M. Azath

M. Azath

About

42
Publications
2,856
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
194
Citations

Publications

Publications (42)
Article
Full-text available
In modern agriculture, IoT is playing a vital part in monitoring and controlling the parameters that has been influenced the growth of the plants. The proposed Hydroponics is sourced by the Solar PV System. It is coupled with the Brushless DC Motor Drive with optical encoder to fulfill the requirement of water in Hydroponics through DC to DC Conver...
Article
Full-text available
Individuals with Motor Neuron Disease were unable to move from one place to another because it gradually reduced all the voluntarily movement due to the degeneration of upper and lower motors neurons. The solution to this problem was to develop rehabilitating devices using biosignals. In this study, we have designed and developed electrooculogram-b...
Article
A smart metropolitan area develops Information and Communications Technology (ICT) to renovation of smart transportation features with lower cost and better efficiency. The foremost aim of this study is to pinpoint and resolve the difficulties in Bhopal-Indore highways. The most important smart metropolitan uses are smart protection, smart alive, a...
Article
Voice signal analysis and identification of disease framework for Parkinson's disease (PD) is most required thing in the past few years. A new framework for determination and identification of PD is the world's most severe neurological disorder, was proposed in this article. It is the most dangerous infection which disables individuals' discourse,...
Article
The waste management is a major problem all over the world. The smart is an innovative automated device for the separate collection of used absorbent hygiene products. The Automatic Intelligence Smart Bin helps to solve waste management problem in smart cities. The smart bin will play a important role in smart cities. The smart lifestyle begins wit...
Chapter
Mobile wireless sensor network (MWSN) consists of numerous wireless sensor nodes that can energetically build a network to transmit the details lacking the preset infrastructure. The MANET is simple to be formed as well as does not necessitate any precise support; thus, it is incredibly admired between users. Mobile sensor nodes require transmittin...
Chapter
A suffix tree is a data structure that stores a string of text. In bioinformatics, the suffix trees can be used as a tool to align the entire genomes of closely related organisms, to compare sequence assemblies at different phases and to compare and analyze the results. This paper focuses on the aligning of various whole genome sequences, using suf...
Article
Full-text available
The wireless sensor networks are very vulnerable environments for network attacks, so that they require appropriate security measures must be implemented. The blockchain technology is an effective way of protecting data handled and possessed by the wireless sensor networks. Many of the existing approaches are following conventional security approac...
Chapter
Project aims to decrease the contamination in the water which is a very serious concern both for humans and water organisms. It uses a smart fish-type robotic sensor network which continuously monitors the contamination and sends the data to the control unit. The data include the contamination level and the GPS location of the contamination area. T...
Article
Despite wide spread advances in the car manufacturing industries around the world, the death toll from car accidents is worrying. This concern is heightened when reports of a road accident website reports that the main reason in 25% of road accidents in particular and 60% to road accidents resulting in death or injury. Therefore, there has been a g...
Article
The growth of computer-related technologies and the development of Internet in the world caused moving traditional businesses towards electronic, in addition to it, website-based startup businesses have been established. These businesses are faced with much larger target market than before, but reaching to a larger target market requires to cross f...
Article
This study was conducted to investigate the relationship between entrepreneurship and social networks among entrepreneurs in Abha province using descriptive correlational method. The statistical population of this study included 313 entrepreneurs in Abha province who were selected by random sampling. Information was obtained using a questionnaire....
Article
Data mining is a technique for discovering new knowledge from databases and the use of data mining in medicine is considered one of the most widely used fields of data mining. Schizophrenia is one of the most common illnesses that cause many financial and social damages to society due to the loss of individual performance. In this study, we will ex...
Article
In recent years, the ad hoc network has emerged as a solution to the challenges of designing high-performance complex systems at the nanoscale. Maintaining information security in complex systems is an important issue. Therefore, this paper presents a new topology based on the Torres network with encryption capability to build internal network inte...
Article
Targeting in organizations is one of the main pillars of determining organizational fate. The extent of transparency of objectives has a great impact on the design and formulation of main key words of strategic planning. Regarding the attractiveness of the BSC method and its application in production-oriented organizations, it can increasingly achi...
Article
Full-text available
Health Electronic Records (HER) share the data to improve the quality and decrease the cost of Healthcare. It is challenging because of techniques complexities and privacy compatibilities issues. The existing system is more popular to use the cloud-based healthcare system. However, the healthcare system is affected by content privacy and secure dat...
Article
Fog computing is playing a vital role in data transmission to distributed devices in the Internet of Things (IoT) and another network paradigm. The fundamental element of fog computing is an additional layer added between an IoT device/node and a cloud server. These fog nodes are used to speed up time-critical applications. Current research efforts...
Article
Full-text available
