
Madini O. Alassafi- BS, MS & PhD in Computer Science, KSA, USA, UK
- Professor (Assistant) at King Abdulaziz University, University of Southampton,
Madini O. Alassafi
- BS, MS & PhD in Computer Science, KSA, USA, UK
- Professor (Assistant) at King Abdulaziz University, University of Southampton,
About
122
Publications
184,695
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,033
Citations
Introduction
Madini O. Alassafi received his B.S. degree in Computer Science from King Abdulaziz University, Saudi Arabia in 2006, and received M.S. degree in Computer Science from California Lutheran University, United State of America in 2013. He received the PhD degree in Security Cloud Computing in April 2018 from University of Southampton, Southampton, United Kingdom. He is currently work as an assistant professor, Information Technology department in the Faculty of Computing and Information Technology at King Abdulaziz University. His research interests are mainly focus on Cloud Computing and Security, Distributed Systems, Internet of Things (IoT) Security Issues, Security Threats, Cloud Security Adoption, Risks, Cloud Migration, Project Management and Cloud of Things.
Current institution
King Abdulaziz University, University of Southampton,
Current position
- Professor (Assistant)
Publications
Publications (122)
In recent years, the detection of depression among university students has become an increasingly critical issue. This paper presents a depression detection network (DDNet), a novel approach utilizing a three-stage stacked ensemble model to address this challenge. The proposed model incorporates two different Multilayer Perceptron (MLP) and a Stoch...
The integration of Artificial Intelligence with the Internet of Things (AIoT) significantly enhances the functionality of Vehicle-Road Cooperation (VRC) systems by enabling smarter, real-time decision-making and resource optimization across interconnected vehicular networks. To tackle the challenges associated with resource constraints, this study...
Research has recently grown on multi-agent systems (MAS) and their coordination and secure cooperative control, for example in the field of edge-cloud computing. MAS offers robustness and flexibility compared to centralized systems by distributing control across decentralized agents, allowing the system to adapt and scale without overhaul. The coll...
Rice is one of the fundamental food items that comes in many varieties with their associated benefits. It can be sub-categorized based on its visual features like texture, color, and shape. Using these features, the automatic classification of rice varieties has been studied using various machine learning approaches for marketing and industrial use...
An aim of the analysis of biomedical signals such as heart rate variability signals, brain signals, oxygen saturation variability (OSV) signals, etc., is for the design and development of tools to extract information about the underlying complexity of physiological systems, to detect physiological states, monitor health conditions over time, or pre...
Machine Learning (ML) has become a potent predictive analytics tool in several fields, including the study of social media data. Social media sites have developed into massive repositories of user-generated information, providing insightful data about user trends, interests, and behavior. This abstract emphasizes the use of machine learning methods...
The vulnerability of conventional face recognition systems to face presentation or face spoofing attacks has attracted a great deal of attention from information security, forensic, and biometric communities during the past few years. With the recent advancement and availability of cutting-edge computing technologies, sophisticated and computationa...
Alzheimer’s disease has become a major concern in the healthcare domain as it is growing rapidly. Much research has been conducted to detect it from MRI images through various deep learning approaches.However, the problems of the availability of medical data and preserving the privacy of patients still exists. To mitigate this issue in Alzheimer’s...
Alzheimer’s disease has become a major concern in the healthcare domain as it is growing rapidly. Many researches have been conducted to detect it from MRI images through various deep-learning approaches. However, the problem of the availability of medical data and the privacy of the patients still exists. To mitigate this issue in Alzheimer’s dise...
In order to solve the challenges brought by multi-source and cross-domain scenarios to online music education, this paper designs an online music education system based on advanced artificial intelligence technology, which can provide personalized learning course resource recommendations for music online learners. The system includes four layers, c...
The cultivation of creativity is closely related to language learning. How to design the creativity promotion mechanism of English teaching in the public environment is the challenge faced by English teachers. With the advent of the era of big data, English teachers can apply the latest research results to classroom teaching. For example, the ratio...
Abnormal detection of wind turbine converter (WT) is one of the key technologies to ensure long-term stable operation and safe power generation of WT. The number of normal samples in the SCADA data of WT converter operation is much larger than the number of abnormal samples. In order to solve the problem of low abnormal data and low recognition rat...
