Faculty Members researchs

أنت هنا

Outlook of Coordinated Transmission Control in 5G Networks for IoTs Usman Tariq
The sum of wireless nodes are forecasted to ascent sharply from about ten billion in year 2018 to twenty-five billion by 2020. Consequently, the data packet capacity response is anticipated to increase in future. The projected 5th generation (5G) of cellular grids is anticipated to be a blend of grid mechanisms with diverse magnitudes, transfer energy, backhaul networks and wireless access equipment. Although there are several fascinating complications comprised by the 5G context, we highlighted the problems of communication mechanism with the potential of Internet of Things (IoT). We offer a charter to discover required method constraints strategy that deal with the preeminent advances in terms of possible output for device-to-device inspired mobile grids. We explore the working and breakdown of immediate data and energy handover in IoT and assess individually about communication outage likelihood and energy outage possibility. ...
Security Prospect of Healthcare in IoT arena Usman Tariq

Connected wellness program is a standard for healthcare provision that practice tools to deliver healthcare impeccably through various suppliers. It can deliver novel and exceptional prospects for patients to participate in health workforce to accomplish their precaution. Also, it influences the evolving tools to permit precaution inside/outside sickbay, over the capability for portable and wearable technologies that links to cloud-centered context aware healthcare devices. Defense is not just about shielding information it is essential for preserving the precautions, confidentiality, and reliance of patients. The defenselessness of wellbeing-care to computer-generated attack mirrors a blend of aspects, particularly imperfect resources, patchy control, and edifying performance. The projected system has enhanced information security by adopting a novel technique of cryptographic method of relayed information and buffered information. Precisely, the manuscript delivers a general assessment of security threats influencing the attainment of ICT implementation in well-being care and offers configuration investigation and flexibility study based on the theoretical simulations. In addition, existing information solidity algorithms are examined, because when using the tiny payloads associated to IoT systems, it does not pay off in terms of process utilization anomalies. Experimental and arithmetical study is being conducted to assess authentic challenges by developing a classified cloud infrastructure.

...
A Heterogeneous Framework to Detect Intruder Attacks in Wireless Sensor Networks Usman Tariq
Abstract: Wireless sensor network (WSN) has been broadly implemented in real world applications, such as monitoring of forest fire, military targets detection, medical and/or science areas and above all in our daily home life as well. Nevertheless, WSNs are effortlessly compromised by adversaries due to their broadcast transmission medium as a means of communication which are lacking in tamper resistance. Consequently, an intruder can over hear all traffic, replay previous messages, inject malicious data packets, or can compromise a node. Commonly, sensor nodes are very much vulnerable of two main issues in security aspect that are node authentication and compromising a node. In this paper, a heterogeneous framework of node capture and intrusion detection for WSNs is proposed. This framework efficiently detects the captured nodes by using a novel technique, embedded with an Intrusion Detection mechanism which aggregates Signature and Anomaly based approach with Neural Network Multi-Layer Perceptron (MLP) classification in a clustering environment. Moreover, the proposed framework achieves efficiency at reasonable computation and communication costs and it can be a security shield to real WSN applications.  

Mustafa Al-Fayoumi, Yasir Ahmad and Usman Tariq, “A  Heterogeneous Framework to Detect Intruder Attacks in Wireless Sensor Networks” International Journal of Advanced Computer Science and Applications (IJACSA), 7(12), 2016. http://dx.doi.org/10.14569/IJACSA.2016.071207 

...
Global Ranking, Web Accessibility and Visibility of Websites of Quran: An Evaluation Study - 2015 شوكت احمد د

The less visible contents on web are difficult to search, so web users choose other alternatives for desired information. Thus a successful website should be accessible and visible on search engines. This research aims to evaluate sample Quranic website’s web accessibility level and visibility features like: traffic rank, inlinks, Page load time, search percentage and country visitors.

The websites can play an effective role in disseminating the Message of Quran. A more visible website on search engines can be accessed by big number of users and can be beneficial for the people at large scale, which helps to increase its linkage to other websites also  A sample data set of 10 Quranic websites/portals are investigated for Web Visibility and Content Accessibility. It is found that the Quranexplorer.com has attained a best traffic ranking among sample dataset. Any website following the Web Content Accessibility Guidelines can disseminate its information to many users despite users having aging or any disability problem like difficulty in hearing or vision. The research revealed several accessibility issues in terms of number of problems in sample dataset and concludes with few recommendations for good quality websites/web portals.

...
SAUT CAPTCHA: A Security Verification System for Visually Impaired Web Users شوكت احمد د

CAPTCHAs are widely used by websites for security and privacy purposes. However, text or image-based CAPTCHAs are not suitable for individuals with visual impairments. Audio CAPTCHAs were introduced as an accessible alternative for those unable to use the more common visual CAPTCHAs, but anecdotal accounts have suggested that they may be more difficult to solve. We propose an audio CAPTCHA called SAUT CAPTCHA designed for visually impaired web users, which presents audio-based challenge in which the user has to recognize a word from specific voice type (male, female, child or old) and to read out specific word........

