Abdulhameed Alelaiwi's research while affiliated with King Saud University and other places

Publications (87)

Article
Full-text available
Recognizing human activity from highly sparse body sensor data is becoming an important problem in Internet of Medical Things (IoMT) industry. As IoMT currently uses batteryless or passive wearable body sensors for activity recognition, the data signals of these sensors have a high sparsity, which means that the time intervals of sensors’ readings...
Article
Full-text available
The IEEE 802.15.6 standard has the potential to provide cost-effective and unobtrusive medical services to individuals with chronic health conditions. It is a low-power standard developed for wireless body area networks and enables wireless communication inside or near a human body. This standard utilizes a Carrier Sense Multiple Access with Collis...
Article
Edge-cloud services provide heterogeneous virtual machine types to run various IoT workloads. Choosing the appropriate VM configuration for each workload can effectively improve performance and reduce costs. This article proposes ARVMEC, Adaptive Recommendation of Virtual Machines for IoT in Edge-Cloud Environment, which can always provide users wi...
Article
Full-text available
The inclusion of multimodal inputs improves the accuracy and dependability of smart healthcare systems. A user satisfaction monitoring system that uses multimodal inputs composed of users’ facial images and speech is proposed in this paper. This smart healthcare system then sends multimodal inputs to the cloud. The inputs are processed and classifi...
Article
Full-text available
Varying channel conditions, dynamic traffic flows, interference and congestion are the main challenges to achieve high-throughput data delivery in multi-radio multi-channel Wireless Mesh Networks (WMNs). The performance of existing solutions are limited either for using statically computed end-to-end relay paths or myopic forwarding decisions. In t...
Article
Full-text available
Deep learning algorithms have achieved remarkable results in the natural language processing( NLP) and computer vision. Hence, a trend still going on to use these algorithms, such as convolution and recurrent neural networks, for text analytic task to extract useful information. Features extraction is one of the important reasons behind the success...
Article
Due to environment-friendliness, renewable energy like solar power and wind power is more and more introduced to energy systems all over the world. Simultaneously, high penetrations of wind and solar generation also have brought severe curtailment of wind and solar. How to alleviate curtailment of wind and solar is a crucial problem in evaluating a...
Article
The service of mobile network develops rapidly nowadays, which generates various computing and resource-intensive applications, such as Internet of vehicles and virtual reality. Mobile edge computing (MEC) is close to data source and users, so terminals can execute tasks at the edge of network. In this way, the heavy load on core network can be rel...
Article
Mobile edge clouds can offer delay-sensitive services to users by deploying storage and computing resources at the network edge. Considering resource-limited edge server, it is impossible to deploy all services on the edge clouds. Thus, many existing works have addressed the problem of arranging services on mobile edge clouds for better quality of...
Article
With the rapid development of artificial intelligence and mobile Internet, the new requirements for human-computer interaction have been put forward. The personalized emotional interaction service is a new trend in the human-computer interaction field. As a basis of emotional interaction, emotion recognition has also introduced many new advances wi...
Article
Since traffic in networks is growing rapidly, it is difficult for the existing network architecture to support the huge traffic requirement. This article proposes a novel intelligent architecture as a promising paradigm for B5G heterogeneous networks to optimize network resource usage and network performance. The main idea is to build a suitable ne...
Article
In a data-rich digital world, our hand-held resource-constrained mobile devices are restricted to performing small-to-medium-level computation processes and are incapable of performing high-computation processes. Computation offloading is a suitable solution for overcoming this shortcoming. Until recently, we have perceived cloud computing as an ap...
Article
Full-text available
Cognitive radio networks improve spectrum efficiency by employing vigilant and accurate spectrum management techniques. This is done to enable an unlicensed user to use the underutilized spectrum. Spectrum sensing determines if a spectrum hole exists for the unlicensed user, this is accomplished using various techniques such as energy detection, mi...
Article
Brain cancer classification is an important step that depends on the physician’s knowledge and experience. An automated tumor classification system is very essential to support radiologists and physicians to identify brain tumors. However, the accuracy of current systems need to be improved for suitable treatments. In this paper, we propose a hybri...
Article
Coronary artery disease is a common chronic disease, also known as ischemic heart disease, which is a cardiac dysfunction caused by the insufficient blood supply to the heart and kills countless people every year. In recent years, coronary artery disease ranks first among the world's top ten causes of death. Cardiac auscultation is still an importa...
