Volume 7, Issue 2

This issue features 19 research articles contributing innovative techniques, models, and frameworks across various engineering and technology domains. Studies span wireless sensor networks for hydroponics, vehicular video streaming, mobile ad-hoc network security, hybrid renewable energy grids, digital era project management, DC microgrid stability, probabilistic logic modeling, blended math education, solar energy mapping, hand hygiene computer vision, automatic image captioning, digital forensics on Android, fracture modeling in solids, interpretable AI for mastitis detection, contact tracing apps, searchable encryption privacy, digital readiness assessment, blockchain for healthcare data sharing, and strategic design for organizational transformation.
Download Complete IssueFront Cover
Editorial Board
Editorial
Table of Contents
Automated Hydroponic System using Wireless Sensor Networks
Researchers have associated agriculture and food processing with adverse environmental impacts like; falls in the underground freshwater table, energy consumption, and high carbon emission. These factors have the worst effect on developing countries. Therefore, there is a need for on-demand food production techniques that require minimum resource utilization. For these reasons, scientists are now focusing…
Read MoreEnhanced Dynamic Cross Layer Mechanism for real time HEVC Streaming over Vehicular Ad-hoc Networks (VANETs)
Various applications have helped make vehicular Ad-hoc network communication a reality. Real-time applications, for example, need broadcasting in high video quality with minimal latency. The new High-Efficiency Video Coding (HEVC) has shown great promise for real-time video transmission through Vehicle Ad-hoc Networks due to its high compression level. These networks, on the other hand, have…
Read MoreTaxonomy of Security Techniques for Routing Protocols in Mobile Ad-hoc Networks
The Nodes equipped with wireless technology cooperate in an autonomous and instantaneous way to form a mobile ad hoc network. It turns out that several factors make this type of network vulnerable to various security threats. Considering the sensitivity of user data routed through nodes, routing security should be a priority in mobile ad hoc…
Read MorePower Management and Control of a Grid-Connected PV/Battery Hybrid Renewable Energy System
This paper presents novel Energy Management Strategies (EMSs), and the control of a Grid-Connected Hybrid Renewable Energy System (GCHRES). The GCHRES describes a Photovoltaic Generator (PVG) and a Battery-Based Storage System. Both are tied to the Common Coupling Point (CCP) through a reversible three-phase inverter. The CCP combines the Utility Grid (UG) and an AC…
Read MoreIT Project Management Models in an Era of Digital Transformation: A Study by Practice
In 1998 we were talking about an NTIC era, and since the years 2010, we are tracing the beginning of a new era of technological development, called the era of digital transformation. During this new era companies have started to run towards the digitalization of their processes, which represent a large part of the market,…
Read MoreStability Analysis of a DC Microgrid with Constant Power Load
DC Microgrids (DCMGs) aggregate and integrate various distribution generation (DG) units through the use of power electronic converters (PECs) that are present on both the source side and the load side of the DCMGs. Tightly regulated PECs at the load side behave as constant power loads (CPLs) and may promote instability in the entire DCMG.…
Read MoreOn the Construction of Symmetries and Retaining Lifted Representations in Dynamic Probabilistic Relational Models
Our world is characterised by uncertainty and complex, relational structures that carry temporal information, yielding large dynamic probabilistic relational models at the centre of many applications. We consider an example from logistics in which the transportation of cargoes using vessels (objects) driven by the amount of supply and the potential to generate revenue (relational) changes…
Read MoreOnline Support for Tertiary Mathematics Students in a Blended Learning Environment
The context for the study was a naturally occurring quasi-experiment in the core mathematics program in a large Australian university. Delivery of teaching was changed in a sequence of two initial core mathematics subjects taken by engineering and science students. The change replaced one of two face-to-face tutorial classes per week by an online tutorial.…
Read MoreSolar Energy Assessment, Estimation, and Modelling using Climate Data and Local Environmental Conditions
On Renewable Energy (RE), this field covers the most significant share of the world energy demand and challenges on the expensive measurement and maintenance equipment to be used. In all studies and designs, global solar radiation (GSR) measurements require assessment, estimation, and models to be applied together with the environment and meteorological data on installing…
