Mohammad S. Obaidat's research while affiliated with University of Texas of the Permian Basin and other places

Publications (800)

Poster
Full-text available
A two days International Conference on “Artificial Intelligence and Sustainable Computing for Smart Cities (AIS2C2)” is proposed to be held on 21-22 December 2022 in the University School of Information and Communication Technology. AIS2C2 is to endeavour the participants with the recent research being carried out across the AI Technologies and Sus...
Article
Recent advancements in intelligent surveillance systems for video analysis have been a topic of great interest in the research community due to the vast number of applications to monitor humans’ activities. The growing demand for these systems aims towards automatic violence detection (VD) systems enhancing and comforting human lives through artifi...
Article
In recent days, providing data security over cloud is a complicated process. There are many research works that are developed for authentication based data security over cloud, using cryptographic methods. In contrast, physical rules are used for encrypting data. When the quantum models are appeared, it is called quantum cryptography. And, the key...
Article
Full-text available
In recent years, online education systems (OES) are improved tremendously with the development of information communication technology. Also, OES provides the opportunity for the learners to predict and access the learning resources using Internet-of-Things (IoT) devices and it provides learning flexibility through the various artificial intelligen...
Conference Paper
—Swift evolution of novel computing and communi�cation technologies in beyond 5G networks (B5G) opens up the possibilities for advanced techniques to tackle various issues, which can not be solved by the existing frameworks. As the number of devices continuously increases, blockchain can provide a secure platform for communication among all the use...
Conference Paper
Metaverse allows users a seamless and immersive integration of real-world three-dimensional (3D) objects with virtual worlds. Smart healthcare has transitioned towards health-care 5.0, which allows ambient tracking of patients, emotive telemedicine, telesurgery, wellness monitoring, virtual clinics, and personalized care. Thus, the metaverse is a p...
Conference Paper
In modern smart communities, decentralized ride-sharing (RS) via cab aggregator (CA) services allow users to share trips at reduced expenses, and also help in mitigating congestion. The cab user (CU), and cab driver (CD) share sensitive information (credentials, account linkages, and location information) via open channels over CAs distributed serv...
Article
Learning simulators from data using deep learning methods is a popular research area in simulation modeling. We proposed a general data-driven Lagrangian fluid prediction model to solve the problem of low accuracy in long series prediction and improve the network’s generalization. Although the model based on multi-layer shared perceptron has a simp...
Article
Full-text available
With the advancement of information technology and the reduction of costs, the application of unmanned aerial vehicle (UAV) has gradually expanded from the military field to the industrial field and civilian field. It brings great convenience to people in surveillance, detection, transportation, emergency rescue etc. However, UAVs usually work in h...
Article
Wireless networks ensure the unmanned aerial vehicles (UAVs) communicate and cooperate with each other, which plays an indispensable role among UAVs. The two crucial challenges in UAV wireless networks are energy saving and security. The current lightweight communication approaches lead to insufficient robustness of the encrypted transmission that...
Article
Full-text available
Information and communication technology (ICT) can add appealing attributes such as transparency, energy conservation, cost reduction, reliability, and efficiency to the traditional power grid. The addition of these attributes is possible due to the concept of a smart grid (SG). However, ICT applications engender new access control challenges. Ther...
Article
The ubiquitous and fine-grained features of WiFi signals make it promising for realizing contactless authentication. Existing methods, though yielding reasonably good performance in certain cases, are suffering from two major drawbacks: sensitivity to environmental dynamics and over-dependence on certain activities. Thus, the challenge of solving s...
Article
Full-text available
In recent years, the rapid development of computer vision makes it possible for mobile robots to be more intelligent. Among the related technologies, the visual SLAM system allows the mobile robot to locate itself, build the map, and provide a navigation strategy to execute follow-up tasks, such as searching for objects in unknown environment accor...
Conference Paper
As industry 4.0 is more focused on the digital transformation of industries, various industrialists (including both the private and public sectors) want to increase their brand values, in order to reach the maximum number of peoples. To achieve this, most of them using online platforms including social media. Presently, various companies such as Fl...
Article
Monitoring of cities based on different air pollutants is required to manage the quality of air. The worldwide ranking is based on the one air pollutant PM2.5. The main purpose of the work is to find the worst air polluted city in India based on multiple pollutants. A hybrid framework namely “Analytic Hierarchy Process-Combinative Distance-Based As...
Article
Full-text available
Real-time communication is a significant aspect of Internet of Things (IoT). IoT-enabled devices requires the immediate adoption of the highly distributed and heterogeneous framework of collateral merits. Moreover, cloud-based streaming services for IoT have disadvantages such as the inability to provide low latency, mobility support, location-awar...
Article
Cloud storage services need cost-effective, independent, and scalable functionality to manage data. Cloud repositories provide an opportunity to manage and access essential data conveniently. This article proposes a secure authentication protocol to resolve these issues. To add a convenient sharing of data controlled by a data delegator, we use sym...
