22 results on '"Bandar Alotaibi"'
Search Results
2. Robust Speech Emotion Recognition Using CNN+LSTM Based on Stochastic Fractal Search Optimization Algorithm
- Author
-
Abdelaziz A. Abdelhamid, El-Sayed M. El-Kenawy, Bandar Alotaibi, Ghada M. Amer, Mahmoud Y. Abdelkader, Abdelhameed Ibrahim, and Marwa Metwally Eid
- Subjects
General Computer Science ,General Engineering ,General Materials Science ,Electrical and Electronic Engineering - Published
- 2022
- Full Text
- View/download PDF
3. Deep Investigation of the Recent Advances in Dialectal Arabic Speech Recognition
- Author
-
Dr. Abdelaziz A. Abdelhamid, Given Names Deactivated Family Name Deactivated, Hamzah A. Alsayadi, Islam Hegazy, and Bandar Alotaibi
- Subjects
General Computer Science ,General Engineering ,General Materials Science ,Electrical and Electronic Engineering - Published
- 2022
- Full Text
- View/download PDF
4. Detection of Unauthorized Unmanned Aerial Vehicles Using YOLOv5 and Transfer Learning
- Author
-
Nader Al-Qubaydhi, Abdulrahman Alenezi, Turki Alanazi, Abdulrahman Senyor, Naif Alanezi, Bandar Alotaibi, Munif Alotaibi, Abdul Razaque, Abdelaziz A. Abdelhamid, and Aziz Alotaibi
- Subjects
Computer Networks and Communications ,Hardware and Architecture ,Control and Systems Engineering ,Signal Processing ,drone detection ,YOLOv5 ,unmanned aerial vehicle ,deep learning ,Electrical and Electronic Engineering - Abstract
Drones/unmanned aerial vehicles (UAVs) have recently grown in popularity due to their inexpensive cost and widespread commercial use. The increased use of drones raises the possibility that they may be employed in illicit activities such as drug smuggling and terrorism. Thus, drone monitoring and automated detection are critical for protecting restricted areas or special zones from illicit drone operations. One of the most challenging difficulties in drone detection in surveillance videos is the apparent likeness of drones against varied backdrops. This paper introduces an automated image-based drone-detection system that uses an enhanced deep-learning-based object-detection algorithm known as you only look once (YOLOv5) to defend restricted territories or special zones from unauthorized drone incursions. The transfer learning to pretrain the model is employed for improving performance due to an insufficient number of samples in our dataset. Furthermore, the model can recognize the detected object in the images and mark the object’s bounding box by joining the results across the region. The experiments show outstanding results for the loss value, drone location detection, precision and recall.
- Published
- 2022
- Full Text
- View/download PDF
5. A Stacked Deep Learning Approach for IoT Cyberattack Detection
- Author
-
Munif Alotaibi and Bandar Alotaibi
- Subjects
Article Subject ,Computer science ,business.industry ,Deep learning ,020206 networking & telecommunications ,Denial-of-service attack ,02 engineering and technology ,Residual ,Phishing ,Residual neural network ,Spamming ,Control and Systems Engineering ,Residual Blocks ,0202 electrical engineering, electronic engineering, information engineering ,T1-995 ,020201 artificial intelligence & image processing ,Artificial intelligence ,Electrical and Electronic Engineering ,Internet of Things ,business ,Instrumentation ,Technology (General) ,Computer network - Abstract
Internet of things (IoT) devices and applications are dramatically increasing worldwide, resulting in more cybersecurity challenges. Among these challenges are malicious activities that target IoT devices and cause serious damage, such as data leakage, phishing and spamming campaigns, distributed denial-of-service (DDoS) attacks, and security breaches. In this paper, a stacked deep learning method is proposed to detect malicious traffic data, particularly malicious attacks targeting IoT devices. The proposed stacked deep learning method is bundled with five pretrained residual networks (ResNets) to deeply learn the characteristics of the suspicious activities and distinguish them from normal traffic. Each pretrained ResNet model consists of 10 residual blocks. We used two large datasets to evaluate the performance of our detection method. We investigated two heterogeneous IoT environments to make our approach deployable in any IoT setting. Our proposed method has the ability to distinguish between benign and malicious traffic data and detect most IoT attacks. The experimental results show that our proposed stacked deep learning method can provide a higher detection rate in real time compared with existing classification techniques.
