Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Locating a missing child or elderly person in a large gathering through face recognition in videos is still challenging because of various dynamic factors. In this paper, we present an intelligent mechanism for tracking missing persons in... more
Locating a missing child or elderly person in a large gathering through face recognition in videos is still challenging because of various dynamic factors. In this paper, we present an intelligent mechanism for tracking missing persons in an unconstrained large gathering scenario of Al-Nabawi Mosque, Madinah, KSA. The proposed mechanism in this paper is unique in two aspects. First, there are various proposals existing in the literature that deal with face detection and recognition in high-quality images of a large crowd but none of them tested tracking of a missing person in low resolution images of a large gathering scenario. Secondly, our proposed mechanism is unique in the sense that it employs four phases: (a) report missing person online through web and mobile app based on spatio-temporal features; (b) geo fence set estimation for reducing search space; (c) face detection using the fusion of Viola Jones cascades LBP, CART, and HAAR to optimize the results of the localization o...
Internet of vehicles (IoV) is an emerging area of advanced transportation systems, in which the functionality of traditional vehicular ad hoc networks (VANET) combined with the Internet of things (IoT). This technology allows vehicle... more
Internet of vehicles (IoV) is an emerging area of advanced transportation systems, in which the functionality of traditional vehicular ad hoc networks (VANET) combined with the Internet of things (IoT). This technology allows vehicle users and drivers to interact in real time from anywhere and anytime. However, until recently, the major two problems that authentication and key management methods may solve are security and privacy. In this study, we offer a privacy-preserving authentication and key management scheme for the IoV environment that is computationally and communication cost-effective. We conducted a thorough security analysis, demonstrating that the proposed scheme is resistant to a variety of cryptographic attacks. We have included a cost analysis that indicates the proposed scheme is more efficient than IoV’s current privacy-preserving authentication and key management schemes.
Today, farmers are suffering from the low yield of crops. Though right crop selection is the main boosting key to maximize crop yield by doing soil analysis and considering metrological factors, the lack of knowledge about soil fertility... more
Today, farmers are suffering from the low yield of crops. Though right crop selection is the main boosting key to maximize crop yield by doing soil analysis and considering metrological factors, the lack of knowledge about soil fertility and crop selection is the main reason for low crop production. In the changed current climate, the farmers having primitive knowledge about conventional farming are facing challenges about making sagacious decisions on crop selection. The selection of the same crop in every seasonal cycle makes the low soil fertility. This study is aimed at making an efficient and accurate system using IoT devices and machine learning (ML) algorithms that can correctly select a crop for maximal yield. Such a system is reliable as compared to the old laboratory testing manual systems, which bear the chances of human errors. Correct selection of a crop is predominantly a priority in agricultural arena. As a contribution, we propose an ML-based model, Smart Crop Select...
The Internet of Drones (IoD) has recently gained popularity in several military, commercial, and civilian applications due to its unique characteristics, such as high mobility, three-dimensional (3D) movement, and ease of deployment.... more
The Internet of Drones (IoD) has recently gained popularity in several military, commercial, and civilian applications due to its unique characteristics, such as high mobility, three-dimensional (3D) movement, and ease of deployment. Drones, on the other hand, communicate over an unencrypted wireless link and have little computational capability in a typical IoD environment, making them exposed to a wide range of cyber-attacks. Security vulnerabilities in IoD systems include man-in-the-middle attacks, impersonation, credential leaking, GPS spoofing, and drone hijacking. To avoid the occurrence of such attacks in IoD networks, we need an extremely powerful security protocol. To address these concerns, we propose a blockchain-based authentication scheme employing Hyperelliptic Curve Cryptography (HECC). The concepts of a blockchain as a Certificate Authority (CA) and a transaction as a certificate discussed in this article are meant to facilitate the use of a blockchain without CAs or...