For the problem of class-imbalance in the operation monitoring data of wind turbine (WT) pitch connecting bolts, an improved Borderline-SMOTE oversampling method based on “two-step decision” with adaptive selection of synthetic instances (TSDAS-SMOTE) is proposed. Then, TSDAS-SMOTE is combined with XGBoost to construct a WT pitch connection bolt fa...
In a deluge of scientific literature, it is important to build scientific quantitative rules (SQR) that can be applied to researchers' quantitative data in order to produce a uniform format for making decisions regarding the nomination of outstanding researchers. Google Scholar and other search engines track scholars’ papers, citations, etc. Howeve...
Face presentation attack detection (PAD) is considered to be an essential and critical step in modern face recognition systems. Face PAD aims at exposing an imposter or an unauthorized person seeking to deceive the authentication system. Presentation attacks are typically made using a fake ID through a digital/printed photograph, video, paper mask,...
Depression and anxiety are prevalent mental illnesses that are frequently disregarded. It is estimated that more than 5% of the population suffers from depression or anxiety. Although there have been a number of influential studies in these fields, the majority of the research focuses on one or two factors for detection purposes, whereas these fact...
The Internet of Things (IoT) has grown more pervasive in recent years. It makes it possible to describe the physical world in detail and interact with it in several different ways. Consequently, IoT has the potential to be involved in many different applications, including healthcare, supply chain, logistics, and the automotive sector. IoT-based sm...
This article presents an indirect neural-based finite-time integral sliding mode control algorithm for the reference trajectory tracking guidance of Mars entry vehicle under uncertainties. The proposed controller is developed as a combination of finite-time integral sliding mode controller and indirect neural identification. The finite-time integra...
Purpose
This paper aims to investigate an adaptive prescribed performance control problem for switched pure-feedback non-linear systems with input quantization.
Design/methodology/approach
By using the semi-bounded continuous condition of non-affine functions, the controllability of the system can be guaranteed. Then, a constraint variable method...
Blockchain with its numerous advantages is often considered a foundational technology with the potential to revolutionize a wide range of application domains, including enterprise applications. These enterprise applications must meet several important criteria, including scalability, performance, and privacy. Enterprise blockchain applications are...
Contemporarily numerous analysts labored in the field of Vehicle detection which improves Intelligent Transport System (ITS) and reduces road accidents. The major obstacles in automatic detection of tiny vehicles are due to occlusion, environmental conditions, illumination, view angles and variation in size of objects. This research centers on tiny...
The aim of this article is to analyze the delay influence on the attraction for a scalar tick population dynamics equation accompanying two disparate delays. Taking advantage of the fluctuation lemma and some dynamic inequalities, we derive a criterion to assure the persistence and positiveness on the considered model. Furthermore, a time-lag-depen...
In this paper, a fractional neural integral sliding-mode controller based on the Caputo-Fabrizio derivative and Riemann-Liouville integral for a robot manipulator mounted on a free-floating satellite is proposed and developed. The mathematical model is obtained by using the Euler-Lagrange formalism and generalized through the Caputo-Fabrizio deriva...
Brain connectivity-based methods are efficient and reliable for assessing the mental workload during high task demands as the human brain is functionally interconnected during any psychological task. On the other hand, the graph theory approach is a mathematical study that draws the pairwise relationships between objects. This paper covers the depl...
This paper investigates the command filter backstepping control of uncertain fractional-order generalized strict-feedback nonlinear systems with input nonlinearities and functional uncertainties based on a composite learning method. The main motivations are that the simplification of backstepping control by providing the fractional-order command fi...
The finite-time tracking control issue for a class of nonlinear pure-feedback system with prescribed performance and unknown hysteresis is investigated in this work. To solve the Bouc-Wen hysteresis with unknown parameters and direction conditions, the Nussbaum function and auxiliary virtual control function are used. A finite-time performance func...
In this study, a novel heuristic computing technique is presented to solve bioinformatics problem for the corneal shape model of eye surgery using Morlet wavelet artificial neural network optimized by the global search schemes, i.e. genetic algorithm (GA), local search technique, i.e. sequential quadratic programming (SQP) and the hybrid of GA-SQP....
COVID-19 is a disease caused by SARS-CoV-2 and has been declared a worldwide pandemic by the World Health Organization due to its rapid spread. Since the first case was identified in Wuhan, China, the battle against this deadly disease started and has disrupted almost every field of life. Medical staff and laboratories are leading from the front, b...
