Advances in intelligent systems and computing, 2019
The significant part of smart grid is to make smart grid cost-efficient by predicting electricity... more The significant part of smart grid is to make smart grid cost-efficient by predicting electricity price and load. To improve the prediction performance we proposed an Efficient Convolutional Neural Network (ECNN) and Efficient K-nearest Neighbour (EKNN) in which the parameters are tuned. It may be difficult to deal with huge amount of load data that is coming from the electricity market. To overcome this issue, we incorporated three modules in the proposed methodology. The proposed model consists of feature engineering and classification. Feature engineering is a two-step process (feature selection and feature extraction); for the purpose of feature selection Mutual Information (MI) is used which reduces the redundancy among features and for feature extraction Recursive Feature Elimination (RFE) is used to extract the principle features from the selected features and reduces the dimensionality of features. Finally, after training the data-set and the removal of the duplicate features load prediction is done by ECNN and EKNN. The ECNN and EKNN outperforms better then traditional Convolutional Neural Network (CNN) and K-nearest Neighbour (KNN). The forecast performance is evaluated by comparing the results with MAPE, RMSE, MAE and MSE. i.e. 10.8, 7.5, 7.15, and 10.4 respectively.
The existing security and privacy preserving solutions proposed for IoT-enabled consumer products... more The existing security and privacy preserving solutions proposed for IoT-enabled consumer products overlook communal acts of a consumer behavior. They lack support in case when IoT Consumers borrow, rent, gift, resale and retire their IoT-enabled electronic products. In this paper, we attempt to highlight IoT consumer's security and privacy violation through seemingly five different angles. We also speculate that IoT products or devices, even after their End of Life (EOL), i.e. “IoT waste”, could become an attractive gateway for cyber criminals to access private information. Consequently, we present some recommendations in this regard.
<p>Comparison of Communication Cost of RAWL and RWND, where the number of random walks (r) ... more <p>Comparison of Communication Cost of RAWL and RWND, where the number of random walks (r) in 8(a) is 3, 8(b) is 4 and 8(c) is 5.</p
This nowadays Internet of Things (IoT) has become a platform where devices are becoming more effi... more This nowadays Internet of Things (IoT) has become a platform where devices are becoming more efficient, with higher intellectual capability. For better implementation of the IoT, many challenges are present in 4th Generation of mobile communication technology (4G) that requires improvement of the IoT communication, cheaper cost of IoT products, lower latency and higher battery support. However, IoT device connectivity generates further privacy and security consideration. Existing research works are lack of basic details on 4G-based IoT. Through this paper general user will know not only the basic details but also understand basic security of 4Gbased IoT. It becomes a difficult task to manage large amount of data and combination of vendor applications. This paper aims at to focus the details of basic cellular 4G and IoT, their architectures, connectivity scenarios between IoT and 4G network and obviously security and privacy challenges, attacks, defense mechanism on Physical and MAC layers
Vehicle parking monitoring and management has become a big challenge for educational institutions... more Vehicle parking monitoring and management has become a big challenge for educational institutions with increasing enrollments, high percentage of vehicle ownership and decreasing parking supply which in result triggering blockage of vehicle, congestion, wastage of time and money. In university campuses particularly in Kingdom of Saudi Arabia, vehicle parking monitoring and management problem is getting worse and more frustrating due to the fact that majority of students, faculty and staff members own cars and drive through them to the university campuses. These common problems include finding out people (evidence) who are responsible for the damages (hitting, scraping, scratching and dents) to other cars and the blockage of car due to wrong car parking which takes much time to locate the owner of the car. Moreover, locating or forgetting their car park location another difficulty that is often faced by the students, faculty and staff members. The existing cameras located at the parking lots are only for video surveillance and cannot help in such situations as there is a lack of proper vehicle parking monitoring and management system. To cope with above mentioned problems and to ensure a better parking experience by accommodating increasing number of vehicles in a proper convenient manner, we propose a smart vehicle parking monitoring and management system called CampusSense. In CampusSense, Automatic Number Plate Recognition (ANPR) cameras and android based mobile application is developed to efficiently monitor, manage and protect the parking facilities at university campuses. Parking problems around the university campus faced by the students, faculty and staff members are analyzed by conducting a survey.
