Skip to main content

Showing 1–9 of 9 results for author: Hassan, M A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.07827  [pdf, other

    cs.MM cs.AI cs.CV

    Automatic Recognition of Food Ingestion Environment from the AIM-2 Wearable Sensor

    Authors: Yuning Huang, Mohamed Abul Hassan, Jiangpeng He, Janine Higgins, Megan McCrory, Heather Eicher-Miller, Graham Thomas, Edward O Sazonov, Fengqing Maggie Zhu

    Abstract: Detecting an ingestion environment is an important aspect of monitoring dietary intake. It provides insightful information for dietary assessment. However, it is a challenging problem where human-based reviewing can be tedious, and algorithm-based review suffers from data imbalance and perceptual aliasing problems. To address these issues, we propose a neural network-based method with a two-stage… ▽ More

    Submitted 13 May, 2024; originally announced May 2024.

    Comments: Accepted at CVPRw 2024

  2. arXiv:2401.14420  [pdf, other

    cs.CR

    A Novel Blockchain Based Information Management Framework for Web 3.0

    Authors: Md Arif Hassan, Cong T. Nguyen, Chi-Hieu Nguyen, Dinh Thai Hoang, Diep N. Nguyen, Eryk Dutkiewicz

    Abstract: Web 3.0 is the third generation of the World Wide Web (WWW), concentrating on the critical concepts of decentralization, availability, and increasing client usability. Although Web 3.0 is undoubtedly an essential component of the future Internet, it currently faces critical challenges, including decentralized data collection and management. To overcome these challenges, blockchain has emerged as o… ▽ More

    Submitted 23 January, 2024; originally announced January 2024.

  3. arXiv:2401.10901  [pdf, other

    cs.CY

    Enabling Technologies for Web 3.0: A Comprehensive Survey

    Authors: Md Arif Hassan, Mohammad Behdad Jamshidi, Bui Duc Manh, Nam H. Chu, Chi-Hieu Nguyen, Nguyen Quang Hieu, Cong T. Nguyen, Dinh Thai Hoang, Diep N. Nguyen, Nguyen Van Huynh, Mohammad Abu Alsheikh, Eryk Dutkiewicz

    Abstract: Web 3.0 represents the next stage of Internet evolution, aiming to empower users with increased autonomy, efficiency, quality, security, and privacy. This evolution can potentially democratize content access by utilizing the latest developments in enabling technologies. In this paper, we conduct an in-depth survey of enabling technologies in the context of Web 3.0, such as blockchain, semantic web… ▽ More

    Submitted 29 December, 2023; originally announced January 2024.

  4. arXiv:2203.15733  [pdf

    cs.NI

    Energy Balancing Algorithm for Wireless Sensor Network

    Authors: Ghassan Samara, Mohammad A. Hassan, Munir Al-Okour

    Abstract: A Wireless Sensor Network (WSN) is made up of a large number of nodes that are spread randomly or on a regular basis to detect the surrounding environment and transfer data to a base station (BS) over the Internet to the user. It is widely used in a variety of civil and military concerns. Because the sensor has limited battery capacity, energy efficiency is a critical issue with WSNs. As a result,… ▽ More

    Submitted 17 March, 2022; originally announced March 2022.

    Comments: 11 pages

    Journal ref: Journal of Theoretical and Applied Information Technology 28th February 2022. Vol.100. No 4

  5. IoT Forensic Frameworks (DFIF, IoTDOTS,FSAIoT): A Comprehensive Study

    Authors: Mohammad A. Hassan, Ghassan Samara, Mohammad Abu Fadda

    Abstract: In the Internet of Things, millions of electronic items, including automobiles, smoke alarms, watches, eyeglasses, webcams, and other devices, are now connected to the Internet (IoT). Aside from the luxury and comfort that the individual obtains in the field of IoT, as well as its ability to communicate and obtain information easily and quickly, the other concerning aspect is the achievement of pr… ▽ More

    Submitted 24 March, 2022; originally announced March 2022.

    Comments: 15 pages

    Journal ref: Int. J. Advance Soft Compu. Appl, Vol. 14, No. 1, March 2022 Print ISSN: 2710-1274, Online ISSN: 2074-8523

  6. arXiv:2112.01310  [pdf

    cs.NI

    An Intelligent Vice Cluster Head Election Protocol in WSN

    Authors: Ghassan Samara, Mohammad A. Hassan, Yahya Zayed

    Abstract: Wireless sensor networks (WSNs) has a practical ability to link a set of sensors to build a wireless network that can be accessed remotely; this technology has become increasingly popular in recent years. Wi-Fi-enabled sensor networks (WSNs) are used to gather information from the environment in which the network operates. Many obstacles prevent wireless sensor networks from being used in a wide r… ▽ More

    Submitted 26 November, 2021; originally announced December 2021.

    Comments: 22 pages

    Journal ref: Int. J. Advance Soft Compu. Appl, Vol. 13, No. 3, November 2021 Print ISSN: 2710-1274, Online ISSN: 2074-8523

  7. A Review of Interference Reduction in Wireless Networks Using Graph Coloring Methods

    Authors: Maaly Awad Hassan, Andrew Chickadel

    Abstract: The interference imposes a significant negative impact on the performance of wireless networks. With the continuous deployment of larger and more sophisticated wireless networks, reducing interference in such networks is quickly being focused upon as a problem in today's world. In this paper we analyze the interference reduction problem from a graph theoretical viewpoint. A graph coloring methods… ▽ More

    Submitted 29 March, 2011; originally announced March 2011.

    Comments: 10 pages, 5 figures

    Journal ref: International journal on applications of graph theory in wireless ad hoc networks and sensor networks (GRAPH-HOC) Vol. 3, No. 1, pp. 58-67, March 2011

  8. Image Encryption Using Differential Evolution Approach in Frequency Domain

    Authors: Maaly Awad S Hassan, Ibrahim Soliman I Abuhaiba

    Abstract: This paper presents a new effective method for image encryption which employs magnitude and phase manipulation using Differential Evolution (DE) approach. The novelty of this work lies in deploying the concept of keyed discrete Fourier transform (DFT) followed by DE operations for encryption purpose. To this end, a secret key is shared between both encryption and decryption sides. Firstly two dime… ▽ More

    Submitted 29 March, 2011; originally announced March 2011.

    Comments: 19 pages, 15 figures, 3 tables

    Journal ref: Signal & Image Processing: An International Journal (SIPIJ) Vol.2, No.1, pp. 51-69, March 2011

  9. arXiv:0710.4746  [pdf

    cs.OS

    RTK-Spec TRON: A Simulation Model of an ITRON Based RTOS Kernel in SystemC

    Authors: M. Abdelsalam Hassan, Keishi Sakanushi, Yoshinori Takeuchi, Masaharu Imai

    Abstract: This paper presents the methodology and the modeling constructs we have developed to capture the real time aspects of RTOS simulation models in a System Level Design Language (SLDL) like SystemC. We describe these constructs and show how they are used to build a simulation model of an RTOS kernel targeting the $μ$-ITRON OS specification standard.

    Submitted 25 October, 2007; originally announced October 2007.

    Comments: Submitted on behalf of EDAA (http://www.edaa.com/)

    Journal ref: Dans Design, Automation and Test in Europe - DATE'05, Munich : Allemagne (2005)