- Published
- 2020
- Full Text
- View/download PDF
6. Intelligent Medical IoT-Enabled Automated Microscopic Image Diagnosis of Acute Blood Cancers
- Author
-
Mohamed Esmail Karar, Bandar Alotaibi, and Munif Alotaibi
- Subjects
Leukemia ,acute leukemia ,generative adversarial networks ,computer-aided diagnosis ,internet of medical things ,wireless microscopic imaging ,Artificial Intelligence ,Image Interpretation, Computer-Assisted ,Internet of Things ,Humans ,Electrical and Electronic Engineering ,Child ,Biochemistry ,Instrumentation ,Algorithms ,Atomic and Molecular Physics, and Optics ,Analytical Chemistry - Abstract
Blood cancer, or leukemia, has a negative impact on the blood and/or bone marrow of children and adults. Acute lymphocytic leukemia (ALL) and acute myeloid leukemia (AML) are two sub-types of acute leukemia. The Internet of Medical Things (IoMT) and artificial intelligence have allowed for the development of advanced technologies to assist in recently introduced medical procedures. Hence, in this paper, we propose a new intelligent IoMT framework for the automated classification of acute leukemias using microscopic blood images. The workflow of our proposed framework includes three main stages, as follows. First, blood samples are collected by wireless digital microscopy and sent to a cloud server. Second, the cloud server carries out automatic identification of the blood conditions—either leukemias or healthy—utilizing our developed generative adversarial network (GAN) classifier. Finally, the classification results are sent to a hematologist for medical approval. The developed GAN classifier was successfully evaluated on two public data sets: ALL-IDB and ASH image bank. It achieved the best accuracy scores of 98.67% for binary classification (ALL or healthy) and 95.5% for multi-class classification (ALL, AML, and normal blood cells), when compared with existing state-of-the-art methods. The results of this study demonstrate the feasibility of our proposed IoMT framework for automated diagnosis of acute leukemia tests. Clinical realization of this blood diagnosis system is our future work.
- Published
- 2022
- Full Text
- View/download PDF
7. Big Data Handling Approach for Unauthorized Cloud Computing Access
- Author
-
Abdul Razaque, Nazerke Shaldanbayeva, Bandar Alotaibi, Munif Alotaibi, Akhmetov Murat, and Aziz Alotaibi
- Subjects
TK7800-8360 ,Computer Networks and Communications ,Hardware and Architecture ,Control and Systems Engineering ,data security ,data handling ,access control ,unauthorized access ,cloud computing ,Signal Processing ,Electrical and Electronic Engineering ,Electronics - Abstract
Nowadays, cloud computing is one of the important and rapidly growing services; its capabilities and applications have been extended to various areas of life. Cloud computing systems face many security issues, such as scalability, integrity, confidentiality, unauthorized access, etc. An illegitimate intruder may gain access to a sensitive cloud computing system and use the data for inappropriate purposes, which may lead to losses in business or system damage. This paper proposes a hybrid unauthorized data handling (HUDH) scheme for big data in cloud computing. The HUDH scheme aims to restrict illegitimate users from accessing the cloud and to provide data security provisions. The proposed HUDH consists of three steps: data encryption, data access, and intrusion detection. The HUDH scheme involves three algorithms: advanced encryption standards (AES) for encryption, attribute-based access control (ABAC) for data access control, and hybrid intrusion detection (HID) for unauthorized access detection. The proposed scheme is implemented using the Python and Java languages. The testing results demonstrated that the HUDH scheme can delegate computation overhead to powerful cloud servers. User confidentiality, access privilege, and user secret key accountability can be attained with more than 97% accuracy.
