41 results on '"Alhakami, Wajdi"'
Search Results
2. Adaptive control-based Isolated bi-directional converter for G2V& V2G charging with integration of the renewable energy source
- Author
-
Singirikonda, Srinivas, Obulesu, Yeddula Pedda, Kannan, Ramani, Reddy, K. Jyotheeswara, Kiran Kumar, G., Alhakami, Wajdi, Baz, Abdullah, and Alhakami, Hosam
- Published
- 2022
- Full Text
- View/download PDF
3. A novel trust-based security and privacy model for Internet of Vehicles using encryption and steganography
- Author
-
Rathore, Manjari Singh, Poongodi, M., Saurabh, Praneet, Lilhore, Umesh Kumar, Bourouis, Sami, Alhakami, Wajdi, Osamor, Jude, and Hamdi, Mounir
- Published
- 2022
- Full Text
- View/download PDF
4. A Novel Secured Multi-Access Edge Computing based VANET with Neuro fuzzy systems based Blockchain Framework
- Author
-
M., Poongodi, Bourouis, Sami, Ahmed, Ahmed Najat, M., Vijayaragavan, K.G.S., Venkatesan, Alhakami, Wajdi, and Hamdi, Mounir
- Published
- 2022
- Full Text
- View/download PDF
5. P-STORE: Extension of STORE Methodology to Elicit Privacy Requirements
- Author
-
Ansari, Md Tarique Jamal, Baz, Abdullah, Alhakami, Hosam, Alhakami, Wajdi, Kumar, Rajeev, and Khan, Raees Ahmad
- Published
- 2021
- Full Text
- View/download PDF
6. A hybrid fuzzy rule-based multi-criteria framework for sustainable-security assessment of web application
- Author
-
Kumar, Rajeev, Baz, Abdullah, Alhakami, Hosam, Alhakami, Wajdi, Agrawal, Alka, and Khan, Raees Ahmad
- Published
- 2021
- Full Text
- View/download PDF
7. Enhanced Harris Hawks optimization as a feature selection for the prediction of student performance
- Author
-
Turabieh, Hamza, Azwari, Sana Al, Rokaya, Mahmoud, Alosaimi, Wael, Alharbi, Abdullah, Alhakami, Wajdi, and Alnfiai, Mrim
- Published
- 2021
- Full Text
- View/download PDF
8. Inpainting forgery detection using hybrid generative/discriminative approach based on bounded generalized Gaussian mixture model
- Author
-
Alharbi, Abdullah, Alhakami, Wajdi, Bourouis, Sami, Najar, Fatma, and Bouguila, Nizar
- Published
- 2019
- Full Text
- View/download PDF
9. Evaluating modern intrusion detection methods in the face of Gen V multi-vector attacks with fuzzy AHP-TOPSIS.
- Author
-
Alhakami, Wajdi
- Subjects
- *
ANALYTIC hierarchy process , *CYBERTERRORISM , *TOPSIS method , *BEHAVIORAL assessment , *SYSTEMS design - Abstract
The persistent evolution of cyber threats has given rise to Gen V Multi-Vector Attacks, complex and sophisticated strategies that challenge traditional security measures. This research provides a complete investigation of recent intrusion detection systems designed to mitigate the consequences of Gen V Multi-Vector Attacks. Using the Fuzzy Analytic Hierarchy Process (AHP) and the Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS), we evaluate the efficacy of several different intrusion detection techniques in adjusting to the dynamic nature of sophisticated cyber threats. The study offers an integrated analysis, taking into account criteria such as detection accuracy, adaptability, scalability, resource effect, response time, and automation. Fuzzy AHP is employed to establish priority weights for each factor, reflecting the nuanced nature of security assessments. Subsequently, TOPSIS is employed to rank the intrusion detection methods based on their overall performance. Our findings highlight the importance of behavioral analysis, threat intelligence integration, and dynamic threat modeling in enhancing detection accuracy and adaptability. Furthermore, considerations of resource impact, scalability, and efficient response mechanisms are crucial for sustaining effective defense against Gen V Multi-Vector Attacks. The integrated approach of Fuzzy AHP and TOPSIS presents a strong and adaptable strategy for decision-makers to manage the difficulties of evaluating intrusion detection techniques. This study adds to the ongoing discussion about cybersecurity by providing insights on the positive and negative aspects of existing intrusion detection systems in the context of developing cyber threats. The findings help organizations choose and execute intrusion detection technologies that are not only effective against existing attacks, but also adaptive to future concerns provided by Gen V Multi-Vector Attacks. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
10. Enhancing Cybersecurity Competency in the Kingdom of Saudi Arabia: A Fuzzy Decision-Making Approach.
- Author
-
Alhakami, Wajdi
- Abstract
The Kingdom of Saudi Arabia (KSA) has achieved significant milestones in cybersecurity. KSA has maintained solid regulatorymechanisms to prevent, trace, and punish offenders to protect the interests of both individual users and organizations from the online threats of data poaching and pilferage. The widespread usage of Information Technology (IT) and IT Enable Services (ITES) reinforces security measures. The constantly evolving cyber threats are a topic that is generating a lot of discussion. In this league, the present article enlists a broad perspective on how cybercrime is developing in KSA at present and also takes a look at some of themost significant attacks that have taken place in the region. The existing legislative framework and measures in the KSA are geared toward deterring criminal activity online. Different competency models have been devised to address the necessary cybercrime competencies in this context. The research specialists in this domain can benefit more by developing a master competency level for achieving optimum security. To address this research query, the present assessment uses the Fuzzy Decision-Making Trial and Evaluation Laboratory (Fuzzy-DMTAEL), Fuzzy Analytic Hierarchy Process (F.AHP), and Fuzzy TOPSIS methodology to achieve segment-wise competency development in cybersecurity policy. The similarities and differences between the three methods are also discussed. This cyber security analysis determined that the National Cyber Security Centre got the highest priority. The study concludes by perusing the challenges that still need to be examined and resolved in effectuating more credible and efficacious online security mechanisms to offer a more empowered ITES-driven economy for Saudi Arabia. Moreover, cybersecurity specialists and policy makers need to collate their efforts to protect the country's digital assets in the era of overt and covert cyber warfare. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
11. Inpainting forgery detection using hybrid generative/discriminative approach based on bounded generalized Gaussian mixture model.
