5 results on '"Alsolami, Fawaz"'
Search Results
2. A Bee Colony-Based Optimized Searching Mechanism in the Internet of Things.
- Author
-
Ramzan, Muhammad Sher, Asghar, Anees, Ullah, Ata, Alsolami, Fawaz, and Ahmad, Iftikhar
- Subjects
INTERNET of things ,INTERNET searching ,HONEYBEES ,BEE colonies ,BIG data ,BEES ,ARTIFICIAL intelligence ,DATA replication - Abstract
The Internet of Things (IoT) consists of complex and dynamically aggregated elements or smart entities that need decentralized supervision for data exchanging throughout different networks. The artificial bee colony (ABC) is utilized in optimization problems for the big data in IoT, cloud and central repositories. The main limitation during the searching mechanism is that every single food site is compared with every other food site to find the best solution in the neighboring regions. In this way, an extensive number of redundant comparisons are required, which results in a slower convergence rate, greater time consumption and increased delays. This paper presents a solution to optimize search operations with an enhanced ABC (E-ABC) approach. The proposed algorithm compares the best food sites with neighboring sites to exclude poor sources. It achieves an efficient mechanism, where the number of redundant comparisons is decreased during the searching mechanism of the employed bee phase and the onlooker bee phase. The proposed algorithm is implemented in a replication scenario to validate its performance in terms of the mean objective function values for different functions, as well as the probability of availability and the response time. The results prove the superiority of the E-ABC in contrast to its counterparts. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
3. A Double-Layer Indemnity Enhancement Using LSTM and HASH Function Technique for Intrusion Detection System.
- Author
-
Ali, Abdullah Marish, Alqurashi, Fahad, Alsolami, Fawaz Jaber, and Qaiyum, Sana
- Subjects
COMPUTER network traffic ,INTRUSION detection systems (Computer security) ,COMPUTER network security ,DATABASES ,TRACKING algorithms ,INDEMNITY - Abstract
The Intrusion Detection System (IDS) is the most widely used network security mechanism for distinguishing between normal and malicious traffic network activities. It aids network security in that it may identify unforeseen hazards in network traffic. Several techniques have been put forth by different researchers for network intrusion detection. However, because network attacks have increased dramatically, making it difficult to execute precise detection rates quickly, the demand for effectively recognizing network incursion is growing. This research proposed an improved solution that uses Long Short-Term Memory (LSTM) and hash functions to construct a revolutionary double-layer security solution for IoT Network Intrusion Detection. The presented framework utilizes standard and well-known real-time IDS datasets such as KDDCUP99 and UNSWNB-15. In the presented framework, the dataset was pre-processed, and it employed the Shuffle Shepherd Optimization (SSO) algorithm for tracking the most informative attributes from the filtered database. Further, the designed model used the LSTM algorithm for classifying the normal and malicious network traffic precisely. Finally, a secure hash function SHA3-256 was utilized for countering the attacks. The intensive experimental assessment of the presented approach with the conventional algorithms emphasized the efficiency of the proposed framework in terms of accuracy, precision, recall, etc. The analysis showed that the presented model attained attack prediction accuracy of 99.92% and 99.91% for KDDCUP99 and UNSWNB-15, respectively. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
4. Managing Security of Healthcare Data for a Modern Healthcare System.
- Author
-
Almalawi, Abdulmohsen, Khan, Asif Irshad, Alsolami, Fawaz, Abushark, Yoosef B., and Alfakeeh, Ahmed S.
- Subjects
DATA security ,METAHEURISTIC algorithms ,ARTIFICIAL intelligence ,DATA protection ,INTERNET of things ,DATA privacy - Abstract
The advent of Artificial Intelligence (AI) and the Internet of Things (IoT) have recently created previously unimaginable opportunities for boosting clinical and patient services, reducing costs and improving community health. Yet, a fundamental challenge that the modern healthcare management system faces is storing and securely transferring data. Therefore, this research proposes a novel Lionized remora optimization-based serpent (LRO-S) encryption method to encrypt sensitive data and reduce privacy breaches and cyber-attacks from unauthorized users and hackers. The LRO-S method is the combination of hybrid metaheuristic optimization and improved security algorithm. The fitness functions of lion and remora are combined to create a new algorithm for security key generation, which is provided to the serpent encryption algorithm. The LRO-S technique encrypts sensitive patient data before storing it in the cloud. The primary goal of this study is to improve the safety and adaptability of medical professionals' access to cloud-based patient-sensitive data more securely. The experiment's findings suggest that the secret keys generated are sufficiently random and one of a kind to provide adequate protection for the data stored in modern healthcare management systems. The proposed method minimizes the time needed to encrypt and decrypt data and improves privacy standards. This study found that the suggested technique outperformed previous techniques in terms of reducing execution time and is cost-effective. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
5. Novel energy management scheme in IoT enabled smart irrigation system using optimized intelligence methods.
- Author
-
Khan, Asif Irshad, Alsolami, Fawaz, Alqurashi, Fahad, Abushark, Yoosef B., and Sarker, Iqbal H.
- Subjects
- *
ENERGY management , *INTERNET of things , *IRRIGATION , *ENERGY consumption , *ARTIFICIAL intelligence , *AGRICULTURAL technology - Abstract
In recent times, due to the growing global population and increased food demand, smart agriculture is becoming more vital. In this context, Internet of Things (IoT) technologies have emerged as a significant pathway to innovative agricultural techniques. Due to their low capacity, these IoT nodes have faced energy limits and complicated routing methods. As a result, in the sphere of IoT-based agriculture, transmitting data failure, energy consumption, network lifetime reduction, and delay occur. To overcome this problem, this study proposes a novel combination of optimized intelligent smart irrigation systems to improve the energy management performance of the system. Here, the optimal cluster head formation and selection is performed by Hierarchy Shuffled Shepherd Clustering (HSSC) method. Also, the finest energy regulation and routing path are provided by the proposed Emperor Penguin Jellyfish Optimizer (EPJO) method. The simulation of this work is performed on Network Simulator-2 (NS2) software. The simulation consequences from the proposed method are validated and compared with the conventional methods. Thus, the proposed approach results demonstrate that the developed model has much lesser energy consumption and improved network lifetime as compared to the traditional works. [Display omitted] [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.