
Mohammed Bahutair- Doctor of Philosophy
- PhD Student at The University of Sydney
Mohammed Bahutair
- Doctor of Philosophy
- PhD Student at The University of Sydney
About
23
Publications
1,157
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
151
Citations
Introduction
Current institution
Publications
Publications (23)
We propose a novel end-to-end trust management framework for crowdsourced IoT services. The framework targets three main aspects: trust assessment , trust information credibility and accuracy , and trust information storage . We harness the usage patterns of IoT consumers to offer a trust assessment that adapts to IoT consumers’ uses. Additionally,...
We introduce the concept of adaptive trust in crowdsourced IoT services. It is a customized fine-grained trust tailored for specific IoT consumers. Usage patterns of IoT consumers are exploited to provide an accurate trust value for service providers. A novel adaptive trust management framework is proposed to assess the dynamic trust of IoT service...
Finding influential members in social networks received a lot of interest in recent literature. Several algorithms have been proposed that provide techniques for extracting a set of the most influential people in a certain social network. However, most of these algorithms find influential nodes based solely on the topological structure of the netwo...
We develop a novel framework for efficiently and effectively discovering crowdsourced services that move in close proximity to a user over a period of time. We introduce a moving crowdsourced service model which is modelled as a moving region. We propose a deep reinforcement learning-based composition approach to select and compose moving IoT servi...
We propose a novel distributed integrity-preserving framework for storing trust information in crowdsourced IoT environments. The integrity and availability of the trust information is paramount to ensure accurate trust assessment. Our proposed framework leverages the blockchain to build a distributed storage medium for trust-related information th...
We propose a novel generic trust management framework for crowdsourced IoT services. The framework exploits a multi-perspective trust model that captures the inherent characteristics of crowdsourced IoT services. Each perspective is defined by a set of attributes that contribute to the perspective's influence on trust. The attributes are fed into a...
We propose just-in-time memoryless trust for crowdsourced IoT services. We leverage the characteristics of the IoT service environment to evaluate their trustworthiness. A novel framework is devised to assess a service's trust without relying on previous knowledge, i.e., memoryless trust. The framework exploits service-session-related data to offer...
Analyzing social networks has received a lot of reviews in the recent literature. Many papers have been proposed to provide new techniques for mining social networks to help further study this huge amount of data. However, to the best of our knowledge, none of them considered the semantic meaning of the nodes interests while clustering the network....
This work is devoted to capturing Emirati-accented speech database (Arabic United Arab Emirates database) in each of neutral and shouted talking environments in order to study and enhance text-independent Emirati-accented “speaker identification performance in shouted environment” based on each of “first-order circular suprasegmental hidden Markov...
This work is devoted to capturing Emirati-accented speech database (Arabic United Arab Emirates database) in each of neutral and shouted talking environments in order to study and enhance text-independent Emirati-accented speaker identification performance in shouted environment based on each of First-Order Circular Suprasegmental Hidden Markov Mod...
This work is aimed at exploiting Second-Order Circular Suprasegmental Hidden Markov Models (CSPHMM2s) as classifiers to enhance talking condition recognition in stressful and emotional talking environments (completely two separate environments). The stressful talking environment that has been used in this work uses Speech Under Simulated and Actual...
Nowadays, social network sites; such as Facebook and Twitter, have tremendous number of users in their repositories. Having this huge amount of data requires analyzing them to get statistics about the users and their interests. In this paper, we propose a new algorithm that clusters the nodes in social networks into communities based on their geode...
Social networks have gained a lot of interest in recent literature due to the huge amount of data that can be extracted from them. With this ever growing data, emerged the need for techniques to handle it and analyze it. Several papers have proposed many techniques to analyze a given social network from several aspects. Communities are a crucial pr...
Organizations have come to realize that storing their databases in the Cloud rather than in-house data centers is cheaper and more flexible. However, companies are still concerned about the privacy and the security of their data. Encrypting the whole database before uploading it to the Cloud solves the security issue. But querying the database requ...
Finding the optimal path in multi-hop wireless networks has gained considerable interest in the recent literature. Standard routing methods such as Ad-hoc On-Demand Distance Vector Routing (AODV) and Dynamic Source Routing (DSR) are based on link-level abstraction of the network without fully considering the impact of the physical layer. Recent stu...
This work is aimed at exploiting Second-Order Circular Suprasegmental Hidden Markov Models (CSPHMM2s) as classifiers to enhance talking condition recognition in stressful and emotional talking environments (completely two separate environments). The stressful talking environment that has been used in this work uses Speech Under Simulated and Actual...
In this work we focus on Emarati speaker identification systems in neutral talking environments based on each of Vector Quantization (VQ), Gaussian Mixture Models (GMMs), and Hidden Markov Models (HMMs) as classifiers. These systems have been tested on our collected Emarati speech database which is composed of 25 male and 25 female Emarati speakers...