- Author
-
Alharbi, Abdullah, Alhakami, Wajdi, Bourouis, Sami, Najar, Fatma, and Bouguila, Nizar
- Subjects
GAUSSIAN mixture models ,FORGERY ,INPAINTING ,SUPPORT vector machines ,DIGITAL images - Abstract
We propose in this paper a novel reliable detection method to recognize forged inpainting images. Detecting potential forgeries and authenticating the content of digital images is extremely challenging and important for many applications. The proposed approach involves developing new probabilistic support vector machines (SVMs) kernels from a flexible generative statistical model named "bounded generalized Gaussian mixture model". The developed learning framework has the advantage to combine properly the benefits of both discriminative and generative models and to include prior knowledge about the nature of data. It can effectively recognize if an image is a tampered one and also to identify both forged and authentic images. The obtained results confirmed that the developed framework has good performance under numerous inpainted images. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
12. A Smart Card-Based Two-Factor Mutual Authentication Scheme for Efficient Deployment of an IoT-Based Telecare Medical Information System.
- Author
-
Khan, Muhammad Asghar, Alhakami, Hosam, Alhakami, Wajdi, Shvetsov, Alexey V., and Ullah, Insaf
- Subjects
INFORMATION storage & retrieval systems ,MULTI-factor authentication ,INTERNET of things ,ELLIPTIC curves ,INFORMATION sharing ,MEDICAL records - Abstract
The integration of the Internet of Things (IoT) and the telecare medical information system (TMIS) enables patients to receive timely and convenient healthcare services regardless of their location or time zone. Since the Internet serves as the key hub for connection and data sharing, its open nature presents security and privacy concerns and should be considered when integrating this technology into the current global healthcare system. Cybercriminals target the TMIS because it holds a lot of sensitive patient data, including medical records, personal information, and financial information. As a result, when developing a trustworthy TMIS, strict security procedures are required to deal with these concerns. Several researchers have proposed smart card-based mutual authentication methods to prevent such security attacks, indicating that this will be the preferred method for TMIS security with the IoT. In the existing literature, such methods are typically developed using computationally expensive procedures, such as bilinear pairing, elliptic curve operations, etc., which are unsuitable for biomedical devices with limited resources. Using the concept of hyperelliptic curve cryptography (HECC), we propose a new solution: a smart card-based two-factor mutual authentication scheme. In this new scheme, HECC's finest properties, such as compact parameters and key sizes, are utilized to enhance the real-time performance of an IoT-based TMIS system. The results of a security analysis indicate that the newly contributed scheme is resistant to a wide variety of cryptographic attacks. A comparison of computation and communication costs demonstrates that the proposed scheme is more cost-effective than existing schemes. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
13. Advancing Sustainable Healthcare through Enhanced Therapeutic Communication with Elderly Patients in the Kingdom of Saudi Arabia.
- Author
-
Alhakami, Hosam, Alsubait, Tahani, Alhakami, Wajdi, Alhakami, Hatim, Alhakami, Rushdi, Alhakami, Mohammed, Khan, Raees Ahmad, and Ansari, Md Tarique Jamal
- Abstract
Effective communication in nursing, particularly with older patients, is critical to providing high-quality care. The purpose of this research is to fill key gaps in the existing literature by emphasizing the importance of therapeutic communication in the setting of mental nursing care for elderly patients in Saudi Arabia. Building on the study's foundation, which recognizes the various issues faced by cultural, religious, and linguistic diversity, this research adopted a rigorous research methodology incorporating a broad group of senior healthcare professionals as experts. We analyze various therapeutic communication approaches used by mental health nurses using extensive surveys and observations. This empirical study's findings are likely to make a significant addition to the field by throwing light on the most efficient methods for improving nurse–elderly-patient communication. The study identifies Simulation-Based Training as the most viable technique, with potentially far-reaching implications for improving care for older patients in Saudi Arabia. This study paves the way for significant advances in healthcare practices, with a focus on mental health nursing, ultimately helping both nurses and elderly patients by developing trust, understanding, and increased communication. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
14. SVM‐based generative adverserial networks for federated learning and edge computing attack model and outpoising.
- Author
-
Manoharan, Poongodi, Walia, Ranjan, Iwendi, Celestine, Ahanger, Tariq Ahamed, Suganthi, S. T., Kamruzzaman, M. M., Bourouis, Sami, Alhakami, Wajdi, and Hamdi, Mounir
- Subjects
MACHINE learning ,DEEP learning ,EDGE computing ,BILEVEL programming ,GENERATIVE adversarial networks ,POISONS - Abstract
Machine learning are vulnerable to the threats. The Intruders can utilize the malicious nature of the nodes to attack the training dataset to worsen the process and manipulate the learning and make the over all system with less efficiency and performance. The optimized poison attack procedures are already introduced to estimate the overall bad scenario, design the intrusion as bi‐level optimization and it is considered computational complexity is high and demanding, in contrary the applicability is limited such models deep neural networks. In this research papers, we have proposed, novel proposed system, poisoning attacks against the Machine learning training dataset, including the genuine data points that reduce the accuracy of the classifier in the process of training. The proposed system have 3 components of Generative Adverserial networks (GAN) generator, discriminator, and the target classifier. The proposed system allows to detect the vulnerability easy and it can be found as similar as realistic attacks to detect the area where the underlying data distribution have more possibility of poising attack which cause vulnerability to the network. Our experimentation, proves the claim our that the proposed model is effective on compromising the classifiers uses the machine learning algorithms and also deep learning networks. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
15. Corrigendum to “A novel trust-based security and privacy model for Internet of Vehicles using encryption and steganography” CAEE, Volume 102, September 2022, 108205
- Author
-
Rathore, Manjari Singh, Poongodi, M., Saurabh, Praneet, Lilhore, Umesh Kumar, Bourouis, Sami, Alhakami, Wajdi, Osamor, Jude, and Hamdi, Mounir
- Published
- 2022
- Full Text
- View/download PDF
16. Evaluating Intelligent Methods for Detecting COVID-19 Fake News on Social Media Platforms.
- Author
-
Alhakami, Hosam, Alhakami, Wajdi, Baz, Abdullah, Faizan, Mohd, Khan, Mohd Waris, and Agrawal, Alka
- Subjects
FAKE news ,COVID-19 ,DEEP learning ,SARS-CoV-2 ,MACHINE learning ,SOCIAL media - Abstract
The advent of Internet-based technology has made daily life much easy than earlier days. The exponential rise in the popularity of social media platforms has not only connected people from faraway places, but has also increased communication among humans. However, in several instances, social media platforms have also been utilized for unethical and criminal activities. The propagation of fake news on social media during the ongoing COVID-19 pandemic has deteriorated the mental and physical health of people. Therefore, to control the flow of fake news regarding the novel coronavirus, several studies have been undertaken to automatically detect the fake news about COVID-19 using various intelligent techniques. However, different studies have shown different results on the performance of the predicting models. In this paper, we have evaluated several machine learning and deep learning models for the automatic detection of fake news regarding COVID-19. The experiments were carried out on two publicly available datasets, and the results were assessed using several evaluation metrics. The traditional machine learning models produced better results than the deep learning models in predicting fake news. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
17. Computational Study of Security Risk Evaluation in Energy Management and Control Systems Based on a Fuzzy MCDM Method.
