About
57
Publications
15,983
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,434
Citations
Introduction
Current institution
Publications
Publications (57)
Chaos-based image encryption techniques have gained attention due to their potential for generating highly complex and unpredictable encryption algorithms. These algorithms leverage chaotic systems’ attributes, which are sensitive to initial conditions and exhibit complex, non-repeating behavior, enabling them attractive candidate for encryption pu...
ChatGPT, an advanced Artificial Intelligence tool, is getting considerable attention in higher education. ChatGPT significantly changes the student learning experience through its AI-aided support, personalized study assistance and effective educational experiences, and it has become an object of particular interest in this context. This research a...
Improved software for processing medical images has inspired tremendous interest in modern medicine in recent years. Modern healthcare equipment generates huge amounts of data, such as scanned medical images and computerized patient information, which must be secured for future use. Diversity in the healthcare industry, namely in the form of medica...
Autism Spectrum Disorder (ASD) is a neurological condition that significantly affects cognitive abilities, language comprehension, object recognition, interpersonal skills, and communication capabilities. Its primary origin is genetic, and early detection and intervention can mitigate the need for costly medical procedures and lengthy examinations...
In modern air defense systems, safeguarding sensitive information is crucial to prevent unauthorized access and cyber-attacks. Here, we present an innovative image encryption approach, leveraging chaotic logistic maps and hyperchaotic Folded Towel Map sequence generation. The proposed image encryption is a multi-layered procedure intended to secure...
In this study, we propose a novel image encryption approach that utilizes the chaotic dynamics of
the Duffing map and Moore-penrose pseudo inverse to obscure images. Chaotic maps have been widely
used in the field of image encryption due to their sensitive dependence on initial conditions, enabling
them a suitable candidate for generating pseudo-ra...
With the rapid increase in the use of technology, images have become a major source of sharing personal, confidential and official information and there is a dire need to protect this secret data. Image encryption plays major role in the security of images and there are many techniques developed for this purpose. Chaos based image encryption has no...
IoT (Internet of Things) devices are increasingly being used in healthcare to collect and transmit patient data, which can improve patient outcomes and reduce costs. However, this also creates new challenges for data security and privacy. Thus, the major demand for secure and efficient data-sharing solutions has prompted significant attention due t...
Cybersecurity guarantees the exchange of information through a public channel in a secure way. That is the data must be protected from unauthorized parties and transmitted to the intended parties with confidentiality and integrity. In this work, we mount an attack on a cryptosystem based on multivariate polynomial trapdoor function over the field o...
Innovative technological solutions are required to improve patients’ quality of life and deliver suitable treatment. Healthcare workers may be able to watch patients from a distance using the Internet of Things (IoT) by using big data algorithms to analyze instrument outputs. Therefore, it is essential to gather information on use and health proble...
Object-oriented programming (OOP) is prone to defects that negatively impact software quality. Detecting defects early in the development process is crucial for ensuring high-quality software, reducing maintenance costs, and increasing customer satisfaction. Several studies use the object-oriented metrics to identify design flaws both at the model...
A growing number of feature learning methods, particularly those based on deep learning, have been investigated to derive useful feature representations from large quantities of data. However, applying each model in real time for various research requirements can be challenging. With the common use of smartphones equipped with sensors, ensemble lea...
An Internet of Things-based automated patient condition monitoring and detection system is discussed and built in this work. The proposed algorithm that underpins the smart-bed system is based on deep learning. The movement and posture of the patient’s body may be determined with the help of wearable sensor-based devices. In this work, an internet...
In this paper, we explore the development of a simulation model to assist in the decision-making process for monitoring the health conditions of elderly patients using data from their smart beds. The main objective of the proposed simulation model is to estimate the transitional condition of the health system by tracking patients’ physiological sig...
The learning environment usually raises various types of anxiety based on the student’s abilities to use technology and their abilities to overcome the negative feelings of an individual being watched all the time and criticized. Hence, learners still feel anxious while using computers and socializing in an e-learning environment. Learners who are...