In today’s sophisticated global marketplace, supply chains are complex nonlinear systems in the presence of different types of uncertainties, including supply-demand and delivery uncertainties. Though up to now, some features of these systems are studied, there are still many aspects of these systems which need more attention. This necessitates mor...
In this article, a command filtering‐based adaptive event‐triggered neural network control scheme is proposed for a class of uncertain switched nonlinear systems with unknown control coefficient and input saturation. First, radial basis function neural networks are used as function approximators to estimate unknown nonlinear functions. Then, an eve...
Image retrieval techniques are becoming famous due to the vast availability of multimedia data. The present image retrieval system performs excellently on labeled data. However, often, data labeling becomes costly and sometimes impossible. Therefore, self-supervised and unsupervised learning strategies are currently becoming illustrious. Most of th...
With the rapid development of wireless technologies, wireless access networks have entered their Fifth-Generation (5G) system phase. The heterogeneous and complex nature of a 5G system, with its numerous technological scenarios, poses significant challenges to wireless resource management, making radio resource optimization an important aspect of D...
Stochastic robustness of discrete noises has already been proposed and studied in the previous work. Nevertheless, the significant phenomenon of delays is left in the basket both in the deterministic and the stochastic parts of the considered equation by the existing work. Stimulated by the above, this paper is devoted to studying the stochastic ro...
Cardiac disease diagnosis and identification is problematic mostly by inaccurate segmentation of the cardiac left ventricle (LV). Besides, LV segmentation is challenging since it involves complex and variable cardiac structures in terms of components and the intricacy of time-based crescendos. In addition, full segmentation and quantification of th...
This study is concerned with dynamical investigation, electrical circuit realization, and emulation of a fractional three-echelon supply chain system. In the financial realm, long-term memory effects play important roles. On the other hand, most financial systems are uncertain with unknown nonlinear dynamics. However, most studies on nonlinear supp...
Intrusion detection in computer networks is of great importance because of its effects on the different communication and security domains. The detection of network intrusion is a challenge. Moreover, network intrusion detection remains a challenging task as a massive amount of data is required to train the state-of-the-art machine learning models...
Due to the vital role of financial systems in today’s sophisticated world, applying intelligent controllers through management strategies is of crucial importance. We propose to formulate the control problem of the macroeconomic system as an optimization problem and find optimal actions using a reinforcement learning algorithm. Using the Q-learning...
In this paper, an output‐based event‐triggered control problem of discrete‐time networked control systems (NCSs) subject to bilateral packet dropouts is investigated. In view of stochastic sequences of packet dropouts in the measurement channels (from sensors to controller) and the control channels (from controller to actuators), the NCS is convert...
The aim of this study is to present the numerical solutions of the Liénard nonlinear model by designing the structure of the computational Gudermannian neural networks (GNNs) along with the global/local search efficiencies of genetic algorithms (GAs) and interior-point algorithm (IPA), i.e. GNNs–GAs–IPA. A merit function in terms of differential sy...
To ensure the stability of the communication architecture in the power monitoring system, we propose an intelligent grid cyber-physical communication architecture modelling method based on the correlation characteristic matrix model. The article connects the physical entity layer, the information physical coupling layer, and the information system...
Over the last years, distributed consensus tracking control has received a lot of attention due to its benefits, such as low operational costs, high resilience, flexible scalability, and so on. However, control methods that do not consider faults in actuators and control agents are impractical in most systems. There is no research in the literature...
The dichotomy model of education informatisation is essential, which means the measurement of education informatisation construction and development. Finite element differential equations play an essential role in signal and information teaching. To improve teaching information, the paper applies the dichotomy model of finite element differential e...
Identifying parameters of financial and economic models with chaotic dynamics is an important, yet daunting challenge because of the complexities there exist in these chaotic systems. Although several studies have been devoted to understanding the mechanism of financial systems, the application of most state-of-the-art methods to these systems is c...
This article takes the nonlinear differential equation model as an example and uses information technology to create a new course teaching model. The computing software Maple is effectively applied to the precise solution of nonlinear differential equations through the analysis of examples. The overall goal and specific implementation of the teachi...
The advancement of Chinese education informatisation construction has injected new vitality into the development of Chinese educational technology in the new era and brought new challenges to the development of Chinese educational technology. Nonlinear dissipative structure theory has been a necessary enlightenment for the development of education...