- Published
- 2022
8. Fabrication of a Biomass-Derived Activated Carbon-Based Anode for High-Performance Li-Ion Batteries
- Author
-
Faheem Ahmed, Ghazzai Almutairi, Prince M. Z. Hasan, Sarish Rehman, Shalendra Kumar, Nagih M. Shaalan, Abdullah Aljaafari, Adil Alshoaibi, Bandar AlOtaibi, and Kaffayatullah Khan
- Subjects
biomass ,XRD ,Control and Systems Engineering ,Mechanical Engineering ,TEM ,Li-ion batteries ,activated carbon ,Electrical and Electronic Engineering - Abstract
Porous carbons are highly attractive and demanding materials which could be prepared using biomass waste; thus, they are promising for enhanced electrochemical capacitive performance in capacitors and cycling efficiency in Li-ion batteries. Herein, biomass (rice husk)-derived activated carbon was synthesized via a facile chemical route and used as anode materials for Li-ion batteries. Various characterization techniques were used to study the structural and morphological properties of the prepared activated carbon. The prepared activated carbon possessed a carbon structure with a certain degree of amorphousness. The morphology of the activated carbon was of spherical shape with a particle size of ~40–90 nm. Raman studies revealed the characteristic peaks of carbon present in the prepared activated carbon. The electrochemical studies evaluated for the fabricated coin cell with the activated carbon anode showed that the cell delivered a discharge capacity of ~321 mAhg−1 at a current density of 100 mAg−1 for the first cycle, and maintained a capacity of ~253 mAhg−1 for 400 cycles. The capacity retention was found to be higher (~81%) with 92.3% coulombic efficiency even after 400 cycles, which showed excellent cyclic reversibility and stability compared to commercial activated carbon. These results allow the waste biomass-derived anode to overcome the problem of cyclic stability and capacity performance. This study provides an insight for the fabrication of anodes from the rice husk which can be redirected into creating valuable renewable energy storage devices in the future, and the product could be a socially and ethically acceptable product.
- Published
- 2023
- Full Text
- View/download PDF
9. Influence of COVID-19 Epidemic on Dark Web Contents
- Author
-
Saule Amanzholova, Aziz Alotaibi, Abdul Razaque, Munif Alotaibi, Bakhytzhan Valiyev, and Bandar Alotaibi
- Subjects
Data collection ,data collection ,TK7800-8360 ,Coronavirus disease 2019 (COVID-19) ,Computer Networks and Communications ,Computer science ,Dark Net ,COVID-19 ,Dark Web ,Variety (cybernetics) ,World Wide Web ,Deep Web ,Product (business) ,Hardware and Architecture ,Control and Systems Engineering ,Order (exchange) ,electrical_electronic_engineering ,Signal Processing ,Confidentiality ,Electronics ,Electrical and Electronic Engineering ,Web crawler - Abstract
The Dark Web is known as a place triggering a variety of criminal activities. Anonymization techniques enable illegal operations, leading to the loss of confidential information and its further use as bait, a trade product or even a crime tool. Despite technical progress, there is still not enough awareness of the Dark Web and its secret activity. In this study, we introduced the Dark Web Enhanced Analysis (DWEA), in order to analyze and gather information about the content accessed on the Dark Net based on data characteristics. The research was performed to identify how the Dark Web has been influenced by recent global events, such as the COVID-19 epidemic. The research included the usage of a crawler, which scans the network and collects data for further analysis with machine learning. The result of this work determines the influence of the COVID-19 epidemic on the Dark Net.
