Muhammad Shoaib

Muhammad Shoaib
King Saud University | KKUH · Department of Information Systems

PhD

About

45
Publications
18,792
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
774
Citations

Publications

Publications (45)
Article
Brain tumor is a deadly disease and its classification is a challenging task for radiologists because of the heterogeneous nature of the tumor cells. Recently, computer-aided diagnosis-based systems have promised, as an assistive technology, to diagnose the brain tumor, through magnetic resonance imaging (MRI). In recent applications of pre-trained...
Article
Most of Flying Adhoc Networks (FANETs) applications consume GPS based location information for their services, which are also shared in real-time with other UAVs, ground control stations and centralized service operators. GPS spoofing is among the most popular attacks in FANETs that lead the Global Navigation Satellite System (GNSS) receivers to ge...
Article
Full-text available
There were necessary trajectory modifications of Cassini spacecraft during its last 14 years movement cycle of the interplanetary research project. In the scale of tens of minutes of signal propagation time and 1.4-billion-kilometer size of Earth-Cassini channel, Complex Event Detection in the orbit modifications requires special investigation and...
Article
Full-text available
A cloudlet is an emerging computing paradigm that is designed to meet the requirements and expectations of the Internet of things (IoT) and tackle the conventional limitations of a cloud (e.g., high latency). The idea is to bring computing resources (i.e., storage and processing) to the edge of a network. This article presents a taxonomy of cloudle...
Article
Full-text available
Smart healthcare systems for the internet of things (IoT) platform are cost-efficient and facilitate continuous remote monitoring of patients to avoid unnecessary hospital visits and long waiting times to see practitioners. Presenting a smart healthcare system for the detection of dysphonia can reduce the suffering and pain of patients by providing...
Article
Full-text available
The vehicular ad-hoc networks integrates with long-term evolution (LTE) forming a heterogeneous network, capable of providing seamless connectivity, which meets the communication requirements of intelligent transportation systems. However, heterogeneous network-based applications involve LTE resource (data and spectrum) usage cost and must be taken...
Article
Full-text available
Cybercriminals are constantly on the lookout for new attack vectors, and the recent COVID-19 pandemic is no exception. For example, social distancing measures have resulted in travel bans, lockdowns, and stay-at-home orders, consequently increasing the reliance on information and communications technologies, such as Zoom. Cybercriminals have also a...
Article
Full-text available
Searchable encryption (SE) is appearing as a prominent solution in the intersection of privacy protection and efficient retrieval of data outsourced to cloud computing storage. While it preserves privacy by encrypting data, yet supports search operation without data leakage. Due to its applicability, many research communities have proposed differen...
Article
Full-text available
The original article has been published with an incorrect grant number in the acknowledgements which should be RG # 1439-036.
Article
Full-text available
Brain tumor is a deadly disease and its classification is a challenging task for radiologists because of the heterogeneous nature of the tumor cells. Recently, computer-aided diagnosis-based systems have promised, as an assistive technology, to diagnose the brain tumor, through magnetic resonance imaging (MRI). In recent applications of pre-trained...
Article
Full-text available
Low power Internet of Things (IoT) is suffering from two limitations: battery-power limitation of IoT nodes and inflexibility of infrastructure-node deployment. In this paper, we propose an Unmanned Aerial Vehicle (UAV)-enabled data acquisition scheme with directional wireless energy transfer (WET) to overcome the limitations of low power IoT. The...
Article
Full-text available
Medical imaging has become of vital importance for diagnosing diseases and conducting noninvasive procedures. Advances in eHealth applications are challenged by the fact that Digital Imaging and Communications in Medicine (DICOM) requires high-resolution images, thereby increasing their size and the associated computational complexity, particularly...
Article
Full-text available
The future of the hash based digital signature schemes appears to be very bright in the upcoming quantum era because of the quantum threats to the number theory based digital signature schemes. The Shor’s algorithm is available to allow a sufficiently powerful quantum computer to break the building blocks of the number theory based signature scheme...
Article
Full-text available
In recent years, Internet of Things (IoT) has attracted significant attention because of its wide range of applications in various domains. However, security is a growing concern as users of small devices in an IoT network are unable to defend themselves against reactive jamming attacks. These attacks negatively affect the performance of devices an...
Article
The development of Industry 4.0 has provided the possibility to meet frequent changes in product type and batches, a sharp decline in the delivery cycle, constraints of quality cost, and other relevant parameters of customized production mode. Intelligent manufacturing, as a core of Industry 4.0, represents a deep integration of new IT technologies...
Article
Full-text available
Recently, internet of vehicles (IoVs) is captivating a lot of interest due to a wide range of applications in various domains. These applications rely on up-to-date information of vehicles for provisioning various services. However, frequent message transmissions by a sheer number of vehicles may not only engulf a centralized server but may also ca...
Article
This article presents a knowledge mining model, where a city can plan its development based on existing knowledge during city expansion, for example, telecommunication resource allocation and crowd forecasts in a new region. Unlike most works that focused on Internet-of- Things (IoT) sensing, this study is aimed at urban planning by using harvested...
Article
Software Defined Network (SDN) is a new network architecture that controls the network through a logically centralized controller. The controller computes and installs the flow rules (i.e., entries) in the flow table at switches. When a switch receives the data packet and does not have the flow rule in its flow table, the switch contacts controller...
Article
Software Defined Network (SDN) is a new network architecture that controls the network through a logically centralized controller. The controller computes and installs the flow rules (i.e., entries) in the flow table at switches. When a switch receives the data packet and does not have the flow rule in its flow table, the switch contacts controller...
Article
The rapid growth in communication technology facilitates the health industry in many aspects from transmission of sensor's data to real-time diagnosis using cloud-based frameworks. However, the secure transmission of data and its authenticity become a challenging task, especially, for health-related applications. The medical information must be acc...
