Mohamed Hadi Habaebi

Mohamed Hadi Habaebi
International Islamic University Malaysia | iium · Department of Electrical and Computer Engineering

PhD

About

383
Publications
202,876
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,321
Citations
Introduction
Current research interests: Energy Security, cryptographic function for IoT and SCADA IP-based networks; wireless distributed computing; energy harvesting; mmWave channel propagation modelling; 5G network and access schemes; RF signature fingerprinting and identification; communication for the smart grids.
Additional affiliations
August 2011 - present
International Islamic University Malaysia
Position
  • Professor
July 2003 - August 2011
University of Tripoli
Position
  • Professor (Associate)
July 1998 - June 2003
Universiti Putra Malaysia
Position
  • Visiting Lecturer

Publications

Publications (383)
Article
Full-text available
This article focuses on the analysis and integration of PV systems to load ratio correlation and the economic importance of the left over to grid supply and integration. The paper focusses on the different methods of PV generation to load utilization using the solar powered air conditioner as the load while minimizing the use of fossil fuel (petrol...
Conference Paper
Full-text available
The prevention of breast cancer at an early stage is crucial for saving lives and reducing costs. Breast thermography, a complementary diagnostic technique, has shown promise in detecting breast tumors early. This research proposes a framework that leverages real-time thermography video streaming and deep learning models for the early detection of...
Conference Paper
Full-text available
The breast tumor is the form of tumor that is diagnosed more frequently than any other type of tumor and it is the leading cause of death from breast cancer among females globally. Breast cancer has the greatest incidence and fatality rate among women worldwide. Early on, it was largely elderly women who were affected, but that has since shifted. Y...
Article
Full-text available
With the rise of the Internet of Things (IoT), tiny devices capable of computation and data transmission are being deployed across various technological domains. Due to the wide deployment of these devices, manual setup and management are infeasible and inefficient. To address this inefficiency, intelligent procedures must be established to enable...
Article
Full-text available
Drones, or unmanned aerial vehicles (UAVs), have emerged as an indispensable tool across numerous industries due to their remarkable versatility, efficiency, and capabilities. Notwithstanding all these traits, drones are still limited by battery life. In this paper, we propose a genuine in-flight charging method without landing. The charging system...
Article
Full-text available
This article presents a numerical simulation model using COMSOL software to study breast thermophysical properties. It analyzes tumor heat at different locations within the breast, records breast surface temperatures, investigates the effects of factors such as blood perfusion, size, depth, and thermal conductivity on breast size, and applies Penne...
Article
Full-text available
Internet of Things (IoT) is the interconnection of devices with the internet to deliver its tasks. Nowadays, security is the main concern relating to these devices. Low in power storage, low in processing capabilities and low in data storage make it hard to provide a strong set of security protocols to protect the vulnerable devices “things”. Havin...
Article
Full-text available
The Wireless Sensor Network needs to become a dynamic and adaptive network to conserve energy stored in the wireless sensor network node battery. This dynamic and adaptive network sometimes are called SON (Self Organizing Network). Several SON concepts have been developed such as routing, clustering, intrusion detection, and other. Although several...
Article
Full-text available
Filtered orthogonal frequency division multiplexing (F-OFDM), a technology which is being considered as a promising platform for beyond 4G era is expected to help deliver the new features at millimeter wave in the new 5 th generation of cellular communication. Some of its key features notably better spectral utilization, enhanced throughput and imm...
Article
Full-text available
Accessing healthcare services by several stakeholders for diagnosis and treatment has become quite prevalent owing to the improvement in the industry and high levels of patient mobility. Due to the confidentiality and high sensitivity of electronic healthcare records (EHR), the majority of EHR data sharing is still conducted via fax or mail because...
Article
Full-text available
Integrating IoT devices in SCADA systems has provided efficient and improved data collection and transmission technologies. This enhancement comes with significant security challenges, exposing traditionally isolated systems to the public internet. Effective and highly reliable security devices, such as intrusion detection system (IDSs) and intrusi...
Article
Full-text available
To facilitate wireless sensor networks deployment in dense jungle environments, the challenges of unreliable wireless communication links used for routing data between nodes and the gateway, and the limited battery energy available from the nodes must be overcome. In this paper, we introduce the Self-Organized Wireless Sensor Network (SOWSN) to ove...
Article
Full-text available
The patch antenna with Ultra-Wide Band (UWB) characteristics is a promising candidate for wireless communication. It is a major research problem to mitigate electromagnetic interference (EMI) with narrowband technologies such as 5G lower band, Wi-MAX, WLAN and satellite band, which are all in the UWB region. This study describes a UWB antenna with...
Article
Full-text available
