Maha Abdelhaq

Maha Abdelhaq
Princess Nourah bint Abdulrahman University | PNU · Department of Computer Science

PhD

About

92
Publications
34,988
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,498
Citations

Publications

Publications (92)
Article
Full-text available
Object recognition along with classification are necessary for many applications, such as surveillance systems, car plate recognition, traffic monitoring, and face detection. Unlike existing approaches, ours incorporates a wide range of important factors to improve recognition precision. The primary phase in the image accumulating process is prepro...
Article
Full-text available
A R T I C L E I N F O Keywords: Privacy-preserving Semi-sensitive attribute Fuzzy c-means clustering Identity disclosure Attribute disclosure Membership disclosure Data privacy and utility A B S T R A C T Privacy is a significant issue that requires consideration in all applications. Data collected from various individuals and organizations must be...
Article
Full-text available
Handwritten character recognition falls under the domain of image classification, which has been under research for years. But still, specific gaps need to be highlighted as offline handwritten character recognition (OHCR) with the limitation of the unstructured hierarchy of character classification. However, the idea is to make the machine recogni...
Article
Full-text available
This study introduces an innovative approach to optimize cloud computing job distribution using the Improved Dynamic Johnson Sequencing Algorithm (DJS). Emphasizing on-demand resource sharing, typical to Cloud Service Providers (CSPs), the research focuses on minimizing job completion delays through efficient task allocation. Utilizing Johnson’s ru...
Article
Full-text available
Human activity recognition (HAR) plays a pivotal role in various domains, including healthcare, sports, robotics, and security. With the growing popularity of wearable devices, particularly Inertial Measurement Units (IMUs) and Ambient sensors, researchers and engineers have sought to take advantage of these advances to accurately and efficiently d...
Article
Full-text available
Human activity recognition (HAR) plays a pivotal role in various domains, including healthcare, sports, robotics, and security. With the growing popularity of wearable devices, particularly Inertial Measurement Units (IMUs) and Ambient sensors, researchers and engineers have sought to take advantage of these advances to accurately and efficiently d...
Article
Full-text available
Advancements in sensing technology have expanded the capabilities of both wearable devices and smartphones, which are now commonly equipped with inertial sensors such as ac-celerometers and gyroscopes. Initially, these sensors were used for device feature advancement, but now, they can be used for a variety of applications. Human activity recogniti...
Article
Full-text available
Efficient path planning optimization strategies are required to maximize flying time while consuming the least energy. This research offers a novel approach for energy-efficient path planning for Unmanned Aerial Vehicles (UAVs) that combines a hybrid evolutionary algorithm and Q-learning while accounting for the UAV’s velocity and distance from obs...
Article
The process of using robotic technology to examine underwater systems is still a difficult undertaking because the majority of automated activities lack network connectivity. Therefore, the suggested approach finds the main hole in undersea systems and fills it using robotic automation. In the predicted model, an analytical framework is created to...
Article
Full-text available
Multiple Internet of Healthcare Things (IoHT)-based devices have been utilized as sensing methodologies for human locomotion decoding to aid in applications related to e-healthcare. Different measurement conditions affect the daily routine monitoring, including the sensor type, wearing style, data retrieval method, and processing model. Currently,...
Article
Full-text available
Multiple Internet of Healthcare Things (IoHT)-based devices have been utilized as sensing methodologies for human locomotion decoding to aid in applications related to e-healthcare. Different measurement conditions affect the daily routine monitoring, including the sensor type, wearing style, data retrieval method, and processing model. Currently,...
Article
Full-text available
A R T I C L E I N F O Keywords: Visible Light Communication (VLC) Reverse Polarity OFDM Berlekamp-Massey algorithm (BMA) signal to noise ratio (SNR) bit error rate (BER) A B S T R A C T The radio frequency spectrum, which has been steadily getting smaller, is under pressure from growing cellular data traffic. A more dependable communication channel...
Article
Full-text available
Nowadays, the Internet of Underwater Things (IoUT) provides many marine 5G applications. However, it has some issues with energy efficiency and network lifetime. The network clustering approach is efficient for optimizing energy consumption, especially for underwater acoustic communications. Recently, many algorithms have been developed related to...
Article
Full-text available
The emergence of drone-based innovative cyber security solutions integrated with the Internet of Things (IoT) has revolutionized navigational technologies with robust data communication services across multiple platforms. This advancement leverages machine learning and deep learning methods for future progress. In recent years, there has been a sig...
Article
Full-text available
This paper presents a novel synthesis of a quasi-Chebyshev Nth order stub-loaded coupled-line ultra-wideband bandpass filter. A unit element of a proposed filter topology consists of two short-circuited stubs loaded at the edges of coupled lines. A distributed equivalent circuit model of a proposed topology is extracted and used to acquire a genera...