Image encryption is one of the sensitive areas used recently to save information over the Internet and confirms the security on a higher level. A new cryptosystem has been proposed for the encoding and decoding of images using sine map, chaotic tent map, and circulant matrices. The process involves three stages. The sine map is used for the permuta...
Artificial intelligence applications (AIA) increase innovative interaction, allowing for a more interactive environment in governmental institutions. Artificial intelligence is user-friendly and embraces an effective number of features among the different services it offers. This study aims to investigate users’ experiences with AIA for governmenta...
Machine learning has already been used as a resource for disease detection and health care as a complementary tool to help with various daily health challenges. The advancement of deep learning techniques and a large amount of data-enabled algorithms to outperform medical teams in certain imaging tasks, such as pneumonia detection, skin cancer clas...
Electromyography is a diagnostic practice that examines the condition of the muscles and the nerves that regulate them. It allows neuromuscular disorders and lesions to be diagnosed, categorized based on their severity, and the most appropriate related treatment to be carried out based on the type of ailment detected. A neurologist or physical ther...
This paper presents a proposal for the development of a new intelligent solution for the optimization of hybrid energy systems. This solution is of great importance for installers of hybrid energy systems, as it helps them obtain the best configuration of the hybrid energy system (efficient and less expensive). In this solution, it is sufficient to...
By comparing the performance of various tree algorithms, we can determine which one is most useful for analyzing biomedical data. In artificial intelligence, decision trees are a classification model known for their visual aid in making decisions. WEKA software will evaluate biological data from real patients to see how well the decision tree class...
Despite numerous studies offering some evidence about the significance of quality measurements in enhancing the success of m-learning applications, there are still limited studies about the role of quality measurements in promoting the usability of mobile learning systems. Therefore, our study explores the role of quality measurements in promoting...
Smart mobile learning (M-learning) applications have shown several new benefits for higher educational institutions during the COVID-19 pandemic, during which such applications were used to support distance learning. Therefore, this study aims to examine the most important drivers influencing the adoption of M-learning by using the technology accep...
Mining association rules are one of the most critical data mining problems, intensively studied since their inception. Several approaches have been proposed in the literature to extend the basic association rule framework to extract more general rules, including the negation operator. Thereby, this extension is expected to bring valuable knowledge...
This study aims to investigate students’ perceptions about the Madrasati platform as well as to identify the crucial factors that could influence the adoption of the Madrasati platform. Online quantitative survey method was employed to collect the data. SEM modelling method was adopted to analyze the hypotheses in the research model. The findings o...
The Industrial Internet of Things (IIoT) is gaining importance as most technologies and applications are integrated with the IIoT. Moreover, it consists of several tiny sensors to sense the environment and gather the information. These devices continuously monitor, collect, exchange, analyze, and transfer the captured data to nearby devices or serv...
The development of mobile learning apps might fail due to poor selection of the suitable technical requirements for mobile devices. This will affect the quality of mobile learning applications and, thus, will increase the development cost of mobile learning apps. Due to the above issues, we need to determine the most appropriate technical quality r...
The goal of this study is to see how cold plasma affects rabbit bone tissue infected with osteoporosis. The search is divided into three categories: control, infected, and treated. The rabbits were subjected to cold plasma for five minutes in a room with a microwave plasma voltage of “175 V” and a gas flow of “2.” A histopathological photograph of...
Digital healthcare is a composite infrastructure of networking entities that includes the Internet of Medical Things (IoMT)-based Cyber-Physical Systems (CPS), base stations, services provider, and other concerned components. In the recent decade, it has been noted that the demand for this emerging technology is gradually increased with cost-effect...
This study focuses on hybrid synchronization, a new synchronization phenomenon in which one element of the system is synced with another part of the system that is not allowing full synchronization and nonsynchronization to coexist in the system. When lim t ⟶ ∞ Y − α X = 0 , where Y and X are the state vectors of the drive and response systems, res...
