Wadood Abdul's research while affiliated with King Saud University and other places

Publications (69)

Article
Full-text available
Sign language is the main channel for hearing-impaired people to communicate with others. It is a visual language that conveys highly structured components of manual and non-manual parameters such that it needs a lot of effort to master by hearing people. Sign language recognition aims to facilitate this mastering difficulty and bridge the communic...
Article
Full-text available
In the current era of rapid technological innovation, human activity recognition (HAR) has emerged as a principal research area in the field of multimedia information retrieval. The capacity to monitor people remotely is a main determinant of HAR’s central role. Multiple gyroscope and accelerometer sensors can be used to aggregate data which can be...
Article
Full-text available
In terms of delivery effectiveness, Vehicular Adhoc NETworks (VANETs) applications have multiple, possibly conflicting, and disparate needs (e.g., latency, reliability, and delivery priorities). Named Data Networking (NDN) has attracted the attention of the research community for effective content retrieval and dissemination in mobile environments...
Article
Bio-inspired deep learning models have revolutionized sign language classification, achieving extraordinary accuracy and human-like video understanding. Recognition and classification of sign language videos in real-time are challenging because the duration and speed of each sign vary for different subjects, the background of videos is dynamic in m...
Article
Full-text available
The brain-computer interface (BCI) is an emerging technology that has the potential to revolutionize the world, with numerous applications ranging from healthcare to human augmentation. Electroencephalogram (EEG) motor imagery (MI) is among the most common BCI paradigms that has been used extensively in smart healthcare applications such as post-st...
Article
Motor imagery electroencephalography (MI-EEG) signals are generated when a person imagines a task without actually performing it. In recent studies, MI-EEG has been used in the rehabilitation process of paralyzed patients, therefore, decoding MI-EEG signals accurately is an important task, and it is difficult task due to the low signal-to-noise rat...
Article
Full-text available
Due to the rapid developments in technology and the sudden expansion of social media use, Dialect Arabic has become an important source of data that needs to be addressed when building Arabic corpora. In this paper, thirty-three Arabic corpora are surveyed to show that despite all of the developments in the literature, Saudi dialect (SD) corpora st...
Conference Paper
Deep Learning based models have revolutionized EEG decoding attaining better performance than techniques using handcrafted features. Decoding and recognizing motor imagery signals accurately has always been a challenging task as these have been used in BCI for various critical applications like assisting stroke patients, controlling robotic arms, e...
Article
Full-text available
Effort estimation is the most critical activity for the success of overall solution delivery in software engineering projects. In this context, the paper’s main contributions to the literature on software effort estimation are twofold. First, this paper examines the application of meta-heuristic algorithms to have a logical and acceptable parametri...
Article
Full-text available
Human activity recognition (HAR) remains a challenging yet crucial problem to address in computer vision. HAR is primarily intended to be used with other technologies, such as the Internet of Things, to assist in healthcare and eldercare. With the development of deep learning, automatic high-level feature extraction has become a possibility and has...
Article
Full-text available
Image authentication is an important field that employs many different approaches and has several significant applications. In the proposed approach, we used a combination of two techniques to achieve authentication. Image watermarking is one of the techniques that has been used in many studies but the authentication field still needs to be studied...
Article
Full-text available
Biometric template disclosure starts gaining an important concern in deploying practical biometric authentication systems, where an assailant compromises the database for illegitimate access. To protect biometric templates from disclosure attacks, biometric authentication systems should meet these four requirements: security, diversity, revocabilit...
Article
Full-text available
Hand gesture recognition is an attractive research field with a wide range of applications, including video games and telesurgery techniques. Another important application of hand gesture recognition is the translation of sign language, which is a complicated structured form of hand gestures. In sign language, the fingers’ configuration, the hand’s...
Article
Full-text available
Due to the increasing number of cars and the difficulty to find vacant parking spots easily, the smart parking system is essential to save time and efforts of drivers and to protect the environment from emissions and air pollution. Wireless sensor networks used in smart parking systems consists of a number of sensors to monitor the events or change...
