
Mohammed Shuaib- Ph.D
- Jazan University
Mohammed Shuaib
- Ph.D
- Jazan University
Self-Sovereign Identity, Land registry system, Blockchain Identity Management, Internet of Things (IoT),Smart Healthcare
About
85
Publications
48,901
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,933
Citations
Introduction
Current institution
Publications
Publications (85)
Providing an identity solution is essential for a reliable blockchain-based land registry system. A secure, privacy-preserving, and efficient identity solution is essential but challenging. This paper examines the current literature and provides a systematic literature review in three stages based on the three research questions (RQ) that show the...
Providing a system user with a unique and secure identity is a prerequisite for authentication and authorization aspects of a security system. It is generally understood that the existing digital identity systems store the identity details in centralized databases, and users store the identity details in centralized databases in which users do not...
The land registry system is one of the essential components of any governance model required to ascertain the ownership records uniquely. This paper reviews the existing literature and provide a detailed literature review consisting of 3 stages based on three research questions (RQ) that highlight the step by step evaluation and analysis. We select...
Cardiac arrhythmias are irregular heart rhythms that, if undetected, can lead to severe cardiovascular conditions. Detecting these anomalies early through electrocardiogram (ECG) signal analysis is critical for preventive healthcare and effective treatment. However, the automatic classification of arrhythmias poses significant challenges, including...
As Internet of Things (IoT) devices leads an significant challenges in securing the systems from cyber-attacks in large-scale IoT networks. Traditional methods faces struggle to precisely detecting the complex intrusion patterns due to the heterogeneity and distributed IoT devices. There is a pressing need for scalable, real-time, and privacy-prese...
Introduction
The growing demand for real-time, affordable, and accessible healthcare has underscored the need for advanced technologies that can provide timely health monitoring. One such area is predicting arterial blood pressure (BP) using non-invasive methods, which is crucial for managing cardiovascular diseases. This research aims to address t...
The development of reliable software depends heavily on the effective collaboration between teams responsible for development and testing. Despite ongoing efforts, many software programs still contain bugs that can lead to financial losses and business risks. Therefore, detecting and fixing software defects after release is crucial. While binary cl...
In this contemporary landscape of corporate environments, the increasing prevalence of mental health challenges necessitates the development of innovative diagnostic methodologies. This research introduces the Emotion-Aware Ensemble Learning (EAEL) framework, a cutting-edge approach designed to revolutionize early mental health diagnosis among corp...
Combating Cyberbullying with Generative AI emphasizes the creative ability of generative AI to generate innovative solutions that are tailored to the issues faced in cyberbully detection. It presents case studies and practical examples that demonstrate effective merging of generative AI in cyberbullying space, providing readers with applicable know...
This research addresses the critical issue of cryptojacking attacks, a significant cybersecurity threat where malicious actors covertly exploit computational resources for unauthorized cryptocurrency mining, particularly in wireless sensor networks (WSN) and Internet of Things (IoT) devices. The article proposes an innovative approach that integrat...
The future of society could be shaped by artificial intelligence (AI), which is a part of soft computing that deals with probabilis-tic reasoning, neural networks, fuzzy logic, and evolutionary algorithms. This paper focuses on issues that are faced by soft computing as it moves towards human-centric solutions, outlines the challenges for soft comp...
Introduction
Machine learning (ML) algorithms and statistical modeling offer a potential solution to offset the challenge of diagnosing early Alzheimer's disease (AD) by leveraging multiple data sources and combining information on neuropsychological, genetic, and biomarker indicators. Among others, statistical models are a promising tool to enhanc...
Brain tumors occur due to the expansion of abnormal cell tissues and can be malignant (cancerous) or benign (not cancerous). Numerous factors such as the position, size, and progression rate are considered while detecting and diagnosing brain tumors. Detecting brain tumors in their initial phases is vital for diagnosis where MRI (magnetic resonance...
Alzheimer’s disease (AD) is a growing public health crisis, a very global health concern, and an irreversible progressive neurodegenerative disorder of the brain for which there is still no cure. Globally, it accounts for 60–80% of dementia cases, thereby raising the need for an accurate and effective early classification. The proposed work used a...
Maintaining quality in software development projects is becoming very difficult because the complexity of modules in the software is growing exponentially. Software defects are the primary concern, and software defect prediction (SDP) plays a crucial role in detecting faulty modules early and planning effective testing to reduce maintenance costs....
