Mohamed Hadi Habaebi

Mohamed Hadi Habaebi
Verified
Mohamed verified their affiliation via an institutional email.
Verified
Mohamed verified their affiliation via an institutional email.
  • PhD
  • Professor (Full) at International Islamic University Malaysia

About

415
Publications
257,840
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,573
Citations
Introduction
Current research interests: Energy Security, cryptographic function for IoT and SCADA IP-based networks; wireless distributed computing; energy harvesting; mmWave channel propagation modelling; 5G network and access schemes; RF signature fingerprinting and identification; communication for the smart grids.
Current institution
International Islamic University Malaysia
Current position
  • Professor (Full)
Additional affiliations
August 2011 - present
International Islamic University Malaysia
Position
  • Professor
July 2003 - August 2011
University of Tripoli
Position
  • Professor (Associate)
July 1998 - June 2003
Universiti Putra Malaysia
Position
  • Visiting Lecturer

Publications

Publications (415)
Article
Fuel cells such as polymer electrolyte membrane fuel cells are playing crucial role in the transition towards sustainable energy systems. Ion conducting membranes (ICMs) are playing critical chemical and mechanical roles in such fuel cells which directly affecting the efficiency, durability and overall device performance. Recent progress in machine...
Article
This study introduces a thoughtfully curated dataset comprising electroencephalogram (EEG) recordings designed to unravel mental stress patterns through the perspective of cognitive load. The dataset incorporates EEG signals obtained from 15 subjects, with a gender distribution of 8 females and 7 males, and a mean age of 21.5 years [1]. Recordings...
Preprint
Edge computing (EC) is a distributed computing approach to processing data at the network edge, either by the device or a local server, instead of centralized data centers or the cloud. EC proximity to the data source can provide faster insights, response time, and bandwidth utilization. However, the distributed architecture of EC, makes them vulne...
Article
Full-text available
Sand and dust storms significantly challenge microwave and millimeter-wave communications, particularly in arid and semi-arid regions. Various models have been developed to predict attenuation caused by these storms theoretically and empirically based on two meteorological parameters, namely visibility and humidity. However, these models are found...
Article
Full-text available
The purpose of this study is to present a lightweight wearable (jeans) monopole antenna configuration for body area network (BAN) communication, breast and head tumors detections with back lobe reduction (i.e. low SAR), and it does so without introducing any special methodologies like as, AMC, EBG, HIS. The planned antenna has dual symmetrical slot...
Article
Full-text available
As we are living in a fast-moving dynamic world. Emerging technologies such as artificial intelligence (AI), internet of things (IoT), virtual reality (VR), augmented reality (AR), fourth industrial revolution (Industry 4.0), metaverse, and edge computing are expected to play an essential role in our daily life. These technologies require high-spee...
Article
Full-text available
As the IoT ecosystem continues to grow, edge computing is becoming essential for handling and analyzing the vast amount of data generated by connected devices. Unlike traditional centralized data models, where information is sent to remote centers for processing, edge computing processes data closer to where it is generated. This decentralized appr...
Article
Full-text available
In this study, we propose a framework that enhances breast cancer classification accuracy by preserving spatial features and leveraging in situ cooling support. The framework utilizes real-time thermography video streaming for early breast cancer detection using Deep Learning models. Inception v3, Inception v4, and a modified Inception Mv4 were dev...
Conference Paper
Blockchain technologies and cryptocurrencies have garnered significant attention for their potential to revolutionize various industries. This paper investigates the landscape of blockchain technologies in the context of cryptocurrencies, focusing on performance metrics, trade-offs, trends, and underlying issues. Through comprehensive analysis, the...
Article
Full-text available
This paper proposes a renewable energy resource (photovoltaic) to generate green and halal energy for household and feeding the excess energy into the Nigeria National Grid Network. The energy demand in third world nation like Nigeria will increase in nearest future. The renewable energy is one of the alternative energy sources that could satisfy t...
Article
Full-text available
This article focuses on the analysis and integration of PV systems to load ratio correlation and the economic importance of the left over to grid supply and integration. The paper focusses on the different methods of PV generation to load utilization using the solar powered air conditioner as the load while minimizing the use of fossil fuel (petrol...
Article
Full-text available
This article is a pragmatic approach on the evaluation of wind energy production and it's estimation in the coastal area of Lagos Nigeria. The work focuses on the accessibility of wind energy production in Lagos Nigeria through analyzing wind data in the look up tables using proficient probability function. Here, three approaches are itemized; Anal...