This study proposes an analytical model of a WPT system with three orthogonal transmitter coils organised to produce a concentrated and controlled omnidirectional magnetic field suited for charging a moving, rotating load, providing maximal energy transfer without receiving end feedback. In order to create a realistic 3D WPT simulation system and a...
Article
Full-text available
Sungai Pusu is the river that passes through the IIUM Gombak campus. The river has been having a cloudy appearance for years hence it is needed to quantify the vital signs such as pH, temperature, and turbidity because these are the vital signs indicating the health of a river. Currently, there a lot of monitoring systems however the available moni...
Article
Full-text available
Consensus protocols stand behind the success of blockchain technology. This is because parties that distrust each other can make secure transactions without the oversight of a central authority. The first consensus protocol emerged with Bitcoin. Since then, many others have appeared. Some of them have been implemented by official blockchain platfor...
Article
Full-text available
Palm oil is the main cash crop of tropical Asia, and the implementation of LPWAN (low-power wide-area network) technologies for smart agriculture applications in palm oil plantations will benefit the palm oil industry in terms of making more revenue. This research attempts to characterize the LoRa 433 MHz frequency channels for the available spread...
Article
Full-text available
Vulnerabilities in the Industrial Control Systems (ICSs) and Supervisory Control and Data Acquisition (SCADA) systems are constantly increasing as these systems incorporate innovative technologies such as the Internet of Things (IoT). As a result of these advancements, the SCADA system became more efficient, simpler to operate, but more exposed to...
Article
Full-text available
Free Space Optical (FSO) has a very good potential alternative solution to Radio Frequency (RF) to provide high terrestrial wireless communication. In tropical region, the only drawback of FSO is atmospheric attenuation due to mainly haze and rain. This study investigates the performance of FSO system over link distances that ranges between 9 km to...
Article
Full-text available
One of the most important measures that developed countries need along with economic success is the provision of contemporary health services for the elderly. Inadequate care for the elderly can put them in danger of falls with serious injury or even death. When an older person falls due to illness, immediate lack of care may lead to death. In this...
Article
With the enormous growth of sensing devices tending to the use of Internet of everything, data aggregated by these devices are the biggest data streams generated in the history of IT. Thus, aggregating such data in the cloud for leveraging powerful cloud computing processing and storage is essential, and it eventually led to the emergence of Sensor...
Article
Full-text available
Recent advances in control, communication, and management systems, as well as the widespread use of renewable energy sources in homes, have led to the evolution of traditional power grids into smart grids, where passive consumers have become so-called prosumers that feed energy into the grid. On the other hand, the integration of blockchain into th...
Article
Full-text available
Future satellite companies will use higher Ka and V bands. Rain fade is the most important issue in establishing reliable communication between Earth and satellites outside the 10 GHz band. The problem is exacerbated in the tropics by significant rainfall throughout the year. One way to deal with rainfall attenuation is to use a time-diversity stra...
Article
Full-text available
LoRaWAN wireless communication channels are often impacted by noise and interference over long-range causing loss of a received signal. One of the main drawbacks of using existing propagation models is less accurate as these models in designing the communication link are tailored to simplify the estimation. In this paper, an artificial intelligent...
Article
Full-text available
To combat the problem of illegal access to a service, several location proof strategies have been proposed in the literature. In blockchain-based decentralized applications, transactions can be issued by IoT nodes or other automated smart devices. Key pair encryption and private key signing have been defined mainly for human identification in block...
Article
Full-text available
In Wireless Sensor Networks which are deployed in remote and isolated tropical areas; such as forest; jungle; and open dirt road environments; wireless communications usually suffer heavily because of the environmental effects on vegetation; terrain; low antenna height; and distance. Therefore; to solve this problem; the Wireless Sensor Network com...
Article
Full-text available
Wearable antennas have grown in popularity in recent years as a result of their appealing features and prospects to actualize lightweight, compact, low-cost and adaptable wireless communications and surroundings. These antennas have to be conformal and made of lightweight materials in a low-profile arrangement when attached to various parts of the...
Article
Full-text available
ASEAN countries have recently proposed the frequency band (4.5–5.5) GHz for fifth generation (5G) cellular communication, which necessitates the creation of an ultra-wideband (UWB) antenna to accommodate the band-notched function. To describe the compact shape of a UWB antenna in the context of 5G application, this article has introduced a variable...
Article
Full-text available
For fifth generation (5G) lower band wireless application at a frequency of (4.5-5.5) GHz, recently ASEAN region countries have suggested 5G forums and band rejection antennas for 5G (4.5-5.5) GHz lower band. A UWB antenna has been constructed and suggested by use of the Roger RT5880 with defected ground on a rectangular radiating patch and a ring...
Article
Full-text available