Advanced Information Networking and Applications, 2019
Virtual machine (VM) consolidation is an intelligent and efficient strategy to balance the load o... more Virtual machine (VM) consolidation is an intelligent and efficient strategy to balance the load of cloud data centers. VM consolidation includes a most important subproblem, i.e., VM placement problem. The basic objective of VM placement is to minimize the use of running physical machines (PMs). An enhanced levy based particle swarm optimization algorithm with variable sized bin packing (PSOLBP) is proposed for solving VM placement problem. Moreover, the best fit strategy is also used with the variable sized bin packing problem (VSBPP). Simulations are performed to check the performance of the proposed algorithm. The proposed algorithm is compared with simple particle swarm optimization (PSO) and the hybrid of levy flight and particle swarm optimization (LFPSO). The proposed algorithm efficiently minimized the number of running PMs. Matlab is used for simulations.
2017 International Conference on Radar, Antenna, Microwave, Electronics, and Telecommunications (ICRAMET), 2017
The oil and gas industrial sector is nowadays inclined towards utilizing smart field technologies... more The oil and gas industrial sector is nowadays inclined towards utilizing smart field technologies for optimizing various operations of upstream, midstream and downstream sectors. The recent advances in Internet of things (IoTs) have promising benefits and advantages over manual wired/wireless systems. Oil and gas wells form an important element of upstream sector. After identifying potential viable fields and drilling of exploratory oil and gas wells, wellhead monitoring is another essential and crucial activity not only for safe operation and productivity but also for extending the production life of these wells. In this paper we propose an intelligent IoT based monitoring system which involves smart objects for reliable and efficient monitoring of oil and gas wells. The smart IoT objects are capable of sensing important parameters like pressure temperature, vibration etc. and reliably, efficiently and timely deliver the sensed data to the control center. The proposed system proactively reports about the anomalous events for predictive maintenance of the well equipment. The detection and reporting catastrophic failures and destructive events on time will increase production downtime and also oil theft can be easily prevented.
2016 International Conference on Radar, Antenna, Microwave, Electronics, and Telecommunications (ICRAMET), 2016
Wireless Sensor Networks (WSNs) involve top potential technologies that will dramatically change ... more Wireless Sensor Networks (WSNs) involve top potential technologies that will dramatically change the way of human living and working. Many scientific, industrial and environmental applications require real time information related to physical events like pressure, temperature or humidity. In the past the only way to transfer the sensed data to control center was through cumbersome, costly wires. But recent advancement in wireless networking enables WSNs to communicate the sensed real time event data wirelessly. WSNs have capabilities of sensing, processing and communicating which make them most suitable for monitoring different oil and gas industries upstream, midstream and downstream operations which help to increase production, decrease the accidents, maintenance cost and malfunctioning. The contributions of this paper are threefold. First, we highlight various characteristics of both WSNs and Oil and Gas Industrial environment. Second, we present major requirements of Oil and Gas industrial operations in the three sectors upstream, midstream and downstream. Third, we present the important issues and challenges specific to Oil and Gas industrial environment which affects the working and efficacy of WSNs. These issues and challenges should be considered by the researchers and developers who are planning to design a WSNs based solution for Oil and Gas monitoring.
