Displaying all 10 publications

Abstract:
Sort:
  1. Yagoub MFS, Khalifa OO, Abdelmaboud A, Korotaev V, Kozlov SA, Rodrigues JJPC
    Sensors (Basel), 2021 Jul 31;21(15).
    PMID: 34372449 DOI: 10.3390/s21155206
    Wireless Sensor Networks (WSNs) have gained great significance from researchers and industry due to their wide applications. Energy and resource conservation challenges are facing the WSNs. Nevertheless, clustering techniques offer many solutions to address the WSN issues, such as energy efficiency, service redundancy, routing delay, scalability, and making WSNs more efficient. Unfortunately, the WSNs are still immature, and suffering in several aspects. This paper aims to solve some of the downsides in existing routing protocols for WSNs; a Lightweight and Efficient Dynamic Cluster Head Election routing protocol (LEDCHE-WSN) is proposed. The proposed routing algorithm comprises two integrated methods, electing the optimum cluster head, and organizing the re-clustering process dynamically. Furthermore, the proposed protocol improves on others present in the literature by combining the random and periodic electing method in the same round, and the random method starts first at the beginning of each round/cycle. Moreover, both random and periodic electing methods are preceded by checking the remaining power to skip the dead nodes and continue in the same way periodically with the rest of the nodes in the round. Additionally, the proposed protocol is distinguished by deleting dead nodes from the network topology list during the re-clustering process to address the black holes and routing delay problems. Finally, the proposed algorithm's mathematical modeling and analysis are introduced. The experimental results reveal the proposed protocol outperforms the LEACH protocol by approximately 32% and the FBCFP protocol by 8%, in terms of power consumption and network lifetime. In terms of Mean Package Delay, LEDCHE-WSN improves the LEACH protocol by 42% and the FBCFP protocol by 15%, and regarding Loss Ratio, it improves the LEACH protocol by approximately 46% and FBCFP protocol by 25%.
  2. Salih S, Hamdan M, Abdelmaboud A, Abdelaziz A, Abdelsalam S, Althobaiti MM, et al.
    Sensors (Basel), 2021 Dec 15;21(24).
    PMID: 34960483 DOI: 10.3390/s21248391
    Cloud ERP is a type of enterprise resource planning (ERP) system that runs on the vendor's cloud platform instead of an on-premises network, enabling companies to connect through the Internet. The goal of this study was to rank and prioritise the factors driving cloud ERP adoption by organisations and to identify the critical issues in terms of security, usability, and vendors that impact adoption of cloud ERP systems. The assessment of critical success factors (CSFs) in on-premises ERP adoption and implementation has been well documented; however, no previous research has been carried out on CSFs in cloud ERP adoption. Therefore, the contribution of this research is to provide research and practice with the identification and analysis of 16 CSFs through a systematic literature review, where 73 publications on cloud ERP adoption were assessed from a range of different conferences and journals, using inclusion and exclusion criteria. Drawing from the literature, we found security, usability, and vendors were the top three most widely cited critical issues for the adoption of cloud-based ERP; hence, the second contribution of this study was an integrative model constructed with 12 drivers based on the security, usability, and vendor characteristics that may have greater influence as the top critical issues in the adoption of cloud ERP systems. We also identified critical gaps in current research, such as the inconclusiveness of findings related to security critical issues, usability critical issues, and vendor critical issues, by highlighting the most important drivers influencing those issues in cloud ERP adoption and the lack of discussion on the nature of the criticality of those CSFs. This research will aid in the development of new strategies or the revision of existing strategies and polices aimed at effectively integrating cloud ERP into cloud computing infrastructure. It will also allow cloud ERP suppliers to determine organisations' and business owners' expectations and implement appropriate tactics. A better understanding of the CSFs will narrow the field of failure and assist practitioners and managers in increasing their chances of success.
  3. Ramanjot, Mittal U, Wadhawan A, Singla J, Jhanjhi NZ, Ghoniem RM, et al.
    Sensors (Basel), 2023 May 15;23(10).
    PMID: 37430683 DOI: 10.3390/s23104769
    A significant majority of the population in India makes their living through agriculture. Different illnesses that develop due to changing weather patterns and are caused by pathogenic organisms impact the yields of diverse plant species. The present article analyzed some of the existing techniques in terms of data sources, pre-processing techniques, feature extraction techniques, data augmentation techniques, models utilized for detecting and classifying diseases that affect the plant, how the quality of images was enhanced, how overfitting of the model was reduced, and accuracy. The research papers for this study were selected using various keywords from peer-reviewed publications from various databases published between 2010 and 2022. A total of 182 papers were identified and reviewed for their direct relevance to plant disease detection and classification, of which 75 papers were selected for this review after exclusion based on the title, abstract, conclusion, and full text. Researchers will find this work to be a useful resource in recognizing the potential of various existing techniques through data-driven approaches while identifying plant diseases by enhancing system performance and accuracy.