Article
With the improvement of mobile device performance, the requirement of equivalent dose description in intensity-modulated radiation therapy is increasing in mobile multimedia for healthcare. The emergence of mobile cloud computing will provide cloud servers and storage for intensity-modulated radiotherapy (IMRT) mobile applications, thus realizing v...
Article
Existing clustering algorithms for directional sensor networks mainly focused on maximizing network lifetime and/or data delivery performances. A distributed clustering algorithm named TRACE considering target coverage is proposed in this paper that improves the clustering performances, as well as, the sensing coverage in the network. TRACE is desi...
Article
Human activity recognition from multimodal body sensor data has proven to be an effective approach for the care of elderly or physically impaired people in a smart healthcare environment. However, traditional machine learning techniques are mostly focused on a single sensing modality, which is not practical for robust healthcare applications. There...
Article
Applications of wireless sensor networks are blooming for attacking some limits of social development, among which energy consumption and communication latency are fatal. Effective communication traffic control and management is a potential solution, so we propose a novel traffic-control system based on deep reinforcement learning, which regards tr...
Article
Decision-making is not a trivial process. It involves studying and analyzing different alternatives. In addition, it requires defining criteria for evaluating the alternatives. A problem arises when evaluating criteria that conflict or when dealing with qualitative criteria. The analytic hierarchy process (AHP) is a multi-criteria decision tool tha...
Article
Full-text available
Recent real medical datasets show that the number of outpatients in China has sharply increased since 2013, when the Chinese health insurance reform started. This situation leads to increased waiting time for the outpatients; in particular, the normal operation of a hospital will be congested at rush hour. The existence of this problem in outpatien...
Article
In this paper, we investigate traffic engineering (TE) methods in Cognitive Radio Wireless Mesh Networks (CR-WMNs) through joint selection of link-channel pairs at each forwarding router and allocating powers on those so as to boost up overall network throughput. We first present an optimization framework, Centralized Optimal Traffic Engineering (C...
Article
Wireless communications in smart homes are vulnerable to many adversarial attacks such as eavesdropping. To secure the communications, secret session keys need to be established between home appliances. In existing symmetric key establishment protocols, it is assumed that devices are pre-loaded with secrets. In practice, however, home appliances ar...
Article
Full-text available
In recent years, wireless medical sensor networks meet the web to enable exciting healthcare applications that require data communication over the Internet. Often these applications suffer from data disclosure due to malicious users’ activities. To prevent such data disclosure in the healthcare systems, many public key cryptographic techniques have...
Article
Area coverage problem in Directional Sensor Networks (DSNs) presents great research challenges including minimization of number of active sensors and overlapping sensing coverage area among them, determination of their active sensing directions in an energy-efficient way, etc. Existing solutions permit to execute coverage enhancement algorithms at...
Article
Multi-level buffer cache hierarchies are now commonly seen in most client/server cluster configurations, especially in today’s big data application deployment. However, multi-level caching policies deployed so far typically use independent cache replacement algorithms in each level, which has two major drawbacks: (1) File blocks may be redundantly...
Article
In this paper, we address the problem of accurately modelling the Cloud data center energy consumption. As minimizing energy consumption has become a crucial issue for the efficient operation and management of Cloud data centers, an energy consumption model plays an important role in Cloud datacentre energy management and control. Moreover, such mo...
Article
Full-text available
With the rapid development of Internet of Things technology and the promotion of embedded devices’ computation performance, smart devices are probably open to security threats and attacks while connecting with rich and novel Internet. Attracting lots of attention in embedded system security community recently, Trusted Execution Environment (TEE), a...
Article
Full-text available
These days, handling large amounts of data generated from Internet of Things (IoT) applications in the Cloud has turned into a powerful solution for fulfilling Quality of Service requests from clients. However, to save on costs, the union of cloud providers, known as a cloud confederation, can be a promising methodology because this organization he...
Article
Full-text available
In VANETs, vehicles broadcast traffic-related messages periodically according to Dedicated Short Range Communication protocol. To ensure the reliability and integrity of messages, authentication schemes are involved in VANETs. As traffic-related messages are time-sensitive, they must be verified and processed timely, or it may cause inestimable har...
