Yazar "Yahya, Khalid O. Moh." seçeneğine göre listele
Listeleniyor 1 - 13 / 13
Sayfa Başına Sonuç
Sıralama seçenekleri
Öğe Application of machine intelligence technology in the detection of vaccines and medicines for SARS-CoV-2(VERDUCI PUBLISHER, VIA GREGORIO VII, ROME 186-00165, ITALY, 2020) Alsharif, Mohammed H.; Alsharif, Yahia H.; Albreem, Mahmoud A. M.; Jahid, Abu; Solyman, Ahmad Amin Ahmad; Yahya, Khalid O. Moh.; Alomari, Osama Ahmad; Hossain, Md. SanwarResearchers have found many similarities between the 2003 severe acute respiratory syndrome (SARS) virus and SARSCoV-19 through existing data that reveal the SARS’s cause. Artificial intelligence (AI) learning models can be created to predict drug structures that can be used to treat COVID-19. Despite the effectively demonstrated repurposed drugs, more repurposed drugs should be recognized. Furthermore, technological advancements have been helpful in the battle against COVID-19. Machine intelligence technology can support this procedure by rapidly determining adequate and effective drugs against COVID-19 and by overcoming any barrier between a large number of repurposed drugs, laboratory/clinical testing, and final drug authorization. This paper reviews the proposed vaccines and medicines for SARSCoV-2 and the current application of AI in drug repurposing for COVID-19 treatment.Öğe Deep learning applications to combat the dissemination of COVID-19 disease: a review(VERDUCI PUBLISHER, VIA GREGORIO VII, ROME 186-00165, ITALY, 2020) Alsharif, Mohammed H.; Alsharif, Yahia H.; Yahya, Khalid O. Moh.; Alomari, Osama Ahmad; Albreem, Mahmoud A. M.; Jahid, AbuRecent Coronavirus (COVID-19) is one of the respiratory diseases, and it is known as fast infectious ability. This dissemination can be decelerated by diagnosing and quarantining patients with COVID-19 at early stages, thereby saving numerous lives. Reverse transcription-polymerase chain reaction (RTPCR) is known as one of the primary diagnostic tools. However, RT-PCR tests are costly and time-consuming; it also requires specific materials, equipment, and instruments. Moreover, most countries are suffering from a lack of testing kits because of limitations on budget and techniques. Thus, this standard method is not suitable to meet the requirements of fast detection and tracking during the COVID-19 pandemic, which motived to employ deep learning (DL)/ convolutional neural networks (CNNs) technology with X-ray and CT scans for efficient analysis and diagnostic. This study provides insight about the literature that discussed the deep learning technology and its various techniques that are recently developed to combat the dissemination of COVID-19 disease.Öğe Evaluating the Performance of Fuzzy-PID Control for Lane Recognition and Lane-Keeping in Vehicle Simulations(MDPI, ST ALBAN-ANLAGE 66, CH-4052 BASEL, SWITZERLAND, 2023) Moveh, Samuel; Yahya, Khalid O. Moh.; Attar, Hani; Amer, Ayman; Mohamed, Mahmoud; Badmos, Tajudeen AdelekeThis study presents the use of a vision-based fuzzy-PID lane-keeping control system for the simulation of a single-track bicycle model. The lane-keeping system (LKS) processes images to identify the lateral deviation of the vehicle from the desired reference track and generates a steering control command to correct the deviation. The LKS was compared to other lane-keeping control methods, such as Ziegler–Nichols proportional derivative (PD) and model predictive control (MPC), in terms of response time and settling time. The fuzzy-PID controller had the best performance, with fewer oscillations and a faster response time compared to the other methods. The PD controller was not as robust under various conditions due to changing parameters, while the MPC was not accurate enough due to similar reasons. However, the fuzzy-PID controller showed the best performance, with a maximum lateral deviation of 2 cm, a settling time of 12 s, and Kp and Kd values of 0.01 and 0.06, respectively. Overall, this work demonstrates the potential of using fuzzy-PID control for effective lane recognition and lane-keeping in vehicles.Öğe GCACS-IoD: A certificate based generic access control scheme for Internet of drones(ELSEVIER, RADARWEG 29, 1043 NX AMSTERDAM, NETHERLANDS, 2021) Chaudhry, Shehzad Ashraf; Yahya, Khalid O. Moh.; Karuppiah, Marimuthu; Kharel, Rupak; Bashir, Ali Kashif; Bin Zikria, YousafInternet of drones (IoD) has gained significant importance in recent times due to its applications in several critical domains ranging from commercial to defense and rescue operations. With several drones flying in different zones to carry out specified tasks, the IoD can be beneficial to gather the real time data for interpretation by the users. However, the data access is carried out through an open channel and battery operated drones. Therefore, the