number of layers in the horizontal axis, in the case of FPM. We found that only 6 layers optimize FPM's performance. FPM has been inspired by th...
Mobility management is characterized into two sections are mainly location management as well as handoff management. The previous one focuses on location updates though the later one oversees consistent Internet availability while the Mobile Router (MR) diverges its point of attachment during movement to the new network. Subsequently, recurrent mov...
IoT (Internet of Things) technically connects billions of entities to the Internet. The IoT is divided between the technology and the service itself. As a result, great efforts are needed to join data from many contexts and services. This reason has motivated proposals to develop solutions that can overcome existing issues of limitations for mobili...
Wireless community networks (WCNs) are a solution for people who are living in some areas facing difficulties for accessing the internet because no ISPs are providing them with the service due to the long distance, the high cost of infrastructure, and the less no of people in these areas. So people decided to build their own internet without the ne...
Video streaming is content sent in compressed form over the netwoks and viwed the users progressively. The transmission of video with the end goal that it can be prepared as consistent and nonstop stream. The point is that to give client support to client at anyplace and at whatever time. Mobile Ad hoc Networks (MANETs) are considered an attractive...
In this paper power energy had been estimated based on actual wind speed records in a coastal city in Palestine Ashdod. The main aims of this study to determine the feasibility of wind turbine and to estimate payback period. Therefore, to encourage investment in renewable energy in Palestine. The daily average wind speed data had been analyzed and...
In this paper power energy estimated based on wind speed records in three different areas in Palestine Nablus, Ramallah and Gaza. The main aims of this study to calculate the total amount of power and energy that can produce and to encourage investment in renewable energy in Palestine. Available meteorological data from local weather stations are u...
The need of clean and renewable energy, as well as the power shortage in Gaza strip with few wind energy studies conducted in Palestine, provide the importance of this paper. Probability density function is commonly used to represent wind speed frequency distributions for the evaluation of wind energy potential in a specific area. This study shows...
Wireless networks incorporate Mobile Nodes (MNs) that use wireless access networks to communicate. However, the communication among these MNs are not remained stable due to the poor network coverage during inter mobility. Moreover, the wireless nodes are typically small that results in resource-constrained. Thus, it is uphill to use algorithms havi...
Synchrophasor advancement has the conversant to the smart grid applications, which is turned into necessary integral parts of digital communication frameworks that include transmission of electrical signals measured crosswise over various parts, which synchronized the grid applications utilizing external precise time source. The existing Communicat...
span>Named Data Networking (NDN) performs its routing and forwarding decisions using name prefixes. This removes some of the issues affecting addresses in our traditional IP architecture such as limitation in address allocation and management, and even NAT translations etcetera. Another positivity of NDN is its ability to use the conventional routi...
Abstract The generation, distribution and transmission of electricity in Palestine have recently emerged as major issues. This study comprehensively assesses the production of wind energy and the estimation of wind energy potential in Palestine’s south coastal plain. The goal is to evaluate Palestine’s wind energy production by studying wind data a...
The current de-facto routing protocol over Low Power and Lossy Networks (LLN) developed by the IETF Working Group (6LOWPAN), is named as Routing Protocol for Low Power and Lossy networks (RPL). RPL in the network layer faces throughput challenges due to the potential large networks, number of nodes, and that multiple coexisting applications will be...
Mobility management is classified into two parts such as location management and handoff management. The earlier one concentrates on location update whereas the later one manages continuous Internet connectivity while the Mobile Router (MR) changes its single point of attachment to the network. Therefore, frequent movement of the MR is one of the s...
In this paper, path loss measurements were conducted and a path loss model was proposed for wireless sensor networks (WSNs) operating in indoor environment. This is done with a view to study transmit power requirements in indoor application of WSNs. The proposed model is a hybrid of the two-ray ground reflection model and the log-normal model and c...
In the era of Internet technology, new applications are developed everyday requiring continuous and seamless connections. This urges for access availability solutions to the new scenarios. One of the critical architecture is the Mobile Ad-Hoc Network Mobility (MANEMO). However, the integration of Ad-hoc and NEMO technologies came out with many comp...
The objective of this paper is to present performance analysis of a new enhanced mobile multicast network mobility management scheme. The initial developed network mobility management called Proxy Mobile IPv6 (PMIPv6) is based on unicast network support. This paper enabled multicast support in network mobility management and named it as MPMIPv6. Ad...
This paper evaluates Proxy Mobile Internet Protocol Version 6 (PMIPv6) multicast fast reroute operations using quantitative analysis. The motivation is to cater the fast growth of mobile data traffic consumption and its networking technologies. Hence it is significance to enhancing the present techniques. Multicast enabled PMIPv6 is a mobile multic...
The objective of this paper is to presents analyses for multicast network mobility management using NS3. It is mainly to verify the proposed network architecture and its activities. NS3 is a network simulator that implements virtually network prototype that is close to real implementation. Network mobility management has become a popular topic in n...
IoT aims to interconnect sensors and actuators built into devices (also known as Things) in order for them to share data and control each other to improve existing processes for making people's life better. IoT aims to connect between all physical devices like fridges, cars, utilities, buildings and cities so that they can take advantage of small p...
Due to the vast increase in global industrial output, rural to urban drift and the over-utilization of land and sea resources, the quality of water available to people has deteriorated greatly. Before the sensor based approach to water quality monitoring, water quality was tested by collecting the samples of water and experimentally analyzing it in...
Vehicular Ad hoc networks (VANETs) combined with vehicle-to-vehicle and vehicle-to-infrastructure communications can be considered as the most suitable technology to enable ITS (Intelligent Transport System) application bestowed upon travellers with mobility, safety and productivity with human comfort. As a delay sensitive ITS application, handoff...
A profound analysis of signaling cost for multicast network mobility management environment. The evaluation is a innovative integration of Multicast only Fast Reroute (MFR) and Context Transfer (CT). This integration is implemented to network mobility environment which is Proxy Mobile IPv6 (PMIPv6). The signaling cost terms is described based on ha...
Telecom Call Details Record (CDR) data-set is considered a rich source of valuable information that will bring new big revenues to Communication Service providers (CSP) as well as it will empower many out-telco services such as transportation, education, health programs, and business analysis in resource management and planning, decision making, an...