Yazar "Almohammedi, Akram A." seçeneğine göre listele
Listeleniyor 1 - 10 / 10
Sayfa Başına Sonuç
Sıralama seçenekleri
Öğe Advancements in Millimeter Wave MIMO Antenna ArraysforEnhanced5GConnectivityArrays for Enhanced 5G Connectivity(Ieee, 2023) Faniar, Asmail Abrahim Mohamed; Almohammedi, Akram A.; Balfaqih, MohammedThis study proposes an optimized MIMO antenna array design for 5G mm-wave communication systems that operates in the 38 GHz band. The design consists of two antenna arrays, each with four evenly spaced elements. The two arrays are assembled with a 90-degree shift, which provides improved performance in terms of gain, efficiency, and beamforming. The substrate is a Rogers RT5880 with a thickness of 0.254 mm and dielectric constants of 2.2 and a loss tangent of 0.0009, respectively. The proposed work combines the most desirable characteristics, including unique design, high gain, efficiency and wide operation of bandwidth. The proposed array antenna design offers a high efficiency up to 86.56% and high average gain up to 12.35 dBi for port-1 and port-2, resulting in attractive performance. The achievable bandwidth in the 38 GHz frequency band (37.5 - 38.4 GHz) is up to 927 MHz for port-1 and port-2. The return loss of our design is up to - 23.28 dB, which is still considered low loss for 38 GHz. The results obtained show that the antenna is a viable candidate for 5G applications at 38 GHz.Öğe Big Data in Healthcare Transformation: A Short Review(Ieee, 2022) Ghaleb, Ebrahim A. A.; Dominic, P. D. D.; Muneer, Amged; Almohammedi, Akram A.With the rising expense of healthcare and rising health insurance premiums, preventive healthcare and wellness are necessary. Additionally, a new era in medical records in the healthcare industry, digitalization has ushered in a paradigm shift. As a result, the healthcare industry is seeing an increase in data volume., complexity, variety, and timeliness. As healthcare professionals explore ways to reduce costs while enhancing care processes, delivery, and management, big data (BD), appears as a viable option with the potential to alter the sector. This paradigm changes from reactive to proactive healthcare has the potential to result in total cost savings and eventually economic development. However, while the healthcare business leverages the potential of BD, privacy concerns remain a top priority as new threats and vulnerabilities emerge. We describe the state-of-the-art privacy challenges in BD related to the healthcare business in this study.Öğe Cost and Efficiency Analysis of Steganography in the IEEE 802.11ah IoT Protocol(Tech Science Press, 2022) Almohammedi, Akram A.; Shepelev, Vladimir; Darshi, Sam; Balfaqih, Mohammed; Ghawbar, FayadThe widespread use of the Internet of Things (IoT) applications has enormously increased the danger level of data leakage and theft in IoT as data transmission occurs through a public channel. As a result, the security of the IoT has become a serious challenge in the field of information security. Steganography on the network is a critical tool for preventing the leakage of private information and enabling secure and encrypted communication. The primary purpose of steganography is to conceal sensitive information in any form of media such as audio, video, text, or photos, and securely transfer it through wireless networks. In this paper, we analyse the performance characteristics of one of the steganography techniques called Hidden Communication System for Corrupted Networks (HCCNETs) for hiding sensitive data. This performance analysis includes the efficiency and the cost of the system in Wireless Local Area Networks (WLANs), specifically in the IEEE 802.11ah IoT protocol. The analysis is mainly based on a two-dimensional Markov chain model in the presence of an error channel. Additionally, the model considers packet arrival rate, back-off timer freezing, back-off stages, and short retry limit to ensure compliance with IEEE 802.11ah requirements. It stresses the importance of taking these elements into consideration while modeling the efficiency and cost of the steganographic channel system. These parameters often result in a high precise channel access estimation, a more accurate and efficient accuracy measurements system, efficient channel utilisation, avoidance of throughput saturation overestimation, and ensuring that no packet is served endlessly. Evaluated results demonstrate that HCCNETs is an effective approach at low cost.