Article
The recent popular game, Pokémon GO, created two symbiotic social networks by location-based mobile augmented reality (LMAR) technique. One is in the physical world among players, and another one is in the cyber world among players’ avatars. To date, there is no study that has explored the formation of each social network and their symbiosis. In th...
Article
Full-text available
Internet of Things (IoT), leveraging interconnected sensors (i.e., wireless body area network (WBAN), can offer opportunities for real time monitoring of patient health status and manage patients and treatment. Therefore, it is expected that IoT will play a significant role in the next-generation healthcare provisioning. Although IoT-based patient...
Article
Full-text available
Smart vehicles form pervasive environment to enhance user experience through multimedia enabled infotainment systems. In order to realize effective infotainment system for vehicles, we need to have context-aware applications that use latest (live) information for enhanced user experience. Such latest information is abundantly available on the Inter...
Article
Password authenticated key exchange (PAKE) protocols are designed for a pair of users to establish a secret session key over a public and unreliable network. In existing PAKE protocols, it is assumed that short passwords are pre-shared between users. This assumption, however, would be impractical in certain applications. For instance, in the Intern...
Article
With the advantages of extremely high access speed, low energy consumption, nonvolatility, and byte addressability, nonvolatile memory (NVM) device has already been setting off a revolution in storage field. Conventional storage architecture needs to be optimized or even redesigned from scratch to fully explore the performance potential of NVM devi...
Article
Full-text available
In this paper, we address the problem of ownership transfer of RFID tagged objects in Internet of Things (IoT) in a secure manner. In application domains such as supply chain management, RFID tagged objects are required to securely change hands several times during their life cycle. To this end, we propose a novel ownership transfer mechanism that...
Article
The integration of the IoT and cloud technology is very important to have a better solution for an uninterrupted, secured, seamless, and ubiquitous framework. The complementary nature of the IoT and the could in terms of storage, processing, accessibility, security, service sharing, and components makes the convergence suitable for many application...
Article
Full-text available
With advances in lasers, optics, and electronics, many new 3D display technologies have been proposed with prototypes in research labs or have entered the marketplace. Although some of these technologies (such as Stereoscopy) are familiar to people, other technologies, such as holography, remain far-fetched to most. This survey introduces the princ...
Article
Full-text available
Application software execution requests, from mobile devices to cloud service providers, are often heterogeneous in terms of device, network, and application runtime contexts. These heterogeneous contexts include the remaining battery level of a mobile device, network signal strength it receives and quality-of-service (QoS) requirement of an applic...
Article
Stroke is considered one of the main causes of death around the world. Survivors often suffer different kinds of disabilities in terms of their cognitive and motor capabilities, and are therefore unable to perform their day-to-day activities. To regain some of their cognitive as well as motor abilities, they require rehabilitation. To this end, we...
Article
Full-text available
Due to the significant advancement of Smartphone technology, the applications targeted for these devices are getting more and more complex and demanding of high power and resources. Mobile cloud computing (MCC) allows the Smart phones to perform these highly demanding tasks with the help of powerful cloud servers. However, to decide whether a given...
Article
Full-text available
This paper introduces basic concept of mood fatigue detection and existing solutions as well as some typical solutions, such as mobile sensing and cloud computing technology. In the first place, we sum up main challenges of mood fatigue detection and the direction of future study. Then one type of system implementation is put forward, such system c...
Article
The IoT is the next generation of innovation in the smart world, which has the potential to improve safety, security, and the quality of our daily lives through pervasive communication and computation. Currently, we have observed that a plethora of interconnected smartphones, devices, and sensors are deployed for providing personalized services (e....
Article
Full-text available
Unstructured clinical medical text, as an important part of the Electronic Health Records (EHRs), is characterized by large quantities and can store substantial disease-related information of patients. Currently, the disease risk assessment model based on the analysis of clinical medical text, designs relevant characteristics aiming at certain dise...
Article
Full-text available
In recent times, there has been a significant growth in the number of smartphone users and number and types of mobile applications (apps). Such a trend has resulted in increased Internet data consumption, particularly for users of ?data hungry? apps. Thus, smartphone apps should be allocated to their required budget to minimize resource wastage wit...
Article
The popularity of Twitter attracts more and more spammers. Spammers send unwanted tweets to Twitter users to promote websites or services, which are harmful to normal users. In order to stop spammers, researchers have proposed a number of mechanisms. The focus of recent works is on the application of machine learning techniques into Twitter spam de...