Article
Full-text available
The proliferation landscape of the Internet of Things (IoT) has accentuated the critical role of Authentication and Authorization (AA) mechanisms in securing interconnected devices. There is a lack of relevant datasets that can aid in building appropriate machine learning enabled security solutions focusing on authentication and authorization using...
Article
Full-text available
To secure sensitive medical records in the healthcare clouds, this paper proposes an End-to-End Encryption (E2EE) to enhance a patient-centric blockchain-based system for electronic health record (EHR) management. The suggested system with a focus on the patient enables individuals to oversee their medical records within various involved parties by...
Article
Full-text available
Nowadays, the surge in energy demand due to economic growth and extreme weather conditions has put immense pressure on the usage of fossil fuels in Kuwait. As a result, scheduled load-shedding is performed in some regions during the summer season to meet the energy demand. To address this issue, this paper proposes a photovoltaic-based street light...
Preprint
Full-text available
Breast cancer remains a leading cause of mortality among women globally. There were techniques that have been developed to enhance early detection, among which thermal imaging has emerged as a promising modality capable of identifying potential signs of breast cancer in its early stages. In addition, Thermal images provide valuable pixel-level info...
Article
Full-text available
This article focuses on the analysis and integration of PV systems to load ratio correlation and the economic importance of the left over to grid supply and integration. The paper focusses on the different methods of PV generation to load utilization using the solar powered air conditioner as the load while minimizing the use of fossil fuel (petrol...
Article
Full-text available
Supervisory Control and Data Acquisition (SCADA) systems are crucial for modern industrial processes and securing them against increasing cyber threats is a significant challenge. This study presents an advanced method for bolstering SCADA security by employing a modified hybrid deep learning model. A key innovation in this work is integrating the...
Article
Full-text available
Sand and dust storms present significant challenges to microwave and millimeter-wave propagation, directly impacting communication systems. Despite the existence of various theoretical and analytical models for predicting dust storm attenuation, many have overlooked the crucial factor of humidity. This study had conducted a year-long monitoring of...
Article
Full-text available
In recent years, cloud computing has become an essential distributed computing platform and has achieved enormous popularity. Within cloud computing, the Cloud service broker creates an abstraction layer between provider and consumer so that customers notice the cloud service providers’ offered services’ solitary view. The brokers of cloud service...
Article
Full-text available
Inductive Power Transfer (IPT) finds applications in various fields that require episodic rather than continuous power supplies, such as implantable medical devices, consumer electronics, IoT applications, civil structure monitoring, and electric vehicle charging. The efficiency of IPT systems depends on the operating frequency which is determined...
Article
Full-text available
The need for strong authentication and authorization (AA) security measures is growing with the proliferation of the Internet of Things (IoT). This paper presents an advanced trust-aware authentication and authorization system for IoT environments. Using real-world data collected from Zigbee Zolertia Z1 devices, a Federated Machine Learning model w...
Conference Paper
Full-text available
The prevention of breast cancer at an early stage is crucial for saving lives and reducing costs. Breast thermography, a complementary diagnostic technique, has shown promise in detecting breast tumors early. This research proposes a framework that leverages real-time thermography video streaming and deep learning models for the early detection of...
Conference Paper
Full-text available
The breast tumor is the form of tumor that is diagnosed more frequently than any other type of tumor and it is the leading cause of death from breast cancer among females globally. Breast cancer has the greatest incidence and fatality rate among women worldwide. Early on, it was largely elderly women who were affected, but that has since shifted. Y...
Article
Full-text available
With the rise of the Internet of Things (IoT), tiny devices capable of computation and data transmission are being deployed across various technological domains. Due to the wide deployment of these devices, manual setup and management are infeasible and inefficient. To address this inefficiency, intelligent procedures must be established to enable...
Article
Full-text available
Drones, or unmanned aerial vehicles (UAVs), have emerged as an indispensable tool across numerous industries due to their remarkable versatility, efficiency, and capabilities. Notwithstanding all these traits, drones are still limited by battery life. In this paper, we propose a genuine in-flight charging method without landing. The charging system...
Article
Full-text available
Featured Application This article presents a numerical simulation model built using COMSOL software to study the thermophysical properties of different breast sizes. Specifically, the effects of varied blood perfusion, tumor size, location depth, and thermal conductivity were studied in relation to breast size. Pennes’ bioheat formula was applied t...
