Othman Omran Khalifa

Othman Omran Khalifa
International Islamic University Malaysia | iium · Department of Electrical and Computer Engineering

PhD, MSc, BSc, CEng, SIEEE, MEIT

About

521
Publications
356,292
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,960
Citations
Additional affiliations
January 2005 - December 2014
International Islamic University Malaysia
Position
  • Head of Department
August 2002 - December 2013
International Islamic University Malaysia
January 1995 - February 2000
Newcastle University

Publications

Publications (521)
Preprint
Full-text available
Our Study of gain modulation and active vision from the field of neuroscience has led us to define visual attention models or attention-based models in computer vision the following definition: Attention-based models are those in which a visual scene is processed part by part sequentially and not at once. In this paper, we review gain modulation, a...
Conference Paper
Full-text available
The recent years have seen a proven impact of the reinforcement learning use in many applications which showed tremendous success in solving many decision-making paradigms in machine learning. Most of the successful applications involves the existence of more than one agent, which makes it fall into the multi-agent category, taking autonomous drivi...
Conference Paper
In recent years, many applications have appeared that use GPS systems extensively, especially in GPS data-based traffic monitoring systems for phones and smart vehicles as well. These systems help to provide information about movement, speed, geographical location, and some other information related to traffic. Currently, these systems interact wit...
Article
Due to the advancement of wireless communications, Internet of Things (IoT) becomes a promising technology in today's digital world. For the enhancement of underwater applications such as ocean exploration, deep-sea monitoring, underwater surveillance, diver network monitoring, location and object tracking, etc., Internet of underwater things (IoUT...
Article
Full-text available
Internet of Things (IoT) technology has been rapidly developing and has been well utilized in the field of smart city monitoring. The IoT offers new opportunities for cities to use data remotely for the monitoring, smart management, and control of device mechanisms that enable the processing of large volumes of data in real time. The IoT supports t...
Conference Paper
The ease of adaptability of Internet of Things (IoT) enables multiple devices to communicate with the aim of shearing data and information resources. The IoT architecture of operation is by default centralized. However, the distributed and decentralized architecture of Blockchain enables efficient and scalable connectivity between conventional devi...
Conference Paper
Full-text available
Agile Enterprise GIS Development (AEGISD) is an environment with a high collaborative feature, needs to be achieved by active communications between the stakeholders. Recently, a number of researchers and users have been interested in Enterprise GIS due to its capabilities in providing a number of services related to co-locate Business. The benefit...
Conference Paper
Transfer learning for crowd counting via CNN is explored in this research to minimize training time and computational cost. The Mall dataset is used to evaluate the effectiveness of the transfer learning approach and is compared with other recent techniques that use their own deep architecture. By using transfer learning, less computation is involv...
Article
Recent trends have revealed that SIP based IP-PBX DoS attacks contribute to most overall IP-PBX attacks which is resulting in loss of revenues and quality of service in telecommunication providers. IP-PBX face challenges in detecting and mitigating malicious traffic. In this research, Support Vector Machine (SVM) machine learning detection & preven...
Article
Full-text available
Vehicle detection in Intelligent Transportation Systems (ITS) is a key factor ensuring road safety, as it is necessary for the monitoring of vehicle flow, illegal vehicle type detection, incident detection, and vehicle speed estimation. Despite the growing popularity in research, it remains a challenging problem that must be solved. Hardware-based...
Preprint
Full-text available
Multimedia information availability has increased dramatically with the advent of mobile devices. but with this availability comes problems of maintaining the security of information that is displayed in public. Many approaches have been used or proposed for providing security for information dissemination over networks, protection system classifie...
Chapter
Named Data Networking (NDN) is a new Content Centric Network architecture that can possibly overwhelm most issues of IP mobility and security. The NDN is centered on addressing contents by themselves using names, rather than assigning IP addresses to packets on hosts where information is located on the global Internet. Due to the developing scope o...
Article
Full-text available
Quantum computing is a computer development technology that uses quantum mechanics to perform the operations of data and information. It is an advanced technology, yet the quantum channel is used to transmit the quantum information which is sensitive to the environment interaction. Quantum error correction is a hybrid between quantum mechanics and...
Article
Full-text available
Online learning has gained substantial traction since the popularization of Massive Open Online Courses (MOOCs) over the last decade. After the dawn of the Covid-19 pandemic, online learning has become an indispensable mode of modern-day education. All educational institutions around the world are now compelled to switch to online classes as a phys...
Article
Full-text available
