Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (10)

Search Parameters:
Authors = Taher M. Ghazal ORCID = 0000-0003-0672-7924

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
20 pages, 1450 KiB  
Article
Exploring the Mediating Role of Information Security Culture in Enhancing Sustainable Practices Through Integrated Systems Infrastructure
by Yasir Hassan, Taher M. Ghazal, Saleha Yasir, Ahmad Samed Al-Adwan, Sayed S. Younes, Marwan Ali Albahar, Munir Ahmad and Atif Ikram
Sustainability 2025, 17(2), 687; https://doi.org/10.3390/su17020687 - 16 Jan 2025
Cited by 1 | Viewed by 1225
Abstract
The need for sustainable development, coupled with the growth in industrialization, creates a complex environment in which businesses strive to achieve and maintain a competitive advantage. Information now forms a vital part of how firms perform in today’s globalized corporate world. This paper [...] Read more.
The need for sustainable development, coupled with the growth in industrialization, creates a complex environment in which businesses strive to achieve and maintain a competitive advantage. Information now forms a vital part of how firms perform in today’s globalized corporate world. This paper explores the impact of information systems on sustainable organizational operations. Furthermore, it observes how IT infrastructure and information security policy (ISP) play vital roles in the changing business environment. The importance of information security culture (ISC) as a mediator in developing the association between the independent and dependent variables is also investigated. Reviewing these categories’ interactions within the context of transitional economics is the main goal. To assess and predict the impact of ISs, ISP, ITI, and ISC on sustainable organizational performance (SOP), 214 businesses took part in a structured survey. For data cleaning and reliability analysis, SPSS software was used; for mediation analysis, the Preacher and Hayes approach was applied; and, for multiple linear regression analysis, Python was applied. The study is significant for developing countries in the role of IS for the effectiveness of IT governance and strategic integration. The findings indicate that organizational performance is substantially impacted by information security policy (ISP), IT infrastructure (ITI), and information security culture (ISC). Full article
(This article belongs to the Section Economic and Business Aspects of Sustainability)
Show Figures

Figure 1

17 pages, 4035 KiB  
Article
Optimized Visual Internet of Things for Video Streaming Enhancement in 5G Sensor Network Devices
by Anil Kumar Budati, Shayla Islam, Mohammad Kamrul Hasan, Nurhizam Safie, Nurhidayah Bahar and Taher M. Ghazal
Sensors 2023, 23(11), 5072; https://doi.org/10.3390/s23115072 - 25 May 2023
Cited by 13 | Viewed by 2749
Abstract
The global expansion of the Visual Internet of Things (VIoT)’s deployment with multiple devices and sensor interconnections has been widespread. Frame collusion and buffering delays are the primary artifacts in the broad area of VIoT networking applications due to significant packet loss and [...] Read more.
The global expansion of the Visual Internet of Things (VIoT)’s deployment with multiple devices and sensor interconnections has been widespread. Frame collusion and buffering delays are the primary artifacts in the broad area of VIoT networking applications due to significant packet loss and network congestion. Numerous studies have been carried out on the impact of packet loss on Quality of Experience (QoE) for a wide range of applications. In this paper, a lossy video transmission framework for the VIoT considering the KNN classifier merged with the H.265 protocols. The performance of the proposed framework was assessed while considering the congestion of encrypted static images transmitted to the wireless sensor networks. The performance analysis of the proposed KNN-H.265 protocol is compared with the existing traditional H.265 and H.264 protocols. The analysis suggests that the traditional H.264 and H.265 protocols cause video conversation packet drops. The performance of the proposed protocol is estimated with the parameters of frame number, delay, throughput, packet loss ratio, and Peak Signal to Noise Ratio (PSNR) on MATLAB 2018a simulation software. The proposed model gives 4% and 6% better PSNR values than the existing two methods and better throughput. Full article
(This article belongs to the Special Issue Machine Learning for Wireless Sensor Network and IoT Security)
Show Figures