Article
Full-text available
Internet of Things (IoT) is the interconnection of devices with the internet to deliver its tasks. Nowadays, security is the main concern relating to these devices. Low in power storage, low in processing capabilities and low in data storage make it hard to provide a strong set of security protocols to protect the vulnerable devices “things”. Havin...
Article
Full-text available
The Wireless Sensor Network needs to become a dynamic and adaptive network to conserve energy stored in the wireless sensor network node battery. This dynamic and adaptive network sometimes are called SON (Self Organizing Network). Several SON concepts have been developed such as routing, clustering, intrusion detection, and other. Although several...
Article
Full-text available
Filtered orthogonal frequency division multiplexing (F-OFDM), a technology which is being considered as a promising platform for beyond 4G era is expected to help deliver the new features at millimeter wave in the new 5 th generation of cellular communication. Some of its key features notably better spectral utilization, enhanced throughput and imm...
Article
Full-text available
Accessing healthcare services by several stakeholders for diagnosis and treatment has become quite prevalent owing to the improvement in the industry and high levels of patient mobility. Due to the confidentiality and high sensitivity of electronic healthcare records (EHR), the majority of EHR data sharing is still conducted via fax or mail because...
Article
Full-text available
Integrating IoT devices in SCADA systems has provided efficient and improved data collection and transmission technologies. This enhancement comes with significant security challenges, exposing traditionally isolated systems to the public internet. Effective and highly reliable security devices, such as intrusion detection system (IDSs) and intrusi...
Article
Full-text available
To facilitate wireless sensor networks deployment in dense jungle environments, the challenges of unreliable wireless communication links used for routing data between nodes and the gateway, and the limited battery energy available from the nodes must be overcome. In this paper, we introduce the Self-Organized Wireless Sensor Network (SOWSN) to ove...
Article
Full-text available
A wide range of critical infrastructures such as power systems, water distribution systems, gas pipelines, and others are controlled and monitored using industrial control systems (ICSs). Recently, security attacks against ICSs are increasing at an alarming rate. These systems cannot afford to lose the availability of service; a cyber-attack can ca...
Article
Full-text available
The patch antenna with Ultra-Wide Band (UWB) characteristics is a promising candidate for wireless communication. It is a major research problem to mitigate electromagnetic interference (EMI) with narrowband technologies such as 5G lower band, Wi-MAX, WLAN and satellite band, which are all in the UWB region. This study describes a UWB antenna with...
Article
Full-text available
This study proposes an analytical model of a WPT system with three orthogonal transmitter coils organised to produce a concentrated and controlled omnidirectional magnetic field suited for charging a moving, rotating load, providing maximal energy transfer without receiving end feedback. In order to create a realistic 3D WPT simulation system and a...
Article
Full-text available
Sungai Pusu is the river that passes through the IIUM Gombak campus. The river has been having a cloudy appearance for years hence it is needed to quantify the vital signs such as pH, temperature, and turbidity because these are the vital signs indicating the health of a river. Currently, there a lot of monitoring systems however the available moni...
Article
Full-text available
Consensus protocols stand behind the success of blockchain technology. This is because parties that distrust each other can make secure transactions without the oversight of a central authority. The first consensus protocol emerged with Bitcoin. Since then, many others have appeared. Some of them have been implemented by official blockchain platfor...
Article
Full-text available
Palm oil is the main cash crop of tropical Asia, and the implementation of LPWAN (low-power wide-area network) technologies for smart agriculture applications in palm oil plantations will benefit the palm oil industry in terms of making more revenue. This research attempts to characterize the LoRa 433 MHz frequency channels for the available spread...
Article
Full-text available
Vulnerabilities in the Industrial Control Systems (ICSs) and Supervisory Control and Data Acquisition (SCADA) systems are constantly increasing as these systems incorporate innovative technologies such as the Internet of Things (IoT). As a result of these advancements, the SCADA system became more efficient, simpler to operate, but more exposed to...
Article
Full-text available
Free Space Optical (FSO) has a very good potential alternative solution to Radio Frequency (RF) to provide high terrestrial wireless communication. In tropical region, the only drawback of FSO is atmospheric attenuation due to mainly haze and rain. This study investigates the performance of FSO system over link distances that ranges between 9 km to...