  4. Riskhan B, Safuan HAJ, Hussain K, Elnour AAH, Abdelmaboud A, Khan F, et al.
    Sensors (Basel), 2023 Jul 21;23(14).
    PMID: 37514868 DOI: 10.3390/s23146574
    Cyberattacks in the modern world are sophisticated and can be undetected in a dispersed setting. In a distributed setting, DoS and DDoS attacks cause resource unavailability. This has motivated the scientific community to suggest effective approaches in distributed contexts as a means of mitigating such attacks. Syn Flood is the most common sort of DDoS assault, up from 76% to 81% in Q2, according to Kaspersky's Q3 report. Direct and indirect approaches are also available for launching DDoS attacks. While in a DDoS attack, controlled traffic is transmitted indirectly through zombies to reflectors to compromise the target host, in a direct attack, controlled traffic is sent directly to zombies in order to assault the victim host. Reflectors are uncompromised systems that only send replies in response to a request. To mitigate such assaults, traffic shaping and pushback methods are utilised. The SYN Flood Attack Detection and Mitigation Technique (SFaDMT) is an adaptive heuristic-based method we employ to identify DDoS SYN flood assaults. This study suggested an effective strategy to identify and resist the SYN assault. A decision support mechanism served as the foundation for the suggested (SFaDMT) approach. The suggested model was simulated, analysed, and compared to the most recent method using the OMNET simulator. The outcome demonstrates how the suggested fix improved detection.
  5. Mahmoud Z, Li C, Zappatore M, Solyman A, Alfatemi A, Ibrahim AO, et al.
    PeerJ Comput Sci, 2023;9:e1639.
    PMID: 38077556 DOI: 10.7717/peerj-cs.1639
    The correction of grammatical errors in natural language processing is a crucial task as it aims to enhance the accuracy and intelligibility of written language. However, developing a grammatical error correction (GEC) framework for low-resource languages presents significant challenges due to the lack of available training data. This article proposes a novel GEC framework for low-resource languages, using Arabic as a case study. To generate more training data, we propose a semi-supervised confusion method called the equal distribution of synthetic errors (EDSE), which generates a wide range of parallel training data. Additionally, this article addresses two limitations of the classical seq2seq GEC model, which are unbalanced outputs due to the unidirectional decoder and exposure bias during inference. To overcome these limitations, we apply a knowledge distillation technique from neural machine translation. This method utilizes two decoders, a forward decoder right-to-left and a backward decoder left-to-right, and measures their agreement using Kullback-Leibler divergence as a regularization term. The experimental results on two benchmarks demonstrate that our proposed framework outperforms the Transformer baseline and two widely used bidirectional decoding techniques, namely asynchronous and synchronous bidirectional decoding. Furthermore, the proposed framework reported the highest F1 score, and generating synthetic data using the equal distribution technique for syntactic errors resulted in a significant improvement in performance. These findings demonstrate the effectiveness of the proposed framework for improving grammatical error correction for low-resource languages, particularly for the Arabic language.
  6. Bhardwaj A, Vishnoi A, Bharany S, Abdelmaboud A, Ibrahim AO, Mamoun M, et al.
    PeerJ Comput Sci, 2023;9:e1771.
    PMID: 38192478 DOI: 10.7717/peerj-cs.1771
    The Internet of Things has a bootloader and applications responsible for initializing the device's hardware and loading the operating system or firmware. Ensuring the security of the bootloader is crucial to protect against malicious firmware or software being loaded onto the device. One way to increase the security of the bootloader is to use digital signature verification to ensure that only authorized firmware can be loaded onto the device. Additionally, implementing secure boot processes, such as a chain of trust, can prevent unauthorized access to the device's firmware and protect against tampering during the boot process. This research is based on the firmware bootloader and application dataflow taint analysis and security assessment of IoT devices as the most critical step in ensuring the security and integrity of these devices. This process helps identify vulnerabilities and potential attack vectors that attackers could exploit and provides a foundation for developing effective remediation strategies.
  7. Muhammed Yusuf N, Abu Bakar K, Isyaku B, Abdelmaboud A, Nagmeldin W
    PeerJ Comput Sci, 2023;9:e1698.
    PMID: 38192471 DOI: 10.7717/peerj-cs.1698
    Software-defined networking (SDN) is a networking architecture with improved efficiency achieved by moving networking decisions from the data plane to provide them critically at the control plane. In a traditional SDN, typically, a single controller is used. However, the complexity of modern networks due to their size and high traffic volume with varied quality of service requirements have introduced high control message communications overhead on the controller. Similarly, the solution found using multiple distributed controllers brings forth the 'controller placement problem' (CPP). Incorporating switch roles in the CPP modelling during network partitioning for controller placement has not been adequately considered by any existing CPP techniques. This article proposes the controller placement algorithm with network partition based on critical switch awareness (CPCSA). CPCSA identifies critical switch in the software defined wide area network (SDWAN) and then partition the network based on the criticality. Subsequently, a controller is assigned to each partition to improve control messages communication overhead, loss, throughput, and flow setup delay. The CPSCSA experimented with real network topologies obtained from the Internet Topology Zoo. Results show that CPCSA has achieved an aggregate reduction in the controller's overhead by 73%, loss by 51%, and latency by 16% while improving throughput by 16% compared to the benchmark algorithms.
