
Muhammad ShoaibKing Saud University | KKUH · Department of Information Systems
Muhammad Shoaib
PhD
About
45
Publications
18,792
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
774
Citations
Publications
Publications (45)
Brain tumor is a deadly disease and its classification is a challenging task for radiologists because of the heterogeneous nature of the tumor cells. Recently, computer-aided diagnosis-based systems have promised, as an assistive technology, to diagnose the brain tumor, through magnetic resonance imaging (MRI). In recent applications of pre-trained...
Most of Flying Adhoc Networks (FANETs) applications consume GPS based location information for their services, which are also shared in real-time with other UAVs, ground control stations and centralized service operators. GPS spoofing is among the most popular attacks in FANETs that lead the Global Navigation Satellite System (GNSS) receivers to ge...
There were necessary trajectory modifications of Cassini spacecraft during its last 14 years movement cycle of the interplanetary research project. In the scale of tens of minutes of signal propagation time and 1.4-billion-kilometer size of Earth-Cassini channel, Complex Event Detection in the orbit modifications requires special investigation and...
A cloudlet is an emerging computing paradigm that is designed to meet the requirements and expectations of the Internet of things (IoT) and tackle the conventional limitations of a cloud (e.g., high latency). The idea is to bring computing resources (i.e., storage and processing) to the edge of a network. This article presents a taxonomy of cloudle...
Smart healthcare systems for the internet of things (IoT) platform are cost-efficient and facilitate continuous remote monitoring of patients to avoid unnecessary hospital visits and long waiting times to see practitioners. Presenting a smart healthcare system for the detection of dysphonia can reduce the suffering and pain of patients by providing...
The vehicular ad-hoc networks integrates with long-term evolution (LTE) forming a heterogeneous network, capable of providing seamless connectivity, which meets the communication requirements of intelligent transportation systems. However, heterogeneous network-based applications involve LTE resource (data and spectrum) usage cost and must be taken...
Cybercriminals are constantly on the lookout for new attack vectors, and the recent COVID-19 pandemic is no exception. For example, social distancing measures have resulted in travel bans, lockdowns, and stay-at-home orders, consequently increasing the reliance on information and communications technologies, such as Zoom. Cybercriminals have also a...
Searchable encryption (SE) is appearing as a prominent solution in the intersection of privacy protection and efficient retrieval of data outsourced to cloud computing storage. While it preserves privacy by encrypting data, yet supports search operation without data leakage. Due to its applicability, many research communities have proposed differen...
The original article has been published with an incorrect grant number in the acknowledgements which should be RG # 1439-036.
Brain tumor is a deadly disease and its classification is a challenging task for radiologists because of the heterogeneous nature of the tumor cells. Recently, computer-aided diagnosis-based systems have promised, as an assistive technology, to diagnose the brain tumor, through magnetic resonance imaging (MRI). In recent applications of pre-trained...
Low power Internet of Things (IoT) is suffering from two limitations: battery-power limitation of IoT nodes and inflexibility of infrastructure-node deployment. In this paper, we propose an Unmanned Aerial Vehicle (UAV)-enabled data acquisition scheme with directional wireless energy transfer (WET) to overcome the limitations of low power IoT. The...
Medical imaging has become of vital importance for diagnosing diseases and conducting noninvasive procedures. Advances in eHealth applications are challenged by the fact that Digital Imaging and Communications in Medicine (DICOM) requires high-resolution images, thereby increasing their size and the associated computational complexity, particularly...
The future of the hash based digital signature schemes appears to be very bright in the upcoming quantum era because of the quantum threats to the number theory based digital signature schemes. The Shor’s algorithm is available to allow a sufficiently powerful quantum computer to break the building blocks of the number theory based signature scheme...
In recent years, Internet of Things (IoT) has attracted significant attention because of its wide range of applications in various domains. However, security is a growing concern as users of small devices in an IoT network are unable to defend themselves against reactive jamming attacks. These attacks negatively affect the performance of devices an...
The development of Industry 4.0 has provided the possibility to meet frequent changes in product type and batches, a sharp decline in the delivery cycle, constraints of quality cost, and other relevant parameters of customized production mode. Intelligent manufacturing, as a core of Industry 4.0, represents a deep integration of new IT technologies...
Recently, internet of vehicles (IoVs) is captivating a lot of interest due to a wide range of applications in various domains. These applications rely on up-to-date information of vehicles for provisioning various services. However, frequent message transmissions by a sheer number of vehicles may not only engulf a centralized server but may also ca...
This article presents a knowledge mining model, where a city can plan its development based on existing knowledge during city expansion, for example, telecommunication resource allocation and crowd forecasts in a new region. Unlike most works that focused on Internet-of- Things (IoT) sensing, this study is aimed at urban planning by using harvested...
Software Defined Network (SDN) is a new network architecture that controls the network through a logically centralized controller. The controller computes and installs the flow rules (i.e., entries) in the flow table at switches. When a switch receives the data packet and does not have the flow rule in its flow table, the switch contacts controller...
Software Defined Network (SDN) is a new network architecture that controls the network through a logically centralized controller. The controller computes and installs the flow rules (i.e., entries) in the flow table at switches. When a switch receives the data packet and does not have the flow rule in its flow table, the switch contacts controller...
The rapid growth in communication technology facilitates the health industry in many aspects from transmission of sensor's data to real-time diagnosis using cloud-based frameworks. However, the secure transmission of data and its authenticity become a challenging task, especially, for health-related applications. The medical information must be acc...
