Ainuddin Wahid Abdul Wahab
YOU?
Author Swipe
View article: An explainable Recursive Feature Elimination to detect Advanced Persistent Threats using Random Forest classifier
An explainable Recursive Feature Elimination to detect Advanced Persistent Threats using Random Forest classifier Open
Intrusion Detection Systems (IDS) play a vital role in modern cybersecurity frameworks by providing a primary defense mechanism against sophisticated threat actors. In this paper, we propose an explainable intrusion detection framework tha…
View article: IMMERSIVE LEARNING THROUGH AUGMENTED REALITY: REDEFINING SKILL DEVELOPMENT IN TVET
IMMERSIVE LEARNING THROUGH AUGMENTED REALITY: REDEFINING SKILL DEVELOPMENT IN TVET Open
The integration of Augmented Reality (AR) in Technical and Vocational Education and Training (TVET) offers significant potential to transform conventional teaching into immersive, skill-focused learning experiences. Yet, the absence of str…
View article: An image quality assessment algorithm based on ‘global + local’ feature fusion
An image quality assessment algorithm based on ‘global + local’ feature fusion Open
Recently, there has been increasing research on image quality assessment. Among the existing mainstream approaches, image feature extraction tends to be simplistic, leading to insufficient quality information extraction and underutilizatio…
View article: A Generation Algorithm for “Text to Image” Based on Multi-Channel Attention
A Generation Algorithm for “Text to Image” Based on Multi-Channel Attention Open
Research on text-to-image has gained significant attention. However, existing methods primarily rely on upsampling convolution operations for feature extraction during the initial image generation stage. This approach has inherent limitati…
View article: Explainable deep learning approach for advanced persistent threats (APTs) detection in cybersecurity: a review
Explainable deep learning approach for advanced persistent threats (APTs) detection in cybersecurity: a review Open
In recent years, Advanced Persistent Threat (APT) attacks on network systems have increased through sophisticated fraud tactics. Traditional Intrusion Detection Systems (IDSs) suffer from low detection accuracy, high false-positive rates, …
View article: Adaptable and Dynamic Access Control Decision-Enforcement Approach Based on Multilayer Hybrid Deep Learning Techniques in BYOD Environment
Adaptable and Dynamic Access Control Decision-Enforcement Approach Based on Multilayer Hybrid Deep Learning Techniques in BYOD Environment Open
View article: Factors Influencing Social Media Adoption in Government Organizations: A TOE Framework and PLS-SEM Model Analysis
Factors Influencing Social Media Adoption in Government Organizations: A TOE Framework and PLS-SEM Model Analysis Open
In an era marked by rapid technological advancements, societal activities across diverse domains have undergone significant transformation. Within the information society, individuals and governments increasingly rely on technology-facilit…
View article: Systematic Literature Review on Security Access Control Policies and Techniques Based on Privacy Requirements in a BYOD Environment: State of the Art and Future Directions
Systematic Literature Review on Security Access Control Policies and Techniques Based on Privacy Requirements in a BYOD Environment: State of the Art and Future Directions Open
The number of devices connected within organisational networks through ”Bring Your Own Device” (BYOD) initiatives has steadily increased. BYOD security risks have resulted in significant privacy and security issues impacting organisational…
View article: Enhanced Adaptable and Distributed Access Control Decision Making Model Based on Machine Learning for Policy Conflict Resolution in BYOD Environment
Enhanced Adaptable and Distributed Access Control Decision Making Model Based on Machine Learning for Policy Conflict Resolution in BYOD Environment Open
Organisations are adopting new IT strategies such as “Bring Your Own Device” (BYOD) and remote working. These trends are highly beneficial both for enterprise owners and employees in terms of increased productivity and reduced costs. Howev…
View article: Exploring Social Media and Organisational Sustainability Performance Goals: Themes, Functional Areas, and Practices Learning from the Preceding Decade
Exploring Social Media and Organisational Sustainability Performance Goals: Themes, Functional Areas, and Practices Learning from the Preceding Decade Open