The term hotspot refers to a location or an area where the occurrence of a particular phenomenon, event, or activity is significantly higher than in the surrounding areas. The existing statistical methods need help working well on discrete data. Also, it can identify a false hotspot. This paper proposes a novel graph-based hotspot detection using a...
Hyperspectral imagery, capturing information beyond the visible spectrum, is essential for many remote sensing applications. This paper introduces a novel approach utilizing a 3D Convolutional Neural Network (CNN) enhanced with self-attention mechanism to address the limitations of traditional architectures in hyperspectral image classification. Th...
Cloud data centers present a challenge to environmental sustainability because of their significant energy consumption. Additionally, performance degradation resulting from energy management solutions, such as virtual machine (VM) consolidation, impacts service level agreements (SLAs) between cloud service providers and users. Thus, to achieve a ba...
Attributed networks are prevalent in the current information infrastructure, where node attributes enhance knowledge discovery. Anomaly detection in attributed networks is gaining attention for its potential uses in cybersecurity, finance, and healthcare. Recognizing the complicated relationship between node attributes and network topology is cruci...
The spectacular concept of integrating OCR with the Internet of Things (IoT) and Wireless Sensor Networks (WSN), presented in this study, intends to increase the autonomy and social inclusion of people with visual impairments and deaf-blindness. This application converts text from photographs into real-time Braille representations by utilizing the...
This research addresses the pressing challenge of intrusion detection and prevention in Wireless Sensor Networks (WSNs), offering an innovative and comprehensive approach. The research leverages Support Vector Regression (SVR) models to predict the number of barriers necessary for effective intrusion detection and prevention while optimising their...
Energy theft is a significant problem that needs to be addressed for effective energy management in smart cities.
Smart meters are highly utilized in smart cities that help in monitoring the energy utilization level and provide
information to the users. However, it is not able to detect energy theft or over-usage. Therefore, we have proposed
a mult...
Dementias that develop in older people test the limits of modern medicine. As far as dementia in older people goes, Alzheimer’s disease (AD) is by far the most prevalent form. For over fifty years, medical and exclusion criteria were used to diagnose AD, with an accuracy of only 85 per cent. This did not allow for a correct diagnosis, which could b...
Developing precise and trustworthy models for monitoring and managing water quality is crucial, as it is a key component of environmental management. Traditional water quality index (WQI) models often rely on simplistic statistical methods, leading to inaccurate predictions. This study addresses the limitations of traditional approaches by proposin...
Nowadays, everyone has a mobile device on
which they save a wealth of personal information. Information
about people is a prime target for hackers looking to steal
sensitive data. Small CPUs, short battery life, and insufficient
storage space constrain mobile devices. However, thanks to
cloud computing, customers can access an infinite computer
pow...
Academic record-keeping and verification systems face several challenges related to data security, privacy, and fraud prevention. Blockchain technology has been proposed as a potential solution to these challenges, as it offers a more secure and transparent system that can enhance the credibility and integrity of academic records. However, the impl...
The emergence of the Internet of Things (IoT) and its subsequent evolution into the Internet of Everything (IoE) is a result of the rapid growth of information and communication technologies (ICT). However, implementing these technologies comes with certain obstacles, such as the limited availability of energy resources and processing power. Conseq...
LoRa technology is widely used in the Internet of things network applications. It enables low-volume data transmission via small wireless devices. The principle of LoRa networks (an LPWAN technology: Low Power Wide Area Network) is to transmit data by air from sensors with a short transmission range, about over ten kilometers. These sensors should...
A shared environment and the computer paradigm are combined in cloud computing (CC), enabling multiple users to access services and resources. This ecosystem is not only globally accessible via the Internet, but it can also be shared at all levels. All levels of resources, platforms, and infrastructure can be traded with a variety of clients. This...
The pharmaceutical company is key to having a strong healthcare system, and excellent healthcare is essential for every society and economy. However, there are signifcant concerns with medication safety and security as a result of fake and inferior medical items, which constitute a signifcant hazard and harm to consumers' health. Globally, drug cou...
The Internet of Things (IoT) has made it far simpler to implement a remote, real-time patient health monitoring system from locations other than hospitals, such as patients' homes. Sensors retrieve various data related to the patient and record a variety of indicators. Then, the IoT, which presents it on a website and provides access for remote mon...
The recent technical and interaction breakthroughs within the virtual reality (VR) sector have marked a new age. This has also led to a huge advancement of technology in the arena of Virtual environment locomotion. Fixed movement speeds are impractical while virtually exploring huge areas because of the long distances involved and various details....