As the Massive Open Online Courses (MOOC) became widely popular since the last decade, online learning has acquired substantial traction. Then, as the Covid-19 pandemic started, this method of education became indispensable. All educational institutes all around the world were compelled to switch to online classes as a safer and more flexible optio...
Article
Full-text available
Wireless Sensor Networks (WSNs) have gained great significance from researchers and industry due to their wide applications. Energy and resource conservation challenges are facing the WSNs. Nevertheless, clustering techniques offer many solutions to address the WSN issues, such as energy efficiency, service redundancy, routing delay, scalability, a...
Article
Full-text available
This paper proposes an anti-theft mechanism uses biometric Face Recognition to identify thief along with alarming. This can be used as security for ATMs, airport’s systems, medical records, identify customers, preventing fraud and providing VIP services as well as recognizing individuals with known shoplifting convictions and video surveillance. Th...
Conference Paper
Human activities recognition from motion capture data is a challenging problem in the computer vision due to the fact that, in various human activities, different body components have distinctive characteristics in terms of the moving pattern. In this paper, a learning method of detecting an activity from different angles based on various sources o...
Conference Paper
Full-text available
Wireless power transfer is becoming a main concern to everyone staring from technical producer to the user. It becomes essential to create elective techniques to produce vitality. Wireless Power Transfer can be utilized to charge electronic versatile gadgets and Electrical Vehicle also In this paper, the methods of Wireless Power Transfer is talked...
Conference Paper
Emotion speech recognition is a developing field in machine learning. The main purpose of this field is to produce a convenient system that is able to effortlessly communicate and interact with humans. The reliability of the current speech emotion recognition systems is far from being achieved. However, this is a challenging task due to the gap bet...
Conference Paper
Deep learning is an emerging technology that is one of the most promising areas of artificial intelligence. Great strides have been made in recent years which resulted in increased efficiency with regards to many applications, including speech. Despite this, an environmentally Robust Speech Recognition system is still far from being achieved. In th...
Conference Paper
Full-text available
Abstract: Plagiarism is when someone takes another author's works, thoughts, ideas, etc. without proper referencing and claim it as his/her own works. Plagiarism detection is the process to find the plagiarism within a work or documents. With the advance of modern technology, it makes it easier for people to search for information and plagiarize th...
Article
Full-text available
Handoff management is an indispensable component in supporting network mobility. The handoff situation raises while the Mobile Router (MR) or Mobile Node (MN) crosses the different wireless communication access technologies. At the time of inter technology handoff the multiple interface based MR can accomplish multihoming features such as enhanced...
Article
Full-text available
Service discovery (SD) is the cornerstone of wireless and mobile systems. The discovery of effective service is the key to achieve a higher level of ubiquity, which ensures the availability of services to users and applications significantly, and the high use of services. The research in this field is limited, with a few SD protocols available for...
Article
Full-text available
Late 2019 and a significant part of early 2020 have witnessed the outbreak of Coronavirus disease-19 (COVID-19) across the world. As a desperate attempt to control the virus spread, many countries are enforcing measures to restrict large concentration of people at one place and are implementing some form of contact tracing mobile application to qui...
Article
Full-text available
Transmitting video over Mobile Ad-hoc networks (MANETs) is a challenging task because it is severely affected by the various properties of the MANETs such as mobility, dynamic change in topology, lack of fixed infrastructure, resource constraints and limited bandwidth. Most of the existing MANETs routing protocols are not cope with QoS metrics (E2E...
Article
Full-text available
Internet of Things aims to automate and add intelligence into existing processes by introducing constrained devices such as sensors and actuators. These constrained devices lack in computation and memory resources and are usually battery powered for ease of deployments. Due to their limited capabilities, the constrained devices usually host proprie...
Article
Full-text available
Solar energy is great potential for future energy due affordability of solar related panels and equipment. Solar-Energy Microgrid for serving DC and AC loads of areas under consideration. Microgrid is a new concept for making safe, clean, and renewable solar available for use. Most of the countries have developed it solar farm in order to harvest t...
Article
Full-text available
Named Data Networking is a novel concept mainly for the future Internet infrastructure that is centered on routable named data. The NDN infrastructure comprises of a new constituent known as the strategy layer. The layer give access for automatic selection of network routes by considering network pre-conditions such as delay in Interest messages fo...
Article
Full-text available
This study originates a new model, the Feature Parallelism Model (FPM), and compares it to deep learning models along depth, which is the number of layers that comprises a machine learning model. It is the number of layers in the horizontal axis, in the case of FPM. We found that only 6 layers optimize FPM's performance. FPM has been inspired by th...
