Fazal NoorIslamic University of Madinah · Faculty of Computer and Information Systems
Fazal Noor
PhD Eng
About
65
Publications
33,714
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,269
Citations
Introduction
Neural Networks
Parallel and Distributed Computing, Embedded Systems, Security, FANETS,IoT
Additional affiliations
September 1986 - May 1992
February 2006 - December 2014
Education
September 1986 - February 1993
Publications
Publications (65)
Unmanned aerial vehicles (UAVs) in beyond 5G (B5G) are crucial for revolutionizing various industries, including surveillance, agriculture, and logistics, by enabling high-speed data transfer, ultra-low latency communication, and ultra-reliable connectivity. However, integrating UAVs into B5G networks poses various security and privacy concerns. Th...
The evolving paradigm of private edge computing seamlessly incorporates the more extensive functionalities of cloud computing with localized processing. This paradigm eliminates the requirement for unmanned aerial vehicles (UAVs) to transmit large volumes of data to a centralized cloud, thereby reducing response times. UAVs' dynamic nature and depe...
The Internet of Vehicles (IoVs) is a wireless network of intelligent and autonomous vehicles and Roadside Units (RSUs), which work together to improve transportation services. On the one hand, this revolutionary mode of transportation optimizes traffic efficiency and reduces congestion and accidents; on the other hand, it raises security and privac...
Thanks to the widespread availability of Fifth Generation (5G) wireless connectivity, it is now possible to provide preventative or proactive healthcare services from any location and at any time. As a result of this technological improvement, Wireless Body Area Networks (WBANs) have emerged as a new study of research in the field of healthcare in...
This study introduces a monopole 4 × 4 Ultra-Wide-Band (UWB) Multiple-Input Multiple-Output (MIMO) antenna system with a novel structure and outstanding performance. The proposed design has triple-notched characteristics due to CSRR etching and a C-shaped curve. The notching occurs in 4.5 GHz, 5.5 GHz, and 8.8 GHz frequencies in the C-band, WLAN ba...
This article introduces a monopole 4x4 Ultra-Wide-Band (UWB) Multiple Input Multiple Output (MIMO) antenna system with a novel structure and outstanding performance. The proposed design has triple-notched characteristics due to CSRR etching and a C-shaped curve. The notching occurs in 4.5 GHz, 5.5 GHz, and 8.8 GHz frequencies in the C-band, WLAN ba...
The Internet of Drones (IoD) is a network of drones that utilizes existing Internet of Things (IoT) infrastructure to facilitate mission fulfilment through real-time data transfer and navigation services. IoD deployments, on the other hand, are often done in public wireless settings, which raises serious security and privacy concerns. A key source...
This paper presents a large gathering dataset of images extracted from publicly filmed videos by 24 cameras installed on the premises of Masjid Al-Nabvi, Madinah, Saudi Arabia. This dataset consists of raw and processed images reflecting a highly challenging and unconstrained
environment. The methodology for building the dataset consists of four co...
Micro Aerial Vehicles (MAVs) are a type of UAV that are both small and fully autonomous, making them ideal for both civilian and military applications. Modern MAVs can hover and navigate while carrying several sensors, operate over long distances, and send data to a portable base station. Despite their many benefits, MAVs often encounter obstacles...
Dengue is a mosquito-borne viral infection, found in tropical and sub-tropical climates
worldwide, mostly in urban and semi-urban areas. Countries like Pakistan receive heavy rains annually resulting in floods in urban cities due to poor drainage systems. Currently, different cities of Pakistan are at high risk of dengue outbreaks, as multiple deng...
With the introduction of 4G/5G internet and the increase in the number of users, the malicious cyberattacks on computing devices has been increased making them vulnerable to external threats. High availability windows servers are designed to ensure delivery of consistent services such as business activities and e-services to their customers without...
Industrial Internet of Things (IIoT) community is concerned about the security of wireless communications in connected industries and autonomous systems. Providing a cyber-security scheme for the IIoT helps you to gain a thorough grasp of the whole spectrum of securing linked industries, from the edge to the cloud. Numerous security schemes have be...