- Published
- 2021
- Full Text
- View/download PDF
10. A Multichannel Deep Learning Framework for Cyberbullying Detection on Social Media
- Author
-
Munif Alotaibi, Abdul Razaque, and Bandar Alotaibi
- Subjects
Short Message Service ,TK7800-8360 ,Computer Networks and Communications ,Computer science ,Twitter ,Machine learning ,computer.software_genre ,Convolutional neural network ,cyberbullying natural language processing (NLP) ,Social media ,information_technology_data_management ,Electrical and Electronic Engineering ,Block (data storage) ,Transformer (machine learning model) ,Artificial neural network ,business.industry ,InformationSystems_INFORMATIONSYSTEMSAPPLICATIONS ,Deep learning ,Sentiment analysis ,neural networks ,Social relation ,Hardware and Architecture ,Control and Systems Engineering ,Online social networks (OSNs) ,sentiment analysis ,Signal Processing ,The Internet ,Artificial intelligence ,Electronics ,business ,computer - Abstract
Online social networks (OSNs) play an integral role in facilitating social interaction, however, these social networks increase antisocial behavior, such as cyberbullying, hate speech, and trolling. Aggression or hate speech that takes place through short message service (SMS) or the Internet (e.g., in social media platforms) is known as cyberbullying. Therefore, automatic detection utilizing natural language processing (NLP) is a necessary first step that helps prevent cyberbullying. This research proposes an automatic cyberbullying method to detect aggressive behavior using a consolidated deep learning model. This technique utilizes multichannel deep learning based on three models, namely, the bidirectional gated recurrent unit (BiGRU), transformer block, and convolutional neural network (CNN), to classify Twitter comments into two categories: aggressive and not aggressive. Three well-known hate speech datasets were combined to evaluate the performance of the proposed method. The proposed method achieved promising results. The accuracy of the proposed method was approximately 88%.
- Published
- 2021
- Full Text
- View/download PDF
11. Utilizing Blockchain to Overcome Cyber Security Concerns in the Internet of Things: A Review
- Author
-
Bandar Alotaibi
- Subjects
Authentication ,Information privacy ,Blockchain ,Computer science ,business.industry ,010401 analytical chemistry ,Big data ,Cloud computing ,Computer security ,computer.software_genre ,Asset (computer security) ,01 natural sciences ,0104 chemical sciences ,Identification (information) ,Data integrity ,Ledger ,Electrical and Electronic Engineering ,business ,Instrumentation ,computer ,Anonymity - Abstract
The Internet of Things (IoT) is a wide network consisting of Internet-connected objects using installed software, such as home appliances, vehicles, and other entities embedded with sensors, actuators, radio-frequency identification (RFID), and electronics to exchange data. In the last two decades, numerous IoT solutions have been developed by small, medium-sized, and large enterprises to make our lives easier. Furthermore, private and academic researchers have extensively investigated some practical IoT solutions. The rapid expansion of IoT solutions accompanies numerous security concerns because the underlying IoT protocols and communication technologies have not considered security. Recently, blockchain has emerged to become one of the promising technologies that might overcome some of the IoT limitations (security limitations, in particular). Blockchain technology is a database ledger that uses a peer-to-peer (P2P) network and stores transactions and asset registries. Blockchain can be described as a mounting list of records (i.e., blocks) with the following properties: distributed, decentralized, immutable, and shared. This paper surveyed recent security advances to overcome IoT limitations using blockchain. In this article, the blockchain attempts to overcome IoT limitations that are related to cyber security have been classified into four categories: end-to-end traceability; data privacy and anonymity; identity verification and authentication; and confidentiality, data integrity, and availability (CIA). Intended as a guideline for future research, this paper also explores systematic processes.
- Published
- 2019
- Full Text
- View/download PDF
12. Distracted driver classification using deep learning
- Author
-
Bandar Alotaibi and Munif Alotaibi
- Subjects
business.industry ,Computer science ,Posture recognition ,Deep learning ,020206 networking & telecommunications ,02 engineering and technology ,Field (computer science) ,Recurrent neural network ,Phone ,Human–computer interaction ,Signal Processing ,0202 electrical engineering, electronic engineering, information engineering ,Action recognition ,020201 artificial intelligence & image processing ,Dashboard ,Artificial intelligence ,Electrical and Electronic Engineering ,business ,Intelligent transportation system - Abstract
One of the most challenging topics in the field of intelligent transportation systems is the automatic interpretation of the driver’s behavior. This research investigates distracted driver posture recognition as a part of the human action recognition framework. Numerous car accidents have been reported that were caused by distracted drivers. Our aim was to improve the performance of detecting drivers’ distracted actions. The developed system involves a dashboard camera capable of detecting distracted drivers through 2D camera images. We use a combination of three of the most advanced techniques in deep learning, namely the inception module with a residual block and a hierarchical recurrent neural network to enhance the performance of detecting the distracted behaviors of drivers. The proposed method yields very good results. The distracted driver behaviors include texting, talking on the phone, operating the radio, drinking, reaching behind, fixing hair and makeup, and talking to the passenger.