- Author
-
Alhakami, Wajdi
- Subjects
FUZZY control systems ,DENIAL of service attacks ,ENERGY management ,MULTIPLE criteria decision making ,RISK assessment ,COMPUTER network security - Abstract
Numerous cyberattacks on connected control systems are being reported every day. Such control systems are subject to hostile external attacks due to their communication system. Network security is vital because it protects sensitive information from cyber threats and preserves network operations and trustworthiness. Multiple safety solutions are implemented in strong and reliable network security plans to safeguard users and companies from spyware and cyber attacks, such as distributed denial of service attacks. A crucial component that must be conducted prior to any security implementation is a security analysis. Because cyberattack encounters in power control networks are currently limited, a comprehensive security evaluation approach for power control technology in communication networks is required. According to previous studies, the challenges of security evaluation include a power control process security assessment as well as the security level of every control phase. To address such issues, the fuzzy technique for order preference by similarity to ideal solution (TOPSIS) based on multiple criteria decision-making (MCDM) is presented for a security risk assessment of the communication networks of energy management and control systems (EMCS). The methodology focuses on quantifying the security extent in each control step; in order to value the security vulnerability variables derived by the protection analysis model, an MCDM strategy incorporated as a TOPSIS is presented. Ultimately, the example of six communication networks of a power management system is modelled to conduct the security evaluation. The outcome validates the utility of the security evaluation. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
18. A Resource-Friendly Certificateless Proxy Signcryption Scheme for Drones in Networks beyond 5G.
- Author
-
Khan, Muhammad Asghar, Alhakami, Hosam, Ullah, Insaf, Alhakami, Wajdi, Mohsan, Syed Agha Hassnain, Tariq, Usman, and Innab, Nisreen
- Published
- 2023
- Full Text
- View/download PDF
19. A Lightweight Authentication MAC Protocol for CR-WSNs.
- Author
-
Aloufi, Bashayer Othman and Alhakami, Wajdi
- Subjects
- *
WIRELESS sensor networks , *INTERNET protocols , *COGNITIVE radio , *INTERNET security , *ACCESS control - Abstract
Cognitive radio (CR) has emerged as one of the most investigated techniques in wireless networks. Research is ongoing in terms of this technology and its potential use. This technology relies on making full use of the unused spectrum to solve the problem of the spectrum shortage in wireless networks based on the excessive demand for spectrum use. While the wireless network technology node's range of applications in various sectors may have security drawbacks and issues leading to deteriorating the network, combining it with CR technology might enhance the network performance and improve its security. In order to enhance the performance of the wireless sensor networks (WSNs), a lightweight authentication medium access control (MAC) protocol for CR-WSNs that is highly compatible with current WSNs is proposed. Burrows–Abadi–Needham (BAN) logic is used to prove that the proposed protocol achieves secure and mutual authentication. The automated verification of internet security protocols and applications (AVISPA) simulation is used to simulate the system security of the proposed protocol and to provide formal verification. The result clearly shows that the proposed protocol is SAFE under the on-the-fly model-checker (OFMC) backend, which means the proposed protocol is immune to passive and active attacks such as man-in-the-middle (MITM) attacks and replay attacks. The performance of the proposed protocol is evaluated and compared with related protocols in terms of the computational cost, which is 0.01184 s. The proposed protocol provides higher security, which makes it more suitable for the CR-WSN environment and ensures its resistance against different types of attacks. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
20. A Generic Internet of Things (IoT) Middleware for Smart City Applications.
- Author
-
Ali, Zulfiqar, Mahmood, Azhar, Khatoon, Shaheen, Alhakami, Wajdi, Ullah, Syed Sajid, Iqbal, Jawaid, and Hussain, Saddam
- Abstract
The Internet of Things (IoT) is one of the key components of the ICT infrastructure of smart cities due to its great potential for intelligent management of infrastructures and facilities and the enhanced delivery of services in support of sustainable cities. Smart cities typically rely on IoT, where a wide variety of devices communicate with each other and collaborate across heterogeneous and distributed computing environments to provide information and services to urban entities and urbanites. However, leveraging the IoT within software applications raises tremendous challenges, such as data acquisition, device heterogeneity, service management, security and privacy, interoperability, scalability, flexibility, data processing, and visualization. Middleware for IoT has been recognized as the system that can provide the necessary infrastructure of services and has become increasingly important for IoT over the last few years. This study aims to review and synthesize the relevant literature to identify and discuss the core challenges of existing IoT middleware. Furthermore, it augments the information landscape of IoT middleware with big data applications to achieve the required level of services supporting sustainable cities. In doing so, it proposes a novel IoT middleware for smart city applications, namely Generic Middleware for Smart City Applications (GMSCA), which brings together many studies to further capture and invigorate the application demand for sustainable solutions which IoT and big data can offer. The proposed middleware is implemented, and its feasibility is assessed by developing three applications addressing various scenarios. Finally, the GMSCA is tested by conducting load balance and performance tests. The results prove the excellent functioning and usability of the GMSCA. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
