Mohammed J. F. Alenazi
YOU?
Author Swipe
View article: Optimization model for predicting quantum theoretic characteristics of hexagonal systems using temperature dependent graph theoretic estimators
Optimization model for predicting quantum theoretic characteristics of hexagonal systems using temperature dependent graph theoretic estimators Open
View article: Secure monitoring of internet of vehicles in 6G networks through intelligent reflecting surfaces leveraging AI
Secure monitoring of internet of vehicles in 6G networks through intelligent reflecting surfaces leveraging AI Open
View article: CAA: Centrality Adapter Attack for Evaluating Smart City Resilience Against Targeted Attacks
CAA: Centrality Adapter Attack for Evaluating Smart City Resilience Against Targeted Attacks Open
View article: ERINDA: A novel framework for Enhancing the Resilience of Industrial Networks against DDoS Attacks with adaptive recovery
ERINDA: A novel framework for Enhancing the Resilience of Industrial Networks against DDoS Attacks with adaptive recovery Open
The increasing threat of distributed denial-of-service (DDoS) attacks targeting the availability of critical infrastructure systems controlled by industrial control systems (ICS). DDoS attacks endanger the high-reliability requirements ICS…
View article: Robust face forgery detection integrating local texture and global texture information
Robust face forgery detection integrating local texture and global texture information Open
Facial forgery technology is advancing rapidly, leading to significant social security concerns. In recent years, as forgery technologies and types continue to emerge, many methods struggle to strike a balance between accuracy and robustne…
View article: Three infinite families of Hamilton-connected convex polytopes and their detour index
Three infinite families of Hamilton-connected convex polytopes and their detour index Open
A path in a graph encompassing its whole vertex set is called Hamiltonian. Such a path with sharing the same initial and terminal vertices is called a Hamiltonian cycle. A graph comprising a Hamiltonian path (resp. cycle) is said to be tra…
View article: LCUT-Sv9: UAV-Assisted Powerline Inspection Framework with Secure Time-Sensitive Communication for Industry 5.0
LCUT-Sv9: UAV-Assisted Powerline Inspection Framework with Secure Time-Sensitive Communication for Industry 5.0 Open
Integrating Time-Sensitive Networking (TSN) in industrial wireless networks ensures reliability in data transmission. Automated powerline inspection using Unmanned Aerial Vehicles (UAVs) is an industrial application that requires time-cons…
View article: An Efficient Algorithm for Demand‐Response Optimization in Smart Grid Power Communication Based on Edge‐IoT
An Efficient Algorithm for Demand‐Response Optimization in Smart Grid Power Communication Based on Edge‐IoT Open
Demand‐response is one of the influencing factors in power communication networks. Existing studies did not consider much about the information distribution problem in power communication demand‐response, therefore, this paper proposed a n…
View article: Intrusion Detection in NSL-KDD Dataset Using Hybrid Self-Organizing Map Model
Intrusion Detection in NSL-KDD Dataset Using Hybrid Self-Organizing Map Model Open
View article: Combinatorial analysis of line graphs: domination, chromaticity, and Hamiltoniancity
Combinatorial analysis of line graphs: domination, chromaticity, and Hamiltoniancity Open
Line graphs are a fundamental class of graphs extensively studied for their structural properties and applications in diverse fields such as network design, optimization, and algorithm development. Pan and lollipop graphs, with their disti…
View article: Face Forgery Detection via Multi‐Scale and Multi‐Domain Features Fusion
Face Forgery Detection via Multi‐Scale and Multi‐Domain Features Fusion Open
Deepfake, as a popular form of visual forgery technique on the Internet, poses a serious threat to individuals' data privacy and security. In consumer electronics, fraudulent schemes leveraging Deepfake technology are widespread, making it…
View article: A Multi-Signature Scheme for Defending Malleability Attack on DeFi
A Multi-Signature Scheme for Defending Malleability Attack on DeFi Open
Signatures are crucial in blockchain-based Decentralised Finance (DeFi) protocols because they ensure the security and integrity of transactions and smart contracts. Due to the weakness in the signature scheme, it is possible to carry out …
View article: Improving healthy food recommender systems through heterogeneous hypergraph learning
Improving healthy food recommender systems through heterogeneous hypergraph learning Open
Recommender systems in health-conscious recipe suggestions have evolved rapidly, particularly with the integration of both homogeneous and heterogeneous graphs. However, incorporating IoT devices into healthcare, such as wearable fitness t…
View article: Precise Spatial Prediction of Rice Seedlings From Large-Scale Airborne Remote Sensing Data Using Optimized Li-YOLOv9
Precise Spatial Prediction of Rice Seedlings From Large-Scale Airborne Remote Sensing Data Using Optimized Li-YOLOv9 Open
Rice is pivotal in global food security and Rice seeding detection in precision agriculture is essential for optimizing crop productivity and efficient resource use. Currently, the spatial distribution and detection of rice seeding are man…
View article: Blockchain controlled trustworthy federated learning platform for smart homes
Blockchain controlled trustworthy federated learning platform for smart homes Open
Smart device manufacturers rely on insights from smart home (SH) data to update their devices, and similarly, service providers use it for predictive maintenance. In terms of data security and privacy, combining distributed federated learn…
View article: Group Consensus-Driven Energy Consumption Assessment Using Social Network Analysis and Fuzzy Information Fusion