Article
Recently, linear wireless sensor networks (LWSNs) have been eliciting increasing attention because of their suitability for applications such as the protection of critical infrastructures. Most of these applications require LWSN to remain operational for a longer period. However, the non-replenishable limited battery power of sensor nodes does not...
Article
Full-text available
Electrocardiography (ECG) sensors play a vital role in the Internet of Medical Things, and these sensors help in monitoring the electrical activity of the heart. ECG signal analysis can improve human life in many ways, from diagnosing diseases among cardiac patients to managing the lifestyles of diabetic patients. Abnormalities in heart activities...
Article
Recently, mobile crowd sensing (MCS) is captivating growing attention because of their suitability for enormous range of new types of context-aware applications and services. This is attributed to the fact that modern smartphones are equipped with unprecedented sensing, computing, and communication capabilities that allow them to perform more compl...
Article
Uplink multicarrier localized nonorthogonal multiple access (MC‐LNOMA) is a variant of hybrid nonorthogonal multiple access, where subcarrier mapping is performed in localized mode. MC‐LNOMA is one of the most prominent emerging schemes and likely to be employed in the forthcoming fifth‐generation cellular networks due to its massive connectivity,...
Conference Paper
Health information is critical for the patient and its unauthorized access may have server impact. With the advancement in the healthcare systems especially through the Internet of Things give rises to patient privacy. We developed a healthcare system that protects identity of patients using innovative zero-watermarking algorithm along with vocal f...
Article
Full-text available
The growing use of wireless health data transmission via Internet of Things is significantly beneficial to the healthcare industry for optimal usage of health-related facilities. However, at the same time, the use raises concern of privacy protection. Health-related data are private and should be suitably protected. Several pathologies, such as voc...
Article
Full-text available
Scientific organizations and researchers are eager to apply recent technological advancements, such as sensors and actuators, in different application areas, including environmental monitoring, creation of intelligent buildings, and precision agriculture. Technology-assisted irrigation for agriculture is a major research innovation that eases the w...
Conference Paper
This piece of work presents a novel design for buffer-aided relaying to increase the diversity gain. In this design, we used random buffer access method and associate each buffer location with its own antenna resource. Thus, each buffer location acts as an independent entity known as the virtual relay. The relay selection is based on the instantane...
Conference Paper
This paper explored cooperative relaying in the presence of energy constrained relays with data storage facility. The relays depend only on the source signal to harvest energy and forward signal to the destination. The relay is selected according to the instantaneous strength of the wireless link. The strongest link among all links on both sides i....
Article
Bluetooth Inter-piconet communication necessitates deployment of a relay. However, network performance is affected with the increased count of relays due to high control overhead. Moreover, the mobility and power failure of relay node will partition the network, which affects their scatternet performance. This paper presents two works: first, to de...
Article
Confidentiality of health information is indispensable to protect privacy of an individual. However, recent advances in electronic healthcare systems allow transmission of sensitive information through the Internet, which is prone to various vulnerabilities, attacks and may leads to unauthorized disclosure. Such situations may not only create adver...
Article
Full-text available
The virtually unlimited available resources and wide range of services provided by the cloud have resulted in the emergence of new cloud-based applications, such as smart grids, smart building control, and virtual reality. These developments, however, have also been accompanied by a problem for delay-sensitive applications that have stringent delay...
Article
YouTube (owned by Google Inc.) is arguably among most popular social media platforms used by millions across the globe. It provides an ever-growing, unique and rich source of content which presents new opportunities and challenges for information discovery and analysis. It is pertinent to explore and understand a topic via YouTube content to discov...
Article
Full-text available
Due to the unpleasant and unpredictable underwater environment, designing an energy-efficient routing protocol for underwater wireless sensor networks (UWSNs) demands more accuracy and extra computations. In the proposed scheme, we introduce a mobile sink (MS), i.e., an autonomous underwater vehicle (AUV), and also courier nodes (CNs), to minimize...
Article
In this research, a classifier is proposed for automatic modulation classification of some common modulation schemes, i.e., BPSK, QPSK, 8-PSK and 16-QAM. Our proposed classifier considers multipath fading effects on the received signal in a non-Gaussian noise environment. Automatic modulation classification is very challenging in real-world scenari...
Conference Paper
Unique characteristics of Underwater Sensor Net-works (UWSNs) are very challenging in design of an efficient data gathering routing protocol. These characteristics include large propagation delay, high error rate, low bandwidth, and limited energy. In UWSNs, improved network lifetime, increased throughput and low end-to-end delay are prominent issu...
Conference Paper
Underwater Wireless Sensor Networks (UWSNs) are getting growing interest because of wide-range of applications. Most applications of these networks demand reliable data de-livery over longer period in an efficient and timely manner. However, resource-constrained nature of these networks makes routing in a harsh and unpredictable underwater environm...
Article
Limited bandwidth resources lead to a number of challenges especially for eHealth applications, which are communicated over IP and wireless networks. These multimedia services include high-resolution videos and have very large file sizes that require a high level of compression to overcome this limitation. Therefore, there is an acute demand for th...
Conference Paper
Automatic Modulation Classification (AMC) is extremely desirable to realize the merits of cognitive radios in plethora of commercial and military applications. However, AMC is extremely challenging in real-world scenarios due to multipath fading and additive Gaussian noise on modulation schemes. Moreover, it becomes more difficult in blind environm...
Conference Paper
Social networks have a significant influence in a patient's environment. An efficient social network framework that addresses the socio cultural communication needs of hospitalized patients' caregivers can play an important role to improve a patient's treatment. We proposed e-Ziarah Caregiver Social Network (CSN) system, a working model that reflec...

Network

Cited By

Projects

Project (1)