Message Passing Interface (MPI) is an important mechanism in P2P. Herein we assess how different types of MPI collective communication functions perform on a Gigabit Ethernet Homogeneous Beowulf PC cluster. In this way we provide an... more
Message Passing Interface (MPI) is an important mechanism in P2P. Herein we assess how different types of MPI collective communication functions perform on a Gigabit Ethernet Homogeneous Beowulf PC cluster. In this way we provide an insight on the factors that affect P2P applications over an enterprise context such as the emerging Cloud-based services. By contrast to the literature, which includes mostly theoretical studies, we carry out an empirical study. We show that the bahaviour of scatter and gather are most unpredictable in comparison with other collective functions.
Research Interests:
Nowadays cloud-computing services are being offered by various organizations. Peer-to-Peer (P2P) networks can be used as a collaborative computing environment to solve computationally intensive problems. In this work, we use a PC cluster... more
Nowadays cloud-computing services are being offered by various organizations. Peer-to-Peer (P2P) networks can be used as a collaborative computing environment to solve computationally intensive problems. In this work, we use a PC cluster to simulate a P2P network and present results of a computationally intensive image matching algorithm (fingerprint verification). Collective communications are used to transfer images to destination peers over a network. Communication to computation time ratio are calculated of transferring of fingerprint images of various sizes on the internet. As transfer of raw images are communication intensive, a proposed method is to use FBI approved Wavelet Scalar Quantization (WSQ) compression method at the source before transmitting to the destination nodes. We study the viability of fingerprint identification and/or verification service offered by cloud computing. In particular, we present a distributed fingerprint verification algorithm.
Research Interests:
— Message Passing Interface (MPI) is an important mechanism in P2P. Herein we assess how different types of MPI collective communication functions perform on a Gigabit Ethernet Homogeneous Beowulf PC cluster. In this way we provide an... more
— Message Passing Interface (MPI) is an important mechanism in P2P. Herein we assess how different types of MPI collective communication functions perform on a Gigabit Ethernet Homogeneous Beowulf PC cluster. In this way we provide an insight on the factors that affect P2P applications over an enterprise context such as the emerging Cloud-based services. By contrast to the literature, which includes mostly theoretical studies, we carry out an empirical study. We show that the bahaviour of scatter and gather are most unpredictable in comparison with other collective functions.
Parallel prefix circuits are circuits that generate the prefix computation of a given input. The prefix computation is used extensively in hardware circuits. Prefix computation has its wide applications in cryptography, fast adders, etc.... more
Parallel prefix circuits are circuits that generate the prefix computation of a given input. The prefix computation is used extensively in hardware circuits. Prefix computation has its wide applications in cryptography, fast adders, etc. Any hardware circuit that have adders as one of its components could benefit from such computation. Prefix circuits proposed in literature differ in their performance, cost and size. Usually most circuits use operation nodes with fan-in/fan-out of 2. One classification of prefix circuits is dependent on the width of the circuit: circuits with width equal to the input, and circuits with width less than the input. In this paper, we first perform an analysis of two important classes of parallel prefix circuits. The first class performs well when the input size is of the same width as the circuit. The second class performs well when the width of the circuit is greater than the circuit width. We analyze the two classes in case of existence of faulty node...
The detection and tracking of object in a video is an important problem in many applications. In surveillance and in robotic vision tracking and recognition of objects and it’s size is desired. In this paper, an algorithm to obtain size... more
The detection and tracking of object in a video is an important problem in many applications. In surveillance and in robotic vision tracking and recognition of objects and it’s size is desired. In this paper, an algorithm to obtain size of an object in image or video is presented based on pixel relationship to actual size. The object is mainly tracked by the Kalman filter and Log Polar Phase Correlation method is used to more precisely recognize objects in a video. The tracking of objects is performed from frame to frame. As the image of an object gets deformed in a video due to motion of either the camera or the motion of an object a dynamic template for matching is proposed to minimize the error. Simulation results are presented showing the errors in determining the size of objects in an image.
Handwritten signature is one of the essential biometric parameters widely used for document validation and verification. Other methods such as fingerprints, iris/retina scanning, face, and voice recognition, although more accurate, need... more
Handwritten signature is one of the essential biometric parameters widely used for document validation and verification. Other methods such as fingerprints, iris/retina scanning, face, and voice recognition, although more accurate, need special equipment. The purpose of the research is to demonstrate an appropriate and reliable technology organizations may use to recognize signatures automatically. Convolutional neural networks are trained on preprocessed signature images. The code was developed using MATLAB, and results indicate our method to provide promising results and have contributed by extending the technique to be reliable. The CNN is tested with 4 different datasets with N number of individuals and M number of signatures for each individual and contains signatures that differ from each other in many aspects like the type of signature, its readability, etc. We used our CNN to train and test on all the datasets to observe the performance and make interesting observations of our implementation. The network performed reasonably well on all datasets, which is presented in the results section.
