Prof. Hassan Kazemian

Prof. Hassan Kazemian
London Metropolitan University · School of Computing

B.Sc., M.Sc., PhD, FBCS, FIET, SMIEEE, C.Eng.

About

81
Publications
48,951
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
761
Citations

Publications

Publications (81)
Article
Full-text available
The security is important issue in wireless networks. This paper discusses audio watermarking as a tool to improve the security of image communication over the IEEE 802.15.4 ZigBee network. The adopted watermarking method implements the Singular-Value Decomposition (SVD) mathematical technique. This method is based on embedding a chaotic encrypted...
Article
Full-text available
This paper studies a vital issue in wireless commu-nications, which is the transmission of images over wireless networks. IEEE ZigBee 802.15.4 is a short-range communi-cation standard that could be used for small distance multi-media transmissions. In fact, the ZigBee network is a wireless personal area network (WPAN), which needs a strong inter-le...
Preprint
Cyber risk profoundly affects all. In the context of cyber threats, malware is trending in various productive sectors. Nowadays, anti-malware is essential to combat cyber threats; however, their efficiency is often questioned, because malware is different for different regions in the world. Choosing an efficient anti-malware software solution is cr...
Preprint
Full-text available
Every day, researchers in computing and IT are challenged with several articles that they need to rate, classify and separate quickly and effectively to contextualize and further advance their research effectively. It is considered that literature review is the most important step of discovery. Notably, a literature review is a part that allows the...
Preprint
Full-text available
This work proposes the creation of an index to classify UK Universities by the relevance that each institution teaches cybersecurity content based on cybersecurity standards in G400 courses. The results show that 1 and 2 Stars represents 80% of analised G400. The aim of this work is to raise awareness among British universities to pay more attentio...
Presentation
Full-text available
Nowadays, software engineering solutions for supporting the scientific research process are needed. As we have many articles in thousands of scientific sources, methods to improve and ease the selection and prioritization of research works are demanded, mainly in systematic or quasi-systematic literature reviews. We can increase the productivity of...
Article
This paper is concerned with applications of a dual Neural Network (NN) and Support Vector Machine (SVM) to prediction and analysis of beta barrel trans membrane proteins. The prediction and analysis of beta barrel proteins usually offer a host of challenges to the research community, because of their low presence in genomes. Current beta barrel pr...
Article
This paper compares machine learning techniques for detecting malicious webpages. The conventional method of detecting malicious webpages is going through the black list and checking whether the webpages are listed. Black list is a list of webpages which are classified as malicious from a user’s point of view. These black lists are created by trust...
Conference Paper
This paper is concerned with transmembrane prediction analysis. Most of novel drug design requires the use of Membrane proteins. Transmembrane protein structure allows pharmaceutical industry to design new drugs based on structural layout. However, laboratory experimental structure determination by X-ray crystallography is difficult to be achieved...
Article
About 15% of all proteins in a genome contain a signal peptide (SP) sequence, at the N-terminus, that targets the protein to intracellular secretory pathways. Once the protein is targeted correctly in the cell, the SP is cleaved, releasing the mature protein. Accurate prediction of the presence of these short amino-acid SP chains is crucial for mod...
Article
Text entry from people is not only grammatical and distinct, but also noisy. For example, a user's typing stream contains all the information about the user's interaction with computer using a QWERTY keyboard, which may include the user's typing mistakes as well as specific vocabulary, typing habit, and typing performance. In particular, these feat...
Article
Any sniffer can see the information sent through unprotected ‘probe request messages’ and ‘probe response messages’ in wireless local area networks (WLAN). A station (STA) can send probe requests to trigger probe responses by simply spoofing a genuine media access control (MAC) address to deceive access point (AP) controlled access list. Adversarie...
Conference Paper
The IEEE 802.15.4 standard, known as ZigBee, is limited to a through-rate of 250kbps providing support for small packet file transitions and it is designed to provide highly efficient connectivity with low power-usage. ZigBee is commonly used in wireless architecture and in controlling and monitoring applications. ZigBee's cost effective potential...
Article
Full-text available
Bluetooth is a wireless personal area network. This type of networks is widely used for image communication. This paper presents a study for the transmission of images over mobile Bluetooth networks. It presents a novel chaotic interleaving scheme for this purpose. In this scheme, the chaotic Baker map is used for bit interleaving and enhanced data...