Figure 1

24 pages, 4204 KiB  
Review
Lithium-Ion Battery Management System for Electric Vehicles: Constraints, Challenges, and Recommendations
by A. K. M. Ahasan Habib, Mohammad Kamrul Hasan, Ghassan F. Issa, Dalbir Singh, Shahnewaz Islam and Taher M. Ghazal
Batteries 2023, 9(3), 152; https://doi.org/10.3390/batteries9030152 - 27 Feb 2023
Cited by 106 | Viewed by 40578
Abstract
Flexible, manageable, and more efficient energy storage solutions have increased the demand for electric vehicles. A powerful battery pack would power the driving motor of electric vehicles. The battery power density, longevity, adaptable electrochemical behavior, and temperature tolerance must be understood. Battery management [...] Read more.
Flexible, manageable, and more efficient energy storage solutions have increased the demand for electric vehicles. A powerful battery pack would power the driving motor of electric vehicles. The battery power density, longevity, adaptable electrochemical behavior, and temperature tolerance must be understood. Battery management systems are essential in electric vehicles and renewable energy storage systems. This article addresses concerns, difficulties, and solutions related to batteries. The battery management system covers voltage and current monitoring; charge and discharge estimation, protection, and equalization; thermal management; and battery data actuation and storage. Furthermore, this study characterized the various cell balancing circuit types, their components, current and voltage stresses, control reliability, power loss, efficiency, size and cost, and their benefits and drawbacks. Secondly, we review concerns and challenges in battery management systems. Furthermore, we identify problems and obstacles that need additional attention for optimal and sustainable battery management systems for electric vehicles and renewable energy storage systems. Our last topic will be on issues for further research. Full article
(This article belongs to the Special Issue Maximizing the Use of Batteries of Electric Vehicles)
Show Figures

Figure 1

15 pages, 4529 KiB  
Article
A Cloud-Based Software Defect Prediction System Using Data and Decision-Level Machine Learning Fusion
by Shabib Aftab, Sagheer Abbas, Taher M. Ghazal, Munir Ahmad, Hussam Al Hamadi, Chan Yeob Yeun and Muhammad Adnan Khan
Mathematics 2023, 11(3), 632; https://doi.org/10.3390/math11030632 - 26 Jan 2023
Cited by 19 | Viewed by 3362
Abstract
This research contributes an intelligent cloud-based software defect prediction system using data and decision-level machine learning fusion techniques. The proposed system detects the defective modules using a two-step prediction method. In the first step, the prediction is performed using three supervised machine learning [...] Read more.
This research contributes an intelligent cloud-based software defect prediction system using data and decision-level machine learning fusion techniques. The proposed system detects the defective modules using a two-step prediction method. In the first step, the prediction is performed using three supervised machine learning techniques, including naïve Bayes, artificial neural network, and decision tree. These classification techniques are iteratively tuned until the maximum accuracy is achieved. In the second step, the final prediction is performed by fusing the accuracy of the used classifiers with a fuzzy logic-based system. The proposed fuzzy logic technique integrates the predictive accuracy of the used classifiers using eight if–then fuzzy rules in order to achieve a higher performance. In the study, to implement the proposed fusion-based defect prediction system, five datasets were fused, which were collected from the NASA repository, including CM1, MW1, PC1, PC3, and PC4. It was observed that the proposed intelligent system achieved a 91.05% accuracy for the fused dataset and outperformed other defect prediction techniques, including base classifiers and state-of-the-art ensemble techniques. Full article
(This article belongs to the Special Issue Fuzzy Sets and Fuzzy Systems)
Show Figures