Social Collaborative Internet of Things (SCIoT) is a more elaborative form of Social Internet of ... more Social Collaborative Internet of Things (SCIoT) is a more elaborative form of Social Internet of Things (SIoT) in which, social objects collaborate by interacting and sharing information to achieve a common goal. In order to collaborate, smart objects need to be grouped and work together by developing a trusted environment and cooperative relationships among them. Trust management plays an important role in such SCIoT scenarios where smart objects have to establish social relationships. Also, these smart objects select other objects in their vicinity as friend or foe based on their trust upon those objects to establish an effective successful collaboration. In this paper, we contribute to present a survey of existing trust management schemes for SIoT, compare them by outlining their features and identify their drawbacks, etc. Furthermore, as far as our knowledge is concerned, we are the first to propose the definition of SCIoT, a hierarchical model of SCIoT for its important processes and a few application scenarios. In addition, we present a threat model to categorize the possible attacks that can be launched on SCIoT. Finally, we also highlight some challenges in the SCIoT.
2014 5th International Conference on Intelligent and Advanced Systems (ICIAS), 2014
Wireless Sensor Networks (WSNs) are a tremendous godsend to wireless technology; they can be empl... more Wireless Sensor Networks (WSNs) are a tremendous godsend to wireless technology; they can be employed in critical variety of vital applications such as health monitoring, smart farming and battlefield surveillance. This makes it more popular in emerging technologies that are used in our daily life. While WSNs have many benefits, there are also a few drawbacks. A big area of research into WSNs has concentrated on creating routing protocols that are energy efficient. It is a tremendous challenge to design routing protocols for applications of WSNs, which are mobility centric and energy efficient; because of network topology is often being changed. The concept of clustering offers more benefit than the other flat based routing protocols. A common side-effect of the many-to-one traffic pattern is the hot spot issue, which characterizes the majority of wireless sensor networks: nodes having the optimal path to the sink become overloaded with traffic from all other areas of the network which cause it to lose energy at a faster rate than the other nodes. This research work is aimed at evaluating and validating the proposed Mobile Data Collector-based routing protocol (MDC maximum residual energy LEACH) with A Novel Application Specific Network Protocol for Wireless Sensor Networks routing protocol (Hybrid multi-hop LEACH). A computer simulation was employed to obtain the results that have indicated an improvement in the overall energy efficiency of the network.
2018 International Conference on Radar, Antenna, Microwave, Electronics, and Telecommunications (ICRAMET), 2018
The most valuable and critical asset in any organization is its data and the data center is the c... more The most valuable and critical asset in any organization is its data and the data center is the custodian of this data. The data may be related to finance, employee personal information and sensitive organizational business plans. So physical and environmental monitoring of data center is one of the prime objectives of any organization. Failure to detect catastrophic events like fire or any other physical breach may lead to total shutdown of the data center. Important functions of any organization can also be stopped due to malfunctioning of hardware. The existing physical and environmental monitoring system for data centers are combination of many independent systems like access control hardware, video cameras with recording equipment’s, fire detection with alarming units and temperature, humidity, water leakage sensing. These systems are expensive and also hard to manage because of their heterogenous nature. More importantly these systems fail to detect event on time because they are not only dependent on internal resources like power supply and internet connectivity within the data center, but they also need human supervision. The smooth and protected functioning of data center is a challenging task. To bring these objectives in reality, Internet of Things (IoTs) could be among the best option. In this project we have proposed an internet of things based smart physical and environmental monitoring system for data centers. The proposed system will generate security alarms and notifications and will respond to situations when a threat occurs, and the smart object will take some task independently with human supervision.
2017 International Conference on Computer and Applications (ICCA), 2017
Recent advancement in technologies is reshaping our daily lives. The transformation has changed o... more Recent advancement in technologies is reshaping our daily lives. The transformation has changed our traditional class rooms to virtual class rooms which enables millions of people to access knowledge at their fingertips. Recently, Thin Client is one of the mostly adopted technologies in higher education. Universities in Saudi Arabia are among the pioneer international universities who embraced Thin Client technology. In this paper, we focus on the challenges faced and lessons learned during the implementations phase of Thin Client Technology at Saudi Arabian Universities. In addition, we also performed a comparative analysis of Thin Client Technology implemented at various Saudi Arabian universities.
