Publications by authors named "Osama AlFarraj"

This paper proposes a new optimization technique to make an integration between the Optimal Reactive Power Dispatch (ORPD) problem and Electric Vehicles (EV). Here, a modified metaheuristic algorithm, called the Promoted Osprey Optimizer (POO) is used for this purpose. Inspired by the hunting behavior of ospreys, a predatory bird species, the POO algorithm employs various strategies like diving, soaring, and gliding to effectively explore the search space and avoid local optima.

View Article and Find Full Text PDF

With the swift advancement of technology and growing popularity of internet in business and communication, cybersecurity posed a global threat. This research focuses new Deep Learning (DL) model referred as FinSafeNet to secure loose cash transactions over the digital banking channels. FinSafeNet is based on a Bi-Directional Long Short-Term Memory (Bi-LSTM), a Convolutional Neural Network (CNN) and an additional dual attention mechanism to study the transaction data and influence the observation of various security threats.

View Article and Find Full Text PDF

As facial modification technology advances rapidly, it poses a challenge to methods used to detect fake faces. The advent of deep learning and AI-based technologies has led to the creation of counterfeit photographs that are more difficult to discern apart from real ones. Existing Deep fake detection systems excel at spotting fake content with low visual quality and are easily recognized by visual artifacts.

View Article and Find Full Text PDF
Article Synopsis
  • - This paper introduces a new method for digital watermarking of color images that enhances copyright protection and security by utilizing advanced mathematical techniques like moment and wavelet transformations alongside chaotic systems.
  • - The researchers improved efficiency by extending classical methods to quaternary moments, allowing them to bypass decomposing color images before applying transformations, which cuts down on computational effort.
  • - Their innovative watermarking system shows better performance compared to existing methods in terms of security, storage capacity, attack resistance, and image invisibility, thanks to techniques like QR decomposition and a modified chaotic map for enhanced robustness.
View Article and Find Full Text PDF
Article Synopsis
  • The paper discusses the growing focus on data-driven remote medical management, specifically for predicting survival time, by monitoring patient physical characteristics using intelligent algorithms.
  • It highlights the challenge of lacking multimedia information in traditional medical data analysis and proposes a solution using ensemble deep learning to improve feature representation.
  • The proposed framework, called "MDL-MDM", integrates multiple neural network models to enhance medical data management and shows promising results, achieving a 1-2% reduction in prediction error using cancer patient data.
View Article and Find Full Text PDF

In the context of the increasingly diversified blockchain technology, interoperability among heterogeneous blockchains has become key to further advancing this field. Existing cross-chain technologies, while facilitating data and asset exchange between different blockchains to some extent, have exposed issues such as insufficient security, low efficiency, and inconsistent standards. Consequently, these issues give rise to significant obstacles in terms of both scalability and seamless communication among blockchains within a multi-chain framework.

View Article and Find Full Text PDF

To avoid rounding errors associated with the limited representation of significant digits when applying the floating-point Krawtchouk transform in image processing, we present an integer and reversible version of the Krawtchouk transform (IRKT). This proposed IRKT generates integer-valued coefficients within the Krawtchouk domain, seamlessly aligning with the integer representation commonly utilized in lossless image applications. Building upon the IRKT, we introduce a novel 3D reversible data hiding (RDH) algorithm designed for the secure storage and transmission of extensive medical data within the IoMT (Internet of Medical Things) sector.

View Article and Find Full Text PDF

In the realm of hyperspectral image classification, the pursuit of heightened accuracy and comprehensive feature extraction has led to the formulation of an advance architectural paradigm. This study proposed a model encapsulated within the framework of a unified model, which synergistically leverages the capabilities of three distinct branches: the swin transformer, convolutional neural network, and encoder-decoder. The main objective was to facilitate multiscale feature learning, a pivotal facet in hyperspectral image classification, with each branch specializing in unique facets of multiscale feature extraction.

View Article and Find Full Text PDF

The rapid growth of the Internet of Things (IoT) and big data has raised security concerns. Protecting IoT big data from attacks is crucial. Detecting real-time network attacks efficiently is challenging, especially in the resource-limited IoT setting.