Figure 1

22 pages, 7614 KiB  
Article
Deep Transfer Learning-Based Animal Face Identification Model Empowered with Vision-Based Hybrid Approach
by Munir Ahmad, Sagheer Abbas, Areej Fatima, Ghassan F. Issa, Taher M. Ghazal and Muhammad Adnan Khan
Appl. Sci. 2023, 13(2), 1178; https://doi.org/10.3390/app13021178 - 16 Jan 2023
Cited by 20 | Viewed by 6161
Abstract
The importance of accurate livestock identification for the success of modern livestock industries cannot be overstated as it is essential for a variety of purposes, including the traceability of animals for food safety, disease control, the prevention of false livestock insurance claims, and [...] Read more.
The importance of accurate livestock identification for the success of modern livestock industries cannot be overstated as it is essential for a variety of purposes, including the traceability of animals for food safety, disease control, the prevention of false livestock insurance claims, and breeding programs. Biometric identification technologies, such as thumbprint recognition, facial feature recognition, and retina pattern recognition, have been traditionally used for human identification but are now being explored for animal identification as well. Muzzle patterns, which are unique to each animal, have shown promising results as a primary biometric feature for identification in recent studies. Muzzle pattern image scanning is a widely used method in biometric identification, but there is a need to improve the efficiency of real-time image capture and identification. This study presents a novel identification approach using a state-of-the-art object detector, Yolo (v7), to automate the identification process. The proposed system consists of three stages: detection of the animal’s face and muzzle, extraction of muzzle pattern features using the SIFT algorithm and identification of the animal using the FLANN algorithm if the extracted features match those previously registered in the system. The Yolo (v7) object detector has mean average precision of 99.5% and 99.7% for face and muzzle point detection, respectively. The proposed system demonstrates the capability to accurately recognize animals using the FLANN algorithm and has the potential to be used for a range of applications, including animal security and health concerns, as well as livestock insurance. In conclusion, this study presents a promising approach for the real-time identification of livestock animals using muzzle patterns via a combination of automated detection and feature extraction algorithms. Full article
Show Figures

Figure 1

16 pages, 3643 KiB  
Article
Kidney Cancer Prediction Empowered with Blockchain Security Using Transfer Learning
by Muhammad Umar Nasir, Muhammad Zubair, Taher M. Ghazal, Muhammad Farhan Khan, Munir Ahmad, Atta-ur Rahman, Hussam Al Hamadi, Muhammad Adnan Khan and Wathiq Mansoor
Sensors 2022, 22(19), 7483; https://doi.org/10.3390/s22197483 - 2 Oct 2022
Cited by 43 | Viewed by 3796
Abstract
Kidney cancer is a very dangerous and lethal cancerous disease caused by kidney tumors or by genetic renal disease, and very few patients survive because there is no method for early prediction of kidney cancer. Early prediction of kidney cancer helps doctors start [...] Read more.
Kidney cancer is a very dangerous and lethal cancerous disease caused by kidney tumors or by genetic renal disease, and very few patients survive because there is no method for early prediction of kidney cancer. Early prediction of kidney cancer helps doctors start proper therapy and treatment for the patients, preventing kidney tumors and renal transplantation. With the adaptation of artificial intelligence, automated tools empowered with different deep learning and machine learning algorithms can predict cancers. In this study, the proposed model used the Internet of Medical Things (IoMT)-based transfer learning technique with different deep learning algorithms to predict kidney cancer in its early stages, and for the patient’s data security, the proposed model incorporates blockchain technology-based private clouds and transfer-learning trained models. To predict kidney cancer, the proposed model used biopsies of cancerous kidneys consisting of three classes. The proposed model achieved the highest training accuracy and prediction accuracy of 99.8% and 99.20%, respectively, empowered with data augmentation and without augmentation, and the proposed model achieved 93.75% prediction accuracy during validation. Transfer learning provides a promising framework with the combination of IoMT technologies and blockchain technology layers to enhance the diagnosing capabilities of kidney cancer. Full article
(This article belongs to the Special Issue Machine Learning for IoT Applications and Digital Twins II)
Show Figures

