Mohammad Mehedi Hassan

Mohammad Mehedi Hassan
King Saud University | KKUH · Department of Information Systems

PhD in Computer Engineering

About

332
Publications
84,684
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
8,391
Citations
Introduction
Skills and Expertise

Publications

Publications (332)
Article
Full-text available
The food security of more than half of the world’s population depends on rice production which is one of the key objectives of precision agriculture. The traditional rice almanac used astronomical and climate factors to estimate yield response. However, this research integrated meteorological, agro-chemical, and soil physiographic factors for yield...
Article
In recent years, intrusion detection systems (IDSs) are offering effective solutions to protect various types of cyber-attacks in different networks such as Internet of Vehicles (IoVs) network in Intelligent Transportation Systems (ITS). Deep learning models have largely been leveraged by these intrusion detection systems to achieve better effectiv...
Article
The correlations between smartphone sensors, algorithms, and relevant techniques are major components facilitating indoor localization and tracking in the absence of communication and localization standards. A major research gap can be noted in terms of explaining the connections between these components to clarify the impacts and issues of models...
Article
Full-text available
Advanced collaborative and communication technologies play a significant role in intelligent services and applications, including artificial intelligence, Internet of Things (IoT), remote sensing, robotics, future generation wireless, and aerial access networks. These technologies improve connectivity, energy efficiency, and quality of services of...
Article
Full-text available
This work presents a high-performance approach for 3D lung segmentation tasks in computer tomography images using a new intelligent machine learning algorithm called Floor of Log(FoL). The Support Vector Machine was used to learn the better parameter of the FoL algorithm using the parenchyma and its border as labels. Sensitivity, Matthews Correlati...
Article
In recent years many amazing deep learning models have been developed, but in the process of practical applications, people often find that these deep learning models have high requirements for hardware storage space and computing power. In Artificial Intelligent of Things (AIoT) scenario, the computing power of the edge or terminal side are relati...
Article
Full-text available
The Ejection Fraction value denotes how much blood is pumped out of the heart to different parts of the body. It is a routine clinical procedure in heart function assessment, where the left ventricle of the heart has to be manually outlined by doctors in clinical settings to measure the Ejection Fraction value which is time-consuming and highly var...
Article
Full-text available
Cloud computing enables clients to acquire cloud resources dynamically and on demand for their cloud applications and services. For cloud providers, especially, Software as a Service (SaaS) providers, the prediction of future cloud resource requirements, such as CPU usage for their cloud applications, to implement client requests is a complex task...
Article
Cyber physical systems (CPSs) are multi-dimensional complex systems integrated with computing, networking and physical modules, enabling to realize complex computing and communication tasks. Vehicles are composed of many electrical and electronic hardware modules. With integrating mobile vehicles, CPSs can be extended to realize more remote tasks....
Article
The intelligent warehouse logistics system (IWLS) is an essential component in the emerging industry 5.0. To well assist the IWLS, advanced network architecture and control policies with the adaptive capability to the variation of traffic should be specially designed. In this paper, we consider an air-and-ground cooperative wireless network that en...
Article
Full-text available
A Virtual Network Function (VNF) is responsible for running codes that have been offloaded by mobile users, and are hosted in the cloud and edge servers of the 5G Internet's hybrid cloud infrastructure. The two key design goals of VNF deployment in a 5G hybrid cloud are to reduce deployment cost and minimize service latency experienced by users (i....
Article
Intrusion Detection Systems (IDS) based on deep learning models can identify and mitigate cyberattacks in IoT applications in a resilient and systematic manner. These models, which support the IDS’s decision, could be vulnerable to a cyberattack known as adversarial attack. In this type of attack, attackers create adversarial samples by introducing...
Article
Deep learning has been created as a practical artificial intelligence strategy that takes various layers of information and gives the best in the effects of different classes. The use of deep learning has indicated exceptional execution in other regions, especially in image clustering, division, and recognition. The ongoing advanced learning strate...
Article
Full-text available
A smart grid is an intelligent electricity network that allows efficient electricity distribution from the source to consumers through telecommunication technology. The legacy smart grid follows the centralized oligopoly marketplace for electricity trading. This research proposes a blockchain-based electricity marketplace for the smart grid environ...
