May Almousa
YOU?
Author Swipe
View article: High-isolation dual-band MIMO antenna for next-generation 5G wireless networks at 28/38 GHz with machine learning-based gain prediction
High-isolation dual-band MIMO antenna for next-generation 5G wireless networks at 28/38 GHz with machine learning-based gain prediction Open
This research outlines the results on implementing a Machine Learning (ML) approach to improve the throughput of Multiple-Input Multiple-Output (MIMO) based 5G millimeter wave applications. The research will cover frequencies between 28 an…
View article: Lightweight image encryption using integer reversible discrete Dual-Hahn transform on embedded systems
Lightweight image encryption using integer reversible discrete Dual-Hahn transform on embedded systems Open
The security and performance of a cryptographic algorithm can be reduced when implemented on an embedded system, such as a 32-bit microcontroller, due to the limitation of hardware resources, such as computational precision, processing pow…
View article: Aggregation-based partitioning algorithm for traffic congestion in MapReduce
Aggregation-based partitioning algorithm for traffic congestion in MapReduce Open
The current era has witnessed a remarkable transformation in scientific frontiers, largely driven by advancements in the digital domain. This has resulted in an unprecedented explosion of data known as big data. Among the platforms capable…
View article: Tiny Language Models for Automation and Control: Overview, Potential Applications, and Future Research Directions
Tiny Language Models for Automation and Control: Overview, Potential Applications, and Future Research Directions Open
Large Language Models (LLMs), like GPT and BERT, have significantly advanced Natural Language Processing (NLP), enabling high performance on complex tasks. However, their size and computational needs make LLMs unsuitable for deployment on …
View article: A Robust Image Encryption Scheme Based on Quantum Walks and Dynamic DNA for Secure Cloud Applications
A Robust Image Encryption Scheme Based on Quantum Walks and Dynamic DNA for Secure Cloud Applications Open
With the rapid development of cloud-based services, ensuring the confidentiality of image data in cloud environments has become increasingly critical. Furthermore, advances in quantum computing pose a significant threat to traditional cryp…
View article: Human Behavior Analysis: A Comprehensive Survey on Techniques, Applications, Challenges, and Future Directions
Human Behavior Analysis: A Comprehensive Survey on Techniques, Applications, Challenges, and Future Directions Open
Human Behavior Analysis (HBA) has emerged as a critical interdisciplinary field, combining psychology, sociology, artificial intelligence, and data science to model, understand, and predict human behavior across diverse domains. This paper…
View article: FPGA-implementation of Lossless Integer Tchebichef Transform with Application for Tampering Detection in ROI Medical Images
FPGA-implementation of Lossless Integer Tchebichef Transform with Application for Tampering Detection in ROI Medical Images Open
This research introduces efficient algorithms for the forward and inverse lossless Integer-to-Integer Tchebichef Transform (I2ITT), tailored for resource-constrained embedded systems. These algorithms are then implemented on FPGA using fix…
View article: A URL-Based Social Semantic Attacks Detection With Character-Aware Language Model
A URL-Based Social Semantic Attacks Detection With Character-Aware Language Model Open
Social engineering attacks rely on human errors and behavioral choices. The semantic attack, a subcategory of social engineering attacks, utilizes behavioral or cosmetic deception vectors (e.g., attacker creates a malicious website that lo…
View article: Inclusive Privacy Design for Older Adults Living in Ambient Assisted Living
Inclusive Privacy Design for Older Adults Living in Ambient Assisted Living Open
Ambient assisted living (AAL) environments support independence and quality of life of older adults However, in an AAL environment, privacy-related issues (e.g., unawareness, information disclosure, and lack of support) directly impact old…