- Published
- 2019
- Full Text
- View/download PDF
13. Privacy preservation Models for Third-Party Auditor over Cloud Computing: a Survey
- Author
-
Bandar Alotaibi, Mohamed Ben Haj Frej, Munif Alotaibi, and Abdul Razaque
- Subjects
cloud service provider ,Service (systems architecture) ,TK7800-8360 ,Computer Networks and Communications ,Computer science ,service level agreement ,Cloud computing ,security ,Audit ,Safeguarding ,Computer security ,computer.software_genre ,Outsourcing ,Service-level agreement ,privacy-preserving model ,Electrical and Electronic Engineering ,Third party ,business.industry ,cloud computing ,Adversary ,cloud client ,Hardware and Architecture ,Control and Systems Engineering ,third-party auditor ,Signal Processing ,electrical_electronic_engineering ,Electronics ,business ,computer ,Personally identifiable information - Abstract
Cloud computing has become a prominent technology due to its important utility service, this service concentrates on outsourcing data to organizations and individual consumers. Cloud computing has considerably changed the manner in which individuals or organizations store, retrieve, and organize their personal information. Despite the manifest development in cloud computing, there are still some concerns regarding the level of security and issues related to adopting cloud computing that prevent users from fully trusting this useful technology. Hence, for the sake of reinforcing the trust between cloud clients (CC) and cloud service providers (CSP), as well as safeguarding the CC’s data in the cloud, several security paradigms of cloud computing based on a third-party auditor (TPA) have been introduced. The TPA, as a trusted party, is responsible for checking the integrity of the CC’s data and all the critical information associated with it. However, the TPA could become an adversary and could aim to deteriorate the privacy of the CC’s data by playing a malicious role. In this paper, we present the state of the art of cloud computing’s privacy-preserving models (PPM) based on a TPA. Three TPA factors of paramount significance are discussed: TPA involvement, security requirements, and security threats caused by vulnerabilities. Moreover, TPA’s privacy preserving models are comprehensively analyzed and categorized into different classes with an emphasis on their dynamicity. Finally, we discuss the limitations of the models and present our recommendations for their improvement.
- Published
- 2021
14. Blockchain-Enabled Transaction Scanning Method for Money Laundering Detection
- Author
-
Askar Tolemyssov, Abdul Razaque, Ammar Oad, Munif Alotaibi, Chenglin Zhao, and Bandar Alotaibi
- Subjects
TK7800-8360 ,Computer Networks and Communications ,Computer science ,Process (engineering) ,Beneficiary ,02 engineering and technology ,Computer security ,computer.software_genre ,transactions ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Electrical and Electronic Engineering ,money laundering ,Money laundering ,engineering_other ,money transfers ,Hardware and Architecture ,Control and Systems Engineering ,restrict ,Signal Processing ,originator ,020201 artificial intelligence & image processing ,Anomaly detection ,Electronics ,beneficiary ,computer ,Database transaction ,Java Programming Language - Abstract
Currently, life cannot be imagined without the use of bank cards for purchases or money transfers, however, their use provides new opportunities for money launderers and terrorist organizations. This paper proposes a blockchain-enabled transaction scanning (BTS) method for the detection of anomalous actions. The BTS method specifies the rules for outlier detection and rapid movements of funds, which restrict anomalous actions in transactions. The specified rules determine the specific patterns of malicious activities in the transactions. Furthermore, the rules of the BTS method scan the transaction history and provide a list of entities that receive money suspiciously. Finally, the blockchain-enabled process is used to restrict money laundering. To validate the performance of the proposed BTS method, a Spring Boot application is built based on the Java programming language. Based on experimental results, the proposed BTS method automates the process of investigating transactions and restricts money laundering incidents.