Article
This research paper presents Neuro-Fuzzy applications to Moving Picture Expert Group (MPEG-4) video transmission in IEEE 802.15.4 ZigBee wireless. ZigBee can operate within 2.4 GHz frequency with a data rate of 250 kb/s, which may interfere with other wireless devices functioning within the same frequency band such as WiFi and Bluetooth. MPEG-4 Var...
Article
Full-text available
This paper presents an implementation of 2D chaotic Baker map using different modes of operation in the fractional Fourier transform domain on digital images. The proposed image cryptosystem implements the chaotic Baker map scrambling using three different modes of operation: cipher block chain, cipher feedback, and output feedback, in which the in...
Conference Paper
Full-text available
The OntoCarer Framework is a research programme of the Centre for Intelligent Systems Research of London Metropolitan University which aims at utilizing contemporary Web and Mobile Internet technologies for assisting disabled, elderly and impaired people. In this framework software agents will act on behalf of both the assisted and the assisting pe...
Article
Full-text available
This article studies a vital issue in wireless communications, which is the transmission of audio signals over wireless networks. It presents a novel interleaver scheme for protection against error bursts and reduction the packet loss of the audio signals. The proposed technique in the article is the chaotic interleaver; it is based on chaotic Bake...
Article
Full-text available
This article studies improving of coloured JPEG image transmission over mobile wireless personal area network through the Bluetooth networks. This article uses many types of enhanced data rate and asynchronous connectionless packets. It presents a proposed chaotic interleaving technique for improving a transmission of coloured images over burst err...
Article
Full-text available
The objective of this study is to investigate the development of personalized context-aware applications using an adaptive service composition approach. We have developed a personalized meta-search mobile application to demonstrate effectiveness of our approach. The meta-search system is able to detect the dynamic contextual information in a mobile...
Article
Full-text available
In this work, we present a secure and robust digital image watermarking algorithm using both the Discrete Wavelet Transform (DWT) and the Fractional Fourier Transform (FrFT). The main purpose of the paper is to obtain a robust watermarking algorithm that is secure and that allows multiple watermarks to be embedded in the same cover image. We first...
Conference Paper
This paper is part of a comprehensive study going on implementation of Digital Business Ecosystem (DBE) for Malaysian Small and Medium Enterprises. The objective of the study is to signify the role of Perceived Usefulness and analyze the relationship between Perceived Usefulness (PU) and Responsiveness of Small and Medium Enterprises' (SME) employe...
Conference Paper
This paper presents an implementation of 2-D chaotic Baker map using different modes of operations after applying the Fractional Fourier Transform (FrFT) on digital images. The proposed image cryptosystem implements the chaotic Baker map scrambling using three different modes of operation; Cipher Block Chain (CDC), Cipher Feed-Back (CFB), Output Fe...
Article
The text entry interaction between human and computer could be noisy. The typing stream is a reflection of users' typing behavior that includes ones' fluency of vocabulary, typing habits and typing performance. This research develops an original intermediate layer language modeling framework called Adaptive Language Modeling Intermediate Layer (ALM...
Conference Paper
Full-text available
Channel Quality Driven Data Rate (CQDDR) play main role in the throughput factor over IEEE 802.15.1 Bluetooth network. CQDDR is employed to selects the packet size by Received Signal Strength Indicator (RSSI) over Bluetooth network according to channel conditions. This paper tries to improve the throughput over Bluetooth system in classic and Enhan...
Conference Paper
Full-text available
The paper studies the colored image (JPEG) transmission over mobile Bluetooth network using Enhanced Data Rate (EDR) packets. The paper uses the 2DH3 EDR Asynchronous Connectionless (ACL) packets. It presents the proposed chaotic interleaving technique to improve a transmission of colored images over Bluetooth systems. Also, it studies different in...
Article
The Media Access Control (MAC) layer of the wireless protocol, Institute of Electrical and Electronics Engineers (IEEE) 802.11, is based on the exchange of request and response messages. Probe Request Flooding Attacks (PRFA) are devised based on this design flaw to reduce network performance or prevent legitimate users from accessing network resour...
Article
This paper presents a new approach for audio watermarking using the Singular Value Decomposition (SVD) mathematical technique. The proposed approach can be used for data hiding in the audio signals transmitted over wireless networks and for multi-level security systems as will be stated in the applications section. This approach is based on embeddi...