Article
Full-text available
This paper designs and develops a computational intelligence-based framework using convolutional neural network (CNN) and genetic algorithm (GA) to detect COVID-19 cases. The framework utilizes a multi-access edge computing technology such that end-user can access available resources as well the CNN on the cloud. Early detection of COVID-19 can imp...
Article
Twitter is currently one of the most popular microblogging platforms allowing people to post short messages, news, thoughts, and so on. The Twitter user community is growing very fast. It has an average of 328 million active accounts today, making it one of the most common media for getting information during any influential or important event. Bec...
Article
Edge AI technologies have been used for many Intelligent Transportation Systems, such as road traffic monitor systems. Neural Architecture Search (NAS) is a typcial way to search high-performance models for edge devices with limited computing resources. However, NAS is also vulnerable to adversarial attacks. In this paper, A One-Shot NAS is employe...
Article
Artificial intelligence driven automation has gradually become the technical trend of the new automation era. At present, many artificial intelligence technologies have been applied to improve the intelligence level in the field of automation. Among them, convolutional neural network (CNN) technology is one of the most representative, which is used...
Article
Full-text available
The emerging technology of mobile cloud is introduced to overcome the constraints of mobile devices. We can achieve that by offloading resource intensive applications to remote cloud-based data centers. For the remote computing solution, mobile devices (MDs) experience higher response time and delay of the network, which negatively affects the real...
Article
Full-text available
Mobile edge computing (MEC) is a powerful new technology with the potential to transform and decentralize the way our cell phone networks currently work. The purpose of MEC is to process the intensive mobile applications in the available resources, which are embedded in the base station of the cell phone systems and closer to users (i.e., MEC suppo...
Article
Cardiovascular disease has become a significant cause of modern people's health problems. The mobile electrocardiogram can be a non-intrusive and convenient tool to provide an auxiliary diagnosis of cardiovascular diseases for the virtual heath community. In this paper, a new diagnostic framework for mobile electrocardiogram signal is proposed with...
Article
Full-text available
Internet of Things (IoT)-based paradigm connects multitudinous IoT devices that operate in a wireless mode to gather information about various attributes from their surrounding. These IoT devices suffer from the limited energy resources and hence, these must be used in an optimized way to elongate network lifetime and to improve various performance...
Article
Among the various reasons behind vehicle accidents, drivers' aggressiveness and distractions play a significant role. Deep learning (DL) algorithms inside a car mobile edge (CME) have been used for driver monitoring and to perform automated decision-making processes. Training and retraining the DL models in resource-constrained CME devices come wit...
Article
Cyber-physical systems (CPS) are increasingly commonplace, with applications in energy, health, transportation, and many other sectors. One of the major requirements in CPS is that the interaction between cyber-world and man-made physical world (exchanging and sharing of data and information with other physical objects and systems) must be safe, es...
Article
The fifth-generation (5G) wireless communication technology enables high-reliability and low-latency communications for the Intelligent Transportation System (ITS). However, the growingly sophisticated attacks against 5G-enabled ITS (5G-ITS) might cause serious damages to the valuable data generated by various ITS applications. Therefore, establish...
Article
The great progress of wireless communications breeds the prevalence of connected Internet of Vehicles (CIoV). Naturally, the internal connections among active vehicles also act as an indispensable factor in traffic forecasting. Although much related research work has been conducted during the past few years, they mainly designed and/or developed a...
Article
The recent burgeoning of Internet of Things (IoT) technologies in the maritime industry is successfully digitalizing Maritime Transportation Systems (MTS). In IoT-enabled MTS, the smart maritime objects, infrastructure associated with ship or port communicate wirelessly using an open channel Internet. The intercommunication and incorporation of het...
Article
With the continuous attempts to develop effective machine learning methods, information fusion approaches play an important role in integrating data from multiple sources and improving these methods' performance. Among the different fusion techniques, decision-level fusion has unique advantages to fuse the decisions of various classifiers and getti...
Article
Works that use point cloud avoid wasting time and cost of collection, using simulators and datasets available in the literature. In this way, there is access to an unlimited and organized amount of point clouds, an ideal setting for deep learning networks and Vehicular ad hoc networks (VANETs). However, models trained with synthetic data present pr...