- Published
- 2021
- Full Text
- View/download PDF
15. Improved Support Vector Machine Enabled Radial Basis Function and Linear Variants for Remote Sensing Image Classification
- Author
-
Mohamed Ben Haj Frej, Bandar Alotaibi, Munif Alotaibi, Muder Almiani, and Abdul Razaque
- Subjects
010504 meteorology & atmospheric sciences ,Computer science ,Generalization ,Reliability (computer networking) ,02 engineering and technology ,Land cover ,TP1-1185 ,Overfitting ,01 natural sciences ,Biochemistry ,Article ,Analytical Chemistry ,remote sensing ,0202 electrical engineering, electronic engineering, information engineering ,Radial basis function ,support vector machine ,improved SVM-Linear variant ,Electrical and Electronic Engineering ,Instrumentation ,0105 earth and related environmental sciences ,Remote sensing ,Parametric statistics ,Probability ,Contextual image classification ,Chemical technology ,Reproducibility of Results ,Atomic and Molecular Physics, and Optics ,Support vector machine ,ComputingMethodologies_PATTERNRECOGNITION ,Remote Sensing Technology ,020201 artificial intelligence & image processing ,improved SVM-RBF variant ,Algorithms ,image classification - Abstract
Remote sensing technologies have been widely used in the contexts of land cover and land use. The image classification algorithms used in remote sensing are of paramount importance since the reliability of the result from remote sensing depends heavily on the classification accuracy. Parametric classifiers based on traditional statistics have successfully been used in remote sensing classification, but the accuracy is greatly impacted and rather constrained by the statistical distribution of the sensing data. To eliminate those constraints, new variants of support vector machine (SVM) are introduced. In this paper, we propose and implement land use classification based on improved SVM-enabled radial basis function (RBF) and SVM-Linear for image sensing. The proposed variants are applied for the cross-validation to determine how the optimization of parameters can affect the accuracy. The accuracy assessment includes both training and test sets, addressing the problems of overfitting and underfitting. Furthermore, it is not trivial to determine the generalization problem merely based on a training dataset. Thus, the improved SVM-RBF and SVM-Linear also demonstrate the outstanding generalization performance. The proposed SVM-RBF and SVM-Linear variants have been compared with the traditional algorithms (Maximum Likelihood Classifier (MLC) and Minimum Distance Classifier (MDC)), which are highly compatible with remote sensing images. Furthermore, the MLC and MDC are mathematically modeled and characterized with new features. Also, we compared the proposed improved SVM-RBF and SVM-Linear with the current state-of-the-art algorithms. Based on the results, it is confirmed that proposed variants have higher overall accuracy, reliability, and fault-tolerance than traditional as well as latest state-of-the-art algorithms.
- Published
- 2021
- Full Text
- View/download PDF
16. Hybrid energy-efficient algorithm for efficient Internet of Things deployment
- Author
-
Abdul Razaque, Yaser Jararweh, Bandar Alotaibi, Munif Alotaibi, and Muder Almiani
- Subjects
General Computer Science ,Electrical and Electronic Engineering - Published
- 2022
- Full Text
- View/download PDF
17. Rogue Access Point Detection: Taxonomy, Challenges, and Future Directions
- Author
-
Bandar Alotaibi, Abdul Razaque, and Khaled Elleithy
- Subjects
021110 strategic, defence & security studies ,business.product_category ,Handshake ,Computer science ,business.industry ,Rogue access point ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,0211 other engineering and technologies ,Local area network ,020206 networking & telecommunications ,Denial-of-service attack ,02 engineering and technology ,Computer security ,computer.software_genre ,Computer Science Applications ,Evil twin ,0202 electrical engineering, electronic engineering, information engineering ,Internet access ,Wireless ,The Internet ,Electrical and Electronic Engineering ,business ,Telecommunications ,computer - Abstract
Wireless Local Area Networks (WLANs) are increasingly integrated into our daily lives. Access Points (APs) are an integral part of the WLAN infrastructure, as they are responsible for coordinating wireless users and connecting them to the wired side of the network and, eventually, to the Internet. APs are deployed everywhere, from airports and shopping malls to coffee shops and hospitals, to provide Internet connectivity. One of the most serious security problems encountered by WLAN users is the existence of Rogue Access Points (RAPs). This article classifies existing solutions, identifies vulnerabilities, and suggests future directions for research into these RAPs. The ultimate objective is to classify existing detection techniques and find new RAP types that have not been classified by the research community. The literature typically categorizes Evil-twin, Unauthorized, Compromised, and Improperly Configured RAPs. Two other types have largely been abandoned by researchers, but can be classified as Denial of Service RAP attacks. These are deauthentication/disassociation attacks targeting wireless users, and the forging of the first message in a four-way handshake.