Article
Full-text available
One of the most important measures that developed countries need along with economic success is the provision of contemporary health services for the elderly. Inadequate care for the elderly can put them in danger of falls with serious injury or even death. When an older person falls due to illness, immediate lack of care may lead to death. In this...
Article
With the enormous growth of sensing devices tending to the use of Internet of everything, data aggregated by these devices are the biggest data streams generated in the history of IT. Thus, aggregating such data in the cloud for leveraging powerful cloud computing processing and storage is essential, and it eventually led to the emergence of Sensor...
Article
Full-text available
Recent advances in control, communication, and management systems, as well as the widespread use of renewable energy sources in homes, have led to the evolution of traditional power grids into smart grids, where passive consumers have become so-called prosumers that feed energy into the grid. On the other hand, the integration of blockchain into th...
Article
Full-text available
Future satellite companies will use higher Ka and V bands. Rain fade is the most important issue in establishing reliable communication between Earth and satellites outside the 10 GHz band. The problem is exacerbated in the tropics by significant rainfall throughout the year. One way to deal with rainfall attenuation is to use a time-diversity stra...
Article
Full-text available
LoRaWAN wireless communication channels are often impacted by noise and interference over long-range causing loss of a received signal. One of the main drawbacks of using existing propagation models is less accurate as these models in designing the communication link are tailored to simplify the estimation. In this paper, an artificial intelligent...
Article
Full-text available
To combat the problem of illegal access to a service, several location proof strategies have been proposed in the literature. In blockchain-based decentralized applications, transactions can be issued by IoT nodes or other automated smart devices. Key pair encryption and private key signing have been defined mainly for human identification in block...
Article
Full-text available
In Wireless Sensor Networks which are deployed in remote and isolated tropical areas; such as forest; jungle; and open dirt road environments; wireless communications usually suffer heavily because of the environmental effects on vegetation; terrain; low antenna height; and distance. Therefore; to solve this problem; the Wireless Sensor Network com...
Article
Full-text available
Wearable antennas have grown in popularity in recent years as a result of their appealing features and prospects to actualize lightweight, compact, low-cost and adaptable wireless communications and surroundings. These antennas have to be conformal and made of lightweight materials in a low-profile arrangement when attached to various parts of the...
Article
Full-text available
ASEAN countries have recently proposed the frequency band (4.5–5.5) GHz for fifth generation (5G) cellular communication, which necessitates the creation of an ultra-wideband (UWB) antenna to accommodate the band-notched function. To describe the compact shape of a UWB antenna in the context of 5G application, this article has introduced a variable...
Article
Full-text available
For fifth generation (5G) lower band wireless application at a frequency of (4.5-5.5) GHz, recently ASEAN region countries have suggested 5G forums and band rejection antennas for 5G (4.5-5.5) GHz lower band. A UWB antenna has been constructed and suggested by use of the Roger RT5880 with defected ground on a rectangular radiating patch and a ring...
Article
Full-text available
With today’s advanced technology microstrip patch antennas are more flexible and stronger than ever before. These antennas can work on various frequencies ranging from low to high for a huge variety of applications including medical, military and quite a few more. This paper presents the textile antennas those are designed for Wi-MAX application wi...
Article
Full-text available
This paper introduces a blockchain-based P2P energy trading platform, where prosumers can trade energy autonomously with no central authority interference. Multiple prosumers can collaborate in producing energy to form a single provider. Clients’ power consumption is monitored using a smart meter that interfaces with an IoT node connected to a bloc...
Article
Full-text available
In ASEAN countries, the fifth generation (5G) forum proposed a 5G application lower frequency band (4.5–5.5) GHz and the fixed satellite service (FSS) C-band at (3.3–4.2) GHz. Previous research works have demonstrated that the complexity of antenna design, large size and in most of the cases, active elements that were added to antenna has made the...
Chapter
Rain fade is the main constraint for microwave propagation at higher frequencies. To design microwave link, it contributes significantly specially in tropical region. All rain attenuation prediction models require rain intensity data based on 1-min integration time. Rain intensity data was collected at International Islamic University Malaysia with...
Article
Full-text available
Breast cancer is one of the most significant causes of death for women around the world. Breast thermography supported by deep convolutional neural networks is expected to contribute significantly to early detection and facilitate treatment at an early stage. The goal of this study is to investigate the behavior of different recent deep learning me...