Figure 1

20 pages, 6304 KiB  
Article
Towards Parallel Selective Attention Using Psychophysiological States as the Basis for Functional Cognition
by Asma Kanwal, Sagheer Abbas, Taher M. Ghazal, Allah Ditta, Hani Alquhayz and Muhammad Adnan Khan
Sensors 2022, 22(18), 7002; https://doi.org/10.3390/s22187002 - 15 Sep 2022
Cited by 5 | Viewed by 2951
Abstract
Attention is a complex cognitive process with innate resource management and information selection capabilities for maintaining a certain level of functional awareness in socio-cognitive service agents. The human-machine society depends on creating illusionary believable behaviors. These behaviors include processing sensory information based on [...] Read more.
Attention is a complex cognitive process with innate resource management and information selection capabilities for maintaining a certain level of functional awareness in socio-cognitive service agents. The human-machine society depends on creating illusionary believable behaviors. These behaviors include processing sensory information based on contextual adaptation and focusing on specific aspects. The cognitive processes based on selective attention help the agent to efficiently utilize its computational resources by scheduling its intellectual tasks, which are not limited to decision-making, goal planning, action selection, and execution of actions. This study reports ongoing work on developing a cognitive architectural framework, a Nature-inspired Humanoid Cognitive Computing Platform for Self-aware and Conscious Agents (NiHA). The NiHA comprises cognitive theories, frameworks, and applications within machine consciousness (MC) and artificial general intelligence (AGI). The paper is focused on top-down and bottom-up attention mechanisms for service agents as a step towards machine consciousness. This study evaluates the behavioral impact of psychophysical states on attention. The proposed agent attains almost 90% accuracy in attention generation. In social interaction, contextual-based working is important, and the agent attains 89% accuracy in its attention by adding and checking the effect of psychophysical states on parallel selective attention. The addition of the emotions to attention process produced more contextual-based responses. Full article
Show Figures

Figure 1

19 pages, 7417 KiB  
Article
A Novel Grayscale Image Encryption Scheme Based on the Block-Level Swapping of Pixels and the Chaotic System
by Muhammad Hanif, Nadeem Iqbal, Fida Ur Rahman, Muhammad Adnan Khan, Taher M. Ghazal, Sagheer Abbas, Munir Ahmad, Hussam Al Hamadi and Chan Yeob Yeun
Sensors 2022, 22(16), 6243; https://doi.org/10.3390/s22166243 - 19 Aug 2022
Cited by 18 | Viewed by 3515
Abstract
Hundreds of image encryption schemes have been conducted (as the literature review indicates). The majority of these schemes use pixels as building blocks for confusion and diffusion operations. Pixel-level operations are time-consuming and, thus, not suitable for many critical applications (e.g., telesurgery). Security [...] Read more.
Hundreds of image encryption schemes have been conducted (as the literature review indicates). The majority of these schemes use pixels as building blocks for confusion and diffusion operations. Pixel-level operations are time-consuming and, thus, not suitable for many critical applications (e.g., telesurgery). Security is of the utmost importance while writing these schemes. This study aimed to provide a scheme based on block-level scrambling (with increased speed). Three streams of chaotic data were obtained through the intertwining logistic map (ILM). For a given image, the algorithm creates blocks of eight pixels. Two blocks (randomly selected from the long array of blocks) are swapped an arbitrary number of times. Two streams of random numbers facilitate this process. The scrambled image is further XORed with the key image generated through the third stream of random numbers to obtain the final cipher image. Plaintext sensitivity is incorporated through SHA-256 hash codes for the given image. The suggested cipher is subjected to a comprehensive set of security parameters, such as the key space, histogram, correlation coefficient, information entropy, differential attack, peak signal to noise ratio (PSNR), noise, and data loss attack, time complexity, and encryption throughput. In particular, the computational time of 0.1842 s and the throughput of 3.3488 Mbps of this scheme outperforms many published works, which bears immense promise for its real-world application. Full article
(This article belongs to the Special Issue Advances in Image and Video Encoding Algorithm and H/W Design)
Show Figures