Article
Full-text available
Low power wide area network (LPWAN) is a wireless communication technology that offers large coverage, low data rates, and low power consumption, making it a suitable choice for the growing Internet of Things and machine-to-machine communication applications. Long range (LoRa), an LPWAN technology, has recently been used in the industrial, scientif...
Article
Full-text available
Blockchain is a groundbreaking technology widely adopted in industrial applications for improving supply chain management (SCM). The SCM and logistics communities have paid close attention to the development of blockchain technology. The primary purpose of employing a blockchain for SCM is to lower production costs while enhancing the system’s secu...
Article
Full-text available
The hybrid step-up converter is a fifth-order system with a dc gain greater than the traditional second-order step-up configuration. Considering their high order, several state variables are accessible for feedback purposes in the control of such systems. Therefore, choosing the best state variables is essential since they influence the system’s dy...
Article
Full-text available
This paper focuses on downlink power allocation for a cognitive radio-based non-orthogonal multiple access (CR-NOMA) system in a femtocell environment involving device-to-device (D2D) communication. The proposed power allocation scheme employs the greedy asynchronous distributed interference avoidance (GADIA) algorithm. This research aims to optimi...
Article
Full-text available
While the cloudification of networks with a micro-services-oriented design is a well-known feature of 5G, the 6G era of networks is closely related to intelligent network orchestration and management. Consequently, artificial intelligence (AI), machine learning (ML), and deep learning (DL) have a big part to play in the 6G paradigm that is being im...
Preprint
Full-text available
The emergence of drone-based innovative cyber security solutions integrated with the Internet of Things (IoT) has revolutionized navigational technologies with robust data communication services across multiple platforms. This advancement leverages machine learning and deep learning methods for future progress. In recent years, there has been a sig...
Article
Full-text available
Data stored on physical storage devices and transmitted over communication channels often have a lot of redundant information, which can be reduced through compression techniques to conserve space and reduce the time it takes to transmit the data. The need for adequate security measures, such as secret key control in specific techniques, raises con...
Article
Full-text available
Drones are increasingly vital in numerous fields, such as commerce, delivery services, and military operations. Therefore, it is essential to develop advanced systems for detecting and recognizing drones to ensure the safety and security of airspace. This paper aimed to develop a robust solution for detecting and recognizing drones and birds in air...
Article
Full-text available
The vehicular named data networking (VNDN) is gaining more attention as a future vehicular networking (VN) model. The VNDN's fundamental principles of data naming, data-centric forwarding, and in-network caching make it inherently capable of mitigating the challenges in traditional VN. However, broadcast communication for content discovery and deli...
Article
Full-text available
Version control is an important component of configuration management, and most enterprise-level software uses different tools and technologies to manage the software version control such as CVS, Subversion, or Perforce. Following the success of bitcoin, the first practical application of blockchain, it is being implemented in other fields such as...
Article
Full-text available
Non-orthogonal multiple access (NOMA) is one of the most effective techniques for meeting the spectrum efficiency (SE) requirements of 5G and beyond networks. This paper presents two novel methods for improving the SE of the downlink (DL) NOMA power domain (PD) integrated with a cooperative cognitive radio network (CCRN) in a 5G network using singl...
Article
Full-text available
In cognitive radio networks (CoR), the performance of cooperative spectrum sensing is improved by reducing the overall error rate or maximizing the detection probability. Several optimization methods are usually used to optimize the number of user-chosen for cooperation and the threshold selection. However, these methods do not take into account th...
Article
Full-text available
The world’s expanding populace, the variety of human social factors, and the densely populated environment make humans feel uncertain. Individuals need a safety officer who generally deals with security viewpoints for this frailty. Currently, human monitoring techniques are time-consuming, work concentrated, and incapable. Therefore, autonomous sur...
Article
Full-text available
Human action recognition is critical because it allows machines to comprehend and interpret human behavior, which has several real-world applications such as video surveillance, robot-human collaboration, sports analysis, and entertainment. The enormous variety in human motion and appearance is one of the most challenging problems in human action r...
Article
Full-text available
At both clinical and diagnostic levels, machine learning technologies could help facilitate medical decision-making. Prediction of sports injuries, for instance, is a key component of avoiding and minimizing injury in motion. Despite significant attempts to forecast sports injuries, the present method is limited by its inability to identify predict...
Article
Full-text available
Obesity and its complications is one of the main issues in today’s world and is increasing rapidly. A wide range of non-contagious diseases, for instance, diabetes type 2, cardiovascular, high blood pressure and stroke, numerous types of cancer, and mental health issues are formed following obesity. According to the WHO, Malaysia is the sixth Asian...