Machine Learning and Big-Data Analytics is each growing computing fields. Big data is, in reality, gaining attraction in all regions of Science and engineering. While those big-data units have the clean capacity, successfully comprehending them will call for new thinking methods and inventive learning methodologies to cope with the severe issues. O...
The Internet of Things (IoT) and blockchain (BC) are reliable technologies widely employed in various contexts. IoT devices have a lot of potential for data sensing and recording without human intervention, but they also have processing and security issues. Due to their limited computing power, IoT devices cannot use specialized cryptographic secur...
Major problems and issues in Internet of Things (IoT) systems include load balancing, lowering operational expenses, and power usage. IoT devices typically run on batteries because they lack direct access to a power source. Geographical conditions that make it difficult to access the electrical network are a common cause. Finding ways to ensure tha...
COVID-19 (Coronavirus Disease of 2019) is now a genuine danger to the health of the world’s population. Vaccines capable of halting this pandemic have received much scientific and financial attention. These days expressing emotions over any social media platform is becoming a trend. This paper aims to study a technique known as sentiment analysis t...
The Internet of Things (IoT) has radically transformed how patient information and healthcare monitoring are monitored and recorded and has revolutionized the area by ensuring regular 24 × 7 tracking without costly and restricted human resources and with a low mistake probability. The Internet of Medical Things (IoMT) is a subsection of the Interne...
Longer-term projections indicate that today’s developing and rising nations will account for roughly 60% of the global GDP by 2030. There is tremendous financial growth and advancement in developing countries, resulting in a high demand for personal loans from citizens. Depending on their needs, many people seek personal loans from banks. However,...
Longer-term projections indicate that today’s developing and rising nations will account for roughly 60% of the global GDP by 2030. There is tremendous financial growth and advancement in developing countries, resulting in a high demand for personal loans from citizens. Depending on their needs, many people seek personal loans from banks. However,...
Forest fires are a significant threat to the ecological system’s stability. Several attempts have been made to detect forest fires using a variety of approaches, including optical fire sensors, and satellite-based technologies, all of which have been unsuccessful. In today’s world, research on flying ad hoc networks (FANETs) is a thriving field and...
Modern healthcare systems are known for being extremely complicated and expensive. On the other hand, improved health record management can help lessen this. The Electronic Health Records (EHR) sharing system is cutting-edge healthcare delivery. The system’s tools can anticipate results throughout a patient’s life, measure treatment efficacy, follo...
Cryptography and associated technologies have existed for a long time. This field is advancing at a remarkable speed. Since the inception of its initial application, blockchain has come a long way. Bitcoin is a cryptocurrency based on blockchain, also known as distributed ledger technology (DLT). The most well-known cryptocurrency for everyday use...
FANET (flying ad-hoc networks) is currently a trending research topic. Unmanned aerial vehicles (UAVs) have two significant challenges: short flight times and inefficient routing due to low battery power and high mobility. Due to these topological restrictions, FANETS routing is considered more complicated than MANETs or VANETs. Clustering approach...
e internet of medical things (IoMT) is a smart medical device structure that includes apps, health services, and systems. ese medical equipment and applications are linked to healthcare systems via the internet. Because IoT devices lack computational power, the collected data can be processed and analyzed in the cloud by more computationally intens...
The smart medical system is becoming a health policy service that employs wearables, online services and mobile devices to connect to the internet continuously and connect patients, technology and healthcare centers, and then cope efficiently and thoughtfully with the demands of medical ecosystems. This article explores some of the issues facing us...
Early detection of vessels from fundus images can effectively prevent the permanent retinal damages caused by retinopathies such as glaucoma, hyperextension, and diabetes. Concerning the red color of both retinal vessels and background and the vessel's morphological variations, the current vessel detection methodologies fail to segment thin vessels...
The land registry system is one of the crucial aspects of any government. Proper and reliable land management is essential for economic growth and governance. The traditional land registry model lacks many essential requirements and is mired with a different type of malpractices and security concerns. Blockchain technology has been proposed as a po...
A collaborative filtering technique has proven to be the preferable approach for personalized recommendations. Traditionally, collaborative filtering recommends target items to those users who have similar tastes. The performance of collaborative filtering degrades significantly when a considerable number of users do not provide ratings on recommen...
Blockchain is considered a distributed ledger that can transact securely and trustfully without involving any third party. It has caused a lot of interest in various sectors, like government, finance, banking, etc. Blockchain technology is suitable for areas where multiple data storage and transaction types generally require the third party to auth...