In this research, a platform is proposed based on optimization algorithms for Energy Management System for buildings. Building energy consumption can be minimized based on Artificial Intelligence and user requirements of power supplied... more
In this research, a platform is proposed based on optimization algorithms for Energy Management System for buildings. Building energy consumption can be minimized based on Artificial Intelligence and user requirements of power supplied therefore allowing comfort to consumer with efficient operation and functioning of the building. A prototype using SMART devices with a microcontroller is implemented and tested. It is observed with proper management of the operation of devices efficiency increases and therefore consumer costs reduced. A master controller communicating with multiple apartment controllers is proposed with massage passing interface.
In the last few years, the wireless body area network (WBAN) has emerged as an appealing and viable option in the e-health application domain. WBAN technology is primarily used to offer continuous screening of health data to patients,... more
In the last few years, the wireless body area network (WBAN) has emerged as an appealing and viable option in the e-health application domain. WBAN technology is primarily used to offer continuous screening of health data to patients, independent of their location, time, or activity. A WBAN, on the other hand, is vulnerable to different cyberattacks due to the openness of the wireless environment and the privacy of people’s physiological data. A highly efficient and secure cryptographic scheme that can fulfill the needs of resource-constrained WBAN sensors and devices is considered necessary. First, we take a look at the most up-to-date security solutions for WBANs. Then, we go through some of the underlying concerns and challenges with WBAN security. We propose a new framework called secure channel free certificateless signcryption scheme for WBANs based on a hyperelliptic curve that can meet security requirements such as confidentiality, anonymity, integrity, resistance against un...
Unmanned aerial vehicles (UAVs), also known as drones, once centric to military applications, are presently finding their way in many civilian and commercial applications. If national legislations permit UAVs to operate autonomously, one... more
Unmanned aerial vehicles (UAVs), also known as drones, once centric to military applications, are presently finding their way in many civilian and commercial applications. If national legislations permit UAVs to operate autonomously, one will see the skies become populated with many small UAVs, each one performing various tasks such as mail and package delivery, traffic monitoring, event filming, surveillance, search and rescue, and other applications. Thus, advancing to multiple small UAVs from a single large UAV has resulted in a new clan of networks known as flying ad-hoc networks (FANETs). Such networks provide reliability, ease of deployment, and relatively low operating costs by offering a robust communication network among the UAVs and base stations (BS). Although FANETs offer many benefits, there also exist a number of challenges that need to be addressed; the most significant of these being the communication one. Therefore, the article aims to provide insights into the key ...
Ensuring the safety of residents and visitors is one of the major priorities of the Kingdom of Saudi Arabia (KSA). There are some residents in Madinah who are vulnerable or prone to getting lost in crowded areas, including children, the... more
Ensuring the safety of residents and visitors is one of the major priorities of the Kingdom of Saudi Arabia (KSA). There are some residents in Madinah who are vulnerable or prone to getting lost in crowded areas, including children, the elderly, and people with certain diseases and disorders. Besides, the Kingdom receives millions of visiting pilgrims in Madinah and Makkah and thousands of them get lost every year around Masjid-e-Nabavi and Masjid Al Haram. Considering the importance of the safety of residents and visiting pilgrims in Madinah, in this paper, we propose a smart city application design for tracking and locating the missing person using an emerging Internet of Things (IoT) based system. We propose to evaluate the performance of Bluetooth low energy (BLE), low power wide area network (LPWAN), technologies, both individually and as a hybrid solution. We propose an IoT based system with a proactive approach to help security officials in Madinah and the Department of lost and found in Masjid e Nabavi in two major safety issues: 1) Tracking the companion of missing person found by a security official and 2) Tracking the missing person using reported location via IoT based system. We present our proposed smart city application design and its implementation scenarios in Madinah.