Group Consensus-Driven Energy Consumption Assessment Using Social Network Analysis and Fuzzy Information Fusion Open
With industrial development deepening, the share of industrial energy in overall consumption has notably risen. To assess industrial energy consumption accurately, this paper proposes a method employing interval type-2 fuzzy sets (IT2FSs) …
View article: <scp>ResiSC</scp>: A system for building resilient smart city communication networks
<span>ResiSC</span>: A system for building resilient smart city communication networks Open
Smart city networks are critical for delivering essential services such as healthcare, education, and business operations. However, these networks are highly susceptible to a range of threats, including natural disasters and intentional cy…
View article: On Some Distance Spectral Characteristics of Trees
On Some Distance Spectral Characteristics of Trees Open
Graham and Pollack in 1971 presented applications of eigenvalues of the distance matrix in addressing problems in data communication systems. Spectral graph theory employs tools from linear algebra to retrieve the properties of a graph fro…
View article: MpoxSLDNet: A Novel CNN Model for Detecting Monkeypox Lesions and Performance Comparison with Pre-trained Models
MpoxSLDNet: A Novel CNN Model for Detecting Monkeypox Lesions and Performance Comparison with Pre-trained Models Open
Monkeypox virus (MPXV) is a zoonotic virus that poses a significant threat to public health, particularly in remote parts of Central and West Africa. Early detection of monkeypox lesions is crucial for effective treatment. However, due to …
View article: Characterizations of Minimal Dominating Sets in γ-Endowed and Symmetric γ-Endowed Graphs with Applications to Structure-Property Modeling
Characterizations of Minimal Dominating Sets in γ-Endowed and Symmetric γ-Endowed Graphs with Applications to Structure-Property Modeling Open
Claude Berge (1987) introduced the concept of k-extendable graphs, wherein any independent set of size k is inherently a constituent of a maximum independent set within a graph H=(V,E). Graphs possessing the property of being 1-extendable …
View article: An Optimization Problem for Computing Predictive Potential of General Sum/Product-Connectivity Topological Indices of Physicochemical Properties of Benzenoid Hydrocarbons
An Optimization Problem for Computing Predictive Potential of General Sum/Product-Connectivity Topological Indices of Physicochemical Properties of Benzenoid Hydrocarbons Open
For a graph G=(VG,EG), a degree-based graphical index GId takes the general form GId=∑xy∈EGϕ(dx,dy), where ϕ is a symmetric map and di is the degree of i∈VG. For α∈R, if ϕ=(dxdy)α (resp. ϕ=(dx+dy)α), the index is called the general product…
View article: Locating-dominating number of certain infinite families of convex polytopes with applications
Locating-dominating number of certain infinite families of convex polytopes with applications Open
View article: An Ensemble Deep Learning Model for Vehicular Engine Health Prediction
An Ensemble Deep Learning Model for Vehicular Engine Health Prediction Open
Predictive maintenance has gained importance across various industries, including the automotive sector. It is very challenging to detect vehicle failures in advance due to the intricate composition of various components and sensors. The v…
View article: Effective Controller Placement in Software-Defined Internet-of-Things Leveraging Deep Q-Learning (DQL)
Effective Controller Placement in Software-Defined Internet-of-Things Leveraging Deep Q-Learning (DQL) Open
View article: Performance Optimization of Software-Defined Industrial Internet-of-Things (SD-IIoT)
Performance Optimization of Software-Defined Industrial Internet-of-Things (SD-IIoT) Open
Software-Defined Networking (SDN) offers a centralized network management approach that can effectively address the complex and varied traffic demands characteristic of Industrial Internet of Things (IIoT) environments by decoupling the co…
View article: Hamilton-Connectivity and the Detour Index of Graphs with Applications in Cheminformatics
Hamilton-Connectivity and the Detour Index of Graphs with Applications in Cheminformatics Open
View article: A novel edge-weighted matrix of a graph and its spectral properties with potential applications
A novel edge-weighted matrix of a graph and its spectral properties with potential applications Open
Regarding a simple graph $ \Gamma $ possessing $ \nu $ vertices ($ \nu $-vertex graph) and $ m $ edges, the vertex-weight and weight of an edge $ e = uv $ are defined as $ w(v_{i}) = d_{ \Gamma}(v_{i}) $ and $ w(e) = d_{ \Gamma}(u)+d_{ \Ga…
View article: IoT-Enabled Intelligent Garbage Management System for Smart City: A Fairness Perspective
IoT-Enabled Intelligent Garbage Management System for Smart City: A Fairness Perspective Open
Waste management has been identified as a critical problem underpinning the vision of sustainable cities. Despite existing efforts to tackle this challenge, traditional approaches still undermine resource allocation and utilization for the…
View article: DQN-GNN-Based User Association Approach for Wireless Networks
DQN-GNN-Based User Association Approach for Wireless Networks Open
In the realm of advanced mobile networks, such as the fifth generation (5G) and beyond, the increasing complexity and proliferation of devices and unique applications present a substantial challenge for User Association (UA) in wireless sy…
View article: ENRN: A System for Evaluating Network Resilience against Natural Disasters
ENRN: A System for Evaluating Network Resilience against Natural Disasters Open
The frequency and severity of natural disasters is surging, posing an urgent need for robust communication network infrastructure that is capable of withstanding these events. In this paper, we present a groundbreaking graph-theoretic syst…