Conference Paper
Digital Business Ecosystem (DBE) is a rapidly growing technology which caters online businesses in both sectors of Business to Consumer (B2C) and Business to Business (B2B). It takes networked business organizations into account and helps them in digitally establishing inter and intra-organizational link. We are focusing on Small and Medium Enterpr...
Article
Digital Business Ecosystem (DBE), as it sounds, is a digitized form of business ecosystem amalgamating ICT (Information and Communication Technology) with business networks. Malaysian small and medium enterprises (SME) can be tuned into a collaborative and interdependent socio-economic business environment when they are jacketed with ecosystem. In...
Chapter
Full-text available
The underlying technologies driving the World Wide Web are largely based on the assumption of wired communications and powerful desktop hardware. This is not true when a user is accessing the Web pages and documents using a PDA and moving from wireless network in a mall to a neighboring office environment. Taking into consideration on the informati...
Article
Full-text available
Multiple algorithms have been developed to correct user’s typing mistakes. However, an optimal solution is hardly identified among them. Moreover, these solutions rarely produce a single answer or share common results, and the answers may change with time and context. These motivated this research to synthesize some distinct word correction algorit...
Article
This paper is to introduce an application of Computational Intelligence (CI) to Moving Picture Expert Group-4 (MPEG-4) video compression over IEEE.802.15.1 wireless communication, known as Bluetooth 1.2, in order to improve picture quality. The 2.4 GHz Industrial, Scientific and Medical frequency band is used for the IEEE.802.15.1 standard. IEEE.80...
Article
Bluetooth wireless operates in 2.4-GHz Industrial Scientific and Medicine (ISM) frequency, which may interfere with other devices functioning within the same frequency band, such as WiFi. Furthermore, Moving Picture Expert Group (MPEG) variable bit rate (VBR) video demands larger and more stable bandwidth and may cause data loss and time delay as a...
Conference Paper
Full-text available
In this paper, an adaptive hypermedia framework is used in the design and development of an adaptive personalized e-learning system for Java programming. Learners with different learning goals, background and learning aptitudes are treated differently by including a model of knowledge and preferences in the system. A personalized e-learning framewo...
Article
Full-text available
With increasing the using of wireless technologies in essential fields such as the medical application, this paper proposes different scenarios for the transmission of images over wireless networks. The paper uses the IEEE ZigBee 802.15.4 for applying the proposed schemes. It is a Wireless Personal Area Network (WPAN). This paper presents a novel c...
Conference Paper
The main aim of this research is to develop a robust, reliable, efficient and novel framework by using Web 2.0 technology that will serve as a front and middleware collaboration model between data persistence logic and operational requests. This framework will serve as a mediation platform for request brokers. It will provide a high level of abstra...
Conference Paper
People with Parkinson diseases or motor disability miss-stroke keys. It appears that keyboard layout, key distance, time gap are affecting this group of people's typing performance. This paper studies these features based on neural network learning algorithms to identify the typing patterns, further to correct the typing mistakes. A specific user t...
Conference Paper
In Wireless Local Area Networks (WLAN), beacon, probe request and response messages are unprotected, so the information is visible to sniffers. Probe requests can be sent by anyone with a legitimate Media Access Control (MAC) address, as association to the network is not required at this stage. Legitimate MAC addresses can be easily spoofed to bypa...
Conference Paper
Full-text available
This paper describes statistical analysis of web data traffic to identify the probability distribution best fitting the connection arrivals and to evaluate whether data traffic traces follow heavy-tail distributions – an indication of fractal behaviour, which is in contrast to conventional data traffic. Modelling of the fractal nature of web data t...
Conference Paper
Computer text entry may be full of noises – for example, computer keyboard users inevitably make typing mistakes and their typing stream implies all users’ self rectification actions. These may produce a great negative influence on the accessibility and usability of applications. This research develops an original Intelligent Keyboard hybrid framew...
Conference Paper
Full-text available
This paper is concerned with an intelligent application of Moving Picture Expert Group (MPEG) video transmission in a Bluetooth link. MPEG Variable Bit Rate (VBR) video is data hungry and results in excessive data loss and time delay over wireless networks. In a Bluetooth channel transmission rate is unpredictable as result of interferences by chan...
Conference Paper
Full-text available
