Papers by Dr Moh'd Al Hemairy
Education and information technologies, Mar 6, 2024
Academic credentials play an immensely significant role in the career of a person and in the prog... more Academic credentials play an immensely significant role in the career of a person and in the progress of society. The system in place currently used for the issuance, storage & sharing of academic credentials is quite inefficient in its operations, due to being paper based in large. There is also widespread fraud committed every year in terms of academic credentials, ranging from diploma mills to plain forgery. There presents a need for a total digital transformation in this field, which ensures complete independent authenticity of credentials that could be proven in a foolproof manner. Blockchain technology promises to alleviate the above identified problems by ensuring complete transparency & verifiable proofs of ownership using decentralized storage of credentials & Public Key Cryptography (PKC) in the form of Digital Signatures. This project implements the proposed solution by using the ECDSA algorithm to (i) sign the accreditation of institute by governing body, such as The Ministry of Education (MOE) (ii) sign the academic credentials by the issuing party (iii) sign the issued credentials by the learner to claim iv) sign the credentials by some governing body like the MOE. The learner can share the signed credential with any third party, such as a potential employer. The ECDSA algorithm can then authenticate the credential by programmatically verifying the signature proof by any party using the corresponding Public Key without going through tedious channels.
Springer eBooks, Sep 6, 2017
Global demographic trends clearly point out that the world population is aging due to a combinati... more Global demographic trends clearly point out that the world population is aging due to a combination of dropping mortality rates and increasing life expectancy. The global community is seeking solutions to address the pressing societal challenge of providing effective and efficient healthcare to the elderly. It is difficult to achieve satisfactory results merely by relying on scaling up conventional healthcare infrastructures. These techniques will not be sufficient to independently assist the elderly to live alone in a house mainly if they are suffering from chronic diseases, thus require continuous health monitoring. It is imperative to exploit the advances in emerging technologies such as biosensors, mobile devices, and communication networks to provide remote health monitoring services along with the physical infrastructural facilities. Remote and continuous monitoring of patients with chronic diseases is being considered as an efficient and cost-effective solution, which will reduce the burden on the elderly and his/her families, as well as on the health government’s expenses. While considerable research and development is being undertaken in this field, most of the current state of the art reflects a lack of a concerted and cohesive approach to develop an integrated remote health monitoring system. This chapter surveys existing pervasive healthcare systems and classifies them as academia based or industrial based, and then it develops a set of criteria to compare these solutions. It discusses some drawbacks of existing solutions and proposes future directions in pervasive healthcare, which are predicted to shape future pervasive healthcare systems. Finally, it proposes a novel healthcare monitoring framework based on an integrated and scalable architecture, which provides flexibility and enables interoperability between myriads of healthcare monitoring devices. The proposed framework relies on the analytics of both evidenced data collected from sensors as well as the massive data collected from social networks. A prototype of the framework has been developed to evaluate the applicability and the efficiency of monitoring and analytics practices.
Journal of Risk and Financial Management
The usage of Large Language Models (LMMs) and their exponential progress has created a Cambrian E... more The usage of Large Language Models (LMMs) and their exponential progress has created a Cambrian Explosion in the development of new tools for almost every field of science and technology, but also presented significant concerns regarding the AI ethics and creation of sophisticated malware and phishing attacks. Moreover, several worries have arisen in the field of dataset collection and intellectual property in that many datasets may exist without the license of the respective owners. Triple-Entry Accounting (TEA) has been proposed by Ian Grigg to increase transparency, accountability, and security in financial transactions. This method expands upon the traditional double-entry accounting system, which records transactions as debits and credits in two separate ledgers, by incorporating a third ledger as an independent verifier via a digitally signed receipt. The utilization of a digital signature provides evidentiary power to the receipt, thus reducing the accounting problem to one o...