Enterprises have increased their involvement in sustainability because of social and ecological trends and quickly changing settings. The large-scale environmental influence in attaining sustainability is a serious problem for organisation…
View article: Skin lesion classification using multi-resolution empirical mode decomposition and local binary pattern
Skin lesion classification using multi-resolution empirical mode decomposition and local binary pattern Open
Skin cancer is the most common type of cancer in many parts of the world. As skin cancers start as skin lesions, it is important to identify precancerous skin lesions early. In this paper we propose an image based skin lesion identificatio…
View article: Enhanced Congestion Control Model Based on Message Prioritization and Scheduling Mechanism in Vehicle-to-Infrastructure (V2I)
Enhanced Congestion Control Model Based on Message Prioritization and Scheduling Mechanism in Vehicle-to-Infrastructure (V2I) Open
Vehicular Ad Hoc Networks (VANETs) is an origination of Mobile Ad-Hoc Network (MANET), where road vehicles will distribute messages and provide safety alerts to notice hazardous circumstances to the drivers. One of its greatest challenges …
View article: Permissions-Based Detection of Android Malware Using Machine Learning
Permissions-Based Detection of Android Malware Using Machine Learning Open
Malware applications (Apps) targeting mobile devices are widespread, and compromise the sensitive and private information stored on the devices. This is due to the asymmetry between informative permissions and irrelevant and redundant perm…
View article: Fundus Image Registration Technique Based on Local Feature of Retinal Vessels
Fundus Image Registration Technique Based on Local Feature of Retinal Vessels Open
Feature-based retinal fundus image registration (RIR) technique aligns fundus images according to geometrical transformations estimated between feature point correspondences. To ensure accurate registration, the feature points extracted mu…
View article: Classifier Performance Evaluation for Lightweight IDS Using Fog Computing in IoT Security
Classifier Performance Evaluation for Lightweight IDS Using Fog Computing in IoT Security Open
In this article, a Host-Based Intrusion Detection System (HIDS) using a Modified Vector Space Representation (MVSR) N-gram and Multilayer Perceptron (MLP) model for securing the Internet of Things (IoT), based on lightweight techniques and…
View article: Breast Cancer Detection via Global and Local Features using Digital Histology Images
Breast Cancer Detection via Global and Local Features using Digital Histology Images Open
Globally, breast cancer (BC) is the prevailing cause of unusual deaths in women. Breast tumor (BT) is a primary symptom and may lead to BC. Digital histology (DH) image modality is a gold standard medical test for a definite diagnosis of B…
View article: Internet of Drones Security and Privacy Issues: Taxonomy and Open Challenges
Internet of Drones Security and Privacy Issues: Taxonomy and Open Challenges Open
Internet of Drones (IoD) is a decentralized network and management framework that links drones’ access to the controlled airspace and provides inter-location navigation services. The interconnection of drones in the IoD network is through …
View article: An Edge Assisted Secure Lightweight Authentication Technique for Safe Communication on the Internet of Drones Network
An Edge Assisted Secure Lightweight Authentication Technique for Safe Communication on the Internet of Drones Network Open
Security and privacy are among the most critical challenges on the internet of drones (IoD) network. The communication entities of the IoD network can communicate securely with the use of authenticated key agreement (AKA) based techniques.…
View article: A LIGHTWEIGHT AUTHENTICATION TECHNIQUE FOR SECURE COMMUNICATION OF EDGE/FOG DATA-CENTERS
A LIGHTWEIGHT AUTHENTICATION TECHNIQUE FOR SECURE COMMUNICATION OF EDGE/FOG DATA-CENTERS Open
Edge computing has significantly enhanced the capabilities of cloud computing. Edge data-centres are used for storing data of the end-user devices. Secure communication between the legitimate edge data-centres during the load balancing pro…
View article: Local descriptor for retinal fundus image registration
Local descriptor for retinal fundus image registration Open
A feature‐based retinal image registration (RIR) technique aligns multiple fundus images and composed of pre‐processing, feature point extraction, feature descriptor, matching and geometrical transformation. Challenges in RIR include diffe…
