
Mohamed Hadi Habaebi- PhD
- Professor (Full) at International Islamic University Malaysia
Mohamed Hadi Habaebi
- PhD
- Professor (Full) at International Islamic University Malaysia
About
415
Publications
257,840
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,573
Citations
Introduction
Current research interests: Energy Security, cryptographic function for IoT and SCADA IP-based networks; wireless distributed computing; energy harvesting; mmWave channel propagation modelling; 5G network and access schemes; RF signature fingerprinting and identification; communication for the smart grids.
Current institution
Additional affiliations
August 2011 - present
July 2003 - August 2011
July 1998 - June 2003
Publications
Publications (415)
Fuel cells such as polymer electrolyte membrane fuel cells are playing crucial role in the transition towards sustainable energy systems. Ion conducting membranes (ICMs) are playing critical chemical and mechanical roles in such fuel cells which directly affecting the efficiency, durability and overall device performance. Recent progress in machine...
This study introduces a thoughtfully curated dataset comprising electroencephalogram (EEG) recordings designed to unravel mental stress patterns through the perspective of cognitive load. The dataset incorporates EEG signals obtained from 15 subjects, with a gender distribution of 8 females and 7 males, and a mean age of 21.5 years [1]. Recordings...
Edge computing (EC) is a distributed computing approach to processing data at the network edge, either by the device or a local server, instead of centralized data centers or the cloud. EC proximity to the data source can provide faster insights, response time, and bandwidth utilization. However, the distributed architecture of EC, makes them vulne...
Sand and dust storms significantly challenge microwave and millimeter-wave communications, particularly in arid and semi-arid regions. Various models have been developed to predict attenuation caused by these storms theoretically and empirically based on two meteorological parameters, namely visibility and humidity. However, these models are found...
The purpose of this study is to present a lightweight wearable (jeans) monopole antenna configuration for body area network (BAN) communication, breast and head tumors detections with back lobe reduction (i.e. low SAR), and it does so without introducing any special methodologies like as, AMC, EBG, HIS. The planned antenna has dual symmetrical slot...
As we are living in a fast-moving dynamic world. Emerging technologies such as artificial intelligence (AI), internet of things (IoT), virtual reality (VR), augmented reality (AR), fourth industrial revolution (Industry 4.0), metaverse, and edge computing are expected to play an essential role in our daily life. These technologies require high-spee...
As the IoT ecosystem continues to grow, edge computing is becoming essential for handling and analyzing the vast amount of data generated by connected devices. Unlike traditional centralized data models, where information is sent to remote centers for processing, edge computing processes data closer to where it is generated. This decentralized appr...
In this study, we propose a framework that enhances breast cancer classification accuracy by preserving spatial features and leveraging in situ cooling support. The framework utilizes real-time thermography video streaming for early breast cancer detection using Deep Learning models. Inception v3, Inception v4, and a modified Inception Mv4 were dev...
Blockchain technologies and cryptocurrencies have garnered significant attention for their potential to revolutionize various industries. This paper investigates the landscape of blockchain technologies in the context of cryptocurrencies, focusing on performance metrics, trade-offs, trends, and underlying issues. Through comprehensive analysis, the...
This paper proposes a renewable energy resource (photovoltaic) to generate green and halal energy for household and feeding the excess energy into the Nigeria National Grid Network. The energy demand in third world nation like Nigeria will increase in nearest future. The renewable energy is one of the alternative energy sources that could satisfy t...
This article focuses on the analysis and integration of PV systems to load ratio correlation and the economic importance of the left over to grid supply and integration. The paper focusses on the different methods of PV generation to load utilization using the solar powered air conditioner as the load while minimizing the use of fossil fuel (petrol...
This article is a pragmatic approach on the evaluation of wind energy production and it's estimation in the coastal area of Lagos Nigeria. The work focuses on the accessibility of wind energy production in Lagos Nigeria through analyzing wind data in the look up tables using proficient probability function. Here, three approaches are itemized; Anal...