21. A Secure LEACH-PRO Protocol Based on Blockchain.
- Author
-
Aljumaie, Ghada Sultan and Alhakami, Wajdi
- Subjects
- *
NEAR field communication , *WIRELESS sensor networks , *BLOCKCHAINS , *INTERNET protocols , *CRYPTOCURRENCIES , *INTERNET security , *ENERGY consumption - Abstract
Wireless Sensor Networks (WSNs) are becoming more popular for many applications due to their convenient services. However, sensor nodes may suffer from significant security flaws, leading researchers to propose authentication schemes to protect WSNs. Although these authentication protocols significantly fulfill the required protection, security enhancement with less energy consumption is essential to preserve the availability of resources and secure better performance. In 2020, Youssef et al. suggested a scheme called Enhanced Probabilistic Cluster Head Selection (LEACH-PRO) to extend the sensors' lifetime in WSNs. This paper introduces a new variant of the LEACH-PRO protocol by adopting the blockchain security technique to protect WSNs. The proposed protocol (SLEACH-PRO) performs a decentralized authentication mechanism by applying a blockchain to multiple base stations to avoid system and performance degradation in the event of a station failure. The security analysis of the SLEACH-PRO is performed using Burrows–Abadi–Needham (BAN) logic and Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. Moreover, the SLEACH-PRO is evaluated and compared to related protocols in terms of computational cost and security level based on its resistance against several attacks. The comparison results showed that the SLEACH-PRO protocol is more secure and requires less computational cost compared to other related protocols. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
22. A Numerical Study of the Dynamics of Vector-Born Viral Plant Disorders Using a Hybrid Artificial Neural Network Approach.
- Author
-
Alhakami, Hosam, Umar, Muhammad, Sulaiman, Muhammad, Alhakami, Wajdi, and Baz, Abdullah
- Subjects
ARTIFICIAL neural networks ,MARQUARDT algorithm ,LATENT infection ,PLANT viruses ,PLANT mortality ,MATHEMATICAL models - Abstract
Most plant viral infections are vector-borne. There is a latent period of disease inside the vector after obtaining the virus from the infected plant. Thus, after interacting with an infected vector, the plant demonstrates an incubation time before becoming diseased. This paper analyzes a mathematical model for persistent vector-borne viral plant disease dynamics. The backpropagated neural network based on the Levenberg—Marquardt algorithm (NN-BLMA) is used to study approximate solutions for fluctuations in natural plant mortality and vector mortality rates. A state-of-the-art numerical technique is utilized to generate reference data for obtaining surrogate solutions for multiple cases through NN-BLMA. Curve fitting, regression analysis, error histograms, and convergence analysis are used to assess accuracy of the calculated solutions. It is evident from our simulations that NN-BLMA is accurate and reliable. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
23. A Machine Learning Strategy for the Quantitative Analysis of the Global Warming Impact on Marine Ecosystems.
- Author
-
Alhakami, Hosam, Kamal, Mustafa, Sulaiman, Muhammad, Alhakami, Wajdi, and Baz, Abdullah
- Subjects
MARINE ecology ,MACHINE learning ,LEARNING strategies ,MARINE resource management ,MARINE biology ,ARTIFICIAL neural networks - Abstract
It is generally observed that aquatic organisms have symmetric abilities to produce oxygen (O 2) and fix carbon dioxide (C O 2) . A simulation model with time-dependent parameters was recently proposed to better understand the symmetric effects of accelerated climate change on coastal ecosystems. Changes in environmental elements and marine life are two examples of variables that are expected to change over time symmetrically. The sustainability of each equilibrium point is examined in addition to proving the existence and accuracy of the proposed model. To support the conclusions of this research compared to other studies, numerical simulations of the proposed model and a case study are investigated. This paper proposes an integrated bibliographical analysis of artificial neural networks (ANNs) using the Reverse-Propagation with Levenberg–Marquaradt Scheme (RP-LMS) to evaluate the main properties and applications of ANNs. The results obtained by RP-LMS show how to prevent global warming by improving the management of marine fish resources. The reference dataset for greenhouse gas emissions, environmental temperature, aquatic population, and fisheries population (GAPF) is obtained by varying parameters in the numerical Adam approach for different scenarios. The accuracy of the proposed RP-LMS neural network is demonstrated using mean square error (MSE), regression plots, and best-fit output. According to RP-LMS, the current scenario of rapid global warming will continue unabated over the next 50 years, damaging marine ecosystems, particularly fish stocks. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
24. A Usability Management Framework for Securing Healthcare Information System.
- Author
-
Alhakami, Hosam, Baz, Abdullah, Alhakami, Wajdi, Pandey, Abhishek Kumar, Agrawal, Alka, and Khan, Raees Ahmad
- Subjects
MEDICAL informatics ,INFORMATION resources management ,DATA security ,CYBERTERRORISM ,DATA security failures - Abstract
Transformation from conventional business management systems to smart digital systems is a recurrent trend in the current era. This has led to digital revolution, and in this context, the hardwired technologies in the software industry play a significant role However, from the beginning, software security remains a serious issue for all levels of stakeholders. Software vulnerabilities lead to intrusions that cause data breaches and result in disclosure of sensitive data, compromising the organizations' reputation that translates into, financial losses and compromising software usability as well. Most of the data breaches are financially motivated, especially in the healthcare sector. The cyber invaders continuously penetrate the E-Health data because of the high cost of the data on the dark web. Therefore, security assessment of healthcare web-based applications demands immediate intervention mechanisms to weed out the threats of cyberattacks for the sake of software usability. The proposed disclosure is a unique process of three phases that are combined by researchers in order to produce and manage usability management framework for healthcare information system. In this most threatened time of digital era where, Healthcare data industry has borne the brunt of the highest number of data breach episodes in the last few years. The key reason for this is attributed to the sensitivity of healthcare data and the high costs entailed in trading the data over the dark web. Hence, usability management of healthcare information systems is the need of hour as to identify the vulnerabilities and provide preventive measures as a shield against the breaches. The proposed unique developed model of usability management workflow is prepared by associating steps like learn; analyze and manage. All these steps gives an all in one package for the healthcare information management industry because there is no systematic model available which associate identification to implementation steps with different evaluation steps. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
