Faculty Members researchs

أنت هنا

Paradigm Shift in the Security-n-Privacy Implementation of Semi-Distributed Online Social Networking عبدالله عبدالله الجمعة

Social Networking Applications has gained tremendous response from all the sections of people across the entire world from last few years. Social networking has crossed all the boundaries and glued whole world population together. Users of OSN (Online Social Networking) sites can re-connect with school friends, find some activity or even life partners, and make new friends. OSN has also revolutionized the business community. Now the companies leverage OSN’s credibility and build their reputation, get invaluable information about the customers. The companies are also using OSN for the advertising and the recruitment processes. However, posting of user information on OSN poses greater threats/risks as identity theft, online stalking, and information leakage. The volume and accessibility of personal information available on social networking sites have attracted malicious people who seek to exploit this information. This imposes greater threat to the users’ privacy and security. In this article many security and privacy challenges currently faced by OSN applications are mentioned. The distributed OSN architecture with an external control module is proposed and a prototype is also presented which overcomes many of the privacy, security, accessibility and identity challenges in different perspectives faced by current OSN applications. ...
Network Security Using Job Oriented Architecture (SUJOA) عبدالله عبدالله الجمعة

In the modern world operating system,various security systems (Collection of various security components) are already installed or can be directly installed in it. They are responsible for checking the complete node for suspicious behaviour. There are some ntrusions having the ability to hide themselves from being checked called armouring intrusions. In this research article we present alternative organisation of security systems. To distinguish operating system applications and security systems, the node is completely virtualized with current virtualized systems. The node is then checked by security systems from outside and the right security components are provided through job oriented architecture. Since they run on a virtual machine the infected nodes can be halted, duplicated and moved to other nodes for further analysis and legal aspects. The coordinated architecture analysed in this research article and the results of a preliminary implementation with positive results are discussed. ...

The main aim of this research work is to compress an image that is to remove the redundancies from

an image to such an extent that after decompression the image should be reasonably recognized. In this

approach the proposed, newly constructed multiscaling ancl mitiwavelet functions are used in multiwavelet

Lransform. This modified multiwavelet transforrn is implemented to achieve better image compression ancl decompression. We have also implemented otl'rer multiwavelet transforms such as GHM, df, se , Bih52S and

Cadrbal2 and compared tl're results with proposed modified multiwavelet transform. The results are compared

based on image compression parameters such-as entropy, redundancy, compression ratio, peak signal-to-1oise

ratio and mean square eiror' It is found that the results'of proposed modified multiwavelei transform is better

compared to other multiwavelet trar-rsformation technrques.

Denoising of an Image Using Discrete Stationary Wavelet Transform and Various Thresholding Techniques عبدالله عبدالله الجمعة

Image denoising has remained a fundamental problem in the field of image processing. With Wavelet transforms, various algorithms for denoising in wavelet domain were introduced. Wavelets gave a superior performance in image denoising due to its properties such as multi-resolution. The problem of estimating an image that is corrupted by Additive White Gaussian Noise has been of interest for practical and theoretical reasons. Non-linear methods especially those based on wavelets have become popular due to its advantages over linear methods. Here I applied non-linear thresholding techniques in wavelet domain such as hard and soft thresholding, wavelet shrinkages such as Visu-shrink (nonadaptive) and SURE, Bayes and Normal Shrink (adaptive), using Discrete Stationary Wavelet Transform (DSWT) for different wavelets, at different levels, to denoise an image and determine the best one out of them. Performance of denoising algorithm is measured using quantitative performance measures such as Signal-to-Noise Ratio (SNR) and Mean Square Error (MSE) for various thresholding techniques. ...
Efficient Scheduling Scheme for Mobile Wireless Sensor Network محمد بن سعيد القحطاني


Among many solutions for reducing the energy consumptions of sensor nodes, scheduling the active and sleep cycles of sensor nodes is significantly important for Wireless Sensor Network (WSN). This solution allows a small number of sensors to be in active mode that also guarantees the coverage of the whole network area and all other sensors in inactive or sleep mode by turning their radio off. Recently, many node scheduling schemes have been proposed in the literature. However, most of the schemes are designed for static sensor nodes which are not feasible for the WSN applications where, mobility of sensors is significantly important. For instance, static node scheduling schemes cannot work in health monitoring and habitat monitoring since sensors attached to human body and animals are mobile. Moreover, most existing approaches only consider achieving energy efficiency but reducing end-to-end delay and collision probability is also important for the emergency real-time and many other applications.


Thus, this project introduces an efficient and coverage-based node activity scheduling scheme for Mobile WSN (MWSN) in terms of energy consumptions and end-to-end data transmission delay.

QR Code for https://cces.psau.edu.sa/ar/sources/research/8