The proliferation landscape of the Internet of Things (IoT) has accentuated the critical role of Authentication and Authorization (AA) mechanisms in securing interconnected devices. There is a lack of relevant datasets that can aid in building appropriate machine learning enabled security solutions focusing on authentication and authorization using...
To secure sensitive medical records in the healthcare clouds, this paper proposes an End-to-End Encryption (E2EE) to enhance a patient-centric blockchain-based system for electronic health record (EHR) management. The suggested system with a focus on the patient enables individuals to oversee their medical records within various involved parties by...
Nowadays, the surge in energy demand due to economic growth and extreme weather conditions has put immense pressure on the usage of fossil fuels in Kuwait. As a result, scheduled load-shedding is performed in some regions during the summer season to meet the energy demand. To address this issue, this paper proposes a photovoltaic-based street light...
Breast cancer remains a leading cause of mortality among women globally. There were techniques that have been developed to enhance early detection, among which thermal imaging has emerged as a promising modality capable of identifying potential signs of breast cancer in its early stages. In addition, Thermal images provide valuable pixel-level info...
This article focuses on the analysis and integration of PV systems to load ratio correlation and the economic importance of the left over to grid supply and integration. The paper focusses on the different methods of PV generation to load utilization using the solar powered air conditioner as the load while minimizing the use of fossil fuel (petrol...
Supervisory Control and Data Acquisition (SCADA) systems are crucial for modern industrial processes and securing them against increasing cyber threats is a significant challenge. This study presents an advanced method for bolstering SCADA security by employing a modified hybrid deep learning model. A key innovation in this work is integrating the...
Sand and dust storms present significant challenges to microwave and millimeter-wave propagation, directly impacting communication systems. Despite the existence of various theoretical and analytical models for predicting dust storm attenuation, many have overlooked the crucial factor of humidity. This study had conducted a year-long monitoring of...
In recent years, cloud computing has become an essential distributed computing platform and has achieved enormous popularity. Within cloud computing, the Cloud service broker creates an abstraction layer between provider and consumer so that customers notice the cloud service providers’ offered services’ solitary view. The brokers of cloud service...
Inductive Power Transfer (IPT) finds applications in various fields that require episodic rather than continuous power supplies, such as implantable medical devices, consumer electronics, IoT applications, civil structure monitoring, and electric vehicle charging. The efficiency of IPT systems depends on the operating frequency which is determined...
The need for strong authentication and authorization (AA) security measures is growing with the proliferation of the Internet of Things (IoT). This paper presents an advanced trust-aware authentication and authorization system for IoT environments. Using real-world data collected from Zigbee Zolertia Z1 devices, a Federated Machine Learning model w...
The prevention of breast cancer at an early stage is crucial for saving lives and reducing costs. Breast thermography, a complementary diagnostic technique, has shown promise in detecting breast tumors early. This research proposes a framework that leverages real-time thermography video streaming and deep learning models for the early detection of...
The breast tumor is the form of tumor that is diagnosed more frequently than any other type of tumor and it is the leading cause of death from breast cancer among females globally. Breast cancer has the greatest incidence and fatality rate among women worldwide. Early on, it was largely elderly women who were affected, but that has since shifted. Y...
With the rise of the Internet of Things (IoT), tiny devices capable of computation and data transmission are being deployed across various technological domains. Due to the wide deployment of these devices, manual setup and management are infeasible and inefficient. To address this inefficiency, intelligent procedures must be established to enable...
Drones, or unmanned aerial vehicles (UAVs), have emerged as an indispensable tool across numerous industries due to their remarkable versatility, efficiency, and capabilities. Notwithstanding all these traits, drones are still limited by battery life. In this paper, we propose a genuine in-flight charging method without landing. The charging system...
Featured Application
This article presents a numerical simulation model built using COMSOL software to study the thermophysical properties of different breast sizes. Specifically, the effects of varied blood perfusion, tumor size, location depth, and thermal conductivity were studied in relation to breast size. Pennes’ bioheat formula was applied t...