25. On the Computational Study of a Fully Wetted Longitudinal Porous Heat Exchanger Using a Machine Learning Approach.
- Author
-
Alhakami, Hosam, Khan, Naveed Ahmad, Sulaiman, Muhammad, Alhakami, Wajdi, and Baz, Abdullah
- Subjects
NONLINEAR boundary value problems ,HEAT exchangers ,ARTIFICIAL neural networks ,NONLINEAR differential equations ,PARTICLE swarm optimization ,CONVECTIVE flow ,MACHINE learning - Abstract
The present study concerns the modeling of the thermal behavior of a porous longitudinal fin under fully wetted conditions with linear, quadratic, and exponential thermal conductivities surrounded by environments that are convective, conductive, and radiative. Porous fins are widely used in various engineering and everyday life applications. The Darcy model was used to formulate the governing non-linear singular differential equation for the heat transfer phenomenon in the fin. The universal approximation power of multilayer perceptron artificial neural networks (ANN) was applied to establish a model of approximate solutions for the singular non-linear boundary value problem. The optimization strategy of a sports-inspired meta-heuristic paradigm, the Tiki-Taka algorithm (TTA) with sequential quadratic programming (SQP), was utilized to determine the thermal performance and the effective use of fins for diverse values of physical parameters, such as parameter for the moist porous medium, dimensionless ambient temperature, radiation coefficient, power index, in-homogeneity index, convection coefficient, and dimensionless temperature. The results of the designed ANN-TTA-SQP algorithm were validated by comparison with state-of-the-art techniques, including the whale optimization algorithm (WOA), cuckoo search algorithm (CSA), grey wolf optimization (GWO) algorithm, particle swarm optimization (PSO) algorithm, and machine learning algorithms. The percentage of absolute errors and the mean square error in the solutions of the proposed technique were found to lie between 10 − 4 to 10 − 5 and 10 − 8 to 10 − 10 , respectively. A comprehensive study of graphs, statistics of the solutions, and errors demonstrated that the proposed scheme's results were accurate, stable, and reliable. It was concluded that the pace at which heat is transferred from the surface of the fin to the surrounding environment increases in proportion to the degree to which the wet porosity parameter is increased. At the same time, inverse behavior was observed for increase in the power index. The results obtained may support the structural design of thermally effective cooling methods for various electronic consumer devices. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
26. Design and Analysis of a 5G Wideband Antenna for Wireless Body-Centric Network.
- Author
-
Khan, Mohammad Monirujjaman, Rahman, H. M. Arifur, Shovon, Md. Nakib Alam, Alhakami, Wajdi, Hadjouni, Myriam, Elmannai, Hela, and Bourouis, Sami
- Subjects
ANTENNAS (Electronics) ,IMAGING phantoms ,ANTENNA design ,COMPUTER engineering ,5G networks ,IMPEDANCE matching - Abstract
A compact 5G wideband antenna for body-centric network (BCN) operating on Ka band has been presented in this paper. The design of the antenna consists of a very simple key-shaped radiator patch with a vertical slot for better impedance matching. The antenna was designed and simulated with the help of the Computer Simulation Technology (CST) Microwave Studio Suite, a well-liked and dependable electromagnetic simulation program running on Microsoft Windows. Free-space simulation produces a resonant frequency at 28 GHz, which falls under the Ka band and 5G's n257, more precisely n261. The proposed antenna has a size of 1.24 λ × 0.6 λ × 0.153 λ and has a wider impedance bandwidth of more than 20 GHz. The antenna's gain and radiation efficiency are 3.87 dBi and 70%, respectively, at the resonant point. Further parametric studies reveal that the antenna can be activated in the V-band by increasing the feedline width. The antenna is proposed for the application of BCN. Therefore, a three-dimensional human torso phantom was developed virtually to test on-body performance. The on-body findings of this antenna were resimulated by positioning the antenna in close proximity to the three-layer human body model, where 22.5 dB of on-body reflection coefficient was recorded at 28 GHz. Simulated on-body gain and efficiency were 4.56 dBi and 61.33 percent, respectively. A distance-based investigation was conducted to investigate the impacts of the human body's presence by positioning the antenna at five different distances from the human torso model. The findings were compared to assess how distance affects its behaviors. The antenna's gap was kept at 6 mm for the optimum results, which included 4.83 dBi of gain with a 66 percent efficiency and a recorded RL value of about 23 dB. The on-body simulations produced very consistent results with a slight deviation after 26.5 GHz, even though the distance was varied. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
27. The Rise of "Internet of Things": Review and Open Research Issues Related to Detection and Prevention of IoT-Based Security Attacks.
- Author
-
Shafiq, Muhammad, Gu, Zhaoquan, Cheikhrouhou, Omar, Alhakami, Wajdi, and Hamam, Habib
- Subjects
INTERNET of things ,INTRUSION detection systems (Computer security) ,ANOMALY detection (Computer security) ,INTELLECTUAL property ,DESIGN software - Abstract
This paper provides an extensive and complete survey on the process of detecting and preventing various types of IoT-based security attacks. It is designed for software developers, researchers, and practitioners in the Internet of Things field who aim to understand the process of detecting and preventing these attacks. For each entry identified from the list, a brief description is provided along with references where more information can be found. However, We surveyed the current state-of-the-art IoT security solutions and focused on four main aspects: (1) handpicking representative attacks, (2) identifying potential solutions, (3) performing a threat analysis for each attack and solution, and (4) ranking solutions according to the threats they overcome. By adopting this framework, we identified five main categories of defense mechanisms: distributed denial of service detection/prevention, default password protection, encryption mechanisms, intrusion detection/prevention, and anomaly detection. These solutions are relatively mature in terms of utility and usability. However, the security analysis is conducted only concerning specific attacks, which may or may not be relevant to real-world deployment. Appropriate IoT security solutions should incorporate threat modeling while considering other factors such as resource consumption and implementation effort. Overall, evaluation of IoT security solutions is arduous due to the complexity of IoT OSes, heterogeneous IoT devices (e.g., various hardware platforms), limited availability of open-source codebases, and restrictive policies towards intellectual property disclosure. In addition, we note that there remains a lack of studies that perform a systematic evaluation of the state-of-the-art in terms of both frameworks/methodologies and mechanisms proposed. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
28. An Effective Secure MAC Protocol for Cognitive Radio Networks.
- Author
-
Al-Amri, Bayan, Sami, Gofran, and Alhakami, Wajdi
- Subjects
COGNITIVE ability ,WIRELESS communications ,ELLIPTIC curves ,AUTHENTICATION (Law) ,DATA transmission systems - Abstract
The vast revolution in networking is increasing rapidly along with technology advancements, which requires more effort from all cyberspace professionals to cope with the challenges that come with advanced technology privileges and services. Hence, Cognitive Radio Network is one of the promising approaches that permit a dynamic type of smart network for improving the utilization of idle spectrum portions of wireless communications. However, it is vulnerable to security threats and attacks and demands security mechanisms to preserve and protect the cognitive radio networks for ensuring a secure communication environment. This paper presents an effective secure MAC protocol for cognitive radio networks, significantly enhancing the security level of the existing DSMCRN and SSMCRN protocols by eliminating the authentication server's necessity, which can be a single point of failure to compromise the entire network communication. The proposed protocol has proven to be effective and reliable since it does not rely on a centralized entity for providing the required security for a single pair of cognitive users. The protocol also improves the performance in the context of fast switching to data channels leading to higher throughput is achieved compared to the benchmark protocols. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