Article
Full-text available
Network function virtualization (NFV) and software-defined networking (SDN) are two technologies that have emerged to reduce capital and operational costs, and to simplify network management. In this paper, we propose an SDN-based system that provisions virtual network functions (VNFs) to minimize round trip time (RTT) delay and synchronization del...
Article
Full-text available
Recently, automatic hand gesture recognition has gained increasing importance for two principal reasons: the growth of the deaf and hearing-impaired population, and the development of vision-based applications and touchless control on ubiquitous devices. As hand gesture recognition is at the core of sign language analysis a robust hand gesture reco...
Article
There are a number of issues related to the development of biometric authentication systems, such as privacy breach, consequential security and biometric template storage. Thus, the current paper aims to address these issues through the hybrid approach of watermarking with biometric encryption. A multimodal biometric template protection approach wi...
Article
Automatic hand gesture recognition is the most important part of sign language translation. Its importance increases with the growth of deaf and hard of hearing population and cognitive computing. In this article, we propose an efficient system for automatic hand gesture recognition based on deep learning. The proposed system is based on a convolut...
Article
This paper discusses region based segmentation techniques for digital images. For a few applications, such as image compression or recognition, we cannot handle the entire picture straightforwardly as it is unconventional and inefficient. Due to these reasons, many algorithms related to image segmentation are proposed in the literature to divide an...
Conference Paper
This paper provides a multimodal biometric watermarking algorithm to protect and well authenticate biometric data. It uses the DTCWT-DCT as a combination of two domain transform techniques to fuse face and fingerprint modalities. Two pseudorandom sequences are used to embed the bits of the quantized spectral minutiae representation used as a waterm...
Article
Full-text available
The LoRa (Long Range) defines the physical layer modulation technique that offers a longer range communication link than other challenging technologies, while LoRaWAN is the communication protocol for the network defined by data link (MAC) protocol and its system architecture. LoRaWAN is designed to optimize a Long Range Low Power Wide Area Network...
Article
Full-text available
Exergames platform can be more appealing to the users if they can interact with emotion. Therefore, in this paper, we propose an automatic emotion recognition system from speech to be embedded in the Exergames platform. While playing and doing exercise, the user expresses his or her feeling by uttering some phrases. The speech is recorded by an omn...
Conference Paper
Health information is critical for the patient and its unauthorized access may have server impact. With the advancement in the healthcare systems especially through the Internet of Things give rises to patient privacy. We developed a healthcare system that protects identity of patients using innovative zero-watermarking algorithm along with vocal f...
Article
Full-text available
Microgrid is a community-based power generation and distribution system that interconnects smart homes with renewable energy sources (RESs). Microgrid efficiently and economically generates power for electricity consumers and operates in both islanded and grid-connected modes. In this study, we proposed optimization schemes for reducing electricity...
Article
Full-text available
Demand side management (DSM) is one of the most challenging areas in smart grids, which provides multiple opportunities for residents to minimize electricity cost. In this work, we propose a DSM scheme for electricity expenses and peak to average ratio (PAR) reduction using two well-known heuristic approaches: the cuckoo search algorithm (CSA) and...
Article
Full-text available
Demand side management (DSM) is one of the most challenging areas in smart grids, which provides multiple opportunities for residents to minimize electricity cost. In this work, we propose a DSM scheme for electricity expenses and peak to average ratio (PAR) reduction using two well-known heuristic approaches: the cuckoo search algorithm (CSA) and...
Article
Full-text available
In health sector, trust is considered important because it indirectly influences the quality of health care through patient satisfaction, adherence and the continuity of its relationship with health care professionals and the promotion of accurate and timely diagnoses. One of the important requirements of TRSs in the health sector is rating secrecy...
Data
Badmouthing experiment datasheet. (XLSX)
Data
Ballot-stuffing experiment datasheet. (XLSX)
Article
Full-text available
Trust is a salient feature in the context of health care, which is characterized by uncertainty and an element of risk. It is a fundamental requirement for the acceptance and adoption of new services related to health care. Soft trust, based on social control mechanisms, has yielded to evidence-based trust management, where the level of trust is ex...