The Internet of Drones (IoD) has recently gained popularity in several military, commercial, and civilian applications due to its unique characteristics, such as high mobility, Three Dimensional (3D) movement, and ease of deployment. Drones, on the other hand, communicate over an un-encrypted wireless link and have little computational capability i...
Locating a missing child or elderly person in a large gathering through face recognition in videos is still challenging because of various dynamic factors. In this paper, we present an intelligent mechanism for tracking missing persons in an unconstrained large gathering scenario of Al-Nabawi Mosque, Madinah, KSA. The proposed mechanism in this pap...
Recently, unmanned aerial vehicles (UAVs), also known as drones, have come in a great diversity of several applications such as military, construction, image and video mapping, medical, search and rescue, parcel delivery, hidden area exploration, oil rigs and power line monitoring, precision farming, wireless communication and aerial surveillance....
Internet of Vehicles (IoV) is an emerging area of advanced transportation systems, in which the functionality of traditional vehicular Ad-hoc Networks (VANET) combined with the internet of things (IoT). This technology allows vehicle users and drivers to interact in real time from anywhere and anytime. However, until recently, the major two problem...
Today, farmers are suffering from the low yield of crops. Though right crop selection is the main boosting key to maximize crop yield by doing soil analysis and considering metrological factors, the lack of knowledge about soil fertility and crop selection is the main reason for low crop production. In the changed current climate, the farmers havin...
The evolution of Flying Ad-hoc Networks (FANETs) marks the paradigm shift from a single large drone to multiple small drones linked together in an ad-hoc fashion. To maintain the Quality of Service (QoS) in the multi-hop networking schema, FANETs utilize the available resources efficiently. However, due to open wireless boundary and high mobility o...
In the last few years, the wireless body area network (WBAN) has emerged as an appealing and viable option in the e-health application domain. WBAN technology is primarily used to offer continuous screening of health data to patients, independent of their location, time, or activity. A WBAN, on the other hand, is vulnerable to different cyberattack...
Nowadays, most e-commerce applications are facing issues to secure a proper authentication level. Mobile devices are related to attack the problems in cloud computing, considering that the present authentication. In view of their computational power constraints, key size and memory capacity, RSA public-key cryptography is not suited for these syste...
The Flying Ad-hoc Networks (FANETs) is characterized by the transition from a single large Unmanned Aerial Vehicle (UAV) to multiple small UAVs connected in an ad-hoc fashion. Since high mobility is the core feature of such networks, they are prone to route breaks within the links. The issue of connectivity loss can be coped with, to some extent, b...
With the exponential growth in technologies for the vehicular Internet of things applications and high demands for autonomous road vehicles, future transportation systems are projected to be revolutionized on a global scale. This new landscape requires a stable, flexible, and business-friendly base of connectivity, networking, and computing technol...
The Internet of Health Things (IoHT) is an extended breed of the Internet of Things (IoT), which plays an important role in the remote sharing of data from various physical processes such as patient monitoring, treatment progress, observation, and consultation. The key benefit of the IoHT platform is the ease of time-independent interaction from ge...
More than two millions of pilgrims visit the holy cities of Makkah and Madinah, in Kingdom of Saudi Arabia, to perform Hajj and Umrah rituals every year. Ensuring safety of the pilgrims is the top priority of Saudi government. Therefore, kingdom considers health, safety and security a red line that is not supposed to be crossed at any extent, consi...
The appearance of COVID-19 virus has affected many aspects of our life. These include and not limited to social, financial and economic changes. One of the most important impacts is the economic effects. Many countries have taken actions to continue the teaching process through online teaching platforms. The students are expected to graduate during...
Handwritten signature is one of the essential biometric parameters widely used for document validation and verification. Other methods such as fingerprints, iris/retina scanning, face, and voice recognition, although more accurate, need special equipment. The purpose of the research is to demonstrate an appropriate and reliable technology organizat...