Article
Full-text available
Online learning systems have expanded significantly over the last couple of years. Massive Open Online Courses (MOOCs) have become a major trend on the internet. During the COVID-19 pandemic, the count of learner enrolment has increased in various MOOC platforms like Coursera, Udemy, Swayam, Udacity, FutureLearn, NPTEL, Khan Academy, EdX, SWAYAM, e...
Article
Full-text available
A revolution in network technology has been ushered in by software defined networking (SDN), which makes it possible to control the network from a central location and provides an overview of the network’s security. Despite this, SDN has a single point of failure that increases the risk of potential threats. Network intrusion detection systems (NID...
Article
Full-text available
Higher education regulatory authorities, institutions, and students all value the ability to predict students' performance. Several colleges and universities use student data analytics to predict student performance. Several endeavors have been conducted to classify student results using well-known algorithms to attain the required accuracy. This a...
Article
Full-text available
Cooperative non-orthogonal multiple access (NOMA) is a technology that addresses many challenges in future wireless generation networks by delivering a large amount of connectivity and huge system capacity. The aim of this paper is to design the varied distances and power location coefficients for far users. In addition, this paper aims to evaluate...
Article
Full-text available
A heterogeneous vehicular network (HetVNET) is a promising network architecture that combines multiple network technologies such as IEEE 802.11p, dedicated short-range communication (DSRC), and third/fourth generation cellular networks (3G/4G). In this network area, vehicle users can use wireless fidelity access points (Wi-Fi APs) to offload 4G lon...
Article
Full-text available
Nonorthogonal Multiple Access (NOMA) is incorporated into the wireless network systems to achieve better connectivity, spectral and energy effectiveness, higher data transfer rate, and also obtain the high quality of services (QoS). In order to improve throughput and minimum latency, a Mul-tivariate Renkonen Regressive Weighted Preference Bootstrap...
Article
Full-text available
The integration of multiple-input multiple-output (MIMO) and non-orthogonal multiple access (NOMA) technologies is a hybrid technology that overcomes a myriad of problems in the 5G cellular system and beyond, including massive connectivity, low latency, and high dependability. The goal of this paper is to improve and reassess the bit error rate (BE...
Article
Full-text available
Recently, artificial intelligence (AI) techniques have been used to describe the characteristics of information, as they help in the process of data mining (DM) to analyze data and reveal rules and patterns. In DM, anomaly detection is an important area that helps discover hidden behavior within the data that is most vulnerable to attack. It also h...
Article
Full-text available
Underwater wireless sensor networks (UWSNs) have emerged as the most widely used wireless network infrastructure in many applications. Sensing nodes are frequently deployed in hostile aquatic environments in order to collect data on resources that are severely limited in terms of transmission time and bandwidth. Since underwater information is very...
Article
Nonorthogonal Multiple Access (NOMA) is incorporated into the wireless network systems to achieve better connectivity, spectral and energy effectiveness, higher data transfer rate, and also obtain the high quality of services (QoS). In order to improve throughput and minimum latency, a Mul-tivariate Renkonen Regressive Weighted Preference Bootstrap...
Article
Mobile Ad-Hoc Network (MANET) is an infrastructure-less network that has the ability to configure itself without any centralized management. The topology of MANET changes dynamically which makes it open for new nodes to join it easily. The openness area of MANET makes it very vulnerable to different types of attacks. One of the most dangerous attac...
Article
In recent years, the application of Mobile Ad-hoc Network (MANET) with Voice over Internet Protocol (VoIP) has been increased. However, the level of Quality of Service (QoS) for VoIP traffic in MANET, while there is no infrastructure, will reduce when dealing with a large number of calls. In this type of dynamic environment, the developing of a new...
Article
Many types and methodologies of attacks have been developed in order to target the victims in different ways affecting its resources and assets. This paper reviews the defense in depth concept that has been developed in which multilayer of security controls are implemented to protect resources and assets from such attackers through consuming all th...
Article
Full-text available
Depression is a prevalent sickness, spreading worldwide with potentially serious implications. Timely recognition of emotional responses plays a pivotal function at present, with the profound expansion of social media and users of the internet. Mental illnesses are highly hazardous, stirring more than three hundred million people. Moreover, that is...
Article
Full-text available
Depression is a prevalent sickness spreading worldwide with potentially serious implications. 1 Timely recognition of emotional responses plays a pivotal function in recent times, where social media and 2 users of the internet are expanding profoundly. Mental illnesses are highly hazardous, stirring more than three 3 hundred million people. Moreove...
Article
The need to ensure the quality of video streaming transmitted over wireless networks is growing every day. Video streaming is typically used for applications that are sensitive to poor quality of service (QoS) due to insufficient bandwidth, packet loss, or delay. These challenges hurt video streaming quality since they affect throughput and packet...