Article
The complicated multi-step attacks, such as Advanced Persistent Threats (APTs), have brought considerable threats to cybersecurity because they are naturally varied and complex. Therefore, studying the strategies of adversaries and making predictions are still significant challenges for attack preventions. To address these problems, we propose Deep...
Article
Wireless body area networks (WBANs) are a vital application of the internet of things (IoT) that plays a significant role in gathering a patient's healthcare information. This collected data helps special professionals like doctors or physicians analyze patients' health status to cure different diseases. However, collecting such information from an...
Article
Full-text available
The prediction of abnormality in the heart functionality at an early stage increases the chances of saving the life of people. Thus, this paper proposes a technique which predicts the abnormality in the functionality of the heart using heart rate in the form of beats per minute using wearable devices and deep learning model. The devices used are wr...
Article
Instance segmentation exploits the potential of Internet of Things (IoT) devices to perceive environmental semantic information and achieve complex interactions with the physical world. However, IoT devices usually have limited computing and storage resources and cannot afford the intensive computational costs of instance segmentation networks. Thi...
Conference Paper
Device-to-device (D2D) communication has become a forefront technology to deal with the escalating demand for wireless network traffic. It allows devices in proximity to transmit data directly without the intervention of the base station for both uplink and downlink procedures. Devices in D2D communication can communicate either in underlay or over...
Article
The computing and storage resources of an edge node in a mobile edge computing (MEC) system are limited. One edge computing node cannot cache all the services supported by the entire MEC system. A service chain caching and scheduling strategy should be designed to improve the service processing capacities of the edge computing nodes under high comp...
Chapter
Recently, there has been a lot of innovative work on cloud-based mobile networks. While distributed computing gives immense chances, it likewise forces a few difficulties. One of the difficulties that current information system administrators and future Fifth Generation (5G) wireless communication are predicting is a gigantic increment in data traf...
Article
With the rapidly growing user experience and traffic growth requirements in the Mobile Edge Computing (MEC) environment, the conventional security protocols are no longer capable of meeting the modern demand. In order to cope with this demand, novel security solution such as identity-based cryptography, which does not require complex calculations,...
Conference Paper
As a key enabling technology for pervasive computing, Opportunity Network has recently attracted a great deal of research work in machine learning domain. In this paper, we present a new opportunistic network routing strategy that tries to send messages to a destination location area rather than a single node. To improve routing in Opportunistic ne...
Conference Paper
Full-text available
The upcoming industry is continuously changing, and the current systems and technologies are not suitable in their present form. They need to upgrade to solve the complex problems that are faced by the different applications. The healthcare industry is one of them. In the current healthcare industries, the patient’s information is stored in the cen...
Article
An automatic identification system (AIS) provides significant improvements in traffic monitoring, collision avoidance, and ship assistance. A unique Maritime Mobile Service Identity (MMSI) is used by the AIS transceiver to identify the specific ship. However, an attacker can easily forge and tamper with unique MMSI. Also, the AIS transceiver sends...
Conference Paper
Classihcatio n of soil is crucial for the agricultural domain as it is an essential task in geology and engineering domains. Various procedures are proposed to classify soil types in the literature, but many of them consumed much time or required specially designed equipments/applications. Classification of soil involves the accounting of various f...
Conference Paper
As digital content transmission through the internet is convenient and quick, so the outspread of digital content is very high. However, along with this incredible speed and ease, current communication technologies and computers have also brought with them plenty of digital rights management complications. Digital Rights Management Systems are desi...
Preprint
Cloud Computing is an eminent and reputable agenda which relies on large-scale distributed processing to provide access to their resources and services. In the cloud environment a rigorous management system is mandatory to collect all information regarding task processing levels and proving impartial resource provisioning through the levels of Qual...
Conference Paper
Machine-to-machine and device-to-device communications are very common in the era of the Internet of things (IoT). In 5G-enabled IoT, massive machine type communication and enhanced Mobile broadband are two supporting protocols ensuring communication among a large number of devices. On the other side, for human-to-machine communication, end-to-end...
Conference Paper
AI is the most looked-up technology with a diverse range of applications across all the fields, whether it is intelligent transportation systems (ITS), medicine, healthcare, military operations, or others. One such application is autonomous vehicles (AVs), which come under the category of AI in ITS. Vehicular ad-hoc networks (VANET) make communicat...
Article
Full-text available
The salient events recognition of soccer matches in next-generation Internet of things (Nx-IoT) environment aims to analyze the performance of players/teams by the sports analytics and managerial staff. The embedded Nx-IoT devices carried by the soccer players during the match capture and transmit data to an Artificial Intelligence (AI)-assisted co...
Article
Full-text available
Retraction: “Selection of intermediate routes for secure data communication systems using graph theory application and grey wolf optimization algorithm in MANETs” by authors Subbiah Balaji, Mohammad S. Obaidat, Sriram Suthir, Manoharan Rajesh and Koneri Chandrasekaran Suresh, IET Netw. 2021;1–7. https://doi.org/10.1049/ntw2.12026. The above article...