COVID-19 was declared a global pandemic by the World Health Organisation (WHO) on 11th March 2020. Many researchers have, in the past, attempted to predict a COVID outbreak and its effect. Some have regarded time-series variables as primary factors which can affect the onset of infectious diseases like influenza and severe acute respiratory syndrom...
The population in Saudi Arabia is expected to reach 40 million by 2025. Consequently, healthcare information will become critical to manage. Despite the fact that adopting cloud computing in the Saudi healthcare organizations can facilitate cost reduction, capacity building, institutional interoperability, and get access to data analytics, the adop...
COVID-19 pandemic has impacted various walks of life. A critical aspect of human development is education, which has been transformed from traditional face-to-face to online education. Various researchers have studied the impact of online modes of education on the learning curve of students. This research envisions identifying the intention among s...
The identification of nonlinear system is studied to establish an accurate model of coordination system. The original dynamic fuzzy neural network (DFNN) is first used to identify the nonlinear system for finding the existing problems. Aiming at the problems found, two improvements are made. For the problem of too many pre-set parameters in the ori...
It is crucial to ensure proper surveillance for the safety and security of people and their assets. The development of an aerial surveillance system might be very effective in catering to the challenges in surveillance systems. Current systems are expensive and complex. A cost-effective and efficient solution is required, which is easily accessible...
The modelling and prediction of extreme temperature changes in enclosed compartments is a domain with applications ranging from residential fire alarms, industrial temperature sensors to search and rescue personnel safety systems. The spread of fire in enclosed compartments is a highly uncertain and nonlinear process. Hence, in safety-critical case...
For conventional backstepping control, the analytical calculation of certain virtual controller is required in each step, so when system order increases, the computational burden also increases. An adaptive command filtered fuzzy synchronization approach is implemented for strict feedback fractional-order chaotic systems (FCSs) in this paper. The c...
One of the leading university goals is to provide the students with the necessary skills for better functioning in their future studies. Gaining and developing skills, both technical and soft skills, are the critical building blocks for a successful career. The traditional teaching process, which includes delivering lectures and conducting exams, e...
The variety of cloud services (CSs) that are described, their non-uniform naming conventions, and their heterogeneous types and features make cloud service discovery a difficult problem. Therefore, an intelligent cloud service discovery framework (CSDF) is needed for discovering the appropriate services that meet the user's requirements. This study...
The digital and physical methods of establishing minimal curved surfaces are the basis for realizing the design of the minimal curved surface modeling structure. Based on this research background, the paper showed an artistic surface modeling method based on nonlinear over-limit difference equations. The article combines parameter optimization and...
In this paper, the optimal output tracking problem for a class of switched Boolean networks is investigated by using a graph-theoretical method. Firstly, by using the semitensor product of matrices, the algebraic equation of switched Boolean networks is formulated, and then by utilizing the concepts of set stabilization and switching invariant set,...
Source location privacy (SLP) is a serious issue in wireless sensor networks (WSN) since Eavesdroppers tries to determine the source location. Hunting Animals in Forest is considered as an example for SLP. Many conventional schemes have been proposed for SLP in WSN, namely, Random Walk Routing, and Fake Messages Transmission, which cause critical i...
In this paper, an output-based event-triggered control problem of discrete-time networked control systems (NCSs) subject to bilateral data packet dropouts is investigated. In view of the stochastic sequences of packet dropouts in measurement channels (from sensors to controller) and control channels (from controller to actuators), the NCS is conver...
This paper studies the problem of adaptive fuzzy tracking control for a class of pure-feedback switched nonlinear systems with unknown gain. First, the studied system is handled by using the mean value theorem, the initial pure-feedback nonlinear systems become affine nonlinear systems. Then, the unknown signal is handled through a linear transform...
Firstly, in the present study, classical and fractional variants modeling of the new coronavirus disease transmission are numerically investigated. Afterward, to shape robust and effective policies for preventing the massive outbreak, a fuzzy-based sliding mode control technique is designed. The contact rate is considered as governmental control ac...
Brain tumors are life-threatening for adults and children. However, accurate and timely detection can save lives. This study focuses on three different types of brain tumors: Glioma, meningioma, and pituitary tumors. Many studies describe the analysis and classification of brain tumors, but few have looked at the problem of feature engineering. Met...
