About
92
Publications
34,988
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,498
Citations
Introduction
Publications
Publications (92)
Object recognition along with classification are necessary for many applications, such as surveillance systems, car plate recognition, traffic monitoring, and face detection. Unlike existing approaches, ours incorporates a wide range of important factors to improve recognition precision. The primary phase in the image accumulating process is prepro...
A R T I C L E I N F O Keywords: Privacy-preserving Semi-sensitive attribute Fuzzy c-means clustering Identity disclosure Attribute disclosure Membership disclosure Data privacy and utility A B S T R A C T Privacy is a significant issue that requires consideration in all applications. Data collected from various individuals and organizations must be...
Handwritten character recognition falls under the domain of image classification, which has been under research for years. But still, specific gaps need to be highlighted as offline handwritten character recognition (OHCR) with the limitation of the unstructured hierarchy of character classification. However, the idea is to make the machine recogni...
This study introduces an innovative approach to optimize cloud computing job distribution using the Improved Dynamic Johnson Sequencing Algorithm (DJS). Emphasizing on-demand resource sharing, typical to Cloud Service Providers (CSPs), the research focuses on minimizing job completion delays through efficient task allocation. Utilizing Johnson’s ru...
Human activity recognition (HAR) plays a pivotal role in various domains, including healthcare, sports, robotics, and security. With the growing popularity of wearable devices, particularly Inertial Measurement Units (IMUs) and Ambient sensors, researchers and engineers have sought to take advantage of these advances to accurately and efficiently d...
Human activity recognition (HAR) plays a pivotal role in various domains, including healthcare, sports, robotics, and security. With the growing popularity of wearable devices, particularly Inertial Measurement Units (IMUs) and Ambient sensors, researchers and engineers have sought to take advantage of these advances to accurately and efficiently d...
Advancements in sensing technology have expanded the capabilities of both wearable devices and smartphones, which are now commonly equipped with inertial sensors such as ac-celerometers and gyroscopes. Initially, these sensors were used for device feature advancement, but now, they can be used for a variety of applications. Human activity recogniti...
Efficient path planning optimization strategies are required to maximize flying time while consuming the least energy. This research offers a novel approach for energy-efficient path planning for Unmanned Aerial Vehicles (UAVs) that combines a hybrid evolutionary algorithm and Q-learning while accounting for the UAV’s velocity and distance from obs...
The process of using robotic technology to examine underwater systems is still a difficult undertaking because the majority of automated activities lack network connectivity. Therefore, the suggested approach finds the main hole in undersea systems and fills it using robotic automation. In the predicted model, an analytical framework is created to...
Multiple Internet of Healthcare Things (IoHT)-based devices have been utilized as sensing methodologies for human locomotion decoding to aid in applications related to e-healthcare. Different measurement conditions affect the daily routine monitoring, including the sensor type, wearing style, data retrieval method, and processing model. Currently,...
Multiple Internet of Healthcare Things (IoHT)-based devices have been utilized as sensing methodologies for human locomotion decoding to aid in applications related to e-healthcare. Different measurement conditions affect the daily routine monitoring, including the sensor type, wearing style, data retrieval method, and processing model. Currently,...
A R T I C L E I N F O Keywords: Visible Light Communication (VLC) Reverse Polarity OFDM Berlekamp-Massey algorithm (BMA) signal to noise ratio (SNR) bit error rate (BER) A B S T R A C T The radio frequency spectrum, which has been steadily getting smaller, is under pressure from growing cellular data traffic. A more dependable communication channel...
Nowadays, the Internet of Underwater Things (IoUT) provides many marine 5G applications. However, it has some issues with energy efficiency and network lifetime. The network clustering approach is efficient for optimizing energy consumption, especially for underwater acoustic communications. Recently, many algorithms have been developed related to...
The emergence of drone-based innovative cyber security solutions integrated with the Internet of Things (IoT) has revolutionized navigational technologies with robust data communication services across multiple platforms. This advancement leverages machine learning and deep learning methods for future progress. In recent years, there has been a sig...
This paper presents a novel synthesis of a quasi-Chebyshev Nth order stub-loaded coupled-line ultra-wideband bandpass filter. A unit element of a proposed filter topology consists of two short-circuited stubs loaded at the edges of coupled lines. A distributed equivalent circuit model of a proposed topology is extracted and used to acquire a genera...