29. Intelligent Reasoning Rules for Home Energy Management (IRRHEM): Algeria Case Study.
- Author
-
Saba, Djamel, Cheikhrouhou, Omar, Alhakami, Wajdi, Sahli, Youcef, Hadidi, Abdelkader, and Hamam, Habib
- Subjects
ENERGY management ,RESOURCE exploitation ,ELECTRIC power consumption ,SEMANTIC Web ,ARTIFICIAL intelligence ,SMART homes - Abstract
Algeria is characterized by extreme cold in winter and high heat and humidity in summer. This leads to an increase in the use of electrical appliances, which has a negative impact on electrical energy consumption and its high costs, especially with the high price of electricity in Algeria. In this context, artificial intelligence can help to regulate the daily consumption of electricity, by optimizing the exploitation of natural resources and alerting the individual to avoid energy wasting. This paper proposes a decision-making tool (IRRHEM) for managing electrical energy at smart home. The IRRHEM solution is based on three elements: the use of natural resources, the notification of the inhabitants in case of resources misuse or wasting behavior, and the aggregation of similar activities at same time. Additionally, based on the proposed intelligent reasoning rules, residents' behavior and activities are represented by OWL (Ontology Web Language) and written and executed through SWRL (Semantic Web Rule Language). Finally, the (IRRHEM) solution is tested in a home located in Algiers city inhabited by a family of four persons. The IRRHEM performance evaluation results are very promising and show a 3.60% rate of energy saving. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
30. A New V-Net Convolutional Neural Network Based on Four-Dimensional Hyperchaotic System for Medical Image Encryption.
- Author
-
Wang, Xiaowei, Yin, Shoulin, Shafiq, Muhammad, Laghari, Asif Ali, Karim, Shahid, Cheikhrouhou, Omar, Alhakami, Wajdi, and Hamam, Habib
- Subjects
IMAGE encryption ,CONVOLUTIONAL neural networks ,MEDICAL imaging systems ,IMAGE segmentation ,DATA security failures - Abstract
In the transmission of medical images, if the image is not processed, it is very likely to leak data and personal privacy, resulting in unpredictable consequences. Traditional encryption algorithms have limited ability to deal with complex data. The chaotic system is characterized by randomness and ergodicity, which has advantages over traditional encryption algorithms in image encryption processing. A novel V-net convolutional neural network (CNN) based on four-dimensional hyperchaotic system for medical image encryption is presented in this study. Firstly, the plaintext medical images are processed into 4D hyperchaotic sequence images, including image segmentation, chaotic system processing, and pseudorandom sequence generation. Then, V-net CNN is used to train chaotic sequences to eliminate the periodicity of chaotic sequences. Finally, the chaotic sequence image is diffused to change the raw image pixel to realize the encryption processing. Simulation test analysis demonstrates that the proposed algorithm has better effect, robustness, and plaintext sensitivity. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
31. Role of Blockchain Technology in Combating COVID-19 Crisis.
- Author
-
Alsaed, Zaina, Khweiled, Raghad, Hamad, Mousab, Daraghmi, Eman, Cheikhrouhou, Omar, Alhakami, Wajdi, and Hamam, Habib
- Subjects
COVID-19 pandemic ,BLOCKCHAINS ,SOCIAL distancing ,EPIDEMICS - Abstract
The COVID-19 pandemic has negatively affected aspects of human life and various sectors, especially the health sector. These conditions led to the creation of new patterns of life that people have had to deal with to reduce the spread of the epidemic by committing to social distancing, among others. Therefore, governments and technological organizations had to take advantage of technological developments in the current era to overcome these challenges that were created by these conditions. In this paper, we will discuss the role of the blockchain in combating the COVID-19 crisis. Then we will review the recently recorded blockchain-based research proposals to control the COVID-19 pandemic. Finally, we will highlight the challenges of using blockchain to combat the COVID-19 pandemic and find solutions to mitigate these challenges. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
32. Recognition of Ziziphus lotus through Aerial Imaging and Deep Transfer Learning Approach.
- Author
-
Tufail, Ahsan Bin, Ullah, Inam, Khan, Rahim, Ali, Luqman, Yousaf, Adnan, Rehman, Ateeq Ur, Alhakami, Wajdi, Hamam, Habib, Cheikhrouhou, Omar, and Ma, Yong-Kui
- Subjects
ENDANGERED plants ,DEEP learning ,ZIZIPHUS ,PLANT classification ,CONVOLUTIONAL neural networks - Abstract
There is a growing demand for the detection of endangered plant species through machine learning approaches. Ziziphus lotus is an endangered deciduous plant species in the buckthorn family (Rhamnaceae) native to Southern Europe. Traditional methods such as object-based image analysis have achieved good recognition rates. However, they are slow and require high human intervention. Transfer learning-based methods have several applications for data analysis in a variety of Internet of Things systems. In this work, we have analyzed the potential of convolutional neural networks to recognize and detect the Ziziphus lotus plant in remote sensing images. We fine-tuned Inception version 3, Xception, and Inception ResNet version 2 architectures for binary classification into plant species class and bare soil and vegetation class. The achieved results are promising and effectively demonstrate the better performance of deep learning algorithms over their counterparts. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
33. The Performance of Circularly Polarized Phased Sub-Array Antennas for 5G Laptop Devices Investigating the Radiation Effects.
- Author
-
Mahmoud, Korany R., Baz, Abdullah, Alhakami, Wajdi, Alhakami, Hosam, and Montaser, Ahmed M.