drones’ security and privacy are crucial for accomplishing mission-critical, safety-critical, or surveillance operations. In 2020, Bera et al. presented a certificate based access control scheme for securing the IoD access and argued the scheme’s security through formal and informal methods. However, the analysis presented in this paper shows that the scheme of Bera et al. does not provide anonymity and is insecure against multiple threats, including drone impersonation, the man in the middle, and replay attacks. We then designed a generic certificate based access control scheme to provide inter-drone and drone to ground station access control/authentication in the IoD domain (GCACS-IoD). The GCACS-IoD is provably secure against the known attacks and provides anonymity. GCACS-IoD extends security while preserving computation and communication efficiencies.Öğe LAS-SG: An Elliptic Curve-Based Lightweight Authentication Scheme for Smart Grid Environments(IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ 08855-4141, 2023) Chaudhry, Shehzad Ashraf; Yahya, Khalid O. Moh.; Garg, Sahil; Kaddoum, Georges; Hassan, Mohammad Mehedi; Zikria, Yousaf BinThe communication among smart meters (SMs) and neighborhood area network (NAN) gateways is a fundamental requisite for managing the energy consumption at the consumer site. The bidirectional communication among SMs and NANs over the insecure public channel is vulnerable to impersonation, SM traceability, and SM physical capturing attacks. Many existing schemes’ insecurities and/or inefficiencies call for an efficient and secure authentication scheme for smart grid infrastructure. In this article, we present a privacy preserving and lightweight authentication scheme for smart grid (LAS-SG) using elliptic curve cryptography. The proposed LAS-SG is proved as secure under the standard model. Moreover, the efficiency of the LAS-SG is extracted through a real-time experiment, which attests that proposed LAS-SG completes a round of authentication in 20.331 ms by exchanging only two messages and 192 B. Due to the adequate efficiency and ample security, the proposed LAS-SG is more appropriate for SG environments.Öğe A new maximum power point tracking algorithm based on power differentials method for thermoelectric generators(WILEY-HINDAWI, ADAM HOUSE, 3RD FL, 1 FITZROY SQ, LONDON WIT 5HE, ENGLAND, 2021) Yahya, Khalid O. Moh.; Alomari, Osama AhmadThis study uses a new maximum power point tracking (MPPT) algorithm for Thermoelectric Generator (TEG) devices. The MPPT algorithm appears as an essential solution due to the nature and the variation characteristics of the TEG devices under certain conditions. In this paper, the power differentialsmaximum power point tracking (PD-MPPT) algorithm is proposed to control the boost converter by measuring the output power of TEG devices at both the start and finishing points of the power curve along with making a comparison of these two measured power points. The priority is given to the highest power point until the maximum power point is achieved, and Kalman Filter has been applied to eliminate the oscillation generated from the TEG system. This algorithm does not require any extra circuit to measure the short-circuit current or the open-circuit voltage because there is no disconnection between the TEG and the load. The hardware implementation of the power differentials algorithm is demonstrated under steady-state conditions. Moreover, the PD-MPPT is an effective and applicable algorithm applied to grab the maximum power point from the Photovoltaics PVs and TEGs systems. The practical experiment is conducted using the “STM32f429” microcontroller to implement the algorithm. During the experiments, the change in the duty cycles is observed. The experimental results show that the PD-MPPT algorithm performs better under a steady-state and has the ability to track the maximum power point accurately.Öğe A Novel Pairing-Free Lightweight Authentication Protocol for Mobile Cloud Computing Framework(IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ 08855-4141, 2021) Irshad, Azeem; Chaudhry, Shehzad Ashraf; Alomari, Osama Ahmad; Yahya, Khalid O. Moh.; Kumar, NeerajThe mobile cloud computing (MCC) refers to an infrastructure that integrates cloud computing and mobile computing, and it has changed a great deal, the service provisioning of applications, which requires to get the data processed after collection from vast sensor and Internet-of-Things-based network. The ever increasing number of handheld mobile gadgets has exacerbated the need for robust and efficient authenticated key agreements. We could witness a number of MCC-based multiserver authentication schemes lately to foster the secure adaptation of the technology; however, the demonstrated solutions are either insecure or employing too costly bilinear pairing operations for implementation. In view of limitations, as illustrated in previous studies, we propose a novel pairing-free multiserver authentication protocol for MCC environment based on an elliptic curve cryptosystem that is not only efficient, but also free from security loopholes as demonstrated. The performance evaluation section discusses and distinguishes the findings among latest studies. The strength of the contributed scheme is proved theoretically under formal security model.