This paper is concerned with an intelligent application of Moving Picture Expert Group (MPEG) video transmission over IEEE 802.15.4 - ZigBee. MPEG Variable Bit Rate (VBR) video is data hungry and presents excessive time delay and data loss over a wireless communication. Conventional rate policing such as generic cell rate algorithm is inadequate to...
Conference Paper
Full-text available
This paper is to present a solution on how to improve Quality of Picture on Moving Picture Expert Group (MPEG-4) video compression over IEEE 802.15.1 wireless transmission using artificial intelligence (AI). IEEE 802.15.1 standard is sensitive to noise and interferences due to other 2.4 GHz Industrial, Scientific and Medical (ISM) devices. It is co...
Conference Paper
Multiple algorithms have been developed to correct user’s typing mistakes. However, an optimum solution is hardly identified among them. Moreover, these solutions rarely produce a single answer or share common results, and the answers may change with time and context. These have led this research to combine some distinct word correction algorithms...
Conference Paper
This paper is to introduce an application of Artificial Intelligence (AI) to Moving Picture Expert Group-4 (MPEG-4) video compression over IEEE.802.15.1 wireless communication in order to improve quality of picture. 2.4GHz Industrial, Scientific and Medical (ISM) frequency band is used for the IEEE 802.15.1 standard. Due to other wireless frequency...
Article
Transmitting Moving Picture Expert Group (MPEG) Variable Bit Rate (VBR) video stream over 2.4 GHz wireless frequency demands a large bandwidth and may result in data loss and delay, because of excessive fluctuation in bit rate. Transmission over 2.4 GHz frequency further causes uncertainty due to interferences by other wireless devices in the same...
Chapter
Membrane proteins (MPs) are large set of biological macromolecules that play a fundamental role in physiology and pathophysiology for survival. From a pharma-economical perspective, though it is the fact that MPs constitute ˜75% of possible targets for novel drugs but MPs are one of the most understudied groups of proteins in biochemical research....
Conference Paper
Full-text available
Video transmission over dynamic channels like 2.4 GHz wireless technology is unpredictable, because of interferences caused by other wireless devices in the same ISM (industrial, scientific and medicine) frequency band and/or general channel noises. Transmitting moving picture expert group (MPEG) video stream over wireless technology also presents...
Chapter
Full-text available
This chapter aims to describe the development and two tuning methods for a self-organising fuzzy PID controller. Before application of fuzzy logic, the PID gains are tuned by conventional tuning methods. In the first tuning method, fuzzy logic at the supervisory level readjusts the three PID gains during the system operation. In the second tuning m...
Conference Paper
Full-text available
This paper presents an integrated neuro-fuzzy (NF) scheme and a rule-based-fuzzy (RBF) scheme applications to Moving Picture Expert Group (MPEG) video transmission in Bluetooth. In a Bluetooth network, transmission rate is unpredictable due to interferences by other wireless devices or general Bluetooth channel noises. MPEG variable bit rate (VBR)...
Article
Full-text available
The application of a neuro-fuzzy (NF) controller to moving picture expert group (MPEG-2) video transmission over a Bluetooth asynchronous connectionless (ACL) is presented in this paper. MPEG variable bit rate (VBR) data sources experience unpredictability, long delay, and excessive loss, due to sudden variations in bit rate. Therefore, it is pract...
Article
This paper is concerned with transmission of moving picture expert group (MPEG) variable bit rate (VBR) data sources over asynchronous transfer mode (ATM) networks, using a self-organising fuzzy (SOF) controller and a rule-based fuzzy (RBF) controller. The variations in bit rate for MPEG VBR data sources are predominantly large and unpredictable, w...
Article
This paper is concerned with transmission of Moving Picture Expert Group (MPEG) video over a Bluetooth wireless network using a fuzzy approach. MPEG Variable Bit Rate (VBR) video sources suffer from long delay and excessive loss due to the sudden bursts in bit rate. Constant Bit Rate (CBR) encoding scheme may work well for a network with a guarante...
Article
Full-text available
This paper is concerned with transmission of a moving picture expert group (MPEG) video stream over a Bluetooth channel, using an adaptive neuro-fuzzy technique. MPEG variable bit rate (VBR) video sources over a network generally experience long delay and unacceptable data loss, due to high variations in bit rate. Furthermore, transmission rate cou...
Conference Paper
In the early seventies, it was clear that primary amino acid sequence and its local solution environment hold most of the information necessary for protein folding. Since then, scientists have been trying to solve the bioinformatics problem by constructing the tertiary three-dimensional structure of protein from the primary amino acid sequences by...
Article