The IoT refers to the interconnection of things to the physical network that is embedded with software, sensors, and other devices to exchange information from one device to the other. The interconnection of devices means there is the possibility of challenges such as security, trustworthiness, reliability, confidentiality, and so on. To address th...
The thermal characteristics of polymathic methacrylate combined with unsaturated polyester were determined by numerical and experimental research. Models for numerically investigating the parameters of thermal conductivity, specific heat capacity, and thermal diffusivity were developed using COMSOL Multiphysics. The numerical data were then compare...
In gynecological care, mHealth (mobile health) technology may play an important role. Medical professionals’ willingness to use this technology is the key to its acceptance. Most doctors utilize mobile health technology; however, there is still room for improvement in the use of mHealth. Gynecologists were asked to participate in this research to s...
The educational research is increasingly emphasizing the potential of student engagement and its impact on performance, retention and persistence. This construct has emerged as an important paradigm in the higher education field for many decades. However, evaluating and predicting the student’s engagement level in an online environment remains a ch...
Design defects affect project quality and hinder development and maintenance. Consequently, experts need to minimize these defects in software systems. A promising approach is to apply the concepts of refactoring at higher level of abstraction based on UML diagrams instead of code level. Unfortunately, we find in literature many defects that are de...
Student engagement is a primary driver related to the student experience that influences student performance in online environment. It is considered to be one of the better predictors of student learning ensuring the consistency in learning activities, and a major component in effective online teaching. However, different and confusing definitions...
Due to the COVID-19 pandemic, many higher education institutes shifted to online learning with the precautionary measures taken by governments. This transition was very rapid and sudden which brought challenges to all learning methods in all disciplines while opening up new opportunities. Different studies have been carried out to evaluate experien...
The e-assessment, as an important part of any e-learning system, faces the same challenges and problems such as problems related to portability, reusability, adaptability, integration and interoperability. Therefore, we need an approach aiming to generate a general process of the e-assessment. The present study consists of the development of a gene...
The e-assessment, as an important part of any e-learning system, faces the same challenges and problems such as problems related to portability, reusability, adaptability, integration and interoperability. Therefore, we need an approach aiming to generate a general process of the e-assessment. The present study consists of the development of a gene...
Learning analytics (LA) is a significant area of the enhanced learning technology that has been emerged during the last decade. In this paper, we present a Cloud Adapted Workflow e-Assessment System, called Cloud-AWAS. This system makes use of the learning analytics in order to turn learners into more effective and better learners. Hence, Cloud-AWA...
In recent years, e-assessment started to attract a lot of attention from researchers as well as practitioners. There are many problems for the application development of e-assessment such as the difficulty to use the assessment object from a platform to another one. In addition, the domain model reuse rate is hardness to guarantee the consistency b...
Currently, there are many problems of the application development of E-Assessment such as the difficulty to use the assessment object from a platform to another one. In addition, the domain model reuse rate is very low in various application systems, and hardness to guarantee the consistency between designs and codes. Therefore, to resolve these pr...
Currently, there are many problems in the domain of the development of the e-Assessment process such as the difficulty to use a same e-assessment process by different e-learning platforms, the low rate of the eassessment model reuse by various e-learning systems and the hardness to guarantee the consistency between designs and codes. Therefore, to...
In this paper, we define a fundamental model of e-assessment in e-learning based on the analysis of the needs of learners and tutors. Therefore, we describe an innovative approach to specify an adapted workflow for flexible e-assessment system. This approach is based on refinements techniques which are specified by UML activity diagram language. Fi...
The progress of our culture influences the systems that control our knowledge's, skills and behaviour. Our educational system has been influenced by this rapid change, and technology, is more and more used in learning systems. Our interest is particularly focused in e-assessment. It is the most fundamental operation of teaching and training in e-le...
Several scientific projects focused on the creation of Peer-to-Peer data management system. The main objective of these systems is to allow data sharing and integration among a large set of distributed, heterogeneous data sources. The emergence of large scale systems provides solutions and brings to surface new challenging unsolved problems, among...