Article
Full-text available
Current efforts for providing an efficient dynamic source routing protocol (DSR) for use in multi-hop ad-hoc wireless are promising. This is since DSR has a unique characteristic in that it uses source routing, instead of relying on the routing table at each intermediate device. This study addresses the current challenges facing DSR protocol in ter...
Article
Full-text available
Wireless Sensor Networks (WSNs) play an important role in underground mining applications. In particular, they help to collect information using sensors and provide monitoring of complex mine environments to avoid potential risks and manage operations. Despite the importance of WSNs, they face the problem of energy consumption and the difficulty of...
Article
Full-text available
The growing demands of vehicular network applications, which have diverse networking and multimedia capabilities that passengers use while traveling, cause an overload of cellular networks. This scenario affects the quality of service (QoS) of vehicle and non-vehicle users. Nowadays, wireless fidelity access points Wi-Fi access point (AP) and fourt...
Article
Full-text available
Automated examination of biomedical signals plays a vital role to diagnose diseases and offers useful data to several applications in the areas of physiology, sports medicine, and human–computer interface. The latest advancements in Artificial Intelligence (AI) have the ability to manage and analyse enormous biomedical datasets resulting in clinica...
Article
Vehicular Ad hoc NETworks (VANETs) have become a leading technology receiving great attention from various research communities as a pivotal infrastructure for data dissemination in intelligent transportation systems. Data dissemination in VANET is a challenging task due to high dynamics in topology, mobility, and links connection. Internet model (...
Article
Full-text available
Background: Electronic Health Record (EHR) systems are used as an efficient and effective technique for sharing patient’s health records among different hospitals and various other key stakeholders of the healthcare industry to achieve better diagnosis and treatment of patients globally. However, the existing EHR systems mostly lack in providing ap...
Article
Full-text available
Cloud computing is a well-known technology that provides flexible, efficient, and cost-effective information technology solutions for multinationals to offer improved and enhanced quality of business services to end-users. The cloud computing paradigm is instigated from grid and parallel computing models as it uses virtualization, server consolidat...
Article
Full-text available
Mobile ad hoc network (MANET) is a dynamically reconfigurable wireless network with time-variable infrastructure. Given that nodes are highly mobile, MANET’s topology often changes. These changes increase the difficulty in finding the routes that the packets use when they are routed. This study proposes an algorithm called genetic algorithm-based l...
Article
A Mobile Ad-Hoc Network (MANET) is a decentralized network of mobile node that are connected to an arbitrary topology via wireless connections. The breakdown of the connecting links between adjacent nodes will probably lead to the loss of the transferred data packets. In this research, we proposed an algorithm for link prediction (LP) to enhance th...
Article
Full-text available
A Mobil Ad hoc Network (MANET) is a wireless multi-hop network with various mobile, self-organized and wireless infrastructure nodes. MANET characteristics such as openness restricted resources and decentralization impact node efficiency and made them easy to be affected by various security attacks, especially Distributed Denial of Service (DDoS) a...
Article
Full-text available
An innovative technology that is widely used in many applications is the Mobile Ad-hoc Network (MANET). Discovery and maintenance of routes at MANET are important issues. Within MANET, broadcasting is used to discover a path within on-demand routing protocols. Establishing and maintaining a route periodically among the nodes is the challenge that r...
Article
Full-text available
Mobile ad hoc network (MANET) is a collection of mobile, decentralized and self-organizing nodes that are used in special cases such as medical and military purposes. Securing mobile ad hoc network MANET is a crucial research issue. The properties of MANET impede the protection of the network’s environment against attacks. MANET as an open area of...
Article
The application of mobile ad hoc network (MANET) with voice over Internet protocol (VoIP) has been increasing recently. However, given the lack of infrastructure, the quality of service (QoS) for VoIP traffic in MANET is reduced when a large number of calls are handled. In this type of dynamic environment, the development of a new infrastructure be...
Article
Full-text available
The increasing use of smartphones, tablets, and other vehicular network applications with varied capabilities and the associated growth in the use of all types of data-hungry multimedia services pose a significant challenge to cellular infrastructure operators. Vehicular Wi-Fi offloading (VWO) is one of the potential solutions for offloading cellul...
Article
Full-text available
A mobile ad hoc network (MANET) is a collection of wireless mobile nodes that dynamically form a temporary network without using any existing network infrastructure. MANET selects a path with minimal number of intermediate nodes to reach the destination node. As the distance between each node increases, the quantity of transmission power increases....
Article
Full-text available
A mobile ad hoc network (MANET) is a collection of mobile nodes that dynamically form a temporary network without using any existing network infrastructure. MANET selects a path with minimal number of intermediate nodes to reach the destination node. As the distance between each node increases, the quantity of transmission power increases. The powe...