With today’s advanced technology microstrip patch antennas are more flexible and stronger than ever before. These antennas can work on various frequencies ranging from low to high for a huge variety of applications including medical, military and quite a few more. This paper presents the textile antennas those are designed for Wi-MAX application wi...
Article
Full-text available
This paper introduces a blockchain-based P2P energy trading platform, where prosumers can trade energy autonomously with no central authority interference. Multiple prosumers can collaborate in producing energy to form a single provider. Clients’ power consumption is monitored using a smart meter that interfaces with an IoT node connected to a bloc...
Article
Full-text available
In ASEAN countries, the fifth generation (5G) forum proposed a 5G application lower frequency band (4.5–5.5) GHz and the fixed satellite service (FSS) C-band at (3.3–4.2) GHz. Previous research works have demonstrated that the complexity of antenna design, large size and in most of the cases, active elements that were added to antenna has made the...
Chapter
Rain fade is the main constraint for microwave propagation at higher frequencies. To design microwave link, it contributes significantly specially in tropical region. All rain attenuation prediction models require rain intensity data based on 1-min integration time. Rain intensity data was collected at International Islamic University Malaysia with...
Article
Full-text available
Breast cancer is one of the most significant causes of death for women around the world. Breast thermography supported by deep convolutional neural networks is expected to contribute significantly to early detection and facilitate treatment at an early stage. The goal of this study is to investigate the behavior of different recent deep learning me...
Article
Full-text available
The rapid evolution and growth of the internet through the last decades led to more concern about cyber-attacks that are continuously increasing and changing. As a result, an effective intrusion detection system was required to protect data, and the discovery of artificial intelligence’s sub-fields, machine learning, and deep learning, was one of t...
Article
Full-text available
Electronic health records (EHRs) are digitally saved health records that provide information about a person’s health. EHRs are generally shared among healthcare stakeholders, and thus are susceptible to power failures, data misuse, a lack of privacy, security, and an audit trail, among other problems. Blockchain, on the other hand, is a groundbreak...
Article
Full-text available
Network security becomes indispensable to our daily interactions and networks. As attackers continue to develop new types of attacks and the size of networks continues to grow, the need for an effective intrusion detection system has become critical. Numerous studies implemented machine learning algorithms to develop an effective IDS; however, with...
Article
Full-text available
This paper provides the details of a study on the effects of electron radiation on the Performance of Inters-satellite Optical Wireless Communication (IsOWC). Academia and industry focus on solutions that can improve performance and reduce the cost of IsWOC systems. Spacecraft, space stations, satellites, and astronauts are exposed to an increased...
Article
Full-text available
This paper proposes a novel dust-storm total path attenuation prediction model. This model is formulated as a function of specific attenuation (dB/km) and the effective distance, which considers the non-uniform dust storm intensity variations throughout the link. The effective distance is obtained as a combination of the total link distance and the...
Poster
Full-text available
Microstrip patch antennas are more flexible and stronger than ever before because of today's modern technology. It is possible to use these antennas for a wide range of applications, including medical and military ones, on a wide range of frequencies. The textile antenna for UWB applications between (4.62-10.74) GHz is presented in this paper. Sing...
Poster
Full-text available
Kuliyyah of Engineering Research, Innovation and Commercialization Exhibition 2021
Article
Full-text available
Conventional cryptographic techniques are inappropriate for resource-constrained applications in the Internet of Things (IoT) domain because of their high resources requirement. This paper introduces a new Lightweight (LWT) hash function termed Lightweight New Mersenne Number Transform (LNMNT) Hash function, suitable for many IoT applications. The...
Article
Full-text available
Wireless power transfer (WPT) has been extensively studied from various aspects such as far field and near field, operating frequency, coil design, matched capacitance values, misaligned locations of transmitting and receiving coils, distance variance between them, target loads in the specific locations, environment, and operating conditions. This...
Article
Full-text available
Breast cancer is the most common cause of death in women around the world. A new tool has been adopted based on thermal imaging, deep convolutional networks, health applications on smartphones, and cloud computing for early detection of breast cancer. The development of the smart app included the use of Mastology Research with the Infrared Image DM...
Article
Full-text available
Industrial control systems (ICS) are the backbone for the implementation of cybersecurity solutions. They are susceptible to various attacks, due to openness in connectivity, unauthorized attempts, malicious attacks, use of more commercial off the shelf (COTS) software and hardware, and implementation of Internet protocols (IP) that exposes them to...
Article
Full-text available
Simultaneous wireless information and power transfer (SWIPT) presents a genuine opportunity toward achieving sustainable low-energy wireless devices. This paper introduces a receiver design for an energy harvesting sensor node (SN). The receiver is equipped with multiple radio frequency (RF) inputs. Furthermore, the receiver contains separate circu...