View article: REAL-TIME AUTOMATED CONTOUR BASED MOTION TRACKING USING A SINGLE-CAMERA FOR UPPER LIMB ANGULAR MOTION MEASUREMENT
REAL-TIME AUTOMATED CONTOUR BASED MOTION TRACKING USING A SINGLE-CAMERA FOR UPPER LIMB ANGULAR MOTION MEASUREMENT Open
Upper limb angular motion measurement is particularly a subject of interest in the field of rehabilitation. It is commonly measured manually by physiotherapist via goniometer to monitor stroke patient’s progress. However, manual measuremen…
View article: Systematic Review on Security and Privacy Requirements in Edge Computing: State of the Art and Future Research Opportunities
Systematic Review on Security and Privacy Requirements in Edge Computing: State of the Art and Future Research Opportunities Open
Edge computing is a promising paradigm that enhances the capabilities of cloud computing. In order to continue patronizing the computing services, it is essential to conserve a good atmosphere free from all kinds of security and privacy br…
View article: Breast cancer classification using digital biopsy histopathology images through transfer learning
Breast cancer classification using digital biopsy histopathology images through transfer learning Open
Breast cancer (BC) infection, which is peculiar to women, brings about the high rate of deaths among women in every part of the world. The early investigation of BC has minimized the severe effects of cancer as compared to the last stage d…
View article: ACCELERATING FPGA-SURF FEATURE DETECTION MODULE BY MEMORY ACCESS REDUCTION
ACCELERATING FPGA-SURF FEATURE DETECTION MODULE BY MEMORY ACCESS REDUCTION Open
Feature detection is an important concept in the area of image processing to compute image abstractions of image information, which is used for image recognition and many other applications. One of the popular algorithm used is called the …
View article: A Lightweight Perceptron-Based Intrusion Detection System for Fog Computing
A Lightweight Perceptron-Based Intrusion Detection System for Fog Computing Open
Fog computing is a paradigm that extends cloud computing and services to the edge of the network in order to address the inherent problems of the cloud, such as latency and lack of mobility support and location-awareness. The fog is a dece…
View article: An Energy-Aware and Load-balancing Routing scheme for Wireless Sensor Networks
An Energy-Aware and Load-balancing Routing scheme for Wireless Sensor Networks Open
Energy and memory limitations are considerable constraints of sensor nodes in wireless sensor networks (WSNs). The limited energy supplied to network nodes causes WSNs to face crucial functional limitations. Therefore, the problem of limit…
View article: High-Capacity Image Steganography with Minimum Modified Bits Based on Data Mapping and LSB Substitution
High-Capacity Image Steganography with Minimum Modified Bits Based on Data Mapping and LSB Substitution Open
Steganography is the art and practice of communication using hidden messages. The least significant bits (LSB) based method is the well-known type of steganography in the spatial domain. Usually, achieving the larger embedding capacity in …
View article: Searching on Encrypted E-Data Using Random Searchable Encryption (RanSCrypt) Scheme
Searching on Encrypted E-Data Using Random Searchable Encryption (RanSCrypt) Scheme Open
Cloud computing is intensifying the necessity for searchable encryption (SE) for data protection in cloud storage. SE encrypts data to preserve its confidentiality while offering a secure search facility on the encrypted data. Typical inde…
View article: Source camera identification: a distributed computing approach using Hadoop
Source camera identification: a distributed computing approach using Hadoop Open
The widespread use of digital images has led to a new challenge in digital image forensics. These images can be used in court as evidence of criminal cases. However, digital images are easily manipulated which brings up the need of a metho…
View article: Sequential Monte Carlo Localization Methods in Mobile Wireless Sensor Networks: A Review
Sequential Monte Carlo Localization Methods in Mobile Wireless Sensor Networks: A Review Open
The advancement of digital technology has increased the deployment of wireless sensor networks (WSNs) in our daily life. However, locating sensor nodes is a challenging task in WSNs. Sensing data without an accurate location is worthless, …