Article
Full-text available
The rapid evolution and growth of the internet through the last decades led to more concern about cyber-attacks that are continuously increasing and changing. As a result, an effective intrusion detection system was required to protect data, and the discovery of artificial intelligence’s sub-fields, machine learning, and deep learning, was one of t...
Article
Full-text available
Electronic health records (EHRs) are digitally saved health records that provide information about a person’s health. EHRs are generally shared among healthcare stakeholders, and thus are susceptible to power failures, data misuse, a lack of privacy, security, and an audit trail, among other problems. Blockchain, on the other hand, is a groundbreak...
Article
Full-text available
Network security becomes indispensable to our daily interactions and networks. As attackers continue to develop new types of attacks and the size of networks continues to grow, the need for an effective intrusion detection system has become critical. Numerous studies implemented machine learning algorithms to develop an effective IDS; however, with...
Article
Full-text available
This paper provides the details of a study on the effects of electron radiation on the Performance of Inters-satellite Optical Wireless Communication (IsOWC). Academia and industry focus on solutions that can improve performance and reduce the cost of IsWOC systems. Spacecraft, space stations, satellites, and astronauts are exposed to an increased...
Article
Full-text available
This paper proposes a novel dust-storm total path attenuation prediction model. This model is formulated as a function of specific attenuation (dB/km) and the effective distance, which considers the non-uniform dust storm intensity variations throughout the link. The effective distance is obtained as a combination of the total link distance and the...
Poster
Full-text available
Microstrip patch antennas are more flexible and stronger than ever before because of today's modern technology. It is possible to use these antennas for a wide range of applications, including medical and military ones, on a wide range of frequencies. The textile antenna for UWB applications between (4.62-10.74) GHz is presented in this paper. Sing...
Poster
Full-text available
Kuliyyah of Engineering Research, Innovation and Commercialization Exhibition 2021
Article
Full-text available
Conventional cryptographic techniques are inappropriate for resource-constrained applications in the Internet of Things (IoT) domain because of their high resources requirement. This paper introduces a new Lightweight (LWT) hash function termed Lightweight New Mersenne Number Transform (LNMNT) Hash function, suitable for many IoT applications. The...
Article
Full-text available
Wireless power transfer (WPT) has been extensively studied from various aspects such as far field and near field, operating frequency, coil design, matched capacitance values, misaligned locations of transmitting and receiving coils, distance variance between them, target loads in the specific locations, environment, and operating conditions. This...
Article
Full-text available
Breast cancer is the most common cause of death in women around the world. A new tool has been adopted based on thermal imaging, deep convolutional networks, health applications on smartphones, and cloud computing for early detection of breast cancer. The development of the smart app included the use of Mastology Research with the Infrared Image DM...
Article
Full-text available
Industrial control systems (ICS) are the backbone for the implementation of cybersecurity solutions. They are susceptible to various attacks, due to openness in connectivity, unauthorized attempts, malicious attacks, use of more commercial off the shelf (COTS) software and hardware, and implementation of Internet protocols (IP) that exposes them to...
Article
Full-text available
This paper addresses the multiprocessor arbitration for any System on Chip or ASIC. Any system, be it a simple controller or a very supplicated system, it needs a processor to operate. There are series of processors offered by Intel, AMD or processor companies. The previously single processor was used for any chop to access different targets. But t...
Article
Full-text available
Simultaneous wireless information and power transfer (SWIPT) presents a genuine opportunity toward achieving sustainable low-energy wireless devices. This paper introduces a receiver design for an energy harvesting sensor node (SN). The receiver is equipped with multiple radio frequency (RF) inputs. Furthermore, the receiver contains separate circu...
Article
Full-text available
Breast cancer is one of the most significant causes of death for women around the world. Breast thermography supported by deep convolutional neural networks is expected to contribute significantly to early detection and facilitate treatment at an early stage. The goal of this study is to investigate the behavior of different recent deep learning me...
Article
Full-text available
Low-power lossy networks performance relies heavily on the wireless node battery status. Furthermore, Routing Protocol for Low-Power and Lossy Network routing protocol was not optimally designed with sustainable energy consumption in mind to suit these networks. Prolonging the lifespan of these networks is of utmost priority. This article introduce...
Article
Full-text available
With the ongoing efforts for widespread Internet of Things (IoT) adoption, one of the key factors hindering the wide acceptance of IoT is security. Securing IoT networks such as the electric power grid or water supply systems has emerged as a major national and global priority. To address the security issue of IoT, several studies are being carried...

Network

Cited By