Nirmeen A. El‐Bahnasawy
YOU?
Author Swipe
View article: Optimized Resource Allocation Algorithm for a Deadline-Aware IoT Healthcare Model
Optimized Resource Allocation Algorithm for a Deadline-Aware IoT Healthcare Model Open
In recent years, the healthcare market has grown very fast and is dealing with a huge increase in data. Healthcare applications are time-sensitive and need quick responses with fewer delays. Fog Computing (FC) was introduced to achieve thi…
View article: Cumulative histogram as a feature selection technique for anomaly detection
Cumulative histogram as a feature selection technique for anomaly detection Open
The enhancement of Intrusion Detection Systems (IDS) is required to ensure protection of network resources and services. This is a hot research topic, especially in the presence of advanced intrusions and attacks. This paper provides a com…
View article: Security enhancement of the access control scheme in IoMT applications based on fuzzy logic processing and lightweight encryption
Security enhancement of the access control scheme in IoMT applications based on fuzzy logic processing and lightweight encryption Open
Security of Internet-of-Medical-Things (IoMT) networks has evolved as a vital issue in recent years. The IoMT networks are designed to link patients with caregivers. All reports, data, and medical signals are transferred over these network…
View article: Image Retrieval Using Convolutional Autoencoder, InfoGAN, and Vision Transformer Unsupervised Models
Image Retrieval Using Convolutional Autoencoder, InfoGAN, and Vision Transformer Unsupervised Models Open
Query by Image Content (QBIC), subsequently known as Content-Based Image Retrieval (CBIR), offers an advantageous solution in a variety of applications, including medical, meteorological, search by image, and other applications. Such CBIR …
View article: Sketch-Based Retrieval Approach Using Artificial Intelligence Algorithms for Deep Vision Feature Extraction
Sketch-Based Retrieval Approach Using Artificial Intelligence Algorithms for Deep Vision Feature Extraction Open
Since the onset of civilization, sketches have been used to portray our visual world, and they continue to do so in many different disciplines today. As in specific government agencies, establishing similarities between sketches is a cruci…
View article: Performance Enhancement of Fog Environment with Deadline Aware Resource Allocation Algorithm
Performance Enhancement of Fog Environment with Deadline Aware Resource Allocation Algorithm Open
Fog computing is a new computing paradigm that has been proposed to extend cloud computing services to the edges of cloud computing networks. It has been proposed to support real-time latency-sensitive applications. Due to the far distance…
View article: Securing Data Transmission Using Blockchain Technology For IOT Platform: A Survey
Securing Data Transmission Using Blockchain Technology For IOT Platform: A Survey Open
blockchain is a new direction for data platform are very limited, IOT needs special protecting.The main idea behind using blockchain techniques for data confidentiality.Traditional technology for hidden data is dividing data into small sec…
View article: Secure Health Monitoring Communication Systems Based on IoT and Cloud Computing for Medical Emergency Applications
Secure Health Monitoring Communication Systems Based on IoT and Cloud Computing for Medical Emergency Applications Open
Smart health surveillance technology has attracted wide attention between patients and professionals or specialists to provide early detection of critical abnormal situations without the need to be in direct contact with the patient. This …
View article: A Hybrid Modified Advanced Encryption Standard and Chaos Encryption Algorithm for Securing Compressed Multimedia Data
A Hybrid Modified Advanced Encryption Standard and Chaos Encryption Algorithm for Securing Compressed Multimedia Data Open
The widespread use of multimedia data makes media content security and protection increasingly urgent and necessary. In order to fully protect or maintain security and privacy of multimedia data, it must be secured through encryption befor…
View article: Smart Health Monitoring System based on IoT and Cloud Computing
Smart Health Monitoring System based on IoT and Cloud Computing Open
This paper presents a secure IoT-based health monitoring system that shortens the distance between a patient and the relevant medical organization. Vital signals captured from sensors are processed and encrypted using AES (Advanced Encrypt…
View article: Real-World PPG dataset
Real-World PPG dataset Open
Photoplethysmograph (PPG) is a physiological signal used to describe the volumetric change of blood flow in peripherals with heart beats. A hardware configuration is employed to capture PPG signals from a number of persons using an IoT sen…
View article: A new online scheduling approach for enhancing QOS in cloud
A new online scheduling approach for enhancing QOS in cloud Open
Quality-of-Services (QoS) is one of the most important requirements of cloud users. So, cloud providers continuously try to enhance cloud management tools to guarantee the required QoS and provide users the services with high quality. One …