  8. Dayong W, Bin Abu Bakar K, Isyaku B, Abdalla Elfadil Eisa T, Abdelmaboud A
    Heliyon, 2024 May 15;10(9):e29916.
    PMID: 38698997 DOI: 10.1016/j.heliyon.2024.e29916
    With the rapid development of Internet of Things (IoT) technology, Terminal Devices (TDs) are more inclined to offload computing tasks to higher-performance computing servers, thereby solving the problems of insufficient computing capacity and rapid battery consumption of TD. The emergence of Multi-access Edge Computing (MEC) technology provides new opportunities for IoT task offloading. It allows TDs to access computing networks through multiple communication technologies and supports more mobility of terminal devices. Review studies on IoT task offloading and MEC have been extensive, but none of them focus on IoT task offloading in MEC. To fill this gap, this paper provides a comprehensive and in-depth understanding of the algorithms and mechanisms of multiple IoT task offloading in the MEC network. For each paper, the main problems solved by the mechanism, technical classification, evaluation methods, and supported parameters are extracted and analyzed. Furthermore, shortcomings of current research and future research trends are discussed. This review will help potential and new researchers quickly understand the panorama of IoT task offloading approaches in MEC and find appropriate research paths.
  9. Isyaku B, Abu Bakar KB, Yusuf NM, Abaker M, Abdelmaboud A, Nagmeldin W
    Heliyon, 2024 May 15;10(9):e29965.
    PMID: 38698990 DOI: 10.1016/j.heliyon.2024.e29965
    The proliferation of the Internet of Things (IoT) devices has led to a surge in Internet traffic characterized by variabilities in Quality of Service (QoS) demands. Managing these devices and traffic effectively proves challenging, particularly within conventional IoT network architectures lacking centralized management. However, the advent of Software-Defined Networking (SDN) presents intriguing opportunities for network management, capable of addressing challenges in traditional IoT architectures. SDN's ability to provide centralized network management through a programmable controller, separate from data forwarding elements, has led researchers to incorporate SDN features with IoT (SDIoT) and Wireless Sensor Networks (SDWSN) ecosystems. However, despite the SDN support, these networks encounter challenges related to load-imbalance routing issues, as the SDN controller may be constrained while certain access points serving end users become overloaded. In response to these challenges, various load-balancing routing solutions have been proposed, each with distinct objectives. However, a comprehensive study that classifies and analyzes these solutions based on their weaknesses and postmortem challenges is currently lacking. This paper fills this gap by providing an in-depth classification of existing solutions. The study categorizes the problems addressed by different schemes and summarizes their findings. Furthermore, it discusses the shortcomings of current studies, and postmortem challenges associated with integrating SDN with IoT, and suggests future research directions.
  10. Mishra S, Chaudhury P, Tripathy HK, Sahoo KS, Jhanjhi NZ, Hassan Elnour AA, et al.
    Digit Health, 2024;10:20552076241256732.
    PMID: 39165388 DOI: 10.1177/20552076241256732
    OBJECTIVE: The modern era of cognitive intelligence in clinical space has led to the rise of 'Medical Cognitive Virtual Agents' (MCVAs) which are labeled as intelligent virtual assistants interacting with users in a context-sensitive and ambient manner. They aim to augment users' cognitive capabilities thereby helping both patients and medical experts in providing personalized healthcare like remote health tracking, emergency healthcare and robotic diagnosis of critical illness, among others. The objective of this study is to explore the technical aspects of MCVA and their relevance in modern healthcare.

    METHODS: In this study, a comprehensive and interpretable analysis of MCVAs are presented and their impacts are discussed. A novel system framework prototype based on artificial intelligence for MCVA is presented. Architectural workflow of potential applications of functionalities of MCVAs are detailed. A novel MCVA relevance survey analysis was undertaken during March-April 2023 at Bhubaneswar, Odisha, India to understand the current position of MCVA in society.

    RESULTS: Outcome of the survey delivered constructive results. Majority of people associated with healthcare showed their inclination towards MCVA. The curiosity for MCVA in Urban zone was more than in rural areas. Also, elderly citizens preferred using MCVA more as compared to youths. Medical decision support emerged as the most preferred application of MCVA.

    CONCLUSION: The article established and validated the relevance of MCVA in modern healthcare. The study showed that MCVA is likely to grow in future and can prove to be an effective assistance to medical experts in coming days.

Related Terms
Filters
Contact Us

Please provide feedback to Administrator (afdal@afpm.org.my)

External Links