Advances in intelligent systems and computing, 2019
The significant part of smart grid is to make smart grid cost-efficient by predicting electricity... more The significant part of smart grid is to make smart grid cost-efficient by predicting electricity price and load. To improve the prediction performance we proposed an Efficient Convolutional Neural Network (ECNN) and Efficient K-nearest Neighbour (EKNN) in which the parameters are tuned. It may be difficult to deal with huge amount of load data that is coming from the electricity market. To overcome this issue, we incorporated three modules in the proposed methodology. The proposed model consists of feature engineering and classification. Feature engineering is a two-step process (feature selection and feature extraction); for the purpose of feature selection Mutual Information (MI) is used which reduces the redundancy among features and for feature extraction Recursive Feature Elimination (RFE) is used to extract the principle features from the selected features and reduces the dimensionality of features. Finally, after training the data-set and the removal of the duplicate features load prediction is done by ECNN and EKNN. The ECNN and EKNN outperforms better then traditional Convolutional Neural Network (CNN) and K-nearest Neighbour (KNN). The forecast performance is evaluated by comparing the results with MAPE, RMSE, MAE and MSE. i.e. 10.8, 7.5, 7.15, and 10.4 respectively.
The existing security and privacy preserving solutions proposed for IoT-enabled consumer products... more The existing security and privacy preserving solutions proposed for IoT-enabled consumer products overlook communal acts of a consumer behavior. They lack support in case when IoT Consumers borrow, rent, gift, resale and retire their IoT-enabled electronic products. In this paper, we attempt to highlight IoT consumer's security and privacy violation through seemingly five different angles. We also speculate that IoT products or devices, even after their End of Life (EOL), i.e. “IoT waste”, could become an attractive gateway for cyber criminals to access private information. Consequently, we present some recommendations in this regard.
<p>Comparison of Communication Cost of RAWL and RWND, where the number of random walks (r) ... more <p>Comparison of Communication Cost of RAWL and RWND, where the number of random walks (r) in 8(a) is 3, 8(b) is 4 and 8(c) is 5.</p
This nowadays Internet of Things (IoT) has become a platform where devices are becoming more effi... more This nowadays Internet of Things (IoT) has become a platform where devices are becoming more efficient, with higher intellectual capability. For better implementation of the IoT, many challenges are present in 4th Generation of mobile communication technology (4G) that requires improvement of the IoT communication, cheaper cost of IoT products, lower latency and higher battery support. However, IoT device connectivity generates further privacy and security consideration. Existing research works are lack of basic details on 4G-based IoT. Through this paper general user will know not only the basic details but also understand basic security of 4Gbased IoT. It becomes a difficult task to manage large amount of data and combination of vendor applications. This paper aims at to focus the details of basic cellular 4G and IoT, their architectures, connectivity scenarios between IoT and 4G network and obviously security and privacy challenges, attacks, defense mechanism on Physical and MAC layers
Vehicle parking monitoring and management has become a big challenge for educational institutions... more Vehicle parking monitoring and management has become a big challenge for educational institutions with increasing enrollments, high percentage of vehicle ownership and decreasing parking supply which in result triggering blockage of vehicle, congestion, wastage of time and money. In university campuses particularly in Kingdom of Saudi Arabia, vehicle parking monitoring and management problem is getting worse and more frustrating due to the fact that majority of students, faculty and staff members own cars and drive through them to the university campuses. These common problems include finding out people (evidence) who are responsible for the damages (hitting, scraping, scratching and dents) to other cars and the blockage of car due to wrong car parking which takes much time to locate the owner of the car. Moreover, locating or forgetting their car park location another difficulty that is often faced by the students, faculty and staff members. The existing cameras located at the parking lots are only for video surveillance and cannot help in such situations as there is a lack of proper vehicle parking monitoring and management system. To cope with above mentioned problems and to ensure a better parking experience by accommodating increasing number of vehicles in a proper convenient manner, we propose a smart vehicle parking monitoring and management system called CampusSense. In CampusSense, Automatic Number Plate Recognition (ANPR) cameras and android based mobile application is developed to efficiently monitor, manage and protect the parking facilities at university campuses. Parking problems around the university campus faced by the students, faculty and staff members are analyzed by conducting a survey.