Low power wide area network (LPWAN) is a wireless communication technology that offers large coverage, low data rates, and low power consumption, making it a suitable choice for the growing Internet of Things and machine-to-machine communication applications. Long range (LoRa), an LPWAN technology, has recently been used in the industrial, scientif...
Blockchain is a groundbreaking technology widely adopted in industrial applications for improving supply chain management (SCM). The SCM and logistics communities have paid close attention to the development of blockchain technology. The primary purpose of employing a blockchain for SCM is to lower production costs while enhancing the system’s secu...
The hybrid step-up converter is a fifth-order system with a dc gain greater than the traditional second-order step-up configuration. Considering their high order, several state variables are accessible for feedback purposes in the control of such systems. Therefore, choosing the best state variables is essential since they influence the system’s dy...
This paper focuses on downlink power allocation for a cognitive radio-based non-orthogonal multiple access (CR-NOMA) system in a femtocell environment involving device-to-device (D2D) communication. The proposed power allocation scheme employs the greedy asynchronous distributed interference avoidance (GADIA) algorithm. This research aims to optimi...
While the cloudification of networks with a micro-services-oriented design is a well-known feature of 5G, the 6G era of networks is closely related to intelligent network orchestration and management. Consequently, artificial intelligence (AI), machine learning (ML), and deep learning (DL) have a big part to play in the 6G paradigm that is being im...
The emergence of drone-based innovative cyber security solutions integrated with the Internet of Things (IoT) has revolutionized navigational technologies with robust data communication services across multiple platforms. This advancement leverages machine learning and deep learning methods for future progress. In recent years, there has been a sig...
Data stored on physical storage devices and transmitted over communication channels often have a lot of redundant information, which can be reduced through compression techniques to conserve space and reduce the time it takes to transmit the data. The need for adequate security measures, such as secret key control in specific techniques, raises con...
Drones are increasingly vital in numerous fields, such as commerce, delivery services, and military operations. Therefore, it is essential to develop advanced systems for detecting and recognizing drones to ensure the safety and security of airspace. This paper aimed to develop a robust solution for detecting and recognizing drones and birds in air...
The vehicular named data networking (VNDN) is gaining more attention as a future vehicular networking (VN) model. The VNDN's fundamental principles of data naming, data-centric forwarding, and in-network caching make it inherently capable of mitigating the challenges in traditional VN. However, broadcast communication for content discovery and deli...
Version control is an important component of configuration management, and most enterprise-level software uses different tools and technologies to manage the software version control such as CVS, Subversion, or Perforce. Following the success of bitcoin, the first practical application of blockchain, it is being implemented in other fields such as...
Non-orthogonal multiple access (NOMA) is one of the most effective techniques for meeting the spectrum efficiency (SE) requirements of 5G and beyond networks. This paper presents two novel methods for improving the SE of the downlink (DL) NOMA power domain (PD) integrated with a cooperative cognitive radio network (CCRN) in a 5G network using singl...
In cognitive radio networks (CoR), the performance of cooperative spectrum sensing is improved by reducing the overall error rate or maximizing the detection probability. Several optimization methods are usually used to optimize the number of user-chosen for cooperation and the threshold selection. However, these methods do not take into account th...
The world’s expanding populace, the variety of human social factors, and the densely populated environment make humans feel uncertain. Individuals need a safety officer who generally deals with security viewpoints for this frailty. Currently, human monitoring techniques are time-consuming, work concentrated, and incapable. Therefore, autonomous sur...
Human action recognition is critical because it allows machines to comprehend and interpret human behavior, which has several real-world applications such as video surveillance, robot-human collaboration, sports analysis, and entertainment. The enormous variety in human motion and appearance is one of the most challenging problems in human action r...
At both clinical and diagnostic levels, machine learning technologies could help facilitate medical decision-making. Prediction of sports injuries, for instance, is a key component of avoiding and minimizing injury in motion. Despite significant attempts to forecast sports injuries, the present method is limited by its inability to identify predict...
Obesity and its complications is one of the main issues in today’s world and is increasing rapidly. A wide range of non-contagious diseases, for instance, diabetes type 2, cardiovascular, high blood pressure and stroke, numerous types of cancer, and mental health issues are formed following obesity. According to the WHO, Malaysia is the sixth Asian...