Article
The limited battery capacity of sensor nodes is one of the challenges for achieving sustainable precision agriculture in 5G. When the sensor nodes run out of energy, the data center will not be able to grasp the information of the environment, and the corresponding decisions and actions will not be performed. To solve this problem, this study prese...
Article
Full-text available
Traffic congestion is increasing in over populated urban areas, our traditional traffic management system can no longer solve this problem. However, this problem can be solved by converting our road networks into queueing networks. This paper proposes, the use of an open Jackson Queueing Model which can be equated with our existing road network to...
Article
Cyber-physical-social systems (CPSS) as an emerging computing paradigm are revolutionizing the relationship between humans, devices and physical environments and will be expected to have a fundamental impact and influence in our daily lives. In a typical CPSS scenario, plenty of nodes (or devices) often adopt wireless distributed contention protoco...
Article
The rapid development of Automotive Industrial Internet of Things requires secure networking infrastructure towards digitalization. Cybertwin is a next generation networking architecture that serves as a communication, and digital asset owner, and can make the Vehicle-to-Everything (V2X) network flexible and secure. However, cybertwin itself can pu...
Article
The traditional healthcare is overwhelmed by the processing and storage of massive medical data. The emergence and gradual maturation of Internet of Things (IoT) technologies bring the traditional healthcare an excellent opportunity to evolve into the IoT-enabled healthcare of massive data storage and extraordinary data processing capability. Howev...
Article
Deep learning-based auto-driving systems are vulnerable to adversarial examples attacks which may result in wrong decision making and accidents. An adversarial example can fool the well trained neural networks by adding barely imperceptible perturbations to clean data. In this paper, we explore the mechanism of adversarial examples and adversarial...
Article
Full-text available
Feature extraction plays an important role in arrhythmia classification, and successful arrhythmia classification generally depends on ECG feature extraction. This paper proposed a feature extraction method combining traditional approaches and 1D-CNN aiming to find the optimal feature set to improve the accuracy of arrhythmia classification. The pr...
Article
Full-text available
Pandemic and infectious disease outbreaks put pressure on health authorities and require lockdowns. These outbreaks, which strain limited healthcare resources, must be swiftly controlled and monitored. A large number of healthcare authorities are currently investigating automated systems to support outbreak monitoring and control. However, current...
Article
Full-text available
Colorectal cancer (CRC) is the second most diagnosed cancer in the United States. It is identified by histopathological evaluations of microscopic images of the cancerous region, relying on a subjective interpretation. The Colorectal Histology dataset used in this study contains 5000 images, made available by the University Medical Center Mannheim....
Article
Artificial Internet of Things (AIoT) is that the system collects all kinds of information in real-time through various sensors, and intelligence analysis of the data through machine learning in the terminal equipment, edge domains, or cloud centers, including positioning, comparison, forecasting, scheduling, etc. which brings about the data securit...
Article
Full-text available
Dark Web forums are significantly exploited to trade confidential information and illicit products by criminals. This paper addresses the problem of how to identify the cluster of discussion forums and their characteristics on the Dark Web. Exiting methods are mostly dependent on the continuous labeled contents, which are expensive and not feasible...
Article
Cooperative Intelligent Transport System (C-ITS) is a promising technology that aims to improve the traditional transport management systems. In C-ITS infrastructure Autonomous Vehicles (AVs) communicate wirelessly with other AVs, Road Side Units (RSUs) and Traffic Command Centres (TCCs) using an open channel Internet. However, the use of the Inter...
Article
Full-text available
Pneumonia is responsible for high infant morbidity and mortality. This disease affects the small air sacs (alveoli) in the lung and requires prompt diagnosis and appropriate treatment. Chest X-rays are one of the most common tests used to detect pneumonia. In this work, we propose a real-time Internet of Things (IoT) system to detect pneumonia in c...
Article
The conventional diagnostic process and tools of cardiovascular autonomic neuropathy (CAN) can easily identify the two main categories of the condition: severe/definite CAN and normal/healthy without CAN. Conventional techniques encounter significant challenges when identifying CAN in its early or atypical stages due to the inherent imbalanced and...
