بحوث أعضاء هيئة التدريس

أنت هنا

Moving from Heterogeneous Data Sources to Big Data: Interoperability and Integration Issues محمد عثمان علي حجازي

Heterogeneous databases now facing an emerging challenge of moving towards big data. These databases are adhoc polyglot systems, complex, and NoSQL tools which are semantically annotated. Integration of these heterogeneous databases becoming very challenging because of big data analytics is integrating human and machines contexts. In this paper, an attempt is made to study heterogeneous databases and their interoperability issues and integration issues, their impact on analysis of data. The data science has grown exponentially and a new paradigm has emerged which is of integration of heterogeneous data to big data. Information, knowledge and decision making become easier but the size of databases has grown and it became big data

...
Revisiting K-Means and Topic Modeling, a Comparison Study to Cluster Arabic Documents محمد عثمان علي حجازي
Clustering Arabic text documents is of high importance for many natural language technologies. This paper uses a combined method to cluster Arabic text documents. Mainly, we use generative models and clustering techniques. The study uses latent Dirichlet allocation and k-means clustering algorithm and applies them to a news data set used in previous similar studies. The aim of this paper is twofold: it rst shows that normalizing the weights in the vector space, for the document-term matrix of the text documents, dramatically improves the quality of clusters and hence the accuracy of clustering when using k-means algorithm. The results are compared to a recent study on clustering Arabic text documents. Second, it shows that the combined method is superior in terms of clustering quality for Arabic text documents according to external measures, such as purity, F-measure, entropy, accuracy, and other measures. It is shown in this paper that the purity of the combined method is 0.933 compared to 0.82 for k-means algorithm, and these gures are higher in comparison to a recent similar study. This is also conrmed by the other used validation measures. The correctness of the combined method is then conrmed using different Arabic data sets. ...
Moving from Heterogeneous Data Sources to Big Data: Interoperability and Integration Issues محمد عثمان علي حجازي

Heterogeneous databases now facing an emerging challenge of moving towards big data. These databases are adhoc polyglot systems, complex, and NoSQL tools which are semantically annotated. Integration of these heterogeneous databases becoming very challenging because of big data analytics is integrating human and machines contexts. In this paper, an attempt is made to study heterogeneous databases and their interoperability issues and integration issues, their impact on analysis of data. The data science has grown exponentially and a new paradigm has emerged which is of integration of heterogeneous data to big data. Information, knowledge and decision making become easier but the size of databases has grown and it became big data.

...
Robot-assisted surgery ياسين صالح بوترعة

Nowadays, robotic applications are diversifying with huge way and the need for interactive robots in real time becomes an insistent requirement. Indeed, robotic applications are enormously diverse and controlling development of modern meth- ods to push the emergence of autonomous robots capable of working in a highly complex environment. However, making use of robots that must be carefully programmed and calibrated before use becomes unacceptable and inapplicable in sev- eral applications areas. In fact, for some applications such as medicine, robots are somewhat limited particularly in a context of self-adaptation with circumstances that are not programmed in advance. Certainly, under conditions clearly defined these robots are limited whether for reasons of lack of information or information processing or for reasons of unstructured work environment or partially unknown or crowded or high dynamics change. In medical fields, specially in surgical robots [1] , [2] , even though the robot is not a subject of boredom or fatigue or sensitive to radiation and even though it provides a high geometric accuracy and effort control as well as a large capacity to work in a hostile environment [3] , it remains in special circumstances unable to adapt and it lacks the ability to reason and thought. Therefore, there is a growing need to go beyond the robots that are specifically pre-programmed to those who adapt in real time and generate their movements and behavior based on interaction with its environment.

...
A gesture-based telemanipulation control ياسين صالح بوترعة

The idea is to exploit the natural stability and performance of the human arm during movement, execution and manipulation. The purpose of this paper is to remotely control a handling robot with a low cost but effective solution.