In the modern era of technologies, the internet grows in the advancement of our day-to-day life like automation devices. The devices to set up industries with integrated cyber-physical systems and industrial IoT applications. Generative adversarial networks (GAN) can generate Cognitive feedback analysis with various data for both generator and disc...
Electronic Health Record (EHR) is being used in most healthcare institutions to preserve and share health records instead of a paper-based method. Data records must be exchanged amongst various parties and users' privileges to manage access to their records should also be provided. In addition to the basic standards of secrecy, confidentiality and...
Smart healthcare has become a health policy services that utilize technologies including wearables, the Internet of things, smartphones, etc., to access information continuously and to link patients, equipment and medical facilities, and then effectively handles and responds in an intelligent way to the needs of medical ecosystems. The smart health...
Secret key cryptography has been used since the early days of cryptography and is still in use, even after the invention of public key cryptography due to its efficiency in terms of speed, error propagation and low implementation costs. After the standardization of Block ciphers, the focus has significantly shifted towards stream cipher standardiza...
A massive amount of clinical data is generated daily. Advancement in ICT technologies has enabled the healthcare providers to store them digitally and referred to as Electronic Health Record (EHR). These records are shared with various stakeholders, like doctors, nursing staff, and healthcare providers. These health records are also accessible to g...
This article has been withdrawn: please see Elsevier Policy on Article Withdrawal (https://www.elsevier.com/about/our-business/policies/article-withdrawal).
This article has been withdrawn as part of the withdrawal of the Proceedings of the International Conference on Emerging Trends in Materials Science, Technology and Engineering (ICMSTE2K21). Su...
The refugees and migrants are not recorded generally and deemed invisible by governments without providing them with identity and welfare services. The COVID-19 pandemic has badly impacted the economy, and the poor migrants and refugees have suffered most due to the closure of industries and informal sectors. Lack of legal identity made them more v...
Digital land registry systems have tried to resolve the issues of manual systems like delay in transaction, fraud, security and persistence of records. However, still, these systems are susceptible to various type of security threats due to the weaknesses of inherent issues in centralised or cloud-based systems. This paper reviews the different sho...
Electronic Health Record (EHR) is being used in most healthcare institutions to preserve and share health records instead
of a paper-based method. Data records must be exchanged amongst various parties and users' privileges to manage access
to their records should also be provided. In addition to the basic standards of secrecy, confidentiality and...
The land registry system is one of the very important department in any governance system that stores the records of land ownership. There are various issues and loopholes in the existing system that give rise to corruption and disputes. This requires a significant chunk of valuable government resources from judiciary and law enforcement agencies i...
Requirements engineering plays an important role in coordinating with various stakeholders/customer expectations and ensures developers build applications that meet virtually all stakeholder/customer requirements. Appropriate requirements management tool results in a better solution for the organizations' defined problem. Handling several thousands...
The research paper is about the dangers to information security and a solution to it by the use of the blockchain implementation in data security. Blockchain security implementations were mostly witnessed in sensitive information systems, like the financial database. Furthermore, in this research paper, Threats to computers and information systems...
Internet of Things (IoT) is an emerging technique for connecting
heterogeneous technologies related to our daily needs that can affect our lives tremendously. Many architectures and applications have been proposed and implemented using IoT platform from a simple supply chain to complex life support systems. There are many obvious benefits of such n...
Cloud computing has come out as a key technology to deliver infrastructure and data service requirements at low cost and with minimal efforts and high level of scalability and hence have been highly implemented in various aspects of IT industry. A rapid growth in Cloud Computing adaption has been observed but, still, the information security concer...
Cloud computing is emerging as a powerful solution to ever-growing storage and processing requirements of an organization and individual without the burden of owning and handling the physical devices. Security is one of the primary concerns in cloud computing for large-scale implementation. Intrusion detection and prevention (IDP) techniques can be...
Requirements engineering plays a crucial role in coordinating with different stakeholders/customers needs and helps the developers to develop software's which fulfill almost all the requirements of the stakeholders/customers. Appropriate requirements management tool leads to better solution for the specified problem of the organizations. Managing m...
Technology is moving towards more intelligent and more connected devices in this digital world. Transport system is also not untouched with this phenomenon. Vehicles are becoming intelligent and autonomous with the use of sensor and communication techniques. Advancements in Internet of Things (IoT) has created a new field in the area of transport a...
Rapid development of Wireless sensor network led to applications ranging from industry to military fields. These sensors are deployed in the military base station such as battlefield surveillances. The important issues like security & DoS attacks play crucial role for wireless sensor network. Due to the limitations of resources, traditional securit...