Figure 1

19 pages, 2039 KiB  
Review
IoT for Smart Cities: Machine Learning Approaches in Smart Healthcare—A Review
by Taher M. Ghazal, Mohammad Kamrul Hasan, Muhammad Turki Alshurideh, Haitham M. Alzoubi, Munir Ahmad, Syed Shehryar Akbar, Barween Al Kurdi and Iman A. Akour
Future Internet 2021, 13(8), 218; https://doi.org/10.3390/fi13080218 - 23 Aug 2021
Cited by 429 | Viewed by 26926
Abstract
Smart city is a collective term for technologies and concepts that are directed toward making cities efficient, technologically more advanced, greener and more socially inclusive. These concepts include technical, economic and social innovations. This term has been tossed around by various actors in [...] Read more.
Smart city is a collective term for technologies and concepts that are directed toward making cities efficient, technologically more advanced, greener and more socially inclusive. These concepts include technical, economic and social innovations. This term has been tossed around by various actors in politics, business, administration and urban planning since the 2000s to establish tech-based changes and innovations in urban areas. The idea of the smart city is used in conjunction with the utilization of digital technologies and at the same time represents a reaction to the economic, social and political challenges that post-industrial societies are confronted with at the start of the new millennium. The key focus is on dealing with challenges faced by urban society, such as environmental pollution, demographic change, population growth, healthcare, the financial crisis or scarcity of resources. In a broader sense, the term also includes non-technical innovations that make urban life more sustainable. So far, the idea of using IoT-based sensor networks for healthcare applications is a promising one with the potential of minimizing inefficiencies in the existing infrastructure. A machine learning approach is key to successful implementation of the IoT-powered wireless sensor networks for this purpose since there is large amount of data to be handled intelligently. Throughout this paper, it will be discussed in detail how AI-powered IoT and WSNs are applied in the healthcare sector. This research will be a baseline study for understanding the role of the IoT in smart cities, in particular in the healthcare sector, for future research works. Full article
(This article belongs to the Special Issue AI and IoT technologies in Smart Cities)
Show Figures

Figure 1

20 pages, 2929 KiB  
Article
Using Blockchain to Ensure Trust between Donor Agencies and NGOs in Under-Developed Countries
by Ehsan Rehman, Muhammad Asghar Khan, Tariq Rahim Soomro, Nasser Taleb, Mohammad A. Afifi and Taher M. Ghazal
Computers 2021, 10(8), 98; https://doi.org/10.3390/computers10080098 - 10 Aug 2021
Cited by 45 | Viewed by 7077
Abstract
Non-governmental organizations (NGOs) in under-developed countries are receiving funds from donor agencies for various purposes, including relief from natural disasters and other emergencies, promoting education, women empowerment, economic development, and many more. Some donor agencies have lost their trust in NGOs in under-developed [...] Read more.
Non-governmental organizations (NGOs) in under-developed countries are receiving funds from donor agencies for various purposes, including relief from natural disasters and other emergencies, promoting education, women empowerment, economic development, and many more. Some donor agencies have lost their trust in NGOs in under-developed countries, as some NGOs have been involved in the misuse of funds. This is evident from irregularities in the records. For instance, in education funds, on some occasions, the same student has appeared in the records of multiple NGOs as a beneficiary, when in fact, a maximum of one NGO could be paying for a particular beneficiary. Therefore, the number of actual beneficiaries would be smaller than the number of claimed beneficiaries. This research proposes a blockchain-based solution to ensure trust between donor agencies from all over the world, and NGOs in under-developed countries. The list of National IDs along with other keys would be available publicly on a blockchain. The distributed software would ensure that the same set of keys are not entered twice in this blockchain, preventing the problem highlighted above. The details of the fund provided to the student would also be available on the blockchain and would be encrypted and digitally signed by the NGOs. In the case that a record inserted into this blockchain is discovered to be fake, this research provides a way to cancel that record. A cancellation record is inserted, only if it is digitally signed by the relevant donor agency. Full article
(This article belongs to the Special Issue Blockchain Technology and Recordkeeping)
Show Figures

Figure 1

Back to TopTop