Internet of Things (IoT) is the interconnection of devices with the internet to deliver its tasks. Nowadays, security is the main concern relating to these devices. Low in power storage, low in processing capabilities and low in data storage make it hard to provide a strong set of security protocols to protect the vulnerable devices “things”. Havin...
The Wireless Sensor Network needs to become a dynamic and adaptive network to conserve energy stored in the wireless sensor network node battery. This dynamic and adaptive network sometimes are called SON (Self Organizing Network). Several SON concepts have been developed such as routing, clustering, intrusion detection, and other. Although several...
Filtered orthogonal frequency division multiplexing (F-OFDM), a technology which is being considered as a promising platform for beyond 4G era is expected to help deliver the new features at millimeter wave in the new 5 th generation of cellular communication. Some of its key features notably better spectral utilization, enhanced throughput and imm...
Accessing healthcare services by several stakeholders for diagnosis and treatment has become quite prevalent owing to the improvement in the industry and high levels of patient mobility. Due to the confidentiality and high sensitivity of electronic healthcare records (EHR), the majority of EHR data sharing is still conducted via fax or mail because...
Integrating IoT devices in SCADA systems has provided efficient and improved data collection and transmission technologies. This enhancement comes with significant security challenges, exposing traditionally isolated systems to the public internet. Effective and highly reliable security devices, such as intrusion detection system (IDSs) and intrusi...
To facilitate wireless sensor networks deployment in dense jungle environments, the challenges of unreliable wireless communication links used for routing data between nodes and the gateway, and the limited battery energy available from the nodes must be overcome. In this paper, we introduce the Self-Organized Wireless Sensor Network (SOWSN) to ove...
A wide range of critical infrastructures such as power systems, water distribution systems, gas pipelines, and others are controlled and monitored using industrial control systems (ICSs). Recently, security attacks against ICSs are increasing at an alarming rate. These systems cannot afford to lose the availability of service; a cyber-attack can ca...
The patch antenna with Ultra-Wide Band (UWB) characteristics is a promising candidate for wireless communication. It is a major research problem to mitigate electromagnetic interference (EMI) with narrowband technologies such as 5G lower band, Wi-MAX, WLAN and satellite band, which are all in the UWB region. This study describes a UWB antenna with...
This study proposes an analytical model of a WPT system with three orthogonal transmitter coils organised to produce a concentrated and controlled omnidirectional magnetic field suited for charging a moving, rotating load, providing maximal energy transfer without receiving end feedback. In order to create a realistic 3D WPT simulation system and a...
Sungai Pusu is the river that passes through the IIUM Gombak campus. The river has been having a cloudy appearance for years hence it is needed to quantify the vital signs such as pH, temperature, and turbidity because these are the vital signs indicating the health of a river. Currently, there a lot of monitoring systems however the available moni...
Consensus protocols stand behind the success of blockchain technology. This is because parties that distrust each other can make secure transactions without the oversight of a central authority. The first consensus protocol emerged with Bitcoin. Since then, many others have appeared. Some of them have been implemented by official blockchain platfor...
Palm oil is the main cash crop of tropical Asia, and the implementation of LPWAN (low-power wide-area network) technologies for smart agriculture applications in palm oil plantations will benefit the palm oil industry in terms of making more revenue. This research attempts to characterize the LoRa 433 MHz frequency channels for the available spread...
Vulnerabilities in the Industrial Control Systems (ICSs) and Supervisory Control and Data Acquisition (SCADA) systems are constantly increasing as these systems incorporate innovative technologies such as the Internet of Things (IoT). As a result of these advancements, the SCADA system became more efficient, simpler to operate, but more exposed to...
Free Space Optical (FSO) has a very good potential alternative solution to Radio Frequency (RF) to provide high terrestrial wireless communication. In tropical region, the only drawback of FSO is atmospheric attenuation due to mainly haze and rain. This study investigates the performance of FSO system over link distances that ranges between 9 km to...
One of the most important measures that developed countries need along with economic success is the provision of contemporary health services for the elderly. Inadequate care for the elderly can put them in danger of falls with serious injury or even death. When an older person falls due to illness, immediate lack of care may lead to death. In this...