Öğe A Privacy Enhanced Authentication Scheme for Securing Smart Grid Infrastructure(IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ 08855-4141, 2022) Chaudhry, Shehzad Ashraf; Nebhan, Jamel; Yahya, Khalid O. Moh.; Al-Turjman, FadiThe rapid advancements in smart grid (SG) technology extend a large number of applications including vehicle charging, smart buildings, and smart cities through the efficient use of advanced communication architecture. However, the underlying public channel leads these services to be vulnerable to many threats. Recently, some security schemes were proposed to counter these threats. However, the insecurities of some of these schemes against key compromise impersonation (KCI) and related attacks or compromise on efficiency calls for a secure and efficient authentication scheme for SG infrastructure. A new scheme to secure SG communication is presented in this article to provide a direct device-to-device authentication among smart meter and neighborhood area network gateway. Designed specifically to resists KCI and related attacks, the proposed scheme is more secure and completes the authentication procedure by using the least communication cost as compared with related schemes, which is evident through security and efficiency comparisons.Öğe A Secure and Reliable Device Access Control Scheme for IoT Based Sensor Cloud Systems(IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ 08855-4141, 2020) Chaudhry, Shehzad Ashraf; Yahya, Khalid O. Moh.; Al-Turjman, Fadi; Yang, Ming-HourAmong other security concerns, the reliable device to device direct communication is an important research aspect in sensor cloud system application of Internet of things (IoT). The access control mechanism can ensure the reliability through secure communication among two IoT devices without mediation of intermediate agent. Mainly, it requires twofold strategy involving the authentication of each other and session key establishment. Quite recently, in 2019, Das et al. proposed a certificate based lightweight access control and key agreement scheme for IoT devices (LACKA-IoT) to ensure smooth and secure access control and claimed LACKA-IoT to withstand the several attacks. Specifically, it is claimed that LACKA-IoT can resist device impersonation and man in middle attacks. However, the proof in this article refutes their claim and it is shown here, that LACKA-IoT is insecure against both device impersonation and man in middle attacks. An adversary just by using public parameters and by listening the communication channel can impersonate any device. Moreover, the same can also launch successful man in middle attack using public parameters and listened messages from public channel. An improved protocol iLACKA-IoT is then proposed in the paper. The iLACKA-IoT provides resistance against various types of threats and provides the required level of security, for evidence both formal validation through random or real (ROR) model as well as the informal validation through discussion on attack resilience is provided. The iLACKA-IoT is not only better in security but also provides performance efficiency as compared with LACKA-IoT and related schemes.Öğe Simple Mathematical and Simulink Model of Stepper Motor(MDPI, ST ALBAN-ANLAGE 66, CH-4052 BASEL, SWITZERLAND, 2022) Iqteit, Nassim A.; Yahya, Khalid O. Moh.; Makahleh, Firas M.; Attar, Hani; Amer, Ayman; Solyman, Ahmad Amin Ahmad; Qudaimat, Ahmad; Tamizi, KhaledThis paper presents a simple mathematical and Simulink model of a two-phase hybrid stepper motor, where ignoring the permeance space harmonics of the hybrid stepper motor is regarded as the main physical assumption in this article. Moreover, the dq transformation method is adopted as the main mathematical approach for the derivation of the proposed model, where simple voltages, currents, and torque equations are obtained and used to build the proposed Simulink and circuit model of the stepper motor. The validity and the effectiveness of the proposed model are examined by comparing its results with the results collected from the Simulink model in the library of Matlab. The obtained simulation results showed that the proposed model achieved a high simplicity and high accuracy when compared with conventional models.