Torki Altameem
YOU?
Author Swipe
View article: Gain enhancement of mm-wave antenna using graded index lens integrated frequency selective surface for 5G NR FR2 applications
Gain enhancement of mm-wave antenna using graded index lens integrated frequency selective surface for 5G NR FR2 applications Open
In this study, the gain of a printed antenna is boosted for utilization in 5G systems by employing a phase-oriented graded index-type lens system. In the prescribed design, various metamaterial unit cells are arranged as arrays with radial…
View article: Simple statistical tests selection based parallel computating method ensures the guaranteed global extremum identification
Simple statistical tests selection based parallel computating method ensures the guaranteed global extremum identification Open
The article proposes a parallel computing oriented method for solving the global minimum finding problems, in which continuous objective functions satisfy the Hölder condition, and the control parameters domain limited by continuous functi…
View article: An efficient 32-bit color image encryption technique using multiple chaotic maps and advanced ciphers
An efficient 32-bit color image encryption technique using multiple chaotic maps and advanced ciphers Open
In this study, we introduce a refined approach to encrypting 32-bit color images, leveraging the potential of four 1D chaotic maps – the Logistic map, Tent map, Chebyshev map, and Sine map. These chaotic maps intricately populate the four …
View article: Entropy-metric estimation of the small data models with stochastic parameters
Entropy-metric estimation of the small data models with stochastic parameters Open
The formalization of dependencies between datasets, taking into account specific hypotheses about data properties, is a constantly relevant task, which is especially acute when it comes to small data. The aim of the study is to formalize t…
View article: Evaluation of the QoS policy model of an ordinary 5G smart city cluster with predominant URLLC and eMBB traffic
Evaluation of the QoS policy model of an ordinary 5G smart city cluster with predominant URLLC and eMBB traffic Open
A typical element of the smart city’s information and communication space is a 5G cluster, which is focused on serving both new and handover requests because it is an open system. In an ordinary 5G smart city cluster, Ultra-Reliable Low-La…
View article: Consistent Healthcare Safety Recommendation System for Preventing Contagious Disease Infections in Human Crowds
Consistent Healthcare Safety Recommendation System for Preventing Contagious Disease Infections in Human Crowds Open
The recent impact of COVID-19, as a contagious disease, led researchers to focus on designing and fabricating personal healthcare devices and systems. With the help of wearable sensors, sensing and communication technologies, and recommend…
View article: AuCFSR: Authentication and Color Face Self-Recovery Using Novel 2D Hyperchaotic System and Deep Learning Models
AuCFSR: Authentication and Color Face Self-Recovery Using Novel 2D Hyperchaotic System and Deep Learning Models Open
Color face images are often transmitted over public channels, where they are vulnerable to tampering attacks. To address this problem, the present paper introduces a novel scheme called Authentication and Color Face Self-Recovery (AuCFSR) …
View article: The Markov Concept of the Energy Efficiency Assessment of the Edge Computing Infrastructure Peripheral Server Functioning over Time
The Markov Concept of the Energy Efficiency Assessment of the Edge Computing Infrastructure Peripheral Server Functioning over Time Open
The article is devoted to the research of the peripheral server energy consumption managing process defined based on the threshold policy by manipulating the values of the characteristic parameters of the arithmetic-logical complex of the …
View article: Information Technology for Maximizing Energy Consumption for Useful Information Traffic in a Dense Wi-Fi 6/6E Ecosystem
Information Technology for Maximizing Energy Consumption for Useful Information Traffic in a Dense Wi-Fi 6/6E Ecosystem Open
In Wi-Fi standards, a relatively narrow range of frequency spectrums is declared as working, on the operation of which additional restrictions are imposed in different countries. When creating dense wireless network ecosystems focused on m…
View article: Non-Dominated Sorting-Based Hybrid Optimization Technique for Multi-Objective Hydrothermal Scheduling
Non-Dominated Sorting-Based Hybrid Optimization Technique for Multi-Objective Hydrothermal Scheduling Open
Short-term hydrothermal scheduling problem plays an important role in maintaining a high degree of economy and reliability in power system operational planning. Since electric power generation from fossil fired plants forms a major part of…