Online learning systems have expanded significantly over the last couple of years. Massive Open Online Courses (MOOCs) have become a major trend on the internet. During the COVID-19 pandemic, the count of learner enrolment has increased in various MOOC platforms like Coursera, Udemy, Swayam, Udacity, FutureLearn, NPTEL, Khan Academy, EdX, SWAYAM, e...
A revolution in network technology has been ushered in by software defined networking (SDN), which makes it possible to control the network from a central location and provides an overview of the network’s security. Despite this, SDN has a single point of failure that increases the risk of potential threats. Network intrusion detection systems (NID...
Higher education regulatory authorities, institutions, and students all value the ability to predict students' performance. Several colleges and universities use student data analytics to predict student performance. Several endeavors have been conducted to classify student results using well-known algorithms to attain the required accuracy. This a...
Cooperative non-orthogonal multiple access (NOMA) is a technology that addresses many challenges in future wireless generation networks by delivering a large amount of connectivity and huge system capacity. The aim of this paper is to design the varied distances and power location coefficients for far users. In addition, this paper aims to evaluate...
A heterogeneous vehicular network (HetVNET) is a promising network architecture that combines multiple network technologies such as IEEE 802.11p, dedicated short-range communication (DSRC), and third/fourth generation cellular networks (3G/4G). In this network area, vehicle users can use wireless fidelity access points (Wi-Fi APs) to offload 4G lon...
Nonorthogonal Multiple Access (NOMA) is incorporated into the wireless network systems to achieve better connectivity, spectral and energy effectiveness, higher data transfer rate, and also obtain the high quality of services (QoS). In order to improve throughput and minimum latency, a Mul-tivariate Renkonen Regressive Weighted Preference Bootstrap...
The integration of multiple-input multiple-output (MIMO) and non-orthogonal multiple access (NOMA) technologies is a hybrid technology that overcomes a myriad of problems in the 5G cellular system and beyond, including massive connectivity, low latency, and high dependability. The goal of this paper is to improve and reassess the bit error rate (BE...
Recently, artificial intelligence (AI) techniques have been used to describe the characteristics of information, as they help in the process of data mining (DM) to analyze data and reveal rules and patterns. In DM, anomaly detection is an important area that helps discover hidden behavior within the data that is most vulnerable to attack. It also h...
Underwater wireless sensor networks (UWSNs) have emerged as the most widely used wireless network infrastructure in many applications. Sensing nodes are frequently deployed in hostile aquatic environments in order to collect data on resources that are severely limited in terms of transmission time and bandwidth. Since underwater information is very...
Nonorthogonal Multiple Access (NOMA) is incorporated into the wireless network systems to achieve better connectivity, spectral and energy effectiveness, higher data transfer rate, and also obtain the high quality of services (QoS). In order to improve throughput and minimum latency, a Mul-tivariate Renkonen Regressive Weighted Preference Bootstrap...
Mobile Ad-Hoc Network (MANET) is an infrastructure-less network that has the ability to configure itself without any centralized management. The topology of MANET changes dynamically which makes it open for new nodes to join it easily. The openness area of MANET makes it very vulnerable to different types of attacks. One of the most dangerous attac...
In recent years, the application of Mobile Ad-hoc Network (MANET) with Voice over Internet Protocol (VoIP) has been increased. However, the level of Quality of Service (QoS) for VoIP traffic in MANET, while there is no infrastructure, will reduce when dealing with a large number of calls. In this type of dynamic environment, the developing of a new...
Many types and methodologies of attacks have been developed in order to target the victims in different ways affecting its resources and assets. This paper reviews the defense in depth concept that has been developed in which multilayer of security controls are implemented to protect resources and assets from such attackers through consuming all th...
Depression is a prevalent sickness, spreading worldwide with potentially serious implications. Timely recognition of emotional responses plays a pivotal function at present, with the profound expansion of social media and users of the internet. Mental illnesses are highly hazardous, stirring more than three hundred million people. Moreover, that is...
Depression is a prevalent sickness spreading worldwide with potentially serious implications. 1 Timely recognition of emotional responses plays a pivotal function in recent times, where social media and 2 users of the internet are expanding profoundly. Mental illnesses are highly hazardous, stirring more than three 3 hundred million people. Moreove...
The need to ensure the quality of video streaming transmitted over wireless networks is growing every day. Video streaming is typically used for applications that are sensitive to poor quality of service (QoS) due to insufficient bandwidth, packet loss, or delay. These challenges hurt video streaming quality since they affect throughput and packet...