- Subjects
ANTENNAS (Electronics) ,RADIATION ,5G networks ,INSERTION loss (Telecommunication) ,IMPEDANCE matching ,LAPTOP computers ,IMAGING phantoms - Abstract
In this paper, the performance of circularly polarized (CP) adaptive sub-arrays integrated into 5G laptop device is investigated in the presence of a whole-body human phantom model. In addition, the radiation effect of the steered beam patterns has been analyzed by calculating the specific absorption rate distribution and temperature rise. In this target, a single-feed CP antenna element has been firstly designed to resonate at 28GHz with high realized gain and radiation efficiency. Then, 4 subarrays have been constructed in a rectangular configuration with four-elements for each sub-array. To let the study more realistic, a complete human model is considered to investigate the radiation effects. The measured reflection coefficient and realized gain results of the designed antenna element are found to be -30 dB and 7.82 dB, respectively, in the assigned frequency band. Likewise, the antennas sub-arrays have approximately kept the same impedance matching attitude with high insertion loss of -22 dB and a realized gain and radiation efficiency of 16.85 dB and 86%, respectively, on average. Furthermore, the sub-arrays scan patterns and coverage efficiency have been studied considering the existence of the human body in different scenarios. Regarding the RF exposure, the results show that the resultant maximum values of specific absorption rate and power density do not exceed 1.52 W/kg and 3.5W/m2, respectively, whereas the maximum exposure temperature in such a case is less than 2.8?C after 30 minutes and decreases to 0.5?C after a penetration depth of 3mm which reflects the possibility of safe use. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
34. Healthcare Device Security: Insights and Implications.
- Author
-
Alhakami, Wajdi, Baz, Abdullah, Alhakami, Hosam, Ahmad, Masood, and Khan, Raees Ahmad
- Subjects
DARKNETS (File sharing) ,DATA security failures ,MEDICAL care ,PATIENT safety ,THEFT - Abstract
Healthcare devices play an essential role in tracking and managing patient's safety. However, the complexities of healthcare devices often remain ambiguous due to hardware, software, or the interoperable healthcare system problems. There are essentially two critical factors for targeting healthcare: First, healthcare data is the most valuable entity on the dark web; and the second, it is the easiest to hack. Data pilferage has become a major hazard for healthcare organizations as the hackers now demand ransom and threaten to disclose the sensitive data if not paid within the stipulated timeline. The present study enlists a thorough research on the data violation cases and the possibilities of data infringements likely to happen in the next five years. This paper discusses about the healthcare device, security of healthcare and year wise security flaws. Healthcare data breaches analysis and forecasting of data breaches and causes of breaches also discussed. Open research challenges and future directions for healthcare industries also discussed. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
35. Atrocious Impinging of COVID-19 Pandemic on Software Development Industries.
- Author
-
Alhakami, Wajdi, Binmahfoudh, Ahmed, Baz, Abdullah, Alhakami, Hosam, Ansari, Md Tarique Jamal, and Khan, Raees Ahmad
- Subjects
COVID-19 pandemic ,COVID-19 treatment ,COMPUTER software development ,SOCIAL distancing ,COMPUTER software industry - Abstract
COVID-19 is the contagious disease transmitted by Coronavirus. The majority of people diagnosed with COVID-19 may suffer from moderate-tosevere respiratory illnesses and stabilize without preferential treatment. Those who are most likely to experience significant infections include the elderly as well as people with a history of significant medical issues including heart disease, diabetes, or chronic breathing problems. The novel Coronavirus has affected not only the physical and mental health of the people but also had adverse impact on their emotional well-being. For months on end now, due to constant monitoring and containment measures to combat COVID-19, people have been forced to live in isolation and maintain the norms of social distancing with no community interactions. Social ties, experiences, and partnerships are not only integral part of work life but also form the basis of human evolvement. However, COVID-19 brought all such communication to a grinding halt. Digital interactions have failed to support the fervor that one enjoys in face-to-face meets. The COVID-19 disease outbreak has triggered dramatic changes in many sectors, and the main among them is the software industry. This paper aims at assessing COVID-19's impact on Software Industries. The impact of the COVID-19 disease outbreak has been measured on the basis of some predefined criteria for the demand of different software applications in the software industry. For the stated analysis, we used an approach that involves the application of the integrated Fuzzy ANP and TOPSIS strategies for the assessment of the impact of COVID-19 on the software industry. Findings of this research study indicate that Government administration based software applications were severely affected, and these applications have been the major apprehensions in the wake of the pandemic's outbreak. Undoubtedly, COVID-19 has had a considerable impact on software industry, yet the damage is not irretrievable and the world's societies can emerge out of this setback through concerted efforts in all facets of life. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
36. Fuzzy-Based Symmetrical Multi-Criteria Decision-Making Procedure for Evaluating the Impact of Harmful Factors of Healthcare Information Security.
- Author
-
Kumar, Rajeev, Pandey, Abhishek Kumar, Baz, Abdullah, Alhakami, Hosam, Alhakami, Wajdi, Agrawal, Alka, and Khan, Raees Ahmad
- Subjects
INFORMATION technology security ,INFORMATION resources management ,INTERNET security ,CYBER intelligence (Computer security) ,INFORMATION organization ,INFORMATION modeling - Abstract
Growing concern about healthcare information security in the wake of alarmingly rising cyber-attacks is being given symmetrical priority by current researchers and cyber security experts. Intruders are penetrating symmetrical mechanisms of healthcare information security continuously. In the same league, the paper presents an overview on the current situation of healthcare information and presents a layered model of healthcare information management in organizations. The paper also evaluates the various factors that have a key contribution in healthcare information security breaches through a hybrid fuzzy-based symmetrical methodology of AHP-TOPSIS. Furthermore, for assessing the effect of the calculated results, the authors have tested the results on local hospital software of Varanasi. Tested results of the factors are validated through the comparison and sensitivity analysis in this study. Tabulated results of the proposed study propose a symmetrical mechanism as the most conversant technique which can be employed by the experts and researchers for preparing security guidelines and strategies. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
37. Software Security Estimation Using the Hybrid Fuzzy ANP-TOPSIS Approach: Design Tactics Perspective.
- Author
-
Agrawal, Alka, Seh, Adil Hussain, Baz, Abdullah, Alhakami, Hosam, Alhakami, Wajdi, Baz, Mohammed, Kumar, Rajeev, and Khan, Raees Ahmad
- Subjects
ANALYTIC network process ,COMPUTER security vulnerabilities ,SYSTEMS software ,DATA security failures ,COMPUTER software development ,COMPUTER software - Abstract
Increasing the number of threats against software vulnerabilities and rapidly growing data breaches have become a key concern for both the IT industry and stakeholders. Developing secure software systems when there is a high demand for software products from individuals as well as the organizations is in itself a big challenge for the designers and developers. Meanwhile, adopting traditional and informal learnings to address security issues of software products has made it easier for cyber-criminals to expose software vulnerabilities. Hence, it is imperative for the security practitioners to employ a symmetric mechanism so as to achieve the desired level of software security. In this context, a decision-making approach is the most symmetrical technique to assess the security of software in security tactics perspective. Since the security tactics directly address the quality attribute concerns, this symmetric approach will be highly effective in making the software systems more secure. In this study, the authors have selected three main attributes and fifteen sub-attributes at level 1 and level 2, respectively, with ten different software of an institute as alternatives. Furthermore, this study uses a fuzzy-based symmetrical decision-making approach to assess the security of software with respect to tactics. Fuzzy Analytic Network Process (F-ANP) is applied to evaluate the weights of criteria and fuzzy-Symmetrical technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) is used to determine impact of alternatives. The proposed symmetrical assessment in this study will be beneficial for both the designers and developers to categorize and prioritize the security attributes and understand the importance of security tactics during software development life cycle. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