View Article and Find Full Text PDF

With the widespread application of 5G technology, there has been a significant surge in wireless video service demand and video traffic due to the proliferation of smart terminal devices and multimedia applications. However, the complexity of terminal devices, heterogeneous transmission channels, and the rapid growth of video traffic present new challenges for wireless network-based video applications. Although scalable video coding technology effectively improves video transmission efficiency in complex networks, traditional cellular base stations may struggle to handle video transmissions for all users simultaneously, particularly in large-scale networks.

View Article and Find Full Text PDF

Hybrid beamforming is a viable method for lowering the complexity and expense of massive multiple-input multiple-output systems while achieving high data rates on track with digital beamforming. To this end, the purpose of the research reported in this paper is to assess the effectiveness of the three architectural beamforming techniques (Analog, Digital, and Hybrid beamforming) in massive multiple-input multiple-output systems, especially hybrid beamforming. In hybrid beamforming, the antennas are connected to a single radio frequency chain, unlike digital beamforming, where each antenna has a separate radio frequency chain.

View Article and Find Full Text PDF

The integration of the Internet of Bio Nano Things (IoBNT) with artificial intelligence (AI) and molecular communications technology is now required to achieve eHealth, specifically in the targeted drug delivery system (TDDS). In this work, we investigate an analytical framework for IoBNT with Forster resonance energy transfer (FRET) nanocommunication to enable intelligent bio nano thing (BNT) machine to accurately deliver therapeutic drug to the diseased cells. The FRET nanocommunication is accomplished by using the well-known pair of fluorescent proteins, EYFP and ECFP.

View Article and Find Full Text PDF

With the rapid development of Industry 4.0, the data security of Industrial Internet of Things in the Industry 4.0 environment has received widespread attention.

View Article and Find Full Text PDF

Customer relationship management (CRM) is an innovative technology that seeks to improve customer satisfaction, loyalty, and profitability by acquiring, developing, and maintaining effective customer relationships and interactions with stakeholders. Numerous researches on CRM have made significant progress in several areas such as telecommunications, banking, and manufacturing, but research specific to the healthcare environment is very limited. This systematic review aims to categorise, summarise, synthesise, and appraise the research on CRM in the healthcare environment, considering the absence of coherent and comprehensive scholarship of disparate data on CRM.

View Article and Find Full Text PDF

In today's cyber world, the demand for the internet is increasing day by day, increasing the concern of network security. The aim of an Intrusion Detection System (IDS) is to provide approaches against many fast-growing network attacks (e.g.

View Article and Find Full Text PDF

Wireless Rechargeable Sensor Networks (WRSN) are not yet fully functional and robust due to the fact that their setting parameters assume fixed control velocity and location. This study proposes a novel scheme of the WRSN with mobile sink (MS) velocity control strategies for charging nodes and collecting its data in WRSN. Strip space of the deployed network area is divided into sub-locations for variant corresponding velocities based on nodes energy expenditure demands.

View Article and Find Full Text PDF

Fog computing is playing a vital role in data transmission to distributed devices in the Internet of Things (IoT) and another network paradigm. The fundamental element of fog computing is an additional layer added between an IoT device/node and a cloud server. These fog nodes are used to speed up time-critical applications.

View Article and Find Full Text PDF

Log anomaly detection is an efficient method to manage modern large-scale Internet of Things (IoT) systems. More and more works start to apply natural language processing (NLP) methods, and in particular word2vec, in the log feature extraction. Word2vec can extract the relevance between words and vectorize the words.

View Article and Find Full Text PDF

The proper utilization of road information can improve the performance of relay-node selection methods. However, the existing schemes are only applicable to a specific road structure, and this limits their application in real-world scenarios where mostly more than one road structure exists in the Region of Interest (RoI), even in the communication range of a sender. In this paper, we propose an adaptive relay-node selection (ARNS) method based on the exponential partition to implement message broadcasting in complex scenarios.

View Article and Find Full Text PDF

With the continuous development of science and engineering technology, our society has entered the era of the mobile Internet of Things (MIoT). MIoT refers to the combination of advanced manufacturing technologies with the Internet of Things (IoT) to create a flexible digital manufacturing ecosystem. The wireless communication technology in the Internet of Things is a bridge between mobile devices.

View Article and Find Full Text PDF

In the IoT (Internet of Things) environment, smart homes, smart grids, and telematics constantly generate data with complex attributes. These data have low heterogeneity and poor interoperability, which brings difficulties to data management and value mining. The promising combination of blockchain and the Internet of things as BCoT (blockchain of things) can solve these problems.

View Article and Find Full Text PDF