This paper describes the development and tuning methods for a novel self-organizing fuzzy proportional integral derivative (PID) controller. Before applying fuzzy logic, the PID gains are tuned using a conventional tuning method. At supervisory level, fuzzy logic readjusts the PID gains online. In the first tuning method, fuzzy logic at the supervi...
Article
Full-text available
There have been several attempts over the last 20 years to develop tools for predicting membrane-spanning regions, but the problem of prediction is made topologically more complex by the presence of several transmembrane domains in many proteins, and current tools are far away from achieving 95% reliability in prediction. Though neu-ral networks ha...
Article
Usage parameter control (UPC) provides support for quality of service across heterogeneous networks. For the network operator UPC assists in limiting network usage through traffic shaping, to prevent unacceptable delay. Traditional methods to apply UPC involve the generic cell rate algorithm or ‘leaky bucket’ algorithm, now commonly implemented in...
Conference Paper
Full-text available
The paper is concerned with transmission of MPEG video over a Bluetooth wireless network using fuzzy controllers. MPEG variable bit rate (VBR) data sources are unpredictable and have substantial variations in bit rate. Subsequently, it is almost impossible to transmit the VBR data sources over a Bluetooth channel with a limited transmission speed o...
Conference Paper
Full-text available
In the past, neural networks have been viewed as classification and regression systems whose internal representations were incomprehensible. It is now becoming apparent that algorithms can be designed which extract comprehensible representations from trained neural networks, enabling them to be used for data mining, i.e. the discovery and explanati...
Conference Paper
Connection admission control provides support for quality of service across heterogeneous networks. By restricting access through a traffic policing policy the network is prevented from becoming oversubscribed, in turn reducing latency for real-time variable traffic. Traditional methods to restrict admission involve the use of simple traffic descri...
Conference Paper
Full-text available
The overall aim of the paper is concerned with transmission of a digital video signal over an asynchronous transfer mode (ATM) network, using a self-organizing fuzzy (SOF) controller. In ATM a traffic-shaping buffer is used to prevent excessive back-to-back cells being generated during the peak transmissions of Moving Picture Expert Group (MPEG) va...
Article
Full-text available
The application of a self-organizing fuzzy proportional-integral-derivative (SOF-PID) controller to a multiple-input-multiple-output (MIMO) nonlinear revolute-joint robot arm is studied in this paper. The SOF controller is a learning supervisory controller, making small changes to the values of the PID gains while the system is in operation. In eff...
Article
The self-organising fuzzy controller is an extension of the rule-based fuzzy controller with an additional learning capability. The self-organising fuzzy (SOF) is used as a master controller to readjust conventional PID gains at the actuator level during the system operation, copying the experience of a human operator. The application of the self-o...
Conference Paper
The paper is concerned with two types of fuzzy PID controllers, the rule-based fuzzy PID controller and the learning fuzzy PID controller. Initially, the development of the rule-based fuzzy PID controller is studied, and subsequently, the development of the learning fuzzy PID controller is outlined. For the rule-based fuzzy PID controller, the PID...
Conference Paper
This paper describes the conceptual development of a self-organising fuzzy PID (SOF-PID) controller and applies it to a nonlinear revolute-joint robot-arm. The SOF acts as an intelligent master controller making small changes to the values of the three PID gains during the system operation, without the need to use the knowledge of an experienced hu...
Article
This paper describes the application of a rule-based Multi-Input Multi-Output (MIMO) Self Organising Fuzzy Controller (SOFC) to a non-linear revolute-joint robot-arm. The SOFC is a learning controller which creates its own control rule strategy, without the guidance of an experienced human operator. The step input and path tracking trajectories wer...
Article
Full-text available
This paper is concerned with an intelligent application of Moving Picture Expert Group (MPEG) video transmission over a Bluetooth Asynchronous Connection-Less (ACL) link. MPEG Variable Bit Rate (VBR) video is data hungry and presents excessive time delay and data loss over a wireless communication. In a Bluetooth channel transmission rate could als...

Questions

Question (1)
Question
Dear Prof El-Sayed Mahmoud El-Rabaie and Prof Osama S. Farag Allah,
My PhD student is doing Steganography for her PhD. Shall we collaborate and have joint paper publications?
Kind regards,
______________________________________________________
Prof. Hassan Kazemian, B.Sc, M.Sc, PhD, FIET, FBCS, C.Eng., SMIEEE,
Director of WoW Agency,
Director of Intelligent Systems Research Centre,
School of Computing and Digital Media,
London Metropolitan University,
Tower Building, 166-220 Holloway Road,
London N7 8DB, UK.
Tel: ++44 (0) 207133 2933.

Network

Cited By