Metaheuristic algorithms are powerful methods for solving compute intensive problems. neural Networks, when trained well, are great at prediction and classification type of problems. Backpropagation is the most popular method utilized to... more
Metaheuristic algorithms are powerful methods for solving compute intensive problems. neural Networks, when trained well, are great at prediction and classification type of problems. Backpropagation is the most popular method utilized to obtain the weights of Neural Nets though it has some limitations of slow convergence and getting stuck in a local minimum. In order to overcome these limitations, in this paper, a hybrid method combining the parallel distributed bat algorithm with backpropagation is proposed to compute the weights of the Neural Nets. The aim is to use the hybrid method in applications of a distributed nature. Our study uses the Matlab® software and Arduino® microcontrollers as a testbed. To test the performance of the testbed, an application in the area of speech recognition is carried out. Due to the resource limitations of Arduino microcontrollers, the core speech pre-processing of LPC (linear predictive coding) feature extractions are done in Matlab® and only the...
Optimization algorithms are often used to obtain optimal solutions to complex nonlinear problems and appear in many areas such as control, communication, computation, and others. Bat algorithm is a heuristic optimization algorithm and... more
Optimization algorithms are often used to obtain optimal solutions to complex nonlinear problems and appear in many areas such as control, communication, computation, and others. Bat algorithm is a heuristic optimization algorithm and efficient in obtaining approximate best solutions to non-linear problems. In many situations complex problems involve large amount of computations that may require simulations to run for days or weeks or even years for an algorithm to converge to a solution. In this research, a Parallel Distributed Bat Algorithm (PDBA) is formulated using Message Passing Interface (MPI) in C language code for a PC Cluster. The time complexity of PDBA is determined and presented. The performance in terms of speed-up, efficiency, elapsed time, and number of times fitness function is executed is also presented.
With the exponential growth in technologies for the vehicular Internet of things applications and high demands for autonomous road vehicles, future transportation systems are projected to be revolutionized on a global scale. This new... more
With the exponential growth in technologies for the vehicular Internet of things applications and high demands for autonomous road vehicles, future transportation systems are projected to be revolutionized on a global scale. This new landscape requires a stable, flexible, and business-friendly base of connectivity, networking, and computing technology, in which Unmanned Aerial Vehicles (UAVs) can play an important role. A UAV-enabled Intelligent Transportation System (ITS) can provide a cost-effective communication solution to improve the safety and efficiency of the transportation system, particularly if the data traffic is nonhomogeneous and nonstationary. Typically, wireless is the communication medium between vehicles and UAVs in an ITS setting, which is based on the IEEE802.11p MAC protocol adopted by car manufactures. However, the IEEE 802.11p MAC protocol is modified solely for omnidirectional antennas, which restricts network coverage, delay, and throughput. In comparison, t...
The Internet of Health Things (IoHT) is an extended breed of the Internet of Things (IoT), which plays an important role in the remote sharing of data from various physical processes such as patient monitoring, treatment progress,... more
The Internet of Health Things (IoHT) is an extended breed of the Internet of Things (IoT), which plays an important role in the remote sharing of data from various physical processes such as patient monitoring, treatment progress, observation, and consultation. The key benefit of the IoHT platform is the ease of time-independent interaction from geographically distant locations by offering preventive or proactive healthcare services at a lower cost. The communication, integration, computation, and interoperability in IoHT are provided by various low-power biomedical sensors equipped with limited computational capabilities. Therefore, conventional cryptographic solutions are not feasible for the majority of IoHT applications. In addition, executing computing-intensive tasks will lead to a slow response time that can deteriorate the performance of IoHT. We strive to resolve such a deficiency, and thus a new scheme has been proposed in this article, called an online-offline signature s...