Journal of Risk and Financial Management
Most Artificial Intelligence (AI) implementations so far are based on the exploration of how the ... more Most Artificial Intelligence (AI) implementations so far are based on the exploration of how the human brain is designed. Nevertheless, while significant progress is shown on specialized tasks, creating an Artificial General Intelligence (AGI) remains elusive. This manuscript proposes that instead of asking how the brain is constructed, the main question should be how it was evolved. Since neurons can be understood as intelligent agents, intelligence can be thought of as a construct of multiple agents working and evolving together as a society, within a long-term memory and evolution context. More concretely, we suggest placing Multiple Neighborhood Cellular Automata (MNCA) on a blockchain with an interaction protocol and incentives to create an AGI. Given that such a model could become a “strong” AI, we present the conjecture that this infrastructure is possible to simulate the properties of cognition as an emergent phenomenon.
2019 IEEE 13th International Conference on Application of Information and Communication Technologies (AICT)
Real-life problems are tending to become more complex as a result of expanding population, high l... more Real-life problems are tending to become more complex as a result of expanding population, high level of demand at all levels and the advancement of technology which became integrated into almost all aspects of life. Such complex problems can only be tackled by employing tools in multiples disciplines. The combination of disciplines in such research studies is dictated by the nature of the problem. Here we present our experience as a case study in which we conducted our research following an interdisciplinary research approach involving two disciplines of electrical engineering and biochemistry. We discuss the uniqueness of joint venture between the two disciplines, the obstacles faced and how they are tackled in addition to giving some recommendations that we believe can act as guidelines to scientists who are considering those two disciplines in their future research. Our observations and recommendations go in line with other findings, but we additionally provide real cases and examples and more detailed advice, which can be more efficient and support previous finding in a practical way.
2018 Innovations in Intelligent Systems and Applications (INISTA), 2018
Self-diagnosis of diseases is highly desired and very popular nowadays. This kind of diagnosis wi... more Self-diagnosis of diseases is highly desired and very popular nowadays. This kind of diagnosis will not only permit early disease detection but will also provide access to appropriate treatment promptly. Further to that, due to the frequent increment of diseases nowadays, it becomes impossible for doctors to recall all symptoms and medical conditions for all kind of diseases. This research innovates a new diagnosis algorithm that could be incorporated with web-based tool to provide an efficient online system that corroborate diagnosis using several wearable sensors output. The system incorporates several defined medical conditions. A medical condition is composed of a set of vital signs with abnormal value ranges. The proposed system was experimented on various scenarios and a software simulator has been developed for evaluating and performance testing. Since the algorithm uses an access to the database in order to get real-time vital signs and to check the medical conditions, the calculation of time change depends on the server load. However, during all the tests that were conducted, we observed that the performance of calculating the health Indicator is faster by 10% to 48% than the sequential search method.
International Journal of Advanced Computer Science and Applications, 2018
The monitoring and early detection of abnormalities in the cardiac cycle morphology have signific... more The monitoring and early detection of abnormalities in the cardiac cycle morphology have significant impact on the prevention of heart diseases and their associated complications. Electrocardiogram (ECG) is very effective in detecting irregularities of the heart muscle functionality. In this work, we investigate the detection of possible abnormalities in ECG signal and the identification of the corresponding heart disease in real-time using an efficient algorithm. The algorithm relies on cross-correlation theory to detect abnormalities in ECG signal. The algorithm incorporates two cross-correlations steps. The first step detects abnormality in a real-time ECG signal trace while the second step identifies the corresponding disease. The optimization of search-time is the main advantage of this algorithm.
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2011
This paper investigates the effect of common network attacks on the performance, and security of ... more This paper investigates the effect of common network attacks on the performance, and security of several biometric readers. Experiments are conducted using Denial of Service attacks (DoSs) and the ARP cache poisoning attack. The experiments show that the tested biometric readers are vulnerable to DoS attacks, and their recognition performance is significantly affected after launching the attacks. However, the experiments show that the tested biometric readers are secure from the ARP cache poisoning attack. This work demonstrates that biometric readers are easy targets for malicious network users, lack basic security mechanisms, and are vulnerable to common attacks. The confidentiality, and integrity of the log files in the biometric readers, could be compromised with such attacks. It then becomes important to study these attacks in order to find flags that could aid in a network forensic investigation of a biometric device.