Advanced Information Networking and Applications, 2019
Virtual machine (VM) consolidation is an intelligent and efficient strategy to balance the load o... more Virtual machine (VM) consolidation is an intelligent and efficient strategy to balance the load of cloud data centers. VM consolidation includes a most important subproblem, i.e., VM placement problem. The basic objective of VM placement is to minimize the use of running physical machines (PMs). An enhanced levy based particle swarm optimization algorithm with variable sized bin packing (PSOLBP) is proposed for solving VM placement problem. Moreover, the best fit strategy is also used with the variable sized bin packing problem (VSBPP). Simulations are performed to check the performance of the proposed algorithm. The proposed algorithm is compared with simple particle swarm optimization (PSO) and the hybrid of levy flight and particle swarm optimization (LFPSO). The proposed algorithm efficiently minimized the number of running PMs. Matlab is used for simulations.
2017 International Conference on Radar, Antenna, Microwave, Electronics, and Telecommunications (ICRAMET), 2017
The oil and gas industrial sector is nowadays inclined towards utilizing smart field technologies... more The oil and gas industrial sector is nowadays inclined towards utilizing smart field technologies for optimizing various operations of upstream, midstream and downstream sectors. The recent advances in Internet of things (IoTs) have promising benefits and advantages over manual wired/wireless systems. Oil and gas wells form an important element of upstream sector. After identifying potential viable fields and drilling of exploratory oil and gas wells, wellhead monitoring is another essential and crucial activity not only for safe operation and productivity but also for extending the production life of these wells. In this paper we propose an intelligent IoT based monitoring system which involves smart objects for reliable and efficient monitoring of oil and gas wells. The smart IoT objects are capable of sensing important parameters like pressure temperature, vibration etc. and reliably, efficiently and timely deliver the sensed data to the control center. The proposed system proactively reports about the anomalous events for predictive maintenance of the well equipment. The detection and reporting catastrophic failures and destructive events on time will increase production downtime and also oil theft can be easily prevented.
2016 International Conference on Radar, Antenna, Microwave, Electronics, and Telecommunications (ICRAMET), 2016
Wireless Sensor Networks (WSNs) involve top potential technologies that will dramatically change ... more Wireless Sensor Networks (WSNs) involve top potential technologies that will dramatically change the way of human living and working. Many scientific, industrial and environmental applications require real time information related to physical events like pressure, temperature or humidity. In the past the only way to transfer the sensed data to control center was through cumbersome, costly wires. But recent advancement in wireless networking enables WSNs to communicate the sensed real time event data wirelessly. WSNs have capabilities of sensing, processing and communicating which make them most suitable for monitoring different oil and gas industries upstream, midstream and downstream operations which help to increase production, decrease the accidents, maintenance cost and malfunctioning. The contributions of this paper are threefold. First, we highlight various characteristics of both WSNs and Oil and Gas Industrial environment. Second, we present major requirements of Oil and Gas industrial operations in the three sectors upstream, midstream and downstream. Third, we present the important issues and challenges specific to Oil and Gas industrial environment which affects the working and efficacy of WSNs. These issues and challenges should be considered by the researchers and developers who are planning to design a WSNs based solution for Oil and Gas monitoring.