View article: Significance of Harmonic Filters by Computation of Short-Time Fourier Transform-Based Time–Frequency Representation of Supply Voltage
Significance of Harmonic Filters by Computation of Short-Time Fourier Transform-Based Time–Frequency Representation of Supply Voltage Open
The nonlinear characteristics of power electronic-based loads in a power system contribute a major role in the harmonics’ injection and other power quality disturbances. This affects the quality of the power supplied to consumers by distri…
View article: Securing Images Using High Dimensional Chaotic Maps and DNA Encoding Techniques
Securing Images Using High Dimensional Chaotic Maps and DNA Encoding Techniques Open
With the growing need for secure multimedia data transmission, image encryption has become an important research area. Traditional encryption algorithms like RSA are not well-suited for this purpose, leading researchers to explore new appr…
View article: Shadow Extraction and Elimination of Moving Vehicles for Tracking Vehicles
Shadow Extraction and Elimination of Moving Vehicles for Tracking Vehicles Open
Shadow extraction and elimination is essential for intelligent transportation systems (ITS) in vehicle tracking application. The shadow is the source of error for vehicle detection, which causes misclassification of vehicles and a high fal…
View article: A computationally efficient method for assessing the impact of an active viral cyber threat on a high-availability cluster
A computationally efficient method for assessing the impact of an active viral cyber threat on a high-availability cluster Open
The field of computer science, like its sub-field of cyber threat modelling, is rapidly evolving. The prerequisites for key changes can be summarized as follows: cyber threats are evolving; there are leaks of special services tools; agile …
View article: RanKer: An AI-Based Employee-Performance Classification Scheme to Rank and Identify Low Performers
RanKer: An AI-Based Employee-Performance Classification Scheme to Rank and Identify Low Performers Open
An organization’s success depends on its employees, and an employee’s performance decides whether the organization is successful. Employee performance enhances the productivity and output of organizations, i.e., the performance of an emplo…
View article: Blockchain and IoT-Driven Optimized Consensus Mechanism for Electric Vehicle Scheduling at Charging Stations
Blockchain and IoT-Driven Optimized Consensus Mechanism for Electric Vehicle Scheduling at Charging Stations Open
The emerging demand for electric vehicles in urban cities leads to the need to install a huge number of charging stations. With this requirement, electric vehicle coordination and scheduling at charging stations in real-time becomes highly…
View article: BlockCrime: Blockchain and Deep Learning-Based Collaborative Intelligence Framework to Detect Malicious Activities for Public Safety
BlockCrime: Blockchain and Deep Learning-Based Collaborative Intelligence Framework to Detect Malicious Activities for Public Safety Open
Detecting malicious activity in advance has become increasingly important for public safety, economic stability, and national security. However, the disparity in living standards incites the minds of certain undesirable members of society …
View article: A Novel Hybrid Cryptosystem for Secure Streaming of High Efficiency H.265 Compressed Videos in IoT Multimedia Applications
A Novel Hybrid Cryptosystem for Secure Streaming of High Efficiency H.265 Compressed Videos in IoT Multimedia Applications Open
In this modernistic age of innovative technologies like big data processing, cloud computing, and Internet of things, the utilization of multimedia information is growing daily. In contrast to other forms of multimedia, videos are extensiv…
View article: Energy-Efficient Hybrid Framework for Green Cloud Computing
Energy-Efficient Hybrid Framework for Green Cloud Computing Open
The increasing growth in the demand for cloud computing services, due to the increasing digital transformation and the high elasticity of the cloud, requires more efforts to improve the electrical energy efficiency of cloud data centers. I…
View article: AN INVESTIGATION OF VIDEO COMMUNICATION OVER BANDWIDTH LIMITED PUBLIC SAFETY NETWORK
AN INVESTIGATION OF VIDEO COMMUNICATION OVER BANDWIDTH LIMITED PUBLIC SAFETY NETWORK Open
Application performance of video-based services for public safety and security (PSS) systems is of high importance in order to protect citizens, organizations, and institutions against threats to their well-being. Video based services help…