Ali Tufail

Ali Tufail
Universiti Brunei Darussalam · School of Digital Science

PhD (Information and Communication Engineering)

About

62
Publications
51,663
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
747
Citations

Publications

Publications (62)
Chapter
Technological progress has bridged the gap between humans and machines. However, this rapid advancement has brought new challenges due to the rising wave of cyberattacks in various industries. In the context of security, human susceptibility often becomes the weak link. Social engineering attacks (SEAs) are the weapon of choice focusing on individu...
Chapter
This chapter explores the revolutionary potential role of artificial intelligence (AI) applications in agriculture, considering the global issues posed by food security and sustainable agricultural practices. The agricultural industry is well positioned to transform existing methods and address urgent issues by utilizing AI's capabilities. The chap...
Article
Full-text available
As the patent landscape continues to grow, so does the complexity of retrieving relevant “prior art”, “background art”, or “state of the art” from an expanding pool of publicly available patent data, a critical step in establishing novelty. However, retrieving this information presents significant challenges due to its volume and complexity. This s...
Chapter
In the era of the Internet and artificial intelligence, cybersecurity, biometrics, and digital forensics have become important. Contemporary society, without the expertise of the digital age, would be under attack from more sophisticated forces using cyber-attacks, biometrics, and cyber weapons of every kind imaginable. In this chapter, we will exp...
Preprint
Full-text available
Multimodal generative artificial intelligence is revolutionizing critical domains, including education, healthcare, business, and entertainment. This article presents a comprehensive umbrella review of prominent surveys, reviews, and SLRs on advances in generative AI in teaching and learning, synthesizing its applications, benefits, challenges, and...
Preprint
Full-text available
Multimodal generative artificial intelligence is revolutionizing critical domains, including education, healthcare, business, and entertainment. This article presents a comprehensive umbrella review of prominent surveys, reviews, and SLRs on advances in generative AI in teaching and learning, synthesizing its applications, benefits, challenges, and...
Chapter
The Internet of Things (IoTs) has arisen as a powerful and revolutionary technological strength in the transport and the hospitality industry, profoundly changing how hotels interact with their customers and maximize their operations. In the context of smart hotels, this study thoroughly explores IoT’s tremendous influence on unmatched guest experi...
Chapter
Current technology has permitted various technological advancements and enhanced how we live and work as the world works toward a sustainable economy, contributing to zero hunger, climate action, responsible consumption, and production of the United Nation's sustainable development goals. By integrating smart agriculture technologies, the Internet...
Conference Paper
Significant time delays and energy inefficiencies are frequently caused by implementing Industrial Control Systems (ICS) in Industrial Wireless Sensor Networks (IWSN). To overcome these issues, this paper suggests two optimization techniques: Harris Hawk Optimization (HHO) and Gradient-Based Optimization (GBO). The GBO technique uses gradient data...
Preprint
Full-text available
The increased utilization of disruptive health and biomedical informatics technologies, such as artificial intelligence (AI), has accelerated medical operations from patient-centered medical experience data management to simplified medical procedures in this generative era. As these technologies integrate into traditional approaches, they raise cri...
Article
Full-text available
This article proposes the so-called large user interface models (LUIMs) to enable the generation of user interfaces and prediction of usability using artificial intelligence in the context of mobile applications. To this end, we synergized an integrated framework for the effective testing of the usability of mobile applications following a selectiv...
Article
This article proposes the so-called large user interface models (LUIMs) to enable the generation of user interfaces and prediction of usability using artificial intelligence in the context of mobile applications. To this end, we synergized an integrated framework for the effective testing of the usability of mobile applications following a select...
Chapter
Consider elderly physicians adapting to advanced digital healthcare facilities, ascenario that may initially perplex these seasoned doctors. The Fourth Industrial Revolu-tion (4IR) stands at the forefront of technological progress, ushering in a new era of pro-fessional dynamics that blurs the boundary between the physical and digital realms. Itspe...
Article
Full-text available
Security is a complex issue in critical infrastructure like industrial control systems (ICS) since its leakages cause critical damage. Protecting the ICS environment from external threats, cyber-attacks, and natural disasters is important. Various works have been done on anomaly detection in ICS, and it has been identified that these proposed appro...
Article
Full-text available
Subsistence farmers and global food security depend on sufficient food production, which aligns with the UN's "Zero Hunger, " "Climate Action, " and "Responsible Consumption and Production" sustainable development goals. In addition to already available methods for early disease detection and classification facing overfitting and fine feature extra...