Journal of Intelligent Systems, 2015
Biometrics readers are deployed in many public sites and are used for user identification and ver... more Biometrics readers are deployed in many public sites and are used for user identification and verification. Nowadays, most biometrics readers can be connected to local area networks, and consequently, they are potential targets for network attacks. This article investigates the robustness of several fingerprint and iris readers against common denial of service (DoS) attacks. This investigation has been conducted using a set of laboratory experiments and DoS attack generator tools. The experiments show clearly that the tested biometric readers are very vulnerable to common DoS attacks, and their recognition performances deteriorate significantly once they are under DoS attacks. Finally, the article lists some security consideration that should be taken into consideration when designing secure biometrics readers.
2009 International Conference on the Current Trends in Information Technology (CTIT), 2009
The address resolution protocol (ARP) is used by computers to map network addresses (IP) to physi... more The address resolution protocol (ARP) is used by computers to map network addresses (IP) to physical addresses [MAC] and we can't imagine a communications between networks without the support of ARP protocol. However, ARP had been misused by many malicious hosts for illegitimate penetration; ARP Spoofing is one example for such illegal access. ARP Spoofing can enable malicious hosts to
2014 World Congress on Computer Applications and Information Systems (WCCAIS), 2014
Biometrics readers are deployed in many public sites and are used for user identification and ver... more Biometrics readers are deployed in many public sites and are used for user identification and verification. Nowadays, most biometrics readers can be connected to local area networks (LANs), and consequently they are potential targets for network attacks. This paper investigates the resilience of several fingerprint and iris readers against common denial of service (DoS) attacks. This investigation has been conducted using a set of laboratory experiments and DoS attack generator tools. The experiments show clearly that the tested biometric readers are very vulnerable to common DoS attacks, and their recognition performances are significantly affected by the launched attacks. Finally, the paper lists some security consideration that should be taken into consideration when designing secure biometrics readers.
Coventry University, 2017
Journal of Intelligent Systems, 2014
Biometrics readers are deployed in many public sites and are used for user identification and ver... more Biometrics readers are deployed in many public sites and are used for user identification and verification. Nowadays, most biometrics readers can be connected to local area networks, and consequently, they are potential targets for network attacks. This article investigates the robustness of several fingerprint and iris readers against common denial of service (DoS) attacks. This investigation has been conducted using a set of laboratory experiments and DoS attack generator tools. The experiments show clearly that the tested biometric readers are very vulnerable to common DoS attacks, and their recognition performances deteriorate significantly once they are under DoS attacks. Finally, the article lists some security consideration that should be taken into consideration when designing secure biometrics readers.
2013 Sixth International Conference on Developments in Esystems Engineering, Dec 1, 2013
The new concepts of ubiquitous computing are being integrated in healthcare technologies and led ... more The new concepts of ubiquitous computing are being integrated in healthcare technologies and led to the emergence of pervasive healthcare systems. This development is shifting the care that patients get to the comfort of their own homes. This paper surveys existing pervasive healthcare solutions including those developed in academia as well as commercial solutions from the industry sector. This paper also develops a set of criteria, which were used to classify and compare these solutions. These criteria are: integrity, confidentiality, mobility and context-awareness. We discuss some drawbacks of existing solutions, and propose future directions in pervasive healthcare. Finally, the paper draws some guidelines and best practices, which are predicted to shape future pervasive healthcare systems.
Global demographic trends clearly point out that the world population is ageing owing to a combin... more Global demographic trends clearly point out that the world population is ageing owing to a combination of dropping mortality rates and increasing life expectancy. The global community is looking for ways to address the pressing societal challenge of providing effective and efficient healthcare to the elderly. It is difficult to achieve satisfactory results merely by relying on scaling up of conventional healthcare infrastructure as the conventional techniques will not be sufficient to assist the elderly to independently live in house especially if they are suffering from chronic diseases, thus require continuous health monitoring. It is imperative to exploit the advances in emerging technologies such as biosensors, mobile devices, and communication networks to provide remote health monitoring services along with the physical infrastructural facilities. Remote/continuous monitoring of patients with chronic diseases is being considered as an efficient and cost-effective solution, whic...
Uploads
Papers by Dr Moh'd Al Hemairy