...
Mobility of Internet of Things and Fog Computing: Serious Concerns and Future Paths طارق احمد . اهينقر

IoT devised the modern world of technology into a world where different objects are joining the global network, exchanging, storing and processing the data using different surrounding environments and actively intercede. Enormous number of services can be visualized and put into reality by using the basic concepts of IoT. Since IoT devices are resource constrained, the concept of edge computing also termed as fog computing was proposed to assist IoT devices in handling and delivery information. The centralized cloud is not replaced by fog but enhances its functionality, accessibility and reliability in many means by distributing its principles and technologies through the CoT continuation, specifically at edge of network. The nearness of the fog and IoT nodes enables many distinctive features that should be available and protected always even during the movement of IoT devices through different places. This article discusses the main challenges by analyzing the concept of providing mobility support in a fog environment.

...
Internet of Things : A Comprehensive Study of Security Issues and Defence Mechanisms طارق احمد . اهينقر

The Internet of Things (IoT) is an evolving global trend in web-based information architecture aiding in the exchange of services and goods over a network without necessitating human to human or human to computer interaction. It has the potential to revolutionize physical world interaction of individuals and the organizations. The application of IoT can be recognized significantly in many areas such as in healthcare, resource management, learning, knowledge processing and many more. The practical realization of IoT is met with a plethora of security and privacy challenges that needs to be tackled for IoT’s successful deployment on a commercially viable large scale. This study analyzes the security issues related to IoT networks through an analysis of the existing empirical researches to get an insight on the security requirements of the IoT networks. The findings of the study revealed that security threats are one of the biggest and ever-growing challenges for IoT and it is essential to substantially mitigate them for the success of this platform.

...
Defense Scheme to Protect Internet of Things (IoT) from Cyber Attacks using Artificial Intelligence Principles طارق احمد . اهينقر

Even in its infancy, the internet of things (IoT) has enticed most of the modern industrial areas like smart cities, automobiles, medical technology. Since IoT connects everything together, it is vulnerable to a variety of devastating intrusion attacks. Being the internet of different devices makes it easy for attackers to launch their attacks. Thus, to combat all these attacks, an attack analysis is presented in this article using the basic principles of Artificial Neural Networks. Internet packet traces are used to train to the supervised ANN (Multilevel Perceptron) and evaluated after the training to decline the DDoS Attacks. This research article mainly focuses on the categorization of traffic patterns into legitimate traffic and attack traffic patterns in IoT network. The ANN processes are evaluated and tested in a simulated IoT network. The experimental results show a greater accuracy in detection of various DDoS attacks.

...
Mobility of Internet of Things and Fog Computing: Concerns and Future Directions Usman Tariq

International Journal of Communication Networks and Information Security (IJCNIS)

Vol. 10, No. 3, December 2018

...
Noise modeling in a signal conditioning circuit for low power audio application using resistive sensor جمال محمد نبهان
Piezoresistive sensors convert a physical value into a resistance variation. Often four resistive elements are connected together in a Wheatstone bridge to provide electrical variations of sensors. When this structure is biased with a fixed voltage source or a current source the topology provides a differential output voltage. To exploit information a conditioning circuit is associated to the bridge. In most cases it consists of an instrumentation amplifier followed by a data converter to obtain very quickly a digital representation of information. Due to the high input impedance of the instrumentation amplifier, bridge sensitivity is preserved. A filter may be added to avoid aliasing or a continuous time sigma-delta modulator that includes filtering feature. This study is concerning the conditioning structure for piezoresistive sensors bridge especially fully integrated microphones for biomedical application. The bridge signal to noise ratio is set by biasing the amplifier stage by current. The noise performance becomes the limiting factor of the read-out circuit. Current mode topologies drive amplifiers design where inputs are the main noise contributor. Modeling noise contribution is a key point in the design of the conditioning circuit. The current consumption leads noise performances too. A proposed architecture was implemented in a 65nm CMOS standard technology for performance measurement and evaluation with nanowire based microphone dedicated to hearing aids application. ...
QR Code for https://cces.psau.edu.sa/ar/sources/research