Chapter
The healthcare industry is undergoing a momentous transformation with the advent of artificial intelligence (AI) and the internet of medical things (IoMT), as these technologies are significant in managing patient data, simple medical surgery, and medical personnel. This development has shown the potential to mitigate medical shortages, health issu...
Article
Full-text available
Technological advancement plays a crucial role in our daily lives and constantly transforms the industrial sector. However, these technologies also introduce new security vulnerabilities to Industrial Control Systems (ICS). Attackers take advantage of these weaknesses to infiltrate the ICS environment. The size of the targeted industry and the atta...
Article
Full-text available
Ship routing is a fundamental component of maritime passenger logistics, involving the careful planning of sea routes to facilitate the efficient and comfortable transportation of passengers. However, the ship routing problem presents unique challenges in the transit network design, encompassing various Vehicle Routing Problem (VRP) variants. These...
Conference Paper
The idea of an agent is useful for describing circumstances in which it is difficult or perhaps impossible for a single entity to gain all the necessary knowledge about the state of a system. The multiagent system is known to be useful in designing distributed solutions. Control action, data, or even both are distributed. In this research, we inves...
Article
Full-text available
The fast expansion of renewable energy sources, rising electricity demand, and the requirement for improved grid dependability have made it necessary to create cutting-edge technologies for electric power systems. The electric power business faces several issues, and deep learning, a branch of machine learning, has emerged as a possible solution. T...
Article
Full-text available
Smart manufacturing is pivotal in the context of Industry 4.0, as it integrates advanced technologies like the Internet of Things (IoT) and automation to streamline production processes and improve product quality, paving the way for a competitive industrial landscape. Machines have become network-based through the IoT, where integrated and collabo...
Article
Full-text available
Plant pests and diseases are a significant threat to almost all major types of plants and global food security. Traditional inspection across different plant fields is time-consuming and impractical for a wider plantation size, thus reducing crop production. Therefore, many smart agricultural practices are deployed to control plant diseases and pes...
Article
Full-text available
Students with special needs should be empowered to use assistive technologies and services that suit their individual circumstances and environments to maximize their learning attainment. Fortunately, modern distributed computing paradigms, such as the Internet of Things (IoT), cloud computing, and mobile computing, provide ample opportunities to c...
Article
Full-text available
Integrating smart heterogeneous objects, IoT devices, data sources, and software services to produce new business processes and functionalities continues to attract considerable attention from the research community due to its unraveled advantages, including reusability, adaptation, distribution, and pervasiveness. However, the exploitation of serv...
Article
Full-text available
In software development, the main problem is recognizing the security-oriented issues within the reported bugs due to their unacceptable failure rate to provide satisfactory reliability on customer and software datasets. The misclassification of bug reports has a direct impact on the effectiveness of the bug prediction model. The misclassification...
Article
Full-text available
Plant pests and diseases are a significant threat to almost all major types of plants and global food security. Traditional inspection across different plant fields is time-consuming and impractical for a wider plantation size, thus reducing crop production. Therefore, many smart agricultural practices are deployed to control plant diseases and pes...
Article
Full-text available
e-Commerce is booming everywhere, and Saudi Arabia is no exception. However, the adoption and prevalence of online mobile auctions (aka m-auction) remain unsatisfying in Saudi Arabia and the MENA region. This paper uncovers the enabling factors and hindering barriers against the use of mobile auctions by online consumers. To this end, a multiphase...
Article
Full-text available
We present a survey of machine learning works that attempt to organize the process flow of waste management in smart cities. Unlike past reviews, we focused on the waste generation and disposal phases in which citizens, households, and municipalities try to eliminate their solid waste by applying intelligent computational models. To this end, we sy...
Article
Full-text available
The digital revolution caused major changes in the world because not only are people increasingly connected, but companies are also turning more to the use of intelligent systems. The large amount of information about each product provided by the e-commerce websites may confuse the customers in their choices. The recommendations system and Internet...
Article
Network Function Virtualization (NFV) migrates the carrier-grade LTE Evolved Packet Core (EPC) that runs on commodity boxes to the public cloud. In the new virtualized environment, LTE EPC must offer high availability to its mobile users upon failures. Achieving high service availability is challenging because failover procedure must keep the laten...