The main purpose of a topological index is to encode a chemical structure by a number. A topological index is a graph invariant, which decribes the topology of the graph and remains constant under a graph automorphism. Topological indices play a wide role in the study of QSAR (quantitative structure-activity relationship) and QSPR (quantita-tive st...
Several bioactivities of chemical compounds in a molecular graph can be expected by using many topological descriptors. A topological descriptor is a numeric quantity which quantify the topology of a graph. By defining the metric on a graph related with a vector space, we consider this graph in the context of few topological descriptors, and quanti...
This paper presents a comprehensive survey on intrusion and extrusion phenomena and their existing detection and prevention techniques. Intrusion and extrusion events, breach of security system, hamper the protection of the devices or systems. Needless to say that security threats are flourishing with new level of complexity making difficulty in re...
A shortest path between two vertices u and v in a connected graph G is a u−v geodesic. A vertex w of G performs the geodesic identification for the vertices in a pair u,v if either v belongs to a u−w geodesic or u belongs to a v−w geodesic. The minimum number of vertices performing the geodesic identification for each pair of vertices in G is calle...
Smart grid data traffic behaves in a similar way to computer network data traffic and they are vulnerable to the same security risks. This paper presents a methodology for the real-time determination of adaptive estimates of router traffic-rate demand every five-minutes, as well as for the evolution of the estimated demand starting from zero during...
One of the university main goals is to provide the students with the necessary skills for better functioning in their future studies. Gaining and developing skills, both technical and soft skills, are the key building blocks for a successful career. Traditional teaching process, which includes delivering lectures and conducting exams, emphasizes on...
Economic systems, due to their substantial effects on any society, are interesting research subject for a large family of researchers. Despite all attempts to study economic and financial systems, studies on discrete-time macroeconomic systems are rare. Hence, in the current study, we aim to investigate dynamical behavior and synchronization of the...
The advent in Online Social Networks (OSN) and Internet of Things (IoT) has created a new world of collaboration and communication between people and devices. The domain of internet of things uses billions of devices (ranging from tiny sensors to macro scale devices) that continuously produce and exchange huge amounts of data with people and applic...
There is a significant need for a computer-aided modeling, effective information analysis and ontology knowledge base models to support both special needs children and care providers. As this research work correlated to the symmetry scope, it proposes an innovative generic smart knowledge-based “School Care Coordination System” (SCCS), which is est...
Fingerprint-based biometric systems are designed to authenticate and provide authorized access to the users in various security applications. However, such systems can be jeopardized by different kinds of presentation and spoof attacks by using different spoof materials. In this paper, an improved feature descriptor named as Quantized Fundamental F...
Higher education institutions could introduce enormous cloud-based educational services that satisfy their stakeholders’ IT needs. Migration to these pools of cloud services is multiple decision-making processes that are impacted by different organizational and technological obstacles and drivers. Investigating the preparedness of the internal tech...
Let $G(V,E)$ be a simple connected graph of order $n$. A graph of order $n$ is called pancyclic if it contains all the cycles $C_k$ for $k\in \{3,4,\cdot\cdot\cdot,n\}$. In this paper, some new spectral sufficient conditions for the graph to be pancyclic are established in terms of the edge number, the spectral radius and the signless Laplacian spe...
Supervisory control and data acquisition (SCADA) systems monitor and supervise our daily infrastructure systems and industrial processes. Hence, the security of the information systems of critical infrastructures cannot be overstated. The effectiveness of unsupervised anomaly detection approaches is sensitive to parameter choices, especially when t...
Most current access control models are rigid, as they are designed using static policies that always give the same outcome in different circumstances. In addition, they cannot adapt to environmental changes and unpredicted situations. With dynamic systems such as the Internet of Things (IoT) with billions of things that are distributed everywhere,...
This work presents an artificial neural network-based linearly regressive technique for the prediction of a temperature rise event caused by a fire in enclosed building environments. The method predicts temperature range in a burning compartment based on the historic fire behavior data modelled via a neural network algorithm. The approach further e...
The rapid growth of Internet of Things (IoT) devices brings countless benefits, but it also brings new security and forensics challenges. The IoT system with billions of devices generates a huge amount of evidence which causes big challenges to digital investigators and practitioners who are required to interact with IoT devices to investigate cybe...