A group of small UAVs can synergize to form a flying ad hoc network (FANET). The small UAVs are, typically, prone to security lapses because of limited onboard power, restricted computing ability, insufficient bandwidth, etc. Such... more
A group of small UAVs can synergize to form a flying ad hoc network (FANET). The small UAVs are, typically, prone to security lapses because of limited onboard power, restricted computing ability, insufficient bandwidth, etc. Such limitations hinder the applicability of standard cryptographic techniques. Thus, assuring confidentiality and authentication on part of small UAV remains a far-fetched goal. We aim to address such an issue by proposing an identity-based generalized signcryption scheme. The lightweight security scheme employs multiaccess edge computing (MEC) whereby the primary UAV, as a MEC node, provides offloading to the computationally fragile member UAVs. The scheme is based on the concept of the hyperelliptic curve (HEC), which is characterized by a smaller key size and is, therefore, suitable for small UAVs. The scheme is robust since it offers confidentiality and authentication simultaneously as well as singly. Formal as well as informal security analyses and the va...
A Distributed Genetic Algorithm to compute minimal reducts is presented for a novel biomedical application to distinguish 50 medical drugs from 228 side effects. The results indicate that 15 side effects are sufficient to differentiate... more
A Distributed Genetic Algorithm to compute minimal reducts is presented for a novel biomedical application to distinguish 50 medical drugs from 228 side effects. The results indicate that 15 side effects are sufficient to differentiate among all the 50 drugs. In fact, any one of 4 sets of 15 side effects can be used. The Distributed Genetic Algorithm is inherently parallel, uses a variable mutation rate and is efficiently implemented on a PC cluster using 5, 10 and 20 nodes each with a Message Passing Interface. Results show that the distributed algorithm with 20 nodes uses much less computation time than two sequential methods (savings of about a factor of 5).
A Neural network based on Kalman Filter and Phase Correlation is devised to recognize and distinguish objects moving in a plane. A bank of Kalman Filters in parallel are used to track the moving objects and the Phase correlation method is... more
A Neural network based on Kalman Filter and Phase Correlation is devised to recognize and distinguish objects moving in a plane. A bank of Kalman Filters in parallel are used to track the moving objects and the Phase correlation method is used to recognize the moving objects. Both methods together are used to distinguish identical objects based on Kalman estimates of the location and speed. Experiments were performed using MATLAB 2013a and it is seen errors occur when identical objects are occluded moving at similar speeds.
Abstract In this paper, the performance of frequency-hopping minimum-shift-keying (FH/MSK) system operating over a frequency-selective channel and partial tone Jamming is presented. In the analysis of FH/MSK system, conventional type MSK... more
Abstract In this paper, the performance of frequency-hopping minimum-shift-keying (FH/MSK) system operating over a frequency-selective channel and partial tone Jamming is presented. In the analysis of FH/MSK system, conventional type MSK transmitter and ...
ABSTRACT
L'auteur a accordé une licence irrévocable e~ non exclusi'.! e permettant à la Bibliothèque nationale du Canada de reproduire, prêter, distribuer ou vendre des copies de sa thèse de quelque manière et sous quelque forme que ce... more
L'auteur a accordé une licence irrévocable e~ non exclusi'.! e permettant à la Bibliothèque nationale du Canada de reproduire, prêter, distribuer ou vendre des copies de sa thèse de quelque manière et sous quelque forme que ce soit pou!'mettre des exemplaires de cette ...
Page 1. Page 2. Page 3. Page 4. Page 5. Page 6. Page 7. Page 8. Page 9. Page 10. Page 11. Page 12. Page 13. Page 14. Page 15. Page 16. Page 17. Page 18. Page 19. Page 20. Page 21. Page 22. Page 23. Page 24. Page 25. Page 26. Page 27. Page... more
Page 1. Page 2. Page 3. Page 4. Page 5. Page 6. Page 7. Page 8. Page 9. Page 10. Page 11. Page 12. Page 13. Page 14. Page 15. Page 16. Page 17. Page 18. Page 19. Page 20. Page 21. Page 22. Page 23. Page 24. Page 25. Page 26. Page 27. Page 28. Page 29. Page 30. Page ...