Article
Full-text available
Regression testing aims at testing a system under test (SUT) in the presence of changes. As a SUT changes, the number of test cases increases to handle the modifications, and ultimately, it becomes practically impossible to execute all of them within limited testing budget. Test Suite Reduction (TSR) approaches are widely used to improve the regres...
Article
Full-text available
With the emergence of automated environments, energy demand by consumers is increasing rapidly. More than 80% of total electricity is being consumed in the residential sector. This brings a challenging task of maintaining the balance between demand and generation of electric power. In order to meet such challenges, a traditional grid is renovated b...
Article
This work proposes a residue number system (RNS) based hardware architecture of an elliptic curve cryptography (ECC) processor over prime field. The processor computes point multiplication in Jacobian coordinates by a combined architecture of point doubling and point addition. An optimized modular reduction architecture is also presented that achie...
Article
Full-text available
In a smart grid, several optimization techniques have been developed to schedule load in the residential area. Most of these techniques aim at minimizing the energy consumption cost and the comfort of electricity consumer. Conversely, maintaining a balance between two conflicting objectives: energy consumption cost and user comfort is still a chall...
Article
The proposed chaotic visual cryptography approach for medical images allows for secure sharing of medical information in the form of digital images with only the relevant or authorized persons to access the records. We performed the experimentation on the mini-MIAS dataset of mammograms. The effectiveness of the proposed approach is achieved by gen...
Article
Healthcare and other mobile based applications require a certain level of trust, privacy and security, especially when it comes to authentication of a user, let it be a medical professional or patient. Biometric based authentication offers several advantages over other methods such as passwords and ID cards. There has been a major development and u...
Article
Full-text available
Today’s buildings are responsible for about 40% of total energy consumption and 30–40% of carbon emissions, which are key concerns for the sustainable development of any society. The excessive usage of grid energy raises sustainability issues in the face of global changes, such as climate change, population, economic growths, etc. Traditionally, th...
Article
In this paper, to monitor the fields with square and circular geometries, three energy-efficient routing protocols are proposed for underwater wireless sensor networks (UWSNs). First one is, sparsity-aware energy efficient clustering (SEEC), second one is, circular SEEC (CSEEC), and the third one is, circular depth based SEEC (CDSEEC) routing proto...
Article
Full-text available
Traditional power grid and its demand-side management (DSM) techniques are centralized and mainly focus on industrial consumers. The ignorance of residential and commercial sectors in DSM activities degrades the overall performance of a conventional grid. Therefore, the concept of DSM and demand response (DR) via residential sector makes the smart...
Article
With the innovations and increasing popularity of smart cities, video analytics (e.g., from social media, entertainment, surveillance, smart health monitoring, and crowd management) are used in a range of application domains to provide safety, security, and well-being for residents. As these video analytics are shared through highly interconnected...
Article
Full-text available
In this paper, three opportunistic pressure based routing techniques for underwater wireless sensor networks (UWSNs) are proposed. The first one is the cooperative opportunistic pressure based routing protocol (Co-Hydrocast), second technique is the improved Hydrocast (improved-Hydrocast), and third one is the cooperative improved Hydrocast (Co-imp...
Article
In this paper, we propose two schemes; position-aware mobility pattern (PAMP) and cooperative PAMP (Co PAMP). The first one is an optimization scheme that avoids void hole occurrence and minimizes the uncertainty in the position estimation of glider’s. The second one is a cooperative routing scheme that reduces the packet drop ratio by using the re...
Article
Full-text available
Demand Response (DR) programs under the umbrella of Demand Side Management (DSM) tend to involve end users in optimizing their Power Consumption (PC) patterns and offer financial incentives to shift the load at “low-priced” hours. However, users have their own preferences of anticipating the amount of consumed electricity. While installing an Energy...