Social Collaborative Internet of Things (SCIoT) is a more elaborative form of Social Internet of ... more Social Collaborative Internet of Things (SCIoT) is a more elaborative form of Social Internet of Things (SIoT) in which, social objects collaborate by interacting and sharing information to achieve a common goal. In order to collaborate, smart objects need to be grouped and work together by developing a trusted environment and cooperative relationships among them. Trust management plays an important role in such SCIoT scenarios where smart objects have to establish social relationships. Also, these smart objects select other objects in their vicinity as friend or foe based on their trust upon those objects to establish an effective successful collaboration. In this paper, we contribute to present a survey of existing trust management schemes for SIoT, compare them by outlining their features and identify their drawbacks, etc. Furthermore, as far as our knowledge is concerned, we are the first to propose the definition of SCIoT, a hierarchical model of SCIoT for its important processes and a few application scenarios. In addition, we present a threat model to categorize the possible attacks that can be launched on SCIoT. Finally, we also highlight some challenges in the SCIoT.
2014 5th International Conference on Intelligent and Advanced Systems (ICIAS), 2014
Wireless Sensor Networks (WSNs) are a tremendous godsend to wireless technology; they can be empl... more Wireless Sensor Networks (WSNs) are a tremendous godsend to wireless technology; they can be employed in critical variety of vital applications such as health monitoring, smart farming and battlefield surveillance. This makes it more popular in emerging technologies that are used in our daily life. While WSNs have many benefits, there are also a few drawbacks. A big area of research into WSNs has concentrated on creating routing protocols that are energy efficient. It is a tremendous challenge to design routing protocols for applications of WSNs, which are mobility centric and energy efficient; because of network topology is often being changed. The concept of clustering offers more benefit than the other flat based routing protocols. A common side-effect of the many-to-one traffic pattern is the hot spot issue, which characterizes the majority of wireless sensor networks: nodes having the optimal path to the sink become overloaded with traffic from all other areas of the network which cause it to lose energy at a faster rate than the other nodes. This research work is aimed at evaluating and validating the proposed Mobile Data Collector-based routing protocol (MDC maximum residual energy LEACH) with A Novel Application Specific Network Protocol for Wireless Sensor Networks routing protocol (Hybrid multi-hop LEACH). A computer simulation was employed to obtain the results that have indicated an improvement in the overall energy efficiency of the network.
2018 International Conference on Radar, Antenna, Microwave, Electronics, and Telecommunications (ICRAMET), 2018
The most valuable and critical asset in any organization is its data and the data center is the c... more The most valuable and critical asset in any organization is its data and the data center is the custodian of this data. The data may be related to finance, employee personal information and sensitive organizational business plans. So physical and environmental monitoring of data center is one of the prime objectives of any organization. Failure to detect catastrophic events like fire or any other physical breach may lead to total shutdown of the data center. Important functions of any organization can also be stopped due to malfunctioning of hardware. The existing physical and environmental monitoring system for data centers are combination of many independent systems like access control hardware, video cameras with recording equipment’s, fire detection with alarming units and temperature, humidity, water leakage sensing. These systems are expensive and also hard to manage because of their heterogenous nature. More importantly these systems fail to detect event on time because they are not only dependent on internal resources like power supply and internet connectivity within the data center, but they also need human supervision. The smooth and protected functioning of data center is a challenging task. To bring these objectives in reality, Internet of Things (IoTs) could be among the best option. In this project we have proposed an internet of things based smart physical and environmental monitoring system for data centers. The proposed system will generate security alarms and notifications and will respond to situations when a threat occurs, and the smart object will take some task independently with human supervision.
2017 International Conference on Computer and Applications (ICCA), 2017
Recent advancement in technologies is reshaping our daily lives. The transformation has changed o... more Recent advancement in technologies is reshaping our daily lives. The transformation has changed our traditional class rooms to virtual class rooms which enables millions of people to access knowledge at their fingertips. Recently, Thin Client is one of the mostly adopted technologies in higher education. Universities in Saudi Arabia are among the pioneer international universities who embraced Thin Client technology. In this paper, we focus on the challenges faced and lessons learned during the implementations phase of Thin Client Technology at Saudi Arabian Universities. In addition, we also performed a comparative analysis of Thin Client Technology implemented at various Saudi Arabian universities.
Uploads
Papers by Mohammed Aalsalem