Air overpressure (AOp) is one of the most important undesirable effects induced by blasting operations in the mining or tunneling projects. Hence, the present precise model for the prediction of AOp would be much beneficial to control the AOp. To this end, the present study proposes a new hybrid of group method of data handling (GMDH) and genetic a...
Article
Full-text available
Classical job shop scheduling problems took many forms over decades out of which the prominent one is flexible job shop scheduling problem (FJSP), where any machine from a given set, rather than one specific machine can process each operation. To form a stronger search mechanism and better scheduling, an integrated search heuristic given as integra...
Article
The rapid development of internet of things (IoT) is to be the next generation of the IoT devices are a simple target for attackers due to the lack of security. Attackers can easily hack the IoT devices that can be used to form botnets, which can be used to launch distributed denial of service (DDoS) attack against networks. Botnets are the most da...
Article
Full-text available
Nowadays, personal health records (PHR) has built as a platform for health care data trading. The realistic deployment of PHR in distributed computing infrastructure raises the protection and data security hazards that need to be addressed. However, there have been broad security concerns as personal health data. It could be raised for external ser...
Chapter
The paper focusing on the analysis of the feature extraction (FE) algorithm using a two-dimensional discrete wavelet transform (DWT) in mammogram to detect microcalcifications. We are extracting nine features namely Mean(M), Standard deviation(SD), Variance(V), Covariance(Co_V), Entropy(E), Energy(En), Kurtosis(K), Area(A) and Sum(S). FE is a tool...
Chapter
In recent years, cloud services are emerging popular among the public and business ventures. Most of companies are trusting on cloud computing technology for production tasks. Distributed Denial of Service (DDoS) attack is a major general and critical type of attack on the cloud that proved extremely damaging the services. In current years, several...
Article
Full-text available
In the current circumstance, the dimension of information in many kind of cloud atmosphere increases enormously along with the trend of Big Data. Subsequently making, it is a test for common software programming tools to get, supervise, and huge scale process information inside an explicit spans. Thus, it is a test for previous anonymization ways t...
Article
Full-text available
Mobile learning (M learning) supports ubiquitous learning thus is a strong contender in distance learning. One of the challenge faced in development of m learning is an efficient and secure communication network. Mobile ad hoc network (MANET) refers to a set of wireless mobile nodes possessing no centralized architecture as well as a dynamic topolo...
Article
Full-text available
In recent years, the block chain technology considered as adaptable compared to other techniques. Many of the industry, understanding the block chain technology is utilizing for financial services and its transactions but it also effective in other sectors like healthcare industry. Existing methods are hazardous; where, data stored in outsider serv...
Article
Full-text available
p>In this paper, three different impedance source inverters: Z-source inverter, EZ- source inverter, TZ-Source for wind energy conversion system (WECS) were investigated. Total output power and THD of each of these systems are calculated. The proposed system can boost the output voltage effectively when the low output voltage of the generator is av...
Article
Wireless sensor networks (WSNs) circulate hundreds to thousands of modest miniaturized scale sensor hubs in their locales and these hubs are vital parts of Internet of Things (IoT). In WSN-helped IoT, the hubs are asset obliged from multiple points of view, for example, stockpiling assets, figuring assets, vitality assets, et cetera. Powerful steer...
Article
The use of data mining procedures for decision making has been increasing in the past decades in identifying students’ behavior and use of knowledge available in university is a great concern to the e-learning or virtual learning higher education system is increased and the big data phenomenon is also growing from the dawn of time up to 2003 people...
Article
In this paper, three different impedance source inverters: Z-source inverter, EZ-source inverter, TZ-Source for wind energy conversion system (WECS) were investigated. Total output power and THD of each of these systems are calculated. The proposed system can boost the output voltage effectively when the low output voltage of the generator is avail...
Chapter
Automatic Fingerprint Identification System (AFIS) uses fingerprint segmentation as its pre-processing step. A fingerprint segmentation step divides the fingerprint image into foreground and background. An AFIS that uses a feature extraction algorithm for person identification will tend to fail if it extracts spurious features from the noisy backgr...
Article
Full-text available
Mobile Adhoc Network (MANET) is a dynamic field that has acquired remarkable attention for its self-configuration and self-maintenance. It is composed of Mobile Nodes using radio links to form a network without any infrastructure. In MANETs, wireless nodes are allowed to move freely and can join/leave network. MANETs are extremely at risk to variou...
Conference Paper
Full-text available
A framework with three layers is proposed for data collection in wireless sensor networks, which consists of the sensor layer, cluster head layer, and SenCar layer. The aim is to achieve good scalability, long network lifetime and low data collection latency. In the sensor layer, a distributed load balanced clustering (LBC) algorithm is projected f...
Chapter
Through this paper our attempt is to give a onetime networking solution by the means of merging the VLSI field with the networking field as now a days the router is the key player in networking domain so the focus remains on that itself to get a good control over the network, Networking router today are with minimum pins and to enhance the network...
Article
This paper presents a detailed examination of how the dynamic and heterogeneous nature of real-world peer-to-peer systems can introduce bias into the selection of representative samples of peer properties (e.g., degree, link bandwidth, number of files shared).The efficient distribution of stored information has become a major concern in the web whi...

Network

Cited By