Öğe Downlink Massive MIMO Systems: Reduction of Pilot Contamination for Channel Estimation with Perfect Knowledge of Large-Scale Fading(Univ Tun Hussein Onn Malaysia, 2023) Abdullah, Qazwan; Shah, Nor Shahida Mohd; Salh, Adeb; Almohammedi, Akram A.; Anuar, Shipun Hamza; Saeed, A. B. BinMassive multiple-input multiple-output (MIMO) technology is considered crucial for the development of future fifth-generation (5G) systems. However, a limitation of massive MIMO systems arises from the lack of orthogonality in the pilot sequences transmitted by users from a single cell to neighboring cells. To address this constraint, a proposed solution involves utilizing orthogonal pilot reuse sequences (PRS) and zero forced (ZF) pre-coding techniques. The primary objective of these techniques is to eradicate channel interference and improve the experience of end users who are afflicted by low-quality channels. The assessment of the channel involves evaluating its quality through channel assessment, conducting comprehensive evaluations of large-scale shutdowns, and analyzing the maximum transmission efficiency. By assigning PRS to a group of users, the proposed approach establishes lower bounds for the achievable downlink data rate (DR) and signal-to-interference noise ratio (SINR). These bounds are derived by considering the number of antennas approaches infinity which helps mitigate interference. Simulation results demonstrate that the utilization of improved channel evaluation and reduced loss leads to higher DR. When comparing different precoding techniques, the ZF method outperforms maximum ratio transmission (MRT) precoders in achieving a higher DR, particularly when the number of cells reaches y(p) = 7.Öğe Drone Assisted Network Coded Cooperation With Energy Harvesting: Strengthening the Lifespan of the Wireless Networks(Ieee-Inst Electrical Electronics Engineers Inc, 2022) Kumar, Pankaj; Bhattacharyya, Sagnik; Darshi, Sam; Sharma, Ashwani; Almohammedi, Akram A.; Shepelev, Vladimir; Shailendra, SamarNext generation wireless systems include battery operated devices which demand higher throughput and a better reliability in an energy efficient fashion. To fulfil these requirements, in this paper, we propose a novel scenario where we include a dynamic Wireless Power Splitting (WPS) factor for Energy Harvesting (EH) at nodes in a Drone Assisted Network Coded Cooperation (DA-NCC) system. The dynamic WPS factor used for EH in DA-NCC system is made more realistic by determining through the probability of Line-of-Sight (LoS) occurrence. Analytical framework is developed for residual Analog Network Coding (ANC) noise and variance of ANC-noise in EH scenario. We also derive the average rate and average outage probability expressions for the proposed channel model. Various algorithms are developed for deciding the Air-to-Ground (A2G) channel distributions, harvesting the energy at relay and source nodes and evaluating the performance metrics of our proposed work. Our investigations reveal that the use of EH in DA-NCC improves the lifespan of the network. Our findings play important roles in disaster management scenarios where cellular connections to base stations are disrupted due to natural calamities and battery constrained drones are deployed for assistance.Öğe Hybrid Relaying Based Cross Layer MAC Protocol Using Variable Beacon for Cooperative Vehicles(Ieee-Inst Electrical Electronics Engineers Inc, 2024) Bhattacharyya, Sagnik; Kumar, Pankaj; Darshi, Sam; Majhi, Sudhan; Kumbhani, Brijesh; Almohammedi, Akram A.The onset of network coded cooperation (NCC) and its applications in vehicle-to-everything (V2X) scenarios have allowed vehicular networks to relish both reliability and throughput which are the key factors in an on-road scenario. However, a typical NCC based network uses a time division multiple access (TDMA) based data transmission aided by a relay employing a fixed relaying scheme. This puts a concern on the system's quality-of-service (QoS). We thus propose a dual threshold-based hybrid (DTH) relaying scheme where the relay vehicle dynamically decides the relaying scheme or asks for a re-transmission to improve the QoS. The decision to select a relaying scheme is based on the instantaneous signal-to-noise ratio (SNR). Consequently, an acknowledgement frame structure is proposed to convey the crucial information to the destinations which are required during data extraction. A variable beacon interval is also proposed where the relay vehicle dynamically changes the beacon transmission time based on the number of re-transmissions which helps new users to join the system. Metrics like outage probability, achievable rate and throughput have been considered as the QoS metrics to compare the performance of the proposed model with respect to other existing works. Extensive simulations in MATLAB show that the proposed scheme experiences a better outage performance than amplify-and-forward (AF) whereas a worse performance when compared with decode-and-forward (DF). However, the better performance in the case of DF comes with a trade-off in terms of throughput when compared to the proposed scheme.Öğe Outage Analysis Using Probabilistic Channel Model for Drone Assisted Multi-User Coded Cooperation System(Ieee-Inst Electrical Electronics Engineers Inc, 2023) Kumar, Pankaj; Bhattacharyya, Sagnik; Darshi, Sam; Majhi, Sudhan; Almohammedi, Akram A.; Shailendra, SamarThis paper proposes a statistical-based channel modelling approach for a drone assisted multi-user coded cooperation (DA-MUCC) for evaluating the performance metrics of a next-generation wireless communication system. The proposed approach may find its applications in smart cities, disaster management and agriculture for building reliable communication links among ground users (GUs)/user equipments (UEs) over the scenarios where an infrastructure-based network (like a Base Station (BS)) is difficult to establish or disrupted. In such scenarios, an air-to-ground (A2G) channel is modelled based on the probabilistic approach of line-of-sight (LoS) and statistical independence of the links. The network performance of the proposed system model is evaluated by closed-form average outage probability and average rate over the Rayleigh and Rician fading channel models. The analytical performance is corroborated by Monte-Carlo simulations and also compared with the existing state-of-the-art approaches. Finally, we derive the probability density function (PDF) for signal-to-noise ratio (SNR) of relay link which is useful under the scenarios where the direct links among GUs are in the deep fade.