Recently, linear wireless sensor networks (LWSNs) have been eliciting increasing attention because of their suitability for applications such as the protection of critical infrastructures. Most of these applications require LWSN to remain operational for a longer period. However, the non-replenishable limited battery power of sensor nodes does not...
Electrocardiography (ECG) sensors play a vital role in the Internet of Medical Things, and these sensors help in monitoring the electrical activity of the heart. ECG signal analysis can improve human life in many ways, from diagnosing diseases among cardiac patients to managing the lifestyles of diabetic patients. Abnormalities in heart activities...
Recently, mobile crowd sensing (MCS) is captivating growing attention because of their suitability for enormous range of new types of context-aware applications and services. This is attributed to the fact that modern smartphones are equipped with unprecedented sensing, computing, and communication capabilities that allow them to perform more compl...
Uplink multicarrier localized nonorthogonal multiple access (MC‐LNOMA) is a variant of hybrid nonorthogonal multiple access, where subcarrier mapping is performed in localized mode. MC‐LNOMA is one of the most prominent emerging schemes and likely to be employed in the forthcoming fifth‐generation cellular networks due to its massive connectivity,...
Health information is critical for the patient and its unauthorized access may have server impact. With the advancement in the healthcare systems especially through the Internet of Things give rises to patient privacy. We developed a healthcare system that protects identity of patients using innovative zero-watermarking algorithm along with vocal f...
The growing use of wireless health data transmission via Internet of Things is significantly beneficial to the healthcare industry for optimal usage of health-related facilities. However, at the same time, the use raises concern of privacy protection. Health-related data are private and should be suitably protected. Several pathologies, such as voc...
Scientific organizations and researchers are eager to apply recent technological advancements, such as sensors and actuators, in different application areas, including environmental monitoring, creation of intelligent buildings, and precision agriculture. Technology-assisted irrigation for agriculture is a major research innovation that eases the w...
This piece of work presents a novel design for buffer-aided relaying to increase the diversity gain. In this design, we used random buffer access method and associate each buffer location with its own antenna resource. Thus, each buffer location acts as an independent entity known as the virtual relay. The relay selection is based on the instantane...
This paper explored cooperative relaying in the presence of energy constrained relays with data storage facility. The relays depend only on the source signal to harvest energy and forward signal to the destination. The relay is selected according to the instantaneous strength of the wireless link. The strongest link among all links on both sides i....
Bluetooth Inter-piconet communication necessitates deployment of a relay. However, network performance is affected with the increased count of relays due to high control overhead. Moreover, the mobility and power failure of relay node will partition the network, which affects their scatternet performance. This paper presents two works: first, to de...
Confidentiality of health information is indispensable to protect privacy of an individual. However, recent advances in electronic healthcare systems allow transmission of sensitive information through the Internet, which is prone to various vulnerabilities, attacks and may leads to unauthorized disclosure. Such situations may not only create adver...
The virtually unlimited available resources and wide range of services provided by the cloud have resulted in the emergence of new cloud-based applications, such as smart grids, smart building control, and virtual reality. These developments, however, have also been accompanied by a problem for delay-sensitive applications that have stringent delay...
YouTube (owned by Google Inc.) is arguably among most popular social media platforms used by millions across the globe. It provides an ever-growing, unique and rich source of content which presents new opportunities and challenges for information discovery and analysis. It is pertinent to explore and understand a topic via YouTube content to discov...
Due to the unpleasant and unpredictable underwater environment, designing an energy-efficient routing protocol for underwater wireless sensor networks (UWSNs) demands more accuracy and extra computations. In the proposed scheme, we introduce a mobile sink (MS), i.e., an autonomous underwater vehicle (AUV), and also courier nodes (CNs), to minimize...
In this research, a classifier is proposed for automatic modulation classification of some common modulation schemes, i.e., BPSK, QPSK, 8-PSK and 16-QAM. Our proposed classifier considers multipath fading effects on the received signal in a non-Gaussian noise environment. Automatic modulation classification is very challenging in real-world scenari...
Unique characteristics of Underwater Sensor Net-works (UWSNs) are very challenging in design of an efficient data gathering routing protocol. These characteristics include large propagation delay, high error rate, low bandwidth, and limited energy. In UWSNs, improved network lifetime, increased throughput and low end-to-end delay are prominent issu...
Underwater Wireless Sensor Networks (UWSNs) are getting growing interest because of wide-range of applications. Most applications of these networks demand reliable data de-livery over longer period in an efficient and timely manner. However, resource-constrained nature of these networks makes routing in a harsh and unpredictable underwater environm...
Limited bandwidth resources lead to a number of challenges especially for eHealth applications, which are communicated over IP and wireless networks. These multimedia services include high-resolution videos and have very large file sizes that require a high level of compression to overcome this limitation. Therefore, there is an acute demand for th...
Automatic Modulation Classification (AMC) is extremely desirable to realize the merits of cognitive radios in plethora of commercial and military applications. However, AMC is extremely challenging in real-world scenarios due to multipath fading and additive Gaussian noise on modulation schemes. Moreover, it becomes more difficult in blind environm...
Social networks have a significant influence in a patient's environment. An efficient social network framework that addresses the socio cultural communication needs of hospitalized patients' caregivers can play an important role to improve a patient's treatment. We proposed e-Ziarah Caregiver Social Network (CSN) system, a working model that reflec...
Projects
Project (1)