Öğe Strategic Market Growth and Policy Recommendations for Sustainable Solar Energy Deployment in South Korea(SPRINGER SINGAPORE PTE LTD, #04-01 CENCON I, 1 TANNERY RD, SINGAPORE 347719, SINGAPORE, 2020) Alsharif, Mohammed H.; Yahya, Khalid O. Moh.; Geem, Zong WooIt is widely acknowledged that the solar energy markets have experienced increasing interest in the last decade in South Korea, due to a significant economic and ecological impact of solar energy in the coming years. Despite their great technical potential, the development and deployment of large-scale solar energy technologies in South Korea still need to overcome some technical, financial, regulatory, and institutional barriers in order to achieve a vision of the green and eco-sustainable energy. This article provides an updated comprehensive overview of the technical and economic strategies, as well as policies for the development and deployment of solar energy in South Korea. The article reviews and discusses: (1) solar energy resources and technologies, (2) economics and market status of solar energy, (3) policy support for solar energy development, and (4) obstacles to the development and implementation of solar energy technology. Policymakers are given recommendations in which the cost and impact of social, environmental, and geographical factors are considered. This review contributes towards the future of green and eco-sustainable solar energy in South Korea.Öğe Sustainable Development of a Direct Methanol Fuel Cell Using the Enhanced LSHADE Algorithm and Newton Raphson Method(MDPIST ALBAN-ANLAGE 66, CH-4052 BASEL, SWITZERLAND, 2024) Singla, Manish Kumar; Gupta, Jyoti; Alsharif, Mohammed H.; Jahid, Abu; Yahya, Khalid O. Moh.This paper presents a mathematical model for stacks of direct methanol fuel cells (DMFCs) using an optimised method. In order to reduce the sum of squared errors (SSE) in calculating the polarisation profile, the suggested technique makes use of simulated experimental data. Given that DMFC is one of the viable fuel cell choices, developing an appropriate model is essential for cost reduction. However, resolving this issue has proven difficult due to its complex and highly nonlinear character, particularly when adjusting the DMFC model to various operating temperatures. By combining the algorithm and the objective function, the current work introduces a novel method called LSHADE (ELSHADE) for determining the parameters of the DMFC model. This technique seeks to accurately identify DMFCs’ characteristics. The ELSHADE method consists of two stages, the first of which is controlled by a reliable mutation process and the latter by a chaotic approach. The study also recommends an improved Newton–Raphson (INR) approach to deal with the chaotic nature of the I-V curve equation. The findings show that, when used on actual experimental data, the ELSHADE-INR technique outperforms existing algorithms in a variety of statistical metrics for accurately identifying global solutions.Öğe Toward Optimal Cost-Energy Management Green Framework for Sustainable Future Wireless Networks(TECH SCIENCE PRESS, 871 CORONADO CENTER DR, SUTE 200, HENDERSON, NV 89052, 2021) Alsharif, Mohammed H.; Jahid, Abu; Albreem, Mahmoud A. M.; Uthansakul, Peerapong; Nebhen, Jamel; Yahya, Khalid O. Moh.The design of green cellular networking according to the traffic arrivals has the capability to reduce the overall energy consumption to a cluster in a cost-effective way. The cell zooming approach has appealed much attention that adaptively offloads the BS load demands adjusting the transmit power based on the traffic intensity and green energy availability. Besides, the researchers are focused on implementing renewable energy resources, which are considered the most attractive practices in designing energy-efficient wireless networks over the long term in a cost-efficient way in the existing infrastructure. The utilization of available solar can be adapted to acquire cost-effective and reliable power supply to the BSs, especially that sunlight is free, available everywhere, and a good alternative energy option for the remote areas. Nevertheless, planning a photovoltaic scheme necessitates viability assessment to avoid poor power supply, particularly for BSs. Therefore, cellular operators need to consider both technical and economic factors before the implementation of solar-powered BSs. This paper proposed the user-centric cell zooming policy of solar-powered cellular base stations taking into account the optimal technical criteria obtained by the HOMER software tool. The results have shown that the proposed system can provide operational expenditure (OPEX) savings of up to 47%. In addition, the efficient allocation of resource blocks (RBs) under the cell zooming technique attain remarkable energy-saving performance yielding up to 27%.