Faculty Members researchs

You are here

Outlook of Coordinated Transmission Control in 5G Networks for IoTs Usman Tariq
The sum of wireless nodes are forecasted to ascent sharply from about ten billion in year 2018 to twenty-five billion by 2020. Consequently, the data packet capacity response is anticipated to increase in future. The projected 5th generation (5G) of cellular grids is anticipated to be a blend of grid mechanisms with diverse magnitudes, transfer energy, backhaul networks and wireless access equipment. Although there are several fascinating complications comprised by the 5G context, we highlighted the problems of communication mechanism with the potential of Internet of Things (IoT). We offer a charter to discover required method constraints strategy that deal with the preeminent advances in terms of possible output for device-to-device inspired mobile grids. We explore the working and breakdown of immediate data and energy handover in IoT and assess individually about communication outage likelihood and energy outage possibility. ...
Mechatronic design of a biofeedback based-hand exoskeleton for physical rehabilitation Yassine Salah BOUTERAA

Abstract—Recently, there has been a knowing interest in the development of robotic applications for physical rehabilitation. In particular, robotic rehabilitation has received significant attention for hand and wrist therapy due to its ability to provide highintensity repetitive movement therapy with less effort compared to the traditional methods. In this context, a new robotic device for hand is developed. The actuator mechanism provide free motion of the five-fingers and allows to operate each one separately. Indeed, using an embedded controller and five servomotors, the robotic system is able to drive in real time three degrees of freedom (DOFs) for each finger. Based on the biofeedback signal, the developed robotic therapy device can detect the intension of the opening/ closing of the hand. The implementation is simple and very practical, just the electrodes have to be well placed on the suitable muscles in order to detect the correct signals. Myoelectric signals detected through electrodes are measured using an embedded EMG sensor. The filtered signal is processed by an Atmel microcontroller. Two features were implemented to determine the intention and therefore the handgrip force estimation. The signal processing results are mapped to control the servomotors actions.

...
Distributed second order sliding mode control for networked robots synchronisation: theory and experimental results Yassine Salah BOUTERAA

The paper focuses on synchronisation and trajectory tracking problems. The main goal of the distributed strategy is to produce and maintain a common behaviour using only local information interactions. A combination of a trajectory tracking theory and cross-coupling algorithms has been used to solve synchronisation problems for a group of Lagrangian systems. A robust control law based on a modified high order sliding mode concept is developed. In the control architecture, the increment of the control responsible to the robustness of the proposed approach is not proportional to the sign of the sliding surface, but it is proportional to the integral of a sign function. The Lyapunov-based approach has been used to establish the multi-robot systems asymptotic stability. Experimental results are provided to demonstrate the performance of the proposed control schemes.

...
Security Prospect of Healthcare in IoT arena Usman Tariq

Connected wellness program is a standard for healthcare provision that practice tools to deliver healthcare impeccably through various suppliers. It can deliver novel and exceptional prospects for patients to participate in health workforce to accomplish their precaution. Also, it influences the evolving tools to permit precaution inside/outside sickbay, over the capability for portable and wearable technologies that links to cloud-centered context aware healthcare devices. Defense is not just about shielding information it is essential for preserving the precautions, confidentiality, and reliance of patients. The defenselessness of wellbeing-care to computer-generated attack mirrors a blend of aspects, particularly imperfect resources, patchy control, and edifying performance. The projected system has enhanced information security by adopting a novel technique of cryptographic method of relayed information and buffered information. Precisely, the manuscript delivers a general assessment of security threats influencing the attainment of ICT implementation in well-being care and offers configuration investigation and flexibility study based on the theoretical simulations. In addition, existing information solidity algorithms are examined, because when using the tiny payloads associated to IoT systems, it does not pay off in terms of process utilization anomalies. Experimental and arithmetical study is being conducted to assess authentic challenges by developing a classified cloud infrastructure.

...
Constrained region-space control for medical robot manipulator, Journal of Computers and Electrical Engineering Yassine Salah BOUTERAA
This paper addresses the remote control of robot skeleton based on gesture recognition of a human operator’s body. The control motion procedure is facilitated by the use of the Kinect motion capture sensor, which transmits appropriate signals to the robot’s joints to adequately replicate the operator’s movement. Since the movement of the human opera- tor is allowed to occupy the whole Kinect’s space field of view, the arm robot however might have limited range of operation and therefore is subjected to operate in constrained region of the task space. The concept used for the control of the arm robot relies on the employment of the potential energy of a specified geometric desired region. The controller also incorporates high filtered version of joint errors to regulate the system without joint velocity measurement. The approach is experimentally demonstrated on five degrees of freedom articulated robot arm. ...
A Heterogeneous Framework to Detect Intruder Attacks in Wireless Sensor Networks Yasir M Ahmad