COVID19 is a contagious virus which has caused a pandemic around the whole world and into lock downs. Humans are social creatures who have to interact with each other and the environment in variety of ways. In this research, flying ad-hoc networks (FANETs) with built-in electronic nose are proposed to detect either diseases or viruses from samples...
Unmanned aerial vehicles (UAVs), also known as drones, once centric to military applications, are presently finding their way in many civilian and commercial applications. If national legislations permit UAVs to operate autonomously, one will see the skies become populated with many small UAVs, each one performing various tasks such as mail and pac...
Metaheuristic algorithms are powerful methods for solving compute intensive problems. neural Networks, when trained well, are great at prediction and classification type of problems. Backpropagation is the most popular method utilized to obtain the weights of Neural Nets though it has some limitations of slow convergence and getting stuck in a loca...
Optimization algorithms have been applied in many fields. This paper presents performance of Genetics Algorithm and Runner-Roots Algorithm in computation of Reducts. An important area of research in Data Mining is knowledge discovery. Massive amounts of data exists in the health industry and problem is to sift through it, removing redundancy and at...
A group of small UAVs can synergize to form a flying ad hoc network (FANET). The small UAVs are, typically, prone to security lapses because of limited onboard power, restricted computing ability, insufficient bandwidth, etc. Such limitations hinder the applicability of standard cryptographic techniques. Thus, assuring confidentiality and authentic...
A Flying Ad-hoc Network (FANET) consists of Unmanned Aerial Vehicles (UAVs) tasked to handle the communication jobs in a multi-hop ad-hoc fashion. Unlike its predecessors, i.e. Mobile Ad-hoc Networks (MANETs) and Vehicular Ad-hoc Networks (VANETs), a FANET promises uninterrupted connectivity, especially during events that are temporary and stipulat...
Recent studies have shown that robust diets recommended to patients by Dietician or an Artificial Intelligent automated medical diet based cloud system can increase longevity, protect against further disease, and improve the overall quality of life. However, medical personnel are yet to fully understand patient-dietician’s rationale of recommender...
Optimization algorithms are often used to obtain optimal solutions to complex nonlinear problems and appear in many areas such as control, communication, computation, and others. Bat algorithm is a heuristic optimization algorithm and efficient in obtaining approximate best solutions to non-linear problems. In many situations complex problems invol...
Unmanned aerial vehicles (UAVs), when interconnected in a multi-hop ad-hoc fashion,
or as a flying ad-hoc network (FANET), can efficiently accomplish mission-critical tasks. However, UAVs usually suffer from the issues of shorter lifespan and limited computational resources. Therefore, the existing security approaches, being fragile, are not capabl...
The detection and tracking of object in a video is an important problem in many applications. In surveillance and in robotic vision tracking and recognition of objects and it’s size is desired. In this paper, an algorithm to obtain size of an object in image or video is presented based on pixel relationship to actual size. The object is mainly trac...
In this research, a platform is proposed based on optimization algorithms for Energy Management System for buildings. Building energy consumption can be minimized based on Artificial Intelligence and user requirements of power supplied therefore allowing comfort to consumer with efficient operation and functioning of the building. A prototype using...
The growing demand for electricity and fuel shortage is a global challenge due to rapid growth in electricity demand, especially from air conditioning in residential and commercial buildings and huge difference in peak loads between summer and winter. This means, over time, the electricity authorities will have to raise the price for electricity du...
The growing demand for electricity and fuel shortage is a global challenge due to rapid growth in electricity demand, especially from air conditioning in residential and commercial buildings and huge difference in peak loads between summer and winter. This means, over time, the electricity authorities will have to raise the price for electricity du...
Ultrasonic sensors have been used in a variety of applications to measure ranges to objects. Hand gestures via ultrasonic sensors form unique motion patterns for controls. In this research, patterns formed by placing a set of objects in a grid of cells are used for control purposes. A neural network algorithm is implemented on a microcontroller whi...