Current efforts for providing an efficient dynamic source routing protocol (DSR) for use in multi-hop ad-hoc wireless are promising. This is since DSR has a unique characteristic in that it uses source routing, instead of relying on the routing table at each intermediate device. This study addresses the current challenges facing DSR protocol in ter...
Wireless Sensor Networks (WSNs) play an important role in underground mining applications. In particular, they help to collect information using sensors and provide monitoring of complex mine environments to avoid potential risks and manage operations. Despite the importance of WSNs, they face the problem of energy consumption and the difficulty of...
The growing demands of vehicular network applications, which have diverse networking and multimedia capabilities that passengers use while traveling, cause an overload of cellular networks. This scenario affects the quality of service (QoS) of vehicle and non-vehicle users. Nowadays, wireless fidelity access points Wi-Fi access point (AP) and fourt...
Automated examination of biomedical signals plays a vital role to diagnose diseases and offers useful data to several applications in the areas of physiology, sports medicine, and human–computer interface. The latest advancements in Artificial Intelligence (AI) have the ability to manage and analyse enormous biomedical datasets resulting in clinica...
Vehicular Ad hoc NETworks (VANETs) have become a leading technology receiving great attention from various research communities as a pivotal infrastructure for data dissemination in intelligent transportation systems. Data dissemination in VANET is a challenging task due to high dynamics in topology, mobility, and links connection. Internet model (...
Background: Electronic Health Record (EHR) systems are used as an efficient and effective technique for sharing patient’s health records among different hospitals and various other key stakeholders of the healthcare industry to achieve better diagnosis and treatment of patients globally. However, the existing EHR systems mostly lack in providing ap...
Cloud computing is a well-known technology that provides flexible, efficient, and cost-effective information technology solutions for multinationals to offer improved and enhanced quality of business services to end-users. The cloud computing paradigm is instigated from grid and parallel computing models as it uses virtualization, server consolidat...
Mobile ad hoc network (MANET) is a dynamically reconfigurable wireless network with time-variable infrastructure. Given that nodes are highly mobile, MANET’s topology often changes. These changes increase the difficulty in finding the routes that the packets use when they are routed. This study proposes an algorithm called genetic algorithm-based l...
A Mobile Ad-Hoc Network (MANET) is a decentralized network of mobile node that are connected to an arbitrary topology via wireless connections. The breakdown of the connecting links between adjacent nodes will probably lead to the loss of the transferred data packets. In this research, we proposed an algorithm for link prediction (LP) to enhance th...
A Mobil Ad hoc Network (MANET) is a wireless multi-hop network with various mobile, self-organized and wireless infrastructure nodes. MANET characteristics such as openness restricted resources and decentralization impact node efficiency and made them easy to be affected by various security attacks, especially Distributed Denial of Service (DDoS) a...
An innovative technology that is widely used in many applications is the Mobile Ad-hoc Network (MANET). Discovery and maintenance of routes at MANET are important issues. Within MANET, broadcasting is used to discover a path within on-demand routing protocols. Establishing and maintaining a route periodically among the nodes is the challenge that r...
Mobile ad hoc network (MANET) is a collection of mobile, decentralized and self-organizing nodes that are used in special cases such as medical and military purposes. Securing mobile ad hoc network MANET is a crucial research issue. The properties of MANET impede the protection of the network’s environment against attacks. MANET as an open area of...
The application of mobile ad hoc network (MANET) with voice over Internet protocol (VoIP) has been increasing recently. However, given the lack of infrastructure, the quality of service (QoS) for VoIP traffic in MANET is reduced when a large number of calls are handled. In this type of dynamic environment, the development of a new infrastructure be...
The increasing use of smartphones, tablets, and other vehicular network applications with varied capabilities and the associated growth in the use of all types of data-hungry multimedia services pose a significant challenge to cellular infrastructure operators. Vehicular Wi-Fi offloading (VWO) is one of the potential solutions for offloading cellul...
A mobile ad hoc network (MANET) is a collection of wireless mobile nodes that dynamically form a temporary network without using any existing network infrastructure. MANET selects a path with minimal number of intermediate nodes to reach the destination node. As the distance between each node increases, the quantity of transmission power increases....
A mobile ad hoc network (MANET) is a collection of mobile nodes that dynamically form a temporary network without using any existing network infrastructure. MANET selects a path with minimal number of intermediate nodes to reach the destination node. As the distance between each node increases, the quantity of transmission power increases. The powe...