Article
Critical infrastructures across many industries such as smart water treatment and distribution networks (SWTDN) and power generation and public transport networks depend on the supervisory control and data acquisition (SCADA) system. However, being the core component of the critical infrastructures has made the SCADA-based SWTDN system an attractiv...
Article
Peer to Peer energy trading systems faces many complexities and challenges, prosumers privacy, security threats, gapped communication, payment settlement delays, performance bottlenecks among others. With the proliferation and sophis- tication of the smart grid, Blockchain-based solutions have gained a lot of attention in securing several domains,...
Article
Nowadays, deep neural networks are widely applied in sustainable smart cities and societies, including smart manufacturing, healthcare, industries, agriculture, surveillance, and various artificial intelligence-based real-life applications. In this regard, the human detection system has gained notable attention since it is recognized as a crucial t...
Article
An accurate real-time instance segmentation, which can perform both object detection and semantic segmentation at the same time with a multi-task neural network, is important for autonomous driving. This paper proposes a fast one-stage multi-task neural network for instance segmentation, which can meet the requirements of real-time processing with...
Article
The increasing number of Internet of Things (IoT) devices motivate the data sharing that improves the quality of IoT services. However, data providers usually suffer from the privacy leakage caused by direct data sharing. To solve this problem, in this paper, we propose a Federated Learning based Secure data Sharing mechanism for IoT, named FL2S. S...
Article
Full-text available
Internet of Things (IoT) is the ultimate enabler of modern civilization. Cooperative communication in multichannel directional wireless networks is one of the cutting-edge IoT research themes. Typically, cooperation in wireless networks is the opportunistic relaying of data packets for neighboring nodes by idle nodes. Current IoT-based researches r...
Preprint
Full-text available
Fall prevalence is high among elderly people, which is challenging due to the severe consequences of falling. This is why rapid assistance is a critical task. Ambient assisted living (AAL) uses recent technologies such as 5G networks and the internet of medical things (IoMT) to address this research area. Edge computing can reduce the cost of cloud...
Article
Full-text available
The retina is a part of the ocular system responsible for vision. In the central region of the retina is the macula, that enables detailed view. There is a distinct macular disease called Macular Hole (MH). It causes a condition of low vision related to the weakening of the fovea, high myopia, eye trauma and severe exposure to the sun. A surgery de...
Article
Full-text available
Cloud computing has a great ability to store and manage remote access to services in a term of software as a service (SaaS). Recently, many organizations have moved to use outsourcing over the cloud to reduce the local resource burden. The stored services over the cloud are too scalable and complex, so an optimization method is more desirable to se...
Article
Full-text available
Fall prevalence is high among elderly people, which is challenging due to the severe consequences of falling. This is why rapid assistance is a critical task. Ambient assisted living (AAL) uses recent technologies such as 5G networks and the internet of medical things (IoMT) to address this research area. Edge computing can reduce the cost of cloud...
Article
Full-text available
Mobile device cloud (MDC) is a collaborative cloud computing platform over which neighboring smart devices form an alliance of shared resources to mitigate resource-scarcity of an individual user device for running compute-intensive applications. A major challenge of such a platform is maximizing user quality-of-experience (QoE) at minimum cost whi...
Article
In this study, we leverage the fusion of edge computing, artificial intelligence (AI) methods, and facilities provided by B5G to build a heterogeneous set of AI techniques for COVID-19 outbreak prediction. Advancement in the areas of AI, edge computing, the Internet of Things (IoT), and fast communication networks provided by beyond 5G (B5G) networ...
Article
Air pollution monitoring, finding the hazardous zone, and future air quality predictions have recently become a significant issue for many researchers. With the adverse effect of low air quality on human health, it has become necessary for predicting the Air Quality Index (AQI) accurately and on time. The Unmanned Aerial Vehicle (UAV) can collect a...
Article
Full-text available
To fulfill the future demand and expansion of the coverage of the network, ultra-dense deployment of small cell (SC) is an optimal solution for future 5G networks, which will ensure the UEs (User Equipment) continuous connectivity. However, these small cells (SCs) lead to the issue of interference, additional unnecessary handover (HO), signaling ov...