In this research the focus is on detecting multiple objects with an ultrasonic sensor in a dark environment where video or snapshot from a camera is not possible. The problem is to differentiate objects placed in close vicinity of each other and to calculate the width of the objects or the width of a gap between objects placed next to each other. A...
In this paper, we implement a Parallel Distributed Phase Correlation algorithm for fingerprint verification through Cloud computing services. The algorithm is proposed to be hosted by Cloud Computing Services with Quality of Service (QoS) and Quality of Protection (QoP). We also propose 128-bit encryption for security and privacy of individuals' fi...
Nowadays cloud-computing services are being offered by various organizations. Peer-to-Peer (P2P) networks can be used as a collaborative computing environment to solve computationally intensive problems. In this work, we use a PC cluster to simulate a P2P network and present results of a computationally intensive image matching algorithm (fingerpri...
In this paper we present two methodologies, one is to use MPI collective communication functions as performance measures to measure communication time between peers. The other is to use a Distributed Genetic algorithm with MPI functions running on each peer node for solving a variety of optimization problems. Genetic Algorithms are found useful in...
Message Passing Interface (MPI) is an important mechanism in P2P. Herein we assess how different types of MPI collective communication functions perform on a Gigabit Ethernet Homogeneous Beowulf PC cluster. In this way we provide an insight on the factors that affect P2P applications over an enterprise context such as the emerging Cloud-based servi...
In this paper MPI is used on PC Cluster to compute all the eigenvalues of Hermitian Toeplitz Matrices. The parallel algorithms
presented were implemented in C++ with MPI functions inserted and run on a cluster of Lenovo ThinkCentre machines running
RedHat Linux. The two methods, MAHT-P one embarrassingly parallel and the other MPEAHT using master/...
Diagnostic march tests are powerful tests that are capable of detecting and identifying faults in memories. Although march SS was published for detecting simple static faults, no test has been published for identifying all faults possibly present in memory cells. In this paper, we target all published simple static faults. We identify faults that c...
The numerical solution of the complete eigenspectrum for Hermitian
Toeplitz matrices is presented. Trench's algorithm (1989), which employs
bisection on contiguous intervals, and the Pegasus method are used to
achieve estimates of distinct eigenvalues. Several modifications of
Trench's algorithm are examined; the goals are an increase in the rate
o...
A solution to the inverse eigenvalue problem for Hermitian
Toeplitz matrices is presented. The approach taken is to first construct
a real symmetric negacyclic matrix of order 2 n and to then
relate the negacyclic matrix to a Hermitian Toeplitz matrix of order
n with the desired eigenspectrum
Two unitary matrices are presented that transform a Hermitian
Toeplitz matrix into a real Toeplitz-plus-Hankel matrix and vice versa.
Additional properties and consequences of these unitary transformations
are also presented. For a certain class of n -dimensional
Toeplitz-plus-Hankel systems of equations, an efficient method of
solution is presente...
The probability of bit error is evaluated for a communication
system using frequency hopping for jamming rejection and quadrature
partial-response signaling for baseband modulation. The environment in
which the system is operating is modeled as severe partial-band tone
jamming under frequency-selective fading affecting both the signal and
the jamme...
A recursive algorithm is developed for finding the eigenvalues of a Hermitian Toeplitz matrix order n. The algorithm presented represents a generalization to the Hermitian case of one proposed by D.M. Wilkes and M.H. Hayes (1987) for the symmetric Toeplitz case. The method proposed uses Levinson's algorithm, or the more computationally efficient He...
In this paper, the performance of frequency-hopping minimum-shift-keying (FH/MSK) system operating over a frequency-selective channel and partial tone Jamming is presented. In the analysis of FH/MSK system, conventional type MSK transmitter and receiver structures are employed. Also the channel model which assumes wide-sense-stationary-uncorrelated...
In this work, a number of advances are described which we feel lead to better understanding and solution of the eigenvalue and inverse eigenvalue problems for Hermitian Toeplitz matrices. First, a unitary matrix is derived which transforms a Hermitian Toeplitz matrix into a real Toeplitz plus Hankel matrix. Some properties of this transformation ar...