With the enormous growth of sensing devices tending to the use of Internet of everything, data aggregated by these devices are the biggest data streams generated in the history of IT. Thus, aggregating such data in the cloud for leveraging powerful cloud computing processing and storage is essential, and it eventually led to the emergence of Sensor...
Recent advances in control, communication, and management systems, as well as the widespread use of renewable energy sources in homes, have led to the evolution of traditional power grids into smart grids, where passive consumers have become so-called prosumers that feed energy into the grid. On the other hand, the integration of blockchain into th...
Future satellite companies will use higher Ka and V bands. Rain fade is the most important issue in establishing reliable communication between Earth and satellites outside the 10 GHz band. The problem is exacerbated in the tropics by significant rainfall throughout the year. One way to deal with rainfall attenuation is to use a time-diversity stra...
LoRaWAN wireless communication channels are often impacted by noise and interference over long-range causing loss of a received signal. One of the main drawbacks of using existing propagation models is less accurate as these models in designing the communication link are tailored to simplify the estimation. In this paper, an artificial intelligent...
To combat the problem of illegal access to a service, several location proof strategies have been proposed in the literature. In blockchain-based decentralized applications, transactions can be issued by IoT nodes or other automated smart devices. Key pair encryption and private key signing have been defined mainly for human identification in block...
In Wireless Sensor Networks which are deployed in remote and isolated tropical areas; such as forest; jungle; and open dirt road environments; wireless communications usually suffer heavily because of the environmental effects on vegetation; terrain; low antenna height; and distance. Therefore; to solve this problem; the Wireless Sensor Network com...
Wearable antennas have grown in popularity in recent years as a result of their appealing
features and prospects to actualize lightweight, compact, low-cost and adaptable wireless communications
and surroundings. These antennas have to be conformal and made of lightweight materials in a low-profile
arrangement when attached to various parts of the...
ASEAN countries have recently proposed the frequency band (4.5–5.5) GHz for fifth generation (5G) cellular communication, which necessitates the creation of an ultra-wideband (UWB) antenna to accommodate the band-notched function. To describe the compact shape of a UWB antenna in the context of 5G application, this article has introduced a variable...
For fifth generation (5G) lower band wireless application at a frequency of (4.5-5.5) GHz, recently ASEAN region countries have suggested 5G forums and band rejection antennas for 5G (4.5-5.5) GHz lower band. A UWB antenna has been constructed and suggested by use of the Roger RT5880 with defected ground on a rectangular radiating patch and a ring...
With today’s advanced technology microstrip patch antennas
are more flexible and stronger than ever before. These antennas can work on
various frequencies ranging from low to high for a huge variety of applications
including medical, military and quite a few more. This paper presents the textile
antennas those are designed for Wi-MAX application wi...
This paper introduces a blockchain-based P2P energy trading platform, where prosumers can trade energy autonomously with no central authority interference. Multiple prosumers can collaborate in producing energy to form a single provider. Clients’ power consumption is monitored using a smart meter that interfaces with an IoT node connected to a bloc...
In ASEAN countries, the fifth generation (5G) forum
proposed a 5G application lower frequency band (4.5–5.5)
GHz and the fixed satellite service (FSS) C-band at
(3.3–4.2) GHz. Previous research works have demonstrated that the complexity of antenna design, large size
and in most of the cases, active elements that were
added to antenna has made the...
Rain fade is the main constraint for microwave propagation at higher frequencies. To design microwave link, it contributes significantly specially in tropical region. All rain attenuation prediction models require rain intensity data based on 1-min integration time. Rain intensity data was collected at International Islamic University Malaysia with...
Breast cancer is one of the most significant causes of death for women around the world. Breast thermography supported by deep convolutional neural networks is expected to contribute significantly to early detection and facilitate treatment at an early stage. The goal of this study is to investigate the behavior of different recent deep learning me...