- Published
- 2016
- Full Text
- View/download PDF
18. Investigation of the High-Temperature Operation of AlGaN/GaN HFETs via Studying the Impact of Temperature Dependency of Drift Transport Characteristics
- Author
-
Bandar Alotaibi and Pouya Valizadeh
- Subjects
Mobility model ,Drift velocity ,Materials science ,Dependency (UML) ,business.industry ,Monte Carlo method ,Electronic, Optical and Magnetic Materials ,Reliability (semiconductor) ,Quality (physics) ,Velocity overshoot ,Electric field ,Electronic engineering ,Optoelectronics ,Electrical and Electronic Engineering ,Safety, Risk, Reliability and Quality ,business - Abstract
Investigation of the reliable operation of AlGaN/GaN HFETs at elevated temperatures is attempted. In this paper, a Monte Carlo-based temperature-dependent mobility model, with incorporation of steady-state velocity overshoot, is employed in modeling the drain current-voltage characteristics of AlGaN/GaN HFETs at 300, 400, and 500 K. One of the major merits of this model is that it employs a very small set of fitting parameters. The modeled drain current-voltage characteristics have been successfully matched to the experimental characteristics at the aforementioned temperatures. While confirming that a brief measurement at these temperatures is of no reliability concern on the quality of the metal-semiconductor contacts, this matching proves that the temperature dependency of the electron drift velocity is the cause of the degradation of drain current within the aforementioned range of temperature. In producing the aforementioned match for the long-gate AlGaN/GaN HFETs, it is also shown that the accurate modeling of the temperature dependency of the low-field drift transport is more consequential than the accurate representation of the transport in the medium-to-high electric fields.
- Published
- 2012
- Full Text
- View/download PDF
19. Fin- and Island-Isolated AlGaN/GaN HFETs
- Author
-
Bandar Alotaibi and Pouya Valizadeh
- Subjects
Materials science ,Aluminium nitride ,business.industry ,Transconductance ,Direct current ,Transistor ,Wide-bandgap semiconductor ,Gallium nitride ,Heterojunction ,Electronic, Optical and Magnetic Materials ,law.invention ,chemistry.chemical_compound ,chemistry ,law ,Logic gate ,Optoelectronics ,Electrical and Electronic Engineering ,business - Abstract
The effects of the variation of the size of isolation mesa of AlGaN/GaN heterojunction field-effect transistors (HFETs) on the device characteristics are presented for the first time. Studies on the direct current and pulsed drain and gate current-voltage characteristics demonstrate a correlation between the pinchoff voltage and the size of the isolation mesa. In this paper, devices fabricated on narrow mesas (i.e., 16 × 40 μm2 fins) and also a device fabricated on an array of very small size mesas (i.e., 16 × 7 μm2 islands) are compared with AlGaN/GaN HFETs of traditionally sized mesas (i.e., 70 × 100 μm2). All these devices show maximum extrinsic gate transconductance greater than 220 mS/mm, whereas the pinchoff voltage is observed to become less negative by reducing the size of the individual mesas. The island-isolated HFETs also enjoy a relatively higher gate transconductance.
