Fadi Al-Turjman’s research while affiliated with University of Kyrenia and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (563)


Connecting AI and Blockchain to Improve Security of Financial Services
  • Chapter

November 2024

·

3 Reads

·

Diletta Cacciagrano

·

Fadi Al-Turjman


Fig. 1. Constellation plot for two users (BPSK, QPSK) NOMA system.
Probability of Error Analysis for NOMA Systems in Rayleigh Fading Channels: Enabling IoT in Civil Engineering
  • Preprint
  • File available

November 2024

·

8 Reads

In the realm of digital communication, understanding and mitigating the probability of error is crucial, particularly in Rayleigh fading channels where signal impairments are common. This paper presents a unified approach to derive the probability of error formulations for two-users NOMA systems operating in Rayleigh fading channels. The methodologies and findings outlined in this study are essential for IoT applications in construction and civil engineering. Specifically, the derived error probability formulations can be employed to enhance the reliability and efficiency of IoT-based monitoring systems in these sectors. By optimizing communication protocols, the proposed approach ensures accurate data transmission, thereby facilitating real-time monitoring and decision-making processes in construction sites and civil infrastructure projects.

Download


The Internet of Things, Automation in the Future, and Security Protocols for the Smart Grid Framework

October 2024

·

2 Reads

The smart grid's mix of automation, the Internet of Things (IoT), and robust security measures is reshaping the landscape of energy management. This abstract provides a quick summary of the key components and implications of this innovative approach. Automation, monitoring, and management of energy resources in real time are made possible by the smart grid framework, which increases overall efficiency and system responsiveness. A network of linked sensors and equipment can transmit and analyze data more readily by using the Internet of Things, which makes it possible to provide predictive maintenance, demand forecasting, and a strong energy infrastructure. However, the interconnection of the smart grid necessitates stringent security measures to prevent assaults.


Mobile Cloud Computing and the Internet of Things Security and Privacy

October 2024

·

7 Reads

·

2 Citations

Security and privacy are critical factors in the rapidly emerging fields of mobile cloud computing and the Internet of Things (IoT). Because mobile devices are so widely used and IoT devices are becoming ingrained in many aspects of our life, it is increasingly imperative to protect sensitive data and respect user privacy. This abstract looks at the challenges, solutions, and technology surrounding security and privacy in the context of mobile cloud computing and the Internet of Things. Data protection at all stages of life, from processing and transmission to storage and retrieval, is one of the core concerns in this field. Data encryption techniques are crucial for shielding confidential information from unauthorized access or interception. Access control systems control user permissions and stop unauthorized access to resources, while robust identity management approaches guarantee the identities of people and devices.


Smart Grid Environment, Data Security in the Internet of Things, and Supply Chain Ecosystem Transformation

October 2024

·

4 Reads

The supply chain ecosystem is undergoing a significant shift in today's business environment, mostly due to the adoption of smart grids and the integration of cutting-edge technologies like the Internet of Things (IoT). Unprecedented prospects for improved efficiency, real-time monitoring, and data-driven decision-making are presented by this paradigm change. But even in the middle of these developments, data security becomes an increasingly important issue. This study examines the various facets of the change of the supply chain ecosystem in the context of the Internet of Things and the smart grid, with a particular emphasis on the difficulties and solutions pertaining to data security. The smart grid and supply chain operations' integration of IoT devices create several weak points that are open to cyberattacks, underscoring the necessity of putting strong security measures in place as soon as possible.




An Overview of Long-Distance Optical Fiber Communication

October 2024

Journal of Biomedical Research & Environmental Sciences

Long-distance optical fiber communication is a crucial technology enabling high-speed data transmission over vast distances. Utilizing light waves to transmit information, this technology offers significant advantages, including high bandwidth, low attenuation, and minimal interference compared to traditional copper-based communication systems. Optical fibers can transmit data over thousands of kilometers with the help of signal amplification through repeaters and advanced modulation techniques. Innovations such as Wavelength-Division Multiplexing (WDM) allow multiple data channels to travel simultaneously over a single fiber, significantly increasing the data capacity. This paper discusses the fundamental principles of optical fiber communication, key technologies such as lasers, optical amplifiers, and photodetectors, and recent advancements in improving efficiency, speed, and distance. The challenges associated with long-distance optical communication, including signal degradation, dispersion, and noise, are also explored, along with emerging solutions to address these issues.