38. Symmetrical Model of Smart Healthcare Data Management: A Cybernetics Perspective.
- Author
-
Alhakami, Wajdi, Baz, Abdullah, Alhakami, Hosam, Pandey, Abhishek Kumar, and Khan, Raees Ahmad
- Subjects
- *
CYBERNETICS , *DATA management , *DATA integrity , *MEDICAL care , *DATA security - Abstract
Issues such as maintaining the security and integrity of data in digital healthcare are growing day-by-day in terms of size and cost. The healthcare industry needs to work on effective mechanisms to manage these concerns and prevent any debilitating crisis that might affect patients as well as the overall health management. To tackle such critical issues in a simple, feasible, and symmetrical manner, the authors considered the ideology of cybernetics. Working towards this intent, this paper proposes a symmetrical model that illustrates a compact version of the adopted ideology as a pathway for future researchers. Furthermore, the proposed ideology of cybernetics specifically focuses on how to plan the entire design concept more effectively. It is important for the designer to prepare for the future and manage the design structure from a product perspective. Therefore, the proposed ideology provides a symmetric mechanism that includes a variety of estimation and evaluation techniques as well as their management. The proposed model generates a symmetric, variety-issue, reduced infrastructure that can produce highly effective results due to an efficient usability, operatability, and symmetric operation execution which are the benefits of the proposed model. Furthermore, the study also performed a performance simulation assessment by adopting a multi-criteria decision-making approach that helped the authors compare the various existing and proposed models based on their levels of effectiveness. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
39. Design and Analysis of Triangular Split-Ring Resonator–Based Patch Antenna for High-Speed Terahertz Devices.
- Author
-
Sivasangari, A., Danasegaran, Sathish Kumar, Dhanasekar, S., Britto, Elizabeth Caroline, and Paranthaman, M.
- Abstract
Terahertz (THz) technology is helpful in innovative applications and enormously affects wireless technology. To address THz transmission loss, recent modernizations in digital devices for the ultimate data rate of THz communication systems offer a highly efficient metamaterials (MTM) antenna concept with high directionality. This paper suggests that the dual triangular split-ring resonator (TSRR) structure incorporates the patch antenna function, which works at 1.2 THz. The analysis is carried over by optimizing the triangular ring angle of the TSRR structure’s inner and outer ring width. The optimized TSRR patch antenna with breast phantom produces the excellent result of − 61.54 dB RL, 7.929 dBi gain, 1. 0016 VSWR, and 8.715 dB directivity owing to the influence of MTM structure. The suggested TSRR antenna structure is suitable for various THz applications, which include breast cancer detection, imaging, scanning, and spectrometer with the support of high data rates in wireless transmission. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
40. A New SLM-UFMC Model for Universal Filtered Multi-Carrier to Reduce Cubic Metric and Peak to Average Power Ratio in 5G Technology.
- Author
-
Shawqi, Farooq Sijal, Audah, Lukman, Mostafa, Salama A., Gunasekaran, Saraswathy Shamini, Baz, Abdullah, Hammoodi, Ahmed Talaat, Alhakami, Hosam, Hassan, Mustafa Hamid, Jubair, Mohammed Ahmed, and Alhakami, Wajdi
- Subjects
BIT error rate ,WIRELESS communications ,5G networks ,ERROR rates ,TECHNOLOGY ,DRUG carriers ,NONLINEAR oscillators - Abstract
The new generation of wireless communication systems has adopted different waveforms. The universal filtered multicarrier is one of the adopted candidates that has symmetry with various numerology designs. However, the high peak to average power ratio is one of the major limitations faced by universal filter multicarrier (UFMC) designers. Moreover, recent studies utilize cubic metric along with the peak to average power ratio (PAPR) to show the power back-off effect of the signal in which the PAPR metric identifies the maximum peak and the cubic metric (CM) identifies the Out of Band emission and In-Band distortion. Most of the current solutions, such as amplitude clipping, tone reservation, and active constellation extension, decrease the PAPR but cause degradation to the bit error rate. Selected mapping is one of the promising techniques that is recently used to solve the PAPR and CM problems without causing bit error rate (BER) degradation. In this paper, the selected mapping (SLM) is integrated with UFMC to reduce the PAPR and CM without affecting the BER of 5G networks. The SLM-UFMC solution model is simulated by MATLAB and the results show that the SLM-UFMC model presents better PAPR and CM performance without BER degradation. The PAPR has been decreased to 1.5 dB with respect to eight-phase rotation vectors and the CM decreased to 1.25 dB compared to the conventional UFMC. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
41. The Determinants of Outward Foreign Direct Investment from Latin America and the Caribbean: An Integrated Entropy-Based TOPSIS Multiple Regression Analysis Framework.
- Author
-
Correa da Cunha, Henrique, Singh, Vikkram, and Xie, Shengkun
- Subjects
FOREIGN investments ,MULTIPLE regression analysis ,TOPSIS method ,PANEL analysis ,EMERGING markets - Abstract
Given that home country factors play a major role in the internationalization of emerging market firms, there is an ever-growing debate on how they influence the intensity of outward foreign direct investment (OFDI) from these regions. This study investigates how home country factors affect the OFDI intensity in Latin America and Caribbean (LAC) countries. We use the entropy weight method, which uses the Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) method and a balanced panel data consisting of 19 countries from 2007 to 2016. The results show a positive association between macroeconomic performance, formal institutions, infrastructure, technology and the OFDI intensity. Furthermore, we find that robust formal institutions, along with the quality of infrastructure and technology, positively moderate the relationship between macroeconomic performance and the OFDI intensity. These findings show that the internationalization of LAC firms is highly dependent on the contextual conditions in their markets. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.