Read MoreA Study on Novel Hand Hygiene Evaluation System using pix2pix
The novel coronavirus infection (COVID-19), which appeared at the end of 2019 has developed into a global pandemic with numerous deaths, and has also become a serious social concern. The most important and basic measure for preventing infection is hand hygiene. In this study, by photographing palm images of nursing students after hand-washing, using fluorescent…
Read MoreA Unified Visual Saliency Model for Automatic Image Description Generation for General and Medical Images
An enduring vision of Artificial Intelligence is to build robots that can recognize and learn the visual world and who can speak about it in natural language. Automatic image description generation is a demanding problem in Computer Vision and Natural Language Processing. The applications of image description generation systems are in biomedicine, military, commerce, digital…
Read MoreForensic Analysis of “WhatsApp” Artifacts in Android without Root
WhatsApp application is considered the largest messaging application around the world and an important source of information, they just incorporated a new technique that operates on end-to-end encryption, which presents a significant problem for forensic investigators and analysts. This study describes how to recover the encryption key from WhatsApp to decrypt WhatsApp databases and retrieve…
Read MoreAn Interdisciplinary Approach to Fracture of Solids from the Standpoint of Condensed Matter Physics
Instead of approaches of solid mechanics or a formal description of experimental data an interdisciplinary approach is proposed to consider failure and deformation as thermodynamic processes. Mathematical modeling of the processes is carried out using rheological models of the material. One fracture criterion is used, that formally corresponds to the achievement of a threshold concentration…
Read MoreInterpretable Rules Using Inductive Logic Programming Explaining Machine Learning Models: Case Study of Subclinical Mastitis Detection for Dairy Cows
With the development of Internet of Things technology and the widespread use of smart devices, artificial intelligence is now being applied as a decision-making tool in a variety of fields. To make machine learning models, including deep neural network models, more interpretable, various techniques have been proposed. In this paper, a method for explaining the…
Read MoreCOVIDFREE App: The User-Enabling Contact Prevention Application: A Review
The use of Covid-19 contact tracing applications has become almost irrelevant now that several flavors of Covid-19 vaccine have been developed and are constantly being distributed to people during the pandemic to help alleviate the need for lockdowns. Also, the availability of at-home testing kits and testing sites means that people do not need to…
Read MoreLeakage-abuse Attacks Against Forward Private Searchable Symmetric Encryption
Dynamic Searchable Symmetric Encryption (DSSE) methods address the problem of securely outsourcing updating private data into a semi-trusted cloud server. Furthermore, Forward Privacy (FP) notion was introduced to limit data leakage and thwart the related attacks on DSSE approaches. FP schemes ensure previous search queries cannot be linked to future updates and newly added files.…
Read MoreDigital Competencies of Saudi University Graduates Towards Digital Society: The Case of The University of Tabuk
This paper presents findings and proposes recommendations from an evaluation of the level of digital competencies among Saudi university graduates to ascertain their readiness for becoming digital citizens, with high confidence in using digital technologies to successfully engage in digital transformation efforts to achieve Saudi Vision 2030. The sample comprised 352 University of Tabuk students…
Read MoreCloud-Based Hierarchical Consortium Blockchain Networks for Timely Publication and Efficient Retrieval of Electronic Health Records
Blockchain technology is seeing a trend of popularity and adoption in many different application areas. One such area is healthcare, as there is a need to develop a system that can reliably store and share electronic health records (EHRs) among hospital-based health facilities. In this paper, we present a cloud-based hierarchical consortium blockchain framework for…
Read MoreTowards a Framework for Organizational Transformation through Strategic Design Implementation
The aim of the research is to contribute to the emergent field of strategic design as an approach to creating transformational impacts in organizations. This is driven by international strategies to promote sustainable business environments which are innovative and adaptive to change. The literature identifies a gap in the knowledge in relation to how knowledge…
Read More