Article
Full-text available
The use of software and IoT services is increasing significantly among people with special needs, who constitute 15% of the world’s population. However, selecting appropriate services to create a composite assistive service based on the evolving needs and context of disabled user groups remains a challenging research endeavor. Our research applies...
Article
Full-text available
With the increase in urbanization and smart cities initiatives, the management of waste generation has become a fundamental task. Recent studies have started applying machine learning techniques to prognosticate solid waste generation to assist authorities in the efficient planning of waste management processes, including collection, sorting, dispo...
Article
Full-text available
Efforts were exerted to enhance the live virtual machines (VMs) migration, including performance improvements of the live migration of services to the cloud. The VMs empower the cloud users to store relevant data and resources. However, the utilization of servers has increased significantly because of the virtualization of computer systems, leading...
Article
Full-text available
Recently, enormous interest has been shown by both academia and industry around concepts and techniques related to connecting heterogeneous IoT devices. It is now considered a rapidly evolving technology with billions of IoT devices expected to be deployed in the upcoming years around the globe. These devices must be maintained, managed, traced, an...
Article
Full-text available
When designed, technologies and frameworks are not created to be as dynamic and flexible as to cater to the requirements of other domains, and so is the case with Blockchain technology. Specifically designed for cryptocurrency, Blockchain was not intended to be used in other domains. However, during the past few years, critics argued that Blockchai...
Chapter
Full-text available
Web usability is a critical factor for visitors' acceptance and satisfaction. The prevalence of various free and proprietary website testing tools enabled the fast evaluation of the usability of websites. However, their effectiveness in providing meaningful, consistent, and valid results remains questionable. In this study, we initially devised a u...
Article
Full-text available
The deployment of 5G is in full swing, with a significant yearly growth in the data traffic expected to reach 26% by the year and data consumption to reach 122 EB per month by 2022 [10]. In parallel, the idea of smart cities has been implemented by various governments and private organizations. One of the main objectives of 5G deployment is to help...
Article
Full-text available
Recently, the concept of combining ‘things’ on the Internet to provide various services has gained tremendous momentum. Such a concept has also impacted the automotive industry, giving rise to the Internet of Vehicles (IoV). IoV enables Internet connectivity and communication between smart vehicles and other devices on the network. Shifting the com...
Article
Full-text available
The use and coordination of multiple modes of travel efficiently, although beneficial, remains an overarching challenge for urban cities. This paper implements a distributed architecture of an eco-friendly transport guidance system by employing the agent-based paradigm. The paradigm uses software agents to model and represent the complex transport...
Article
Smartphones have ubiquitously integrated into our home andwork environments, however, the user normally relies on explicit but inefficient identification processes in a controlled environment. Therefore, when the device is stolen, the attacker can have access to the user’s personal information and services against the stored password/ s. As a resul...
Conference Paper
Full-text available
Smartphones have pervasively integrated into our home and work environments managing confidential information but their owners still rely on as explicit as inefficient and insecure identification processes. Therefore, if a device is stolen, a thief can have access to the owner's personal information and services though the stored password/s. To avo...
Article
Full-text available
The concept of Internet of Things (IoT) and smart homes is now a reality. The stake of both academia and industry has increased in the devices related to IoT and smart homes. A lot of work has been done in this domain in the last decade or so. However, the architectures and frameworks related to this domain are still evolving. IoT enabled devices a...
Article
Full-text available
This paper proposes and presents the details of an agent-based architecture that has the capacity to model, simulate the movement of, and guide crowds with panic behavior in highly-dense areas in the events of man-made and natural threats. The most populated human gathering in the world, the Muslim pilgrimage event (also known as Hajj) which attrac...
Article
Full-text available
Wireless sensor networks (WSNs) have been increasingly deployed for ambient data reporting for varied settings. Source to the sink communication is typically multi-hop and intermediate nodes relay packets from the source to the destination. Fast energy drainage from the nodes around the sink can affect the overall network lifetime. Mobile sinks are...
Article
Full-text available
Managing a huge crowd and providing them with required services has always been a challenge. Millions of faithful visits the holy sites in Saudi Arabia to perform various rituals, each year. During the event of Hajj, masses of pilgrims gather in Makkah and Madinah making it one of the largest gatherings in the world. Several challenges arise while...