The rapid evolution and growth of the internet through the last decades led to more concern about cyber-attacks that are continuously increasing and changing. As a result, an effective intrusion detection system was required to protect data, and the discovery of artificial intelligence’s sub-fields, machine learning, and deep learning, was one of t...
Electronic health records (EHRs) are digitally saved health records that provide information about a person’s health. EHRs are generally shared among healthcare stakeholders, and thus are susceptible to power failures, data misuse, a lack of privacy, security, and an audit trail, among other problems. Blockchain, on the other hand, is a groundbreak...
Network security becomes indispensable to our daily interactions and networks. As attackers continue to develop new types of attacks and the size of networks continues to grow, the need for an effective intrusion detection system has become critical. Numerous studies implemented machine learning algorithms to develop an effective IDS; however, with...
This paper provides the details of a study on the effects of electron radiation on the Performance of Inters-satellite Optical Wireless Communication (IsOWC). Academia and industry focus on solutions that can improve performance and reduce the cost of IsWOC systems. Spacecraft, space stations, satellites, and astronauts are exposed to an increased...
This paper proposes a novel dust-storm total path attenuation prediction model. This model is formulated as a function of specific attenuation (dB/km) and the effective distance, which considers the non-uniform dust storm intensity variations throughout the link. The effective distance is obtained as a combination of the total link distance and the...
Microstrip patch antennas are more flexible and stronger than ever before because of today's modern technology. It is possible to use these antennas for a wide range of applications, including medical and military ones, on a wide range of frequencies. The textile antenna for UWB applications between (4.62-10.74) GHz is presented in this paper. Sing...
Kuliyyah of Engineering Research, Innovation and Commercialization Exhibition 2021
Conventional cryptographic techniques are inappropriate for resource-constrained applications in the Internet of Things (IoT) domain because of their high resources requirement. This paper introduces a new Lightweight (LWT) hash function termed Lightweight New Mersenne Number Transform (LNMNT) Hash function, suitable for many IoT applications. The...
Wireless power transfer (WPT) has been extensively studied from various aspects such as far field and near field, operating frequency, coil design, matched capacitance values, misaligned locations of transmitting and receiving coils, distance variance between them, target loads in the specific locations, environment, and operating conditions. This...
Breast cancer is the most common cause of death in women around the world. A new tool has been adopted based on thermal imaging, deep convolutional networks, health applications on smartphones, and cloud computing for early detection of breast cancer. The development of the smart app included the use of Mastology Research with the Infrared Image DM...
Industrial control systems (ICS) are the backbone for the implementation of cybersecurity solutions. They are susceptible to various attacks, due to openness in connectivity, unauthorized attempts, malicious attacks, use of more commercial off the shelf (COTS) software and hardware, and implementation of Internet protocols (IP) that exposes them to...
This paper addresses the multiprocessor arbitration for any System on Chip or ASIC. Any system, be it a simple controller or a very supplicated system, it needs a processor to operate. There are series of processors offered by Intel, AMD or processor companies. The previously single processor was used for any chop to access different targets. But t...
Simultaneous wireless information and power transfer (SWIPT) presents a genuine opportunity toward achieving sustainable low-energy wireless devices. This paper introduces a receiver design for an energy harvesting sensor node (SN). The receiver is equipped with multiple radio frequency (RF) inputs. Furthermore, the receiver contains separate circu...
Breast cancer is one of the most significant causes of death for women around the world. Breast thermography supported by deep convolutional neural networks is expected to contribute significantly to early detection and facilitate treatment at an early stage. The goal of this study is to investigate the behavior of different recent deep learning me...
Low-power lossy networks performance relies heavily on the wireless node battery status. Furthermore, Routing Protocol for Low-Power and Lossy Network routing protocol was not optimally designed with sustainable energy consumption in mind to suit these networks. Prolonging the lifespan of these networks is of utmost priority. This article introduce...
With the ongoing efforts for widespread Internet of Things (IoT) adoption, one of the key factors hindering the wide acceptance of IoT is security. Securing IoT networks such as the electric power grid or water supply systems has emerged as a major national and global priority. To address the security issue of IoT, several studies are being carried...