The metric is a non-negative assignment to the pairs of nodes in a connected network N, which assigns the number of links lying in a smallest path between the nodes in the pairs. A pair (a; b) of nodes in N is said to be uniquely identified by a node c of N if the metric assigned to the pair (a; c) is different from the metric assigned to the pair...
In the last decade or so, we have experienced a tremendous proliferation and popularity of different Social Networks (SNs), resulting more and more user attributes being stored in such SNs. These attributes represent a valuable asset and many innovative online services are offered in exchange of such attributes. This particular phenomenon has allur...
Wireless Body Area Networks (WBANs) are designed to provide connectivity among diverse miniature body sensors that support different Internet of Things (IoT) healthcare applications. Among diverse body sensors, WBANs exploit in-vivo sensor nodes that detect and collect the required biometric data of certain physiological change inside the human bod...
The Internet of Things (IoT) connects almost all the environment objects whether physical or virtual over the Internet to produce new digitized services that improve people’s lifestyle. Currently, several IoT applications have a direct impact on our daily life activities including smart agriculture, wearables, connected healthcare, connected vehicl...
In this paper, improvement in the power transfer capacity of transmission lines (TLs) by utilizing a multi-terminal high voltage direct current (MT-HVDC) grid is discussed. A multi-terminal HVDC grid designed for wind power can be used as an extra transmission path in interconnected systems during low wind conditions, and provides extra dynamic sta...
In wealthy developing countries like the Kingdom of Saudi Arabia (KSA), the adoption of cloud computing is progressing slowly compared to the developed countries. To accelerate the cloud computing adoption, this study takes place exploring and investigating the associated security factors with cloud computing that influence organisations’ desire fo...
Governments across the world are starting to make a dynamic shift to cloud computing so as to increase efficiency. Although, the cloud technology brings various benefits for government organisations, including flexibility and low cost, adopting it with the existing system is not an easy task. In this regard, the most significant challenge to any go...
Real-time security requirements continue to increase due to the occurrence of various suspicious activities in open and closed environments. Day-to-day security threats may seriously affect everyone lives. Many techniques have been introduced in this regard, but still some issues remain unaddressed. The work presented in this paper provides video s...
Rapid expansion of online business has engulfed the GCC region. Such expansion causes competition among business entities, causing the need to identify the factors that the customers use to choose a suitable mobile business application. Instead of just focusing on the visitors/users of the application, a shift in focus towards transforming casual c...
In recent times, with the advent of blockchain technology, there is an optimism surrounding the concept of self-sovereign identity which is regarded to have influential effect on how we interact with each other over the Internet in future. There are a few works in the literature which examine different aspects of self-sovereign identity. Unfortunat...
Efficient and Symmetry based precoding plays a key role in wireless communications. In order to improve the transmission performance of multi-user millimeter wave Multiple-Input Multiple-Output (MIMO) (MU-mmWave MIMO) systems, this paper proposes an analog precoding scheme for the receiver of mmWave MIMO with split sub-array hybrid analog and digit...
Scrum is a well-known agile model due to its strong management practices. It can be mingled with many software development models such as extreme programming (XP), Agile Unified Process, and Feature Driven Development (FDD). Lean is a very popular known process in the automobile industry due to its effective practices such as Kanban bard and smooth...
The IoT is capable of communicating and connecting billions of things at the same time. The concept offers numerous benefits for consumers that alters how users interact with the technology. With this said, however, such monumental growth within IoT development also gives rise to a number of legal and technical challenges in the field of IoT forens...
In order to increase the reliability, accuracy, and efficiency in the eHealth, Internet of Medical Things is playing a vital role. Current development in telemedicine and the Internet of Things have delivered efficient and low-cost medical devices. The Internet of Medical Things architectures being developed do not completely recognize the potentia...
In this paper fuzzy logic-based algorithm with improved process of relay selection is presented which not only allocate optimal power for transmission but also help in choosing adaptive data rate. This algorithm utilizes channel gain, cooperative gain and signal to noise ratio with two cases considered in this paper: In case-I nodes do not have the...
Pseudorandom number generators (PRNGs) are important in cryptography and have been used in several security applications, such as authentication protocols, session keys, key distribution, and keystream for a one-time pad. Producing PRNGs is a critical issue because they should be uniform in distribution, unpredictable, and independent. Several PRNG...