- Published
- 2011
- Full Text
- View/download PDF
20. High efficiency, Pt-free photoelectrochemical cells for solar hydrogen generation based on 'giant' quantum dots
- Author
-
Alberto Vomiero, Fabiola Navarro-Pardo, Federico Rosei, Zetian Mi, Daniele Benetti, Bandar Alotaibi, Haiguang Zhao, Rajesh Adhikari, Srinivas Vanka, and Lei Jin
- Subjects
Materials science ,Settore ING-IND/22 - Scienza e Tecnologia dei Materiali ,Solar hydrogen ,Nanotechnology ,02 engineering and technology ,010402 general chemistry ,Hydrogen generation ,7. Clean energy ,01 natural sciences ,General Materials Science ,Electrical and Electronic Engineering ,Hydrogen production ,Water-splitting ,Renewable Energy, Sustainability and the Environment ,business.industry ,Photoelectrochemical cell ,021001 nanoscience & nanotechnology ,0104 chemical sciences ,Experimental physics ,Core@shell quantum dots ,Quantum dot ,Water splitting ,Optoelectronics ,Giant ,0210 nano-technology ,business - Abstract
Quantum dot (QD) sensitized TiO2 is considered as a highly promising photoanode material for photoelectrochemical (PEC) solar hydrogen production. However, due to its limited stability, the photoan ...
- Published
- 2016
21. High efficiency photoelectrochemical water splitting and hydrogen generation using GaN nanowire photoelectrode
- Author
-
Mohammad Harati, Bandar Alotaibi, M. G. Kibria, Zetian Mi, Hieu Pham Trung Nguyen, Songrui Zhao, and Shizhao Fan
- Subjects
Photocurrent ,Materials science ,business.industry ,Potassium bromide ,Mechanical Engineering ,Hydrogen bromide ,Doping ,Nanowire ,Bioengineering ,Biasing ,General Chemistry ,Electrolyte ,chemistry.chemical_compound ,chemistry ,Mechanics of Materials ,Optoelectronics ,Water splitting ,General Materials Science ,Electrical and Electronic Engineering ,business - Abstract
We have studied the photoelectrochemical properties of both undoped and Si-doped GaN nanowire arrays in 1 mol l 1 solutions of hydrogen bromide and potassium bromide, which were used separately as electrolytes. It is observed that variations of the photocurrent with bias voltage depend strongly on the n-type doping in GaN nanowires in both electrolytes, which are analyzed in the context of GaN surface band bending and its variation with the incorporation of Si-doping. Maximum incident-photon-to-current-conversion efficiencies of 15% and 18% are measured for undoped and Si-doped GaN nanowires under 350 nm light illumination, respectively. Stable hydrogen generation is also observed at a zero bias potential versus the counter-electrode. (Some figures may appear in colour only in the online journal)
- Published
- 2013
22. A New MAC Address Spoofing Detection Technique Based on Random Forests
- Author
-
Abdul Razaque, Bandar Alotaibi, and Khaled Elleithy
- Subjects
random forests ,Engineering ,Spoofing attack ,detection ,spoofing ,02 engineering and technology ,lcsh:Chemical technology ,computer.software_genre ,Biochemistry ,Article ,Analytical Chemistry ,law.invention ,law ,MAC address ,0202 electrical engineering, electronic engineering, information engineering ,Wireless ,lcsh:TP1-1185 ,Wi-Fi ,Electrical and Electronic Engineering ,wireless sensor networks ,Instrumentation ,business.industry ,Wireless network ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,020206 networking & telecommunications ,Atomic and Molecular Physics, and Optics ,wireless local area networks ,Random forest ,Media access control ,020201 artificial intelligence & image processing ,Data mining ,business ,computer ,Wireless sensor network ,Computer network - Abstract
Media access control (MAC) addresses in wireless networks can be trivially spoofed using off-the-shelf devices. The aim of this research is to detect MAC address spoofing in wireless networks using a hard-to-spoof measurement that is correlated to the location of the wireless device, namely the received signal strength (RSS). We developed a passive solution that does not require modification for standards or protocols. The solution was tested in a live test-bed (i.e., a wireless local area network with the aid of two air monitors acting as sensors) and achieved 99.77%, 93.16% and 88.38% accuracy when the attacker is 8–13 m, 4–8 m and less than 4 m away from the victim device, respectively. We implemented three previous methods on the same test-bed and found that our solution outperforms existing solutions. Our solution is based on an ensemble method known as random forests.
- Published
- 2016
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.