Article
Full-text available
Retraction: “Comparative analysis of distributive linear and nonlinear optimized spectrum sensing clustering techniques in cognitive radio network systems” by authors Ganesh Babu R, Mohammad S. Obaidat, Amudha V, Rajesh Manoharan and Sitharthan R, IET Netw. 2021;1–11. https://doi.org/10.1049/ntw2.12027. The above article, published online on 5 May...
Article
Full-text available
Obstacle trajectory prediction is a task in mobile robot dynamic obstacle avoidance. One of the most critical issues of dynamic obstacle trajectory prediction is how the robot can accurately and timely perceive and predict trajectories of all obstacles in the same scene when their motion states are different. This study presents an adaptive traject...
Article
Full-text available
Incumbent wireless technologies for futuristic fifth generation (5G) and beyond 5G (B5G) networks, such as IEEE 802.11 ax (WiFi), are vital to provide ubiquitous ultra-reliable and low-latency communication services with massively connected devices. Amalgamating WiFi networks with 5G/B5G networks has attracted strong researcher interest over the pa...
Article
In recent years, voice interaction-based control systems have attracted considerable attention for industrial control systems implementing Industrial Internet of Things (IIoT) technologies. The development of automated semantic understanding relates to the industrial Internet equipment used to realize remote voice control as well as to its intellig...
Article
The papers in this special section focus on pervasive edge computing (PEC)for industrial Internet of Things. With the development of 5G technology and intelligent terminals, computation, communication, and storage capacities of devices are largely improved. Based on that, pervasive edge computing (PEC) becomes possible, where data can be processed...
Article
Full-text available
The developments in telecommunication and online facility resolutions help to connect the digital divide among urban and rural healthcare services administrations, empowering arrangement of appropriate medicinal finding and treatment discussions. Mobile-healthcare (m-Healthcare) systems can be used for quality improvement of healthcare and monitori...
Article
Full-text available
Video surveillance has shown encouraging outcomes to monitor human activities and prevent crimes in real time. To this extent, violence detection (VD) has received substantial attention from the research community due to its vast applications, such as ensuring security over public areas and industrial settings through smart machine intelligence. Ho...
Article
Dynamic scheduling of multiworkflow in a heterogeneous distributed system has become a crucial issue in recent days due to user-defined deadlines and budget constraints. In order to settle down this problem, we present a dynamic multiworkflow deadline and budget constrained heterogeneous scheduling (DMW-HDBS) algorithm. DMW-HDBS owns some unique fe...
Conference Paper
Increased vehicular flow on roads along with proposed deployment of autonomous vehicles has necessitated the need for accurate traffic forecasting so as to achieve effective route guidance, traffic management, public safety and congestion avoidance. Although a number of traffic forecasting algorithms have been proposed but most of these algorithms...
Conference Paper
The COVID-19 pandemic has adversely affected the lives of millions of people worldwide. With an alarming increase in COVID-19 cases, it is important to detect and diagnose COVID-19 in its early stages to prevent its spread. To diagnose remote patients, the Internet can be useful for accessing data of that patient. But, the Internet has also had iss...
Conference Paper
An Artificial Intelligence (AI)-enabled and blockchain-driven Electronic Health Record (EHR) maintenance system has a tremendous potential to facilitate reliable, secure, and robust storage systems for EHRs. Such an EHR system would also facilitate researchers, doctors, and government authorities to access data for research, perform analytics, and...
Article
Anonymous authentication is an important step to protect vehicular privacy and security in VANETs. In order to improve the efficiency of authentication for vehicles in multiple security domains, VANETs integrated with blockchain have attracted extensive attention. However, the existing blockchain based authentication schemes cannot effectively achi...
Article
As one of the main social issues in the 21st century, urban traffic congestion has become a severe challenge, especially during rush hours. Investigation indicates relationships between school-trip commutes, i.e., students’ trips to and from school, and traffic congestion. Therefore, optimizing traffic in terms of the school-trip commute is conside...
Article
Media access control (MAC) plays a pivotal role in ensuring proper operation in wireless body area networks (WBANs). However, current solutions still cannot satisfy multiple requirements of such networks. In this article, we propose a priority ladders-based resource scheduling (PLRS) scheme to satisfy these requirements. First, we design a multiple...
Article
CCTV cameras installed for continuous surveillance generate enormous amounts of data daily, forging the term Big Video Data (BVD). The active practice of BVD includes intelligent surveillance and activity recognition, among other challenging tasks. To efficiently address these tasks, the computer vision research community has provided monitoring sy...
Article
Voting is a formal expression of opinion or choice, either positive or negative, made by an individual or a group of individuals. However, conventional voting systems tend to be centralized, which are known to suffer from security and efficiency limitations. Hence, there has been a trend of moving to decentralized voting systems, such as those base...