Öğe Performance Evaluation of Time Series Forecasting Methods in The Stock Market: A Comparative Study(Ieee, 2022) Dael, Fares Abdulhafidh; Yavuz, Ugur; Almohammedi, Akram A.Stock market forecasting is a challenging area for many researchers and investors since it is a stochastic environment. This paper aims to apply some of the existing forecasting methods to find the optimal method that gives high accuracy based on the given data. IBM stock market dataset has been used for this paper. Ten years of numerical collected data have been applied for training and testing. Eight forecasting methods have been tested which are Linear Regression, Multilayer Perceptron, RBF Regressor, SMO reg, Bagging, Random Sub Space, Timeseries Holt-Winters, and Random Forest. Python and Weka tools have been used for processing, analyzing, and testing. SMO regression has shown an excellent performance compared to the other applied methods in IBM stock market forecasting. The outcome of this paper will help the investors to take the right decision for selling, holding, or buying in the stock market.Öğe Vehicle Location Privacy Protection Mechanism Based on Location and Velocity(Ieee, 2022) Shaleesh, Izdihar Sh; Almohammedi, Akram A.; Mohammad, Naji, I; Muneer, AmgedVehicular ad hoc networks (VANETs) are necessary to protect the lives of drivers by providing them with important information about the condition of the road. However, this type of network is vulnerable to eavesdropping due to the wireless medium of the spread of Beacons messages, which makes drivers worry about the possibility of being pursued through the network. Thus, protecting the privacy of vehicles is an urgent matter in VANETS environments. In this paper, a privacy protection system based on changing pseudonyms depending on the speed of the vehicle and its location inside or outside the predefined mix-zones is proposed. The simulation results show that the proposed strategy is an effective strategy to protect the location information of vehicle drivers. The proposed strategy outperforms existing strategies in terms of mean number tracker confusion, continuous tracking period, and maximum entropy.Öğe Visualizing Realistic Benchmarked IDS Dataset: CIRA-CIC-DoHBrw-2020(Ieee-Inst Electrical Electronics Engineers Inc, 2022) Yusof, Mohammad Hafiz Mohd; Almohammedi, Akram A.; Shepelev, Vladimir; Ahmed, OsmanIntrusion Detection System (IDS) dataset is crucial to detect lateral movement of cyber-attacks. IDS dataset will help to train the IDS classifier model to achieve earliest detection. A good near-realism public dataset is essential to assist the development of advanced IDS classifier models. However, the available public IDS dataset has long been under scrutiny for its practicality to reflect real low-footprint cyber threats, render real-time network scenario, reflect recent malware attack over newly developed DoH protocol, disregard layer 3 information and finally publish contradictory results of classification and analysis between various studies which makes it non-reproducible and without shareable results. This problem can be resolved by sophisticatedly visualizing a new realistic, real-time, low footprint and up-to-date benchmarked dataset. Visualization helps to detect data deformation before designing the optimized and highly accurate classifier model. Therefore, this study aims to review a new realistic benchmarked IDS dataset and apply sophisticated technique to visualize them. The review starts by carefully examining production network features. These are then compared with various well-established public IDS datasets. Many of them are static, unrealistic meta-features and disregard source and destination Internet Protocol (IP) information except CIRA-CIC-DoHBrw-2020 dataset. The study then applies Eigen Centrality (EC) technique from the graph theory to visualize this layer 3 (L3) information. Finally, using various visualization techniques such as Principal Component Analysis (PCA) and Gaussian Mixture Model (GMM), the study further analyzes and subsequently visualizes the data. Results show that the CIRA-CIC-DoHBrw-2020 simulated recent malware attack and has a very imbalanced dataset which reflects the realistic low-footprint cyber-attacks. The centrality graph clearly visualizes IPs that are compromised by recent DoH attack in real-time, and the study concludes decisively that smaller packet length of size 1000 to 2000 bytes is to fit an attack trait.