Article
Full-text available
With the development of IoT (Internet of Thing), big data analysis and cloud computing, traditional medical information system integrates with these new technologies. The establishment of cloud-based smart healthcare application gets more and more attention. In this paper, semi-physical simulation technology is applied to cloud-based smart healthca...
Article
High-throughput data delivery in Wireless Mesh Networks (WMNs) is a challenging problem due to dynamic changes of link quality, interference and congestion. In this work, we first develop an optimization framework for Dynamic Traffic Engineering (O-DTE) in WMNs that aims to minimize the interference and congestion at each hop through joint power an...
Article
Video on demand (VoD) is a popular application on the Internet. In the past few years, more and more VoD services are shifted to cloud. Although this transformation introduces many benefits, it arouses new challenges of data security due to the outsourcing storage on untrusted cloud servers. For satisfying the requirements of fine-grained access co...
Article
Vehicular ad hoc network (VANET) is an increasing important paradigm, which not only provides safety enhancement but also improves roadway system efficiency. However, the security issues of data confidentiality, and access control over transmitted messages in VANET have remained to be solved. In this paper, we propose a secure and efficient message...
Article
Online Social Networks (OSNs) such as Facebook and Twitter have become popular communication and information sharing tools for hundreds of millions of individuals in recent years. OSNs not only make people’s life more connected, but also attract the interest of spammers. Twitter spam generally contains deceptive information, such as “free voucher”...
Article
Electronic trading (e-trading) provides a virtual marketplace (e-Marketplace) where buyers and sellers can engage in business activities through electronic media rather than direct physical contact. Although negotiation is a fundamental component of e-trading, the critical risks of missing out on top utility offers that expire before client’s negot...
Article
Full-text available
Opportunistic usage selection of a licensed channel by a secondary user (SU) and its contention for data transmission is a challenging problem in coexisting cognitive radio network (CCRN). This is caused by the presence of many SUs from different CRNs in a shared environment, and the problem is further intensified when the user applications, with h...
Article
Full-text available
Due to its high level of security, three-factor authentication combining password, smart card and biometrics has received much interest in the past decades. Recently, Islam proposed a dynamic identity-based three-factor authentication scheme using extended chaotic map which attempts to fulfill three-factor security and resist various known attacks,...
Article
This paper proposes a face recognition system based on a steerable pyramid transform (SPT) and local binary pattern (LBP) for e-Health secured login. In an e-Health framework, patients are sometimes unable to identify themselves by traditional login modalities such as username and password. Automatic face recognition can replace the conventional lo...
Article
Full-text available
Wireless sensor network (WSN) has become part of human life as it is used in several applications including healthcare, environment and agricultural, public safety, military, transportation as well as in the industry. In spite of its usefulness, it is challenging to maintain long-term operations due to limited battery life. Several energy efficient...
Article
To meet the increasing demands for popular content downloading services in next-generation cellular networks, device-to-device (D2D) communication was proposed to enable user equipments (UEs) to communicate directly over the D2D links in addition to traditional cellular operation by base stations (BSs), which is capable of utilizing the available c...
Article
To meet the increasing demands for popular content downloading services in next-generation cellular networks, device-to-device (D2D) communication was proposed to enable user equipments (UEs) to communicate directly over the D2D links in addition to traditional cellular operation by base stations (BSs), which is capable of utilizing the available c...
Chapter
Full-text available
Cloud computing is synonymous with outsourced data center management and agile solution architecture that improves the scalability for delivery of services for enterprises. It has the capability to revolutionize how data is delivered from commodity to Information Technology as a service. At its core, Cloud computing is a new approach to distributed...
Article
Full-text available
Vehicular Ad-hoc Networks (VANETs) are seen as the key enabling technology of Intelligent Transportation Systems (ITS). In addition to safety, VANETs also provide a cost-effective platform for numerous comfort and entertainment applications. A pragmatic solution of VANETs requires synergistic efforts in multidisciplinary areas of communication stan...
Article
The availability of 3G and 4G technologies coupled with tablet PCs and smart phones makes the communication and learning system easier. In engineering education, these sophisticated technologies can bring immense advantages to the methods of delivering and acquiring knowledge. In this paper, we focus on facilities of a smart class environment for e...