Wireless sensor network (WSN) has been broadly implemented in real world applications, such as monitoring of forest fire, military targets detection, medical and/or science areas and above all in our daily home life as well. Nevertheless, WSNs are effortlessly compromised by adversaries due to their broadcast transmission medium as a means of communication which are lacking in tamper resistance. Consequently, an intruder can over hear all traffic, replay previous messages, inject malicious data packets, or can compromise a node. Commonly, sensor nodes are very much vulnerable of two main issues in security aspect that are node authentication and compromising a node. In this paper, a heterogeneous framework of node capture and intrusion detection for WSNs is proposed. This framework efficiently detects the captured nodes by using a novel technique, embedded with an Intrusion Detection mechanism which aggregates Signature and Anomaly based approach with Neural Network Multi-Layer Perceptron (MLP) classification in a clustering environment. Moreover, the proposed framework achieves efficiency at reasonable computation and communication costs and it can be a security shield to real WSN applications.

...
A Heterogeneous Framework to Detect Intruder Attacks in Wireless Sensor Networks Usman Tariq
Abstract: Wireless sensor network (WSN) has been broadly implemented in real world applications, such as monitoring of forest fire, military targets detection, medical and/or science areas and above all in our daily home life as well. Nevertheless, WSNs are effortlessly compromised by adversaries due to their broadcast transmission medium as a means of communication which are lacking in tamper resistance. Consequently, an intruder can over hear all traffic, replay previous messages, inject malicious data packets, or can compromise a node. Commonly, sensor nodes are very much vulnerable of two main issues in security aspect that are node authentication and compromising a node. In this paper, a heterogeneous framework of node capture and intrusion detection for WSNs is proposed. This framework efficiently detects the captured nodes by using a novel technique, embedded with an Intrusion Detection mechanism which aggregates Signature and Anomaly based approach with Neural Network Multi-Layer Perceptron (MLP) classification in a clustering environment. Moreover, the proposed framework achieves efficiency at reasonable computation and communication costs and it can be a security shield to real WSN applications.  

Mustafa Al-Fayoumi, Yasir Ahmad and Usman Tariq, “A  Heterogeneous Framework to Detect Intruder Attacks in Wireless Sensor Networks” International Journal of Advanced Computer Science and Applications (IJACSA), 7(12), 2016. http://dx.doi.org/10.14569/IJACSA.2016.071207 

...
Global Ranking, Web Accessibility and Visibility of Websites of Quran: An Evaluation Study - 2015 Shouket Ahmad .

The less visible contents on web are difficult to search, so web users choose other alternatives for desired information. Thus a successful website should be accessible and visible on search engines. This research aims to evaluate sample Quranic website’s web accessibility level and visibility features like: traffic rank, inlinks, Page load time, search percentage and country visitors.

The websites can play an effective role in disseminating the Message of Quran. A more visible website on search engines can be accessed by big number of users and can be beneficial for the people at large scale, which helps to increase its linkage to other websites also  A sample data set of 10 Quranic websites/portals are investigated for Web Visibility and Content Accessibility. It is found that the Quranexplorer.com has attained a best traffic ranking among sample dataset. Any website following the Web Content Accessibility Guidelines can disseminate its information to many users despite users having aging or any disability problem like difficulty in hearing or vision. The research revealed several accessibility issues in terms of number of problems in sample dataset and concludes with few recommendations for good quality websites/web portals.

...
Secured architecture strategy for fighting against bots Shouket Ahmad .

The increase in bots breaking CAPTCHAs shows the ineffectiveness of the text-based CAPTCHAs that are used on most websites and Webmail services today. Bots can easily read the distorted letters and words using optical character recognition (OCR) or break the CAPTCHA using a dictionary attack. The weakness of each CAPTCHA scheme is summarized and accordingly we make an approach to build our CAPTCHA scheme. Considering the case study results and including other points which may pose difficulty for the OCR systems. In this paper we proposed a new technique to build a CAPTCHA which is hybrid (both Picture and Text based with multiple fonts). An image is being rendered on the screen and many text labels of multiple fonts drawn over it.......

...
SAUT CAPTCHA: A Security Verification System for Visually Impaired Web Users Shouket Ahmad .

CAPTCHAs are widely used by websites for security and privacy purposes. However, text or image-based CAPTCHAs are not suitable for individuals with visual impairments. Audio CAPTCHAs were introduced as an accessible alternative for those unable to use the more common visual CAPTCHAs, but anecdotal accounts have suggested that they may be more difficult to solve. We propose an audio CAPTCHA called SAUT CAPTCHA designed for visually impaired web users, which presents audio-based challenge in which the user has to recognize a word from specific voice type (male, female, child or old) and to read out specific word........

...
QR Code for https://cces.psau.edu.sa/en/sources/research