Article
Full-text available
Video streaming is content sent in compressed form over the netwoks and viwed the users progressively. The transmission of video with the end goal that it can be prepared as consistent and nonstop stream. The point is that to give client support to client at anyplace and at whatever time. Mobile Ad hoc Networks (MANETs) are considered an attractive...
Article
Full-text available
n this paper, an algorithm is developed in 3D Stereo vision to improve image stabilization process for multi-camera viewpoints. Finding accurate unique matching key-points using Harris Laplace corner detection method for different photometric changes and geometric transformation in images. Then improved the connectivity of correct matching pairs by...
Article
Full-text available
This paper represents a method for Human Recognition system using Principal Component Analysis. Human Gait recognition works on the gait of walking subjects to identify people without them knowing or without their permission. The initial step in this kind of system is to generate silhouette frames of walking human. A number of features couldb be ex...
Article
Full-text available
Improving voice quality over wireless communication becomes a demanding feature for social media apps like facebook, whatsapp and other communication channels. Voice-over-internet protocol (VoIP) helps us to make quick telephone calls over the internet. It includes various mechanism which are signaling, controlling and transport layer. Over wireles...
Article
Full-text available
span>Named Data Networking (NDN) performs its routing and forwarding decisions using name prefixes. This removes some of the issues affecting addresses in our traditional IP architecture such as limitation in address allocation and management, and even NAT translations etcetera. Another positivity of NDN is its ability to use the conventional routi...
Article
Named Data networking is a novel communication model that is designed mainly to ensure efficient data dissemination on the internet. In this paper, a practical structure of naming data content in NDN is presented using name based routing as well as mobility first. Simulations are conducted to determine to mobility of both the consumer and producer...
Article
Full-text available
An antenna array is a set of a combination of two or more antennas in order to achieve improved performance over a single antenna. This paper investigates the beam steering technique using the active element pattern of dipole antenna array. The radiation pattern of the array can be obtain by using the active element pattern method multiplies with t...
Article
Full-text available
Edge detection is the first step in image recognition systems in a digital image processing. An effective way to resolve many information from an image such depth, curves and its surface is by analyzing its edges, because that can elucidate these characteristic when color, texture, shade or light changes slightly. Thiscan lead to misconception imag...
Article
Full-text available
In multimedia transmission, it is important to rely on an objective quality metric which accurately represents the subjective quality of processed images and video sequences. Maintaining acceptable Quality of Experience in video transmission requires the ability to measure the quality of the video seen at the receiver end. Reduced-reference metrics...
Article
Full-text available
Detection of Moving Objects and Tracking is one of the most concerned issue and is being vastly used at home, business and modern applications. It is used to identify and track of an entity in a significant way. This paper illustrates the way to detect multiple objects using background subtraction methods and extract each object features by using S...
Article
Detection of Moving Objects and Tracking is one of the most concerned issue and is being vastly used at home, business and modern applications. It is used to identify and track of an entity in a significant way. This paper illustrates the way to detect multiple objects using background subtraction methods and extract each object features by using S...
Article
Full-text available
In this paper, a modification of PVD (Pixel value differencing) algorithm is used for Image Steganography in spatial domain. It is normalizing secret data value by encoding method to make the new pixel edge difference less among three neighbors (horizontal, vertical and diagonal) and embedding data only to less intensity pixel difference areas or r...
Article
Full-text available
The recent paradigm shift in the IT sector leading to cloud computing however innovative had brought along numerous data security concerns. One major such security laps is that referred to as the Man in the Middle (MITM) attack where external data are injected to either hijack a data in transit or to manipulate the files and object by posing as a f...
Article
Full-text available
In the era of Internet technology, new applications are developed everyday requiring continuous and seamless connections. This urges for access availability solutions to the new scenarios. One of the critical architecture is the Mobile Ad-Hoc Network Mobility (MANEMO). However, the integration of Ad-hoc and NEMO technologies came out with many comp...
Article
Full-text available
IoT aims to interconnect sensors and actuators built into devices (also known as Things) in order for them to share data and control each other to improve existing processes for making people's life better. IoT aims to connect between all physical devices like fridges, cars, utilities, buildings and cities so that they can take advantage of small p...

Network

Cited By