Citations (26)


... Intellectual Property (IP) Theft The pharmaceutical companies have been able to attract high value investors due to the production of drugs and disease research. Drug research and development for instance, takes a lot of time ranging from one year to ten or 15 years as it requires a lot of data analysis, clinical experiments and trials, as well as pilot studies to determine the effects of the drugs to the general users [26]. This means that there is a lot of information and data in circulation for any given drug development procedure. ...

Reference:

Artificial Intelligence: Cybersecurity Threats in Pharmaceutical
Future uses of AI and blockchain technology in the global value chain and cybersecurity
  • Citing Chapter
  • June 2024

... Several studies have proposed methods to address the UC problem, emphasizing the minimization of operational costs. In [14], a combination of whale optimization algorithm (WOA), differential evolution (DE), and genetic algorithm (GA) aimed at finding a balanced solution between cost minimization and emission reduction while adhering to system and unit constraints. This study overcomes the complex UC problem with emphasizing the minimization of operational costs and emissions due to increasing concerns about environmental impacts from power generation. ...

A hybrid evolutionary approach for multi-objective unit commitment problem in power systems
  • Citing Article
  • June 2024

Energy Reports

... Ransomware attacks have surged in recent years, with hospitals often forced to pay ransoms to restore access to their systems, leading to service disruptions that compromise patient safety (Salama et al., 2024). Data breaches expose organizations to significant financial loss, legal liabilities, and reputational damage (Ayaad et al., 2022). ...

Healthcare cybersecurity challenges: a look at current and future trends
  • Citing Chapter
  • January 2024

... AI is progressively transforming the medical surroundings by automating administrative tasks that aid evaluation, facilitating based on proof healthcare decisions, and recommending suitable remedies via the rapid analysis of extensive health data. The use of AI in medical settings has shown enhancements in the health of patients and the welfare of healthcare staff [9]. Simultaneously, it is essential to acknowledge that AI-based technologies remain at an embryonic stage and therefore need that many stakeholders, including AI scientists, builders, and legislators, learn about advancements in AI. ...

A survey of issues, possibilities, and solutions for a blockchain and AI-powered Internet of things
  • Citing Chapter
  • January 2024

... Moreover, the 3D visualization capabilities of BIM have improved planning in preand post-earthquake events [49]. Furthermore, the Internet of Things (IoT) has facilitated real-time monitoring through sensors installed in buildings that provide instant data on building responses to seismic events [50]. The integration of IoT data with GNDT and RISK-UE models has enabled real-time vulnerability index updates and rapid post-earthquake assessments. ...

The role of artificial intelligence and IoT in prediction of earthquakes: Review

Artificial Intelligence in Geosciences

... Recently, researchers have become more interested in developing CAD systems that use radiographic images for the automatic identification of C-19 [21][22][23] . Abubakar et al. 24 introduced a novel approach for detecting C-19 from the CT scan images, which integrated deep learning models with the Histogram of Oriented Gradient (HOG). Using SVM, they achieved a 99.4% overall accuracy on the CT scan dataset. ...

A hybridized feature extraction for COVID-19 multi-class classification on computed tomography images

Heliyon

... For decades, the push to develop compact and efficient solid-state sources of terahertz (THz) radiation (ranging from 300 GHz to 10 THz) has been driven by the increasing demand for applications in areas such as 6 G communication and sensing technology [1][2][3]. To date the main types of compact solid-state devices for generating THz signals are divided into three categories. ...

Terahertz Communications and Sensing Overview
  • Citing Conference Paper
  • November 2023

... The integration of blockchain to IoT is given by the used of the extensive use of devices interconnected among them and the big exchange data. Blockchain can provide technology for secure communication among devices in the IoT [22]. ...

Blockchain Technology and Artificial Intelligence's Future Applications in Cyber Security
  • Citing Conference Paper
  • November 2023

... Various methods such as solar panels, wind turbines, and the harnessing of kinetic energy from moving individuals or objects are employed to achieve this objective. Additionally, the incorporation of artificial intelligence (AI) and machine learning technologies further amplifies the capabilities of smart cities, catalyzing their evolution towards more efficient and responsive urban environments [3]. ...

Overview of Energy Harvesting and Sustainability in Smart Cities
  • Citing Conference Paper
  • November 2023

... Once trained, we use the testing data to evaluate model performance. For assessing the performance of the compared models, relative performance parameters i.e., Accuracy, Equations (1), (2), and (3) are employed to calculate, Precision, Recall, Accuracy and F1-score from (1) and (2) [26] . Table I provides general insight into the raw, unprocessed data. ...

SegEIR-Net: A Robust Histopathology Image Analysis Framework for Accurate Breast Cancer Classification
  • Citing Article
  • February 2024