...
Multi-Modal CAPTCHA: A User Verification Scheme شوكت احمد د

CAPTCHA is an automated test that humans can pass, but current computer programs can't
pass: any program that has high success over a CAPTCHA can be used to solve an unsolved Articial
Intelligence (AI) problem. The most widely used CAPTCHAs rely on the sophisticated distortion of text
images rendering them unrecognizable to the state of the art of pattern recognition techniques, and these
text-based schemes have found widespread applications in commercial websites like free email service
providers, social networking sites and online auction sites. The increase in bots breaking CAPTCHAs
shows the ineffectiveness of the text-based CAPTCHAs that are used on most websites and Webmail
services today. Bots can easily read the distorted letters and words using optical character recognition
(OCR) or break the CAPTCHA using a dictionary attack. The weakness of each CAPTCHA scheme is
summarized and accordingly we make an approach to build our CAPTCHA scheme. Considering the case
study results and including other points which may pose difficulty for the OCR systems. In this paper we
proposed a new technique to build a CAPTCHA which is multi-modal (Picture and Text based). An
image is being rendered on the screen and many text labels drawn over it. A user has to identify the
correct name of the underlying image among the set of text labels that are scattered over it, in order to
pass a human verification test. We also proposed to use cursive text instead of plain text labels.

...
SECURED ARCHITECTURE STRATEGY FOR FIGHTING AGAINST BOTS Yasir احمد Ahmad

CAPTCHA stands for Completely Automated Public Turing Tests to Tell Computers and Humans Apart .A CAPTCHA is a program that protects websites against bots –automated scripts by generating and grading tests that humans can pass but current computer programs cannot. The aim is to allow the server to identify the visitor is a human or a computer, and only provide services to human. It can improve the current server system and user information security.The increase in bots breaking CAPTCHAs shows the ineffectiveness of the text-based CAPTCHAs that are used on most websites and Webmail services today. Bots can easily read the distorted letters and words using optical character recognition (OCR) or break the CAPTCHA using a dictionary attack. The weakness of each CAPTCHA scheme is summarized and accordingly we make an approach to build our CAPTCHA scheme. Considering the case study results and including other points which may pose difficulty for the OCR systems. In this paper we proposed a new technique to build a CAPTCHA which is hybrid (both Picture and Text based with multiple fonts). An image is being rendered on the screen and many text labels of multiple fonts drawn over it. A user has to identify the correct name of the underlying image among the set of text labels that are scattered over it, in order to pass a human verification test. We proposed to use multiple fonts for each letter of a single word inside a Captcha which increases the more complexity of training OCR...

Detecting Cyber Attacks at Data Dribble Yasir احمد Ahmad
This research article proposes a new technique for detecting unauthorized network intrusions, based on a traffic flow model and Cisco NetFlow protocol application [1,2]. This technique allows us to detect the most common types of network attack (DDoS and port scanning) and most importantly make a list of IP-addresses of trespassers. So, the technique can be used in intrusion detection systems, and in those systems which can track and lock these IP-addresses. ...
A New Approach in T-FA Authentication with OTP Using Mobile Phone Yasir احمد Ahmad
Security will never go out of style. The most existing network applications authenticate users with an username/password system. Such systems using the reusable passwords are susceptible to attacks based on the theft of the password. To overcome the above susceptibility in the existing applications There exist an authentication mechanism known as Two factor Authentication (T-FA). Two factor authentication is a process used to authenticate or verify the identity of a person or other entity requesting access under security constraints. It is a system wherein two different factors are used in conjunction to authenticate. Using two factors as opposed to one factor generally delivers a higher level of authentication assurance. With One-time password (OTP) a factor makes it more difficult to gain unauthorized access to restricted resources, like a computer account, bank account etc. In this paper, we propose a new approach in implementing the two factor authentication with one of the factor as one time password key generation using mobile phones. ...
Processing the Text of the Holy Quran: a Text Mining Study محمد عثمان علي حجازي
The Holy Quran is the reference book for more than 1.6 billion of Muslims all around the world Extracting information and knowledge from the Holy Quran is of high benefit for both specialized people in Islamic studies as well as non-specialized people. This paper initiates a series of research studies that aim to serve the Holy Quran and provide helpful and accurate information and knowledge to the all human beings. Also, the planned research studies aim to lay out a framework that will be used by researchers in the field of Arabic natural language processing by providing a ”Golden Dataset” along with useful techniques and information that will advance this field further. The aim of this paper is to find an approach for analyzing Arabic text and then providing statistical information which might be helpful for the people in this research area. In this paper the holly Quran text is preprocessed and then different text mining operations are applied to it to reveal simple facts about the terms of the holy Quran. The results show a variety of characteristics of the Holy Quran such as its most important words, its wordcloud and chapters with high term frequencies. All these results are based on term frequencies that are calculated using both Term Frequency (TF) and Term Frequency-Inverse Document Frequency (TF-IDF) methods. ...
QR Code for https://cces.psau.edu.sa/ar/sources/research