Article
Full-text available
The cloud computing is a leading driving movement for information technology where the major organizations are using more than one cloud provider, hence, computing will certainly become more distributed than it currently is this poses management, architectural and performance challenges. In this study, we propose a unique seven tier architecture of...
Article
Wireless Sensor Networks (WSNs) have shown a tremendous growth by evolving from merely a concept to a multifaceted realm of real world applications. This increase in growth and popularity is due to the fact that WSNs provide potentially low cost and cutting edge solutions to a range of critical problems like in healthcare, disaster management. Neve...
Article
Full-text available
Although human activity recognition (HAR) has been studied extensively in the past decade, HAR on smartphones is a relatively new area. Smartphones are equipped with a variety of sensors. Fusing the data of these sensors could enable applications to recognize a large number of activities. Realizing this goal is challenging, however. Firstly, these...
Article
Full-text available
Reliable source to sink communication is the most important factor for an efficient routing protocol especially in domains of military, healthcare and disaster recovery applications. We present weighted energy aware multipath reliable routing (WEAMR), a novel energy aware multipath routing protocol which utilizes hotline-assisted routing to meet su...
Article
Full-text available
Wireless sensor networks (WSNs) are persistently evolving from merely a notion of microelectronics to a new realm of practical applications. Certain critical applications like disaster management, healthcare, and military not only require exceptionally reliable but also a low-latency source to sink communication. Nevertheless, low source to sink la...
Conference Paper
Wireless sensor networks (WSNs) have been increasingly deployed for ambient data reporting for varied settings. Certain applications like industrial monitoring, healthcare and military require a highly reliable source to the sink communication link. Due to limited energy WSNs pose additional challenge to the reliable source to the sink communicatio...
Article
Wireless Sensor Networks (WSNs) are receiving increased focus due to their applicability to crucial applications like military, healthcare, habitat monitoring etc. However, wireless communication poses additional threats to the critical information being sent over the wireless media. Therefore there is a dire need to have a secure way of communicat...
Conference Paper
The wireless communication poses additional security threats to the critical information being shared between nodes in a Wireless Sensor Network (WSN). Therefore there is a dire need of having a secure ways of communication for a WSN. In this paper we present a secure and reliable approach for WSN that uses both the symmetric and public key infrast...
Article
Accurate and less invasive personalized predictive medicine relieves many breast cancer patients from agonizingly complex surgical treatments, their colossal costs and primarily letting the patient to forgo the morbidity of a treatment that proffers no benefit. Cancer prognosis estimates recurrence of disease and predict survival of patient; hence...
Article
Full-text available
An extremely reliable source to sink communication is required for most of the contemporary WSN applications especially pertaining to military, healthcare and disaster-recovery. However, due to their intrinsic energy, bandwidth and computational constraints, Wireless Sensor Networks (WSNs) encounter several challenges in reliable source to sink com...
Conference Paper
Breast cancer prognosis poses a great challenge to the researchers. Recently, there have been breakthroughs in the field of bioinformatics and because of that a new realm of breast cancer prognosis has opened. The use of machine learning and data mining techniques has revolutionized the whole process of breast cancer prognosis. In this paper we pre...
Conference Paper
Full-text available
Many anticipated deployment scenarios, in particular military, healthcare, and disaster-recovery applications, of Wireless Sensor Networks (WSNs) require reliable source to sink communication. Since transmission range of sensors is quite limited, to achieve higher end-to-end transmission reliability, WSNs generally employ intermediate backbone link...
Article
Many anticipated deployment scenarios, in particular military, healthcare, and disaster-recovery applications, of Wireless Sensor Networks require reliable source to sink communication. In this paper, we introduce a novel reliable topology that uses hotlines between sensor gateways to enhance the reliability of end-to-end transmissions. These hotli...
Conference Paper
Many anticipated deployment scenarios, in particular military, healthcare, and disaster-recovery applications, of Wireless Sensor Networks (WSNs) require reliable source to sink communication. In this paper, we introduce a novel reliable topology that uses hotlines between sensor gateways to enhance the reliability of end-to-end transmissions. Thes...
Conference Paper
Vehicular ad hoc networks (VANETs) are the relevant form of ubiquitous computing. Several protocols are being developed for V2R (vehicle to road side) and V2V (vehicle to vehicle) communication and the notion of intelligent vehicles is nurturing very rapidly. We have tested the existing WIFI protocol for V2V communication especially at high speed....

Network

Cited By