Faculty of Technoscience
Permanent URI for this community
Browse
Browsing Faculty of Technoscience by Title
Now showing 1 - 20 of 92
Results Per Page
Sort Options
Item A Comprehensive review on cryptographic techniques for securing internet of medical things: A state-of-the-art, applications, security attacks, mitigation measures, and future research direction.(Mesopotamian Journal of Artificial Intelligence in Healthcare, 2024-11-30) Wamusi, Robert; Asiku, Denis; Adebo, Thomas; Aziku, Samuel; Kabiito, Simon Peter; Zaward, Morish; Guma, AliAs healthcare becomes increasingly dependent on the Internet of Medical Things (IoMT) infrastructure, it is essential to establish a secure system that guarantees the confidentiality and privacy of patient data. This system must also facilitate the secure sharing of healthcare information with other parties within the healthcare ecosystem. However, this increased connectivity also introduces cybersecurity attacks and vulnerabilities. This comprehensive review explores the state-of-the-art in the IoMT, security requirements in the IoMT, cryptographic techniques in the IoMT, application of cryptographic techniques in securing the IoMT, security attacks on cryptographic techniques, mitigation strategies, and future research directions. The study adopts a comprehensive review approach, synthesizing findings from peer-reviewed journals, conference proceedings, book chapters, Books, and websites published between 2020 and 2024 to assess their relevance to cryptographic applications in IoMT systems. Despite advancements, cryptographic algorithms in IoMT remain susceptible to security attacks, such as man-in-the-middle attacks, replay attacks, ransomware attacks, cryptanalysis attacks, key management attacks, chosen plaintext/chosen ciphertext attacks, and side-channel attacks. While techniques like homomorphic encryption enhance security, their high computational and power demands pose challenges for resource-constrained IoMT devices. The rise of quantum computing threatens the efficacy of current cryptographic protocols, highlighting the need for research into quantum-resistant cryptography. The review identifies critical gaps in existing cryptographic research and emphasizes future directions, including lightweight cryptography, quantum-resistant methods, and artificial intelligence-driven security mechanisms. These innovations are vital for meeting the growing security requirements of IoMT systems and protecting against increasingly sophisticated threats.Item A secure and efficient blockchain and distributed ledger technology-based optimal resource management in digital twin beyond 5G networks using hybrid energy valley and levy flight distributer optimization algorithm.(IEEE, 2024-08-19) Kumar, K. Suresh; Alzubi, Jafar A.; Sarhan, Nadia M.; Awwad, E. M.; Kandasamy, V.; Ali, GumaThis paper aims to establish a virtual object management system, as well as optimal task scheduling using the foundation of Digital Twins (DT), to improve the user’s experience with management and to accomplish the task efficiently. On the other hand, offloading tasks using IoT gadgets to edge computing, fails to speed up control by users. The capabilities of the DT are provided by executing processes such as visualization, virtualization, synchronization, and simulation. The optimal selection of the virtual objects for the DT is done by utilizing the implemented Hybrid Energy Valley with Lévy Flight Distribution Optimization (HEV-LFDO) in order to optimally offload the task by the edge devices. The optimal selection of the virtual objects is done with the aid of the HEV-LFDO in the DT by considering the total cost of executing all tasks using the selected virtual objects and the decision variables to determine whether a virtual object is taken for executing a task or not as the constraint. The data for performing resource management is secured using the blockchain or distributed ledger technology. This accounts for the minimization of the local loss function. Finally, the secured data is considered for optimal resource management tasks. The optimal resource management is done using the same HEV-LFDO. This optimal resource management is carried out by considering the constraints like the cost of assigning a virtual object for the task to the edge device, and the cost of assigning the task to the edge device. These two costs are analyzed by taking the network’s bandwidth, energy consumption, and computational resources into consideration. Experimental verifications are conducted on the executed optimal resource management scheme to prove the ability of the implemented model to be integrated with the edge computing network. The overall processing time as well as the latency are also minimized by executing the optimal resource management scheme.Item A Survey on artificial intelligence and blockchain applications in cybersecurity for smart cities(2025-01-10) Asiku, Denis; Adebo, Thomas; Wamusi, Robert; Aziku, Samuel; Kabiito, Simon Peter; Zaward, Morish; Sallam, Malik; Ali, Guma; Mijwil, Maad M.Smart cities rapidly evolve into transformative ecosystems where advanced technologies work together to improve urban living. These interconnected environments use emerging technologies to offer efficient services and sustainable solutions for urban challenges. As these systems become more complex, their vulnerability to cybersecurity threats also increases. Integrating artificial intelligence (AI) and Blockchain technologies to address these challenges presents promising solutions that ensure secure and resilient infrastructures. This study provides a comprehensive survey of integrating AI, Blockchain, cybersecurity, and smart city technologies based on an analysis of peer-reviewed journals, conference proceedings, book chapters, and websites. Seven independent researchers reviewed relevant literature published between January 2021 and December 2024 using ACM Digital Library, Wiley Online Library, Taylor & Francis, Springer, ScienceDirect, MDPI, IEEE Xplore Digital Library, IGI Global, and Google Scholar. The