Article
Full-text available
In recent years, demand side management (DSM) techniques have been designed for residential, industrial and commercial sectors. These techniques are very effective in flattening the load profile of customers in grid area networks. In this paper, a heuristic algorithms-based energy management controller is designed for a residential area in a smart...
Article
Full-text available
Mobile Sink (MS) based routing strategies have been widely investigated to prolongs the lifetime of Wireless Sensor Networks (WSNs). In this paper, we propose two schemes for data gathering in WSNs: (i) MS moves on Random paths in the network (RMS), and (ii) the trajectory of MS is Defined (DMS). In both the schemes, the network field is logically...
Article
Full-text available
In this paper, a novel routing strategy to cater the energy consumption and delay sensitivity issues in deep underwater wireless sensor networks is proposed. This strategy is named as ESDR: Event Segregation based Delay sensitive Routing. In this strategy sensed events are segregated on the basis of their criticality and, are forwarded to their res...
Conference Paper
This paper presents a spatial biometric watermarking scheme for multimodal authentication system. This method embeds the face features (watermark) into the fingerprint image (cover) via a generated secret key to locate the pixels to be watermarked while preserving the fingerprint minutia points. The face features are extracted using Orthogonal Loca...
Article
The IoT is the next generation of innovation in the smart world, which has the potential to improve safety, security, and the quality of our daily lives through pervasive communication and computation. Currently, we have observed that a plethora of interconnected smartphones, devices, and sensors are deployed for providing personalized services (e....
Article
Full-text available
Over the last decade, wearable technology has seen significant developments, making it possible to enhance our lives. One of the areas in which wearable technology can cause large changes is education, where it can be used to make educational experiences intrinsically motivating and more relevant to youth culture. In this paper, we focus on the use...
Article
This paper proposes a face recognition system based on a steerable pyramid transform (SPT) and local binary pattern (LBP) for e-Health secured login. In an e-Health framework, patients are sometimes unable to identify themselves by traditional login modalities such as username and password. Automatic face recognition can replace the conventional lo...
Article
Full-text available
With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detail. Mobile devices store enormous amounts of personal and financial information, unfortunately withou...
Article
Full-text available
An automatic gender detection may be useful in some cases of a mobile healthcare system. For example, there are some pathologies, such as vocal fold cyst, which mainly occur in female patients. If there is an automatic method for gender detection embedded into the system, it is easy for a healthcare professional to assess and prescribe appropriate...
Article
Biometric recognition has been proven to offer a reliable solution to authenticate the identity of the legitimate user. Because of the inherent nature of biometrics, which involves the practice of digitally scanning the physiological or behavioral characteristics of individuals as a means of identification, the biometric trait employed is associate...
Conference Paper
The focus of user authentication is shifting frompassword based systems to biometrics based systems. The issuewith biometrics is that they are susceptible to modifications andwhen attacked, can not be changed like a password. It is alsorequired that a biometric trait used to access one system shouldnot be used to access other systems. This paper pr...
Article
The IPv4 addressing scheme, which was proposed by IETF in 1981, provides 4.3 billion unique 32-bit IP addresses but has been fully exhausted in Feb, 2011. This exhaustion of unique IP addresses poses significant challenges to the addition of new devices to the Internet as well as offering new services. Internet of Things, which provides interconnec...
Article
Conventional steganography focuses on invisibility and undetectability, as the main concern is to make the algorithms immune to steganalysis. Zero-steg-anography is an imperceptible and undetectable data hiding technique as no change is made to the cover, hence not requiring any steganalysis. The proposed algorithm hides the payload based on certai...
Conference Paper
Biometric authentication systems have proven a priority over traditional systems like passwords. But while biometrics ensure uniqueness, they do not provide secrecy and security of the users data. Many attacks can be launched against biometric systems resulting in the reduction of these systems credibility. Specially, the attack on the biometric te...
Article
Full-text available
This article details the conception, design, development and analysis of invisible, blind and robust color image watermarking algorithms based on the wavelet transform. Using error correcting codes, the watermarking algorithms are designed to be robust against intentional or unintentional attacks such as JPEG compression, additive white Gaussian no...