Mohammed Saeed Alkatheiri
YOU?
Author Swipe
View article: A Dual-Band, Dual-Pattern Antenna for Body-Centric Communications
A Dual-Band, Dual-Pattern Antenna for Body-Centric Communications Open
A dual-band, dual-pattern antenna is presented for 1.437 GHz L-band and 2.45 GHz Industrial Scientific and Medical (ISM) band applications. The antenna is based on multilayer circular patches with symmetric slots and two asymmetric cylindr…
View article: Enhanced Skin Cancer Classification using Deep Learning and Nature-based Feature Optimization
Enhanced Skin Cancer Classification using Deep Learning and Nature-based Feature Optimization Open
This paper presents a skin cancer classification model that combines a pre-trained Convolutional Neural Network (CNN) with a nature-inspired feature optimization algorithm. A custom dataset comprising both malignant and benign skin cancer …
View article: Blockchain-Assisted Cybersecurity for the Internet of Medical Things in the Healthcare Industry
Blockchain-Assisted Cybersecurity for the Internet of Medical Things in the Healthcare Industry Open
The Internet of Medical Things (IoMT) plays an important role in strengthening sustainable healthcare systems. IoMT significantly influences our healthcare because it facilitates monitoring and checking patient medical information before t…
View article: Use of Blockchain-Based Smart Contracts in Logistics and Supply Chains
Use of Blockchain-Based Smart Contracts in Logistics and Supply Chains Open
Blockchain is a disrupting technology that has the capability to completely alter the design, activities, and product flows in logistics and supply chain networks. It provides assurance of openness, immutability, transparency, security, an…
View article: Redundant Transmission Control Algorithm for Information-Centric Vehicular IoT Networks
Redundant Transmission Control Algorithm for Information-Centric Vehicular IoT Networks Open
Vehicular Adhoc Networks (VANETs) enable vehicles to act as mobile nodes that can fetch, share, and disseminate information about vehicle safety, emergency events, warning messages, and passenger infotainment. However, the continuous disse…
View article: Application of Physical Unclonable Function for Lightweight Authentication in Internet of Things
Application of Physical Unclonable Function for Lightweight Authentication in Internet of Things Open
© 2023 Tech Science Press. All rights reserved. cc-by
View article: A Lightweight Authentication Scheme for a Network of Unmanned Aerial Vehicles (UAVs) by Using Physical Unclonable Functions
A Lightweight Authentication Scheme for a Network of Unmanned Aerial Vehicles (UAVs) by Using Physical Unclonable Functions Open
A network of agents constituted of multiple unmanned aerial vehicles (UAVs) is emerging as a promising technology with myriad applications in the military, public, and civil domains. UAVs’ power, memory, and size constraints, ultra-mobile …
View article: A New Security Boundary of Component Differentially Challenged XOR PUFs Against Machine Learning Modeling Attacks
A New Security Boundary of Component Differentially Challenged XOR PUFs Against Machine Learning Modeling Attacks Open
Physical Unclonable Functions (PUFs) are promising security primitives for resource-constrained network nodes. The XOR Arbiter PUF (XOR PUF or XPUF) is an intensively studied PUF invented to improve the security of the Arbiter PUF, probabl…
View article: A New Security Boundary of Component Differentially Challenged XOR Pufs Against Machine Learning Modeling Attacks
A New Security Boundary of Component Differentially Challenged XOR Pufs Against Machine Learning Modeling Attacks Open
Physical Unclonable Functions (PUFs) are promising security primitives for resource-constrained network nodes. The XOR Arbiter PUF (XOR PUF or XPUF) is an intensively studied PUF invented to improve the security of the Arbiter PUF, probabl…
View article: A Novel Database Watermarking Technique Using Blockchain as Trusted Third Party
A Novel Database Watermarking Technique Using Blockchain as Trusted Third Party Open
With widespread use of relational database in various real-life applications, maintaining integrity and providing copyright protection is gaining keen interest of the researchers. For this purpose, watermarking has been used for quite a lo…
View article: Spectrum Handoff Aware AODV Routing Protocol for Cognitive Radio Vehicular Ad Hoc Networks
Spectrum Handoff Aware AODV Routing Protocol for Cognitive Radio Vehicular Ad Hoc Networks Open
End‐to‐end application performance and throughput of vehicular cognitive transport control protocol depend on how efficiently the segments (TCP header) are being transmitted from source to destination. One way to enhance the performance of…
View article: A Fast Deep Learning Method for Security Vulnerability Study of XOR PUFs
A Fast Deep Learning Method for Security Vulnerability Study of XOR PUFs Open
Physical unclonable functions (PUF) are emerging as a promising alternative to traditional cryptographic protocols for IoT authentication. XOR Arbiter PUFs (XPUFs), a group of well-studied PUFs, are found to be secure against machine learn…
View article: Fingerprinting of Relational Databases for Stopping the Data Theft
Fingerprinting of Relational Databases for Stopping the Data Theft Open
The currently-emerging technology demands sharing of data using various channels via the Internet, disks, etc. Some recipients of this data can also become traitors by leaking the important data. As a result, the data breaches due to data …
View article: Robustness and Unpredictability for Double Arbiter PUFs on Silicon Data: Performance Evaluation and Modeling Accuracy
Robustness and Unpredictability for Double Arbiter PUFs on Silicon Data: Performance Evaluation and Modeling Accuracy Open
Classical cryptographic methods that inherently employ secret keys embedded in non-volatile memory have been known to be impractical for limited-resource Internet of Things (IoT) devices. Physical Unclonable Functions (PUFs) have emerged a…
View article: Secure opinion sharing for reputation-based systems in mobile ad hoc networks
Secure opinion sharing for reputation-based systems in mobile ad hoc networks Open
Due to the basic nature of mobile ad hoc networks, that is, infrastructure-less, it is prone to individual or collective misbehaviors by participating node(s). Participating nodes could act selfishly and does cause massive loss to network …
View article: Context-Aware Autonomous Security Assertion for Industrial IoT
Context-Aware Autonomous Security Assertion for Industrial IoT Open
© 2020 Institute of Electrical and Electronics Engineers Inc.. All rights reserved. cc-by
View article: A Quantum-Safe Key Hierarchy and Dynamic Security Association for LTE/SAE in 5G Scenario
A Quantum-Safe Key Hierarchy and Dynamic Security Association for LTE/SAE in 5G Scenario Open
Millions of devices are going to participate in 5G producing a huge space for\nsecurity threats. The 5G specification goals require rigid and robust security\nprotocol against such threats. Quantum cryptography is a recently emerged term\n…
View article: Abjad: Towards Interactive Learning Approach to Arabic Reading Based on Speech Recognition
Abjad: Towards Interactive Learning Approach to Arabic Reading Based on Speech Recognition Open
Speech recognition technology has gained more attention recently especially with the increasing use of mobile phones, and tablets. Yet, researches in speech recognition technology for Arabic language is still limited. This paper presents o…