Abstract—Nowadays cloud-computing services are being offered by various organizations. Peer-to-Peer (P2P) networks can be used as a collaborative computing environment to solve computationally intensive problems. In this work, we use a PC... more
Abstract—Nowadays cloud-computing services are being offered by various organizations. Peer-to-Peer (P2P) networks can be used as a collaborative computing environment to solve computationally intensive problems. In this work, we use a PC cluster to simulate a P2P network and present results of a computationally intensive image matching algorithm (fingerprint verification). Collective communications are used to transfer images to destination peers over a network. Communication to computation time ratio are calculated ...
Abstract: Message Passing Interface (MPI) is an important mechanism in P2P. Herein we assess how different types of MPI collective communication functions perform on a Gigabit Ethernet Homogeneous Beowulf PC cluster. In this way we... more
Abstract: Message Passing Interface (MPI) is an important mechanism in P2P. Herein we assess how different types of MPI collective communication functions perform on a Gigabit Ethernet Homogeneous Beowulf PC cluster. In this way we provide an insight on the factors that affect P2P applications over an enterprise context such as the emerging Cloud-based services. By contrast to the literature, which includes mostly theoretical studies, we carry out an empirical study. We show that in case of gather and scatter, the message size is ...
Ultrasonic sensors have been used in a variety of applications to measure ranges to objects. Hand gestures via ultrasonic sensors form unique motion patterns for controls. In this research, patterns formed by placing a set of objects in a... more
Ultrasonic sensors have been used in a variety of applications to measure ranges to objects. Hand gestures via ultrasonic sensors form unique motion patterns for controls. In this research, patterns formed by placing a set of objects in a grid of cells are used for control purposes. A neural network algorithm is implemented on a microcontroller which takes in range signals as inputs read from ultrasonic sensors and classifies them in one of four classes. The neural network is then trained to classify patterns based on objects’ locations in real-time. The testing of the neural network for pattern recognition is performed on a testbed consisting of Inter-Integrated Circuit (I2C) ultrasonic sensors and a microcontroller. The performance of the proposed model is presented and it is observed the model is highly scalable, accurate, robust and reliable for applications requiring high accuracy such as in robotics and artificial intelligence.
In this paper we present two methodologies, one is to use MPI collective communication functions as performance measures to measure communication time between peers. The other is to use a Distributed Genetic algorithm with MPI functions... more
In this paper we present two methodologies, one is to use MPI collective communication functions as performance measures to measure communication time between peers. The other is to use a Distributed Genetic algorithm with MPI functions running on each peer node for solving a variety of optimization problems. Genetic Algorithms are found useful in variety of problems, such as in searching and optimization. Distributed Genetic Algorithms are inherently embarrassingly parallel which leads to efficient implementation on the nodes. In this work DGA is used first to distribute resources on nodes to maximize availability within budget and second to find in-best network routes within links cost and end-to-end delay. The iterations for DGA to converge are measured. It is seen overall performance of DGA is not affected as nodes join or leave the network.
In this paper MPI is used on PC Cluster to compute all the eigenvalues of Hermitian Toeplitz Matrices. The parallel algorithms presented were implemented in C++ with MPI functions inserted and run on a cluster of Lenovo ThinkCentre... more
In this paper MPI is used on PC Cluster to compute all the eigenvalues of Hermitian Toeplitz Matrices. The parallel algorithms presented were implemented in C++ with MPI functions inserted and run on a cluster of Lenovo ThinkCentre machines running RedHat Linux. The two methods, MAHT-P one embarrassingly parallel and the other MPEAHT using master/ slave scheme are compared for performance and results presented. It is seen that computation time is reduced and speedup factor increases with the number of computers used for the two parallel schemes presented. Load balancing becomes an issue as number of computers in a cluster are increased. A solution is provided to overcome such a case.
A recursive algorithm is developed for finding the eigenvalues of a Hermitian Toeplitz matrix order n. The algorithm presented represents a generalization to the Hermitian case of one proposed by D.M. Wilkes and M.H. Hayes (1987) for the... more
A recursive algorithm is developed for finding the eigenvalues of a Hermitian Toeplitz matrix order n. The algorithm presented represents a generalization to the Hermitian case of one proposed by D.M. Wilkes and M.H. Hayes (1987) for the symmetric Toeplitz case. The method proposed uses Levinson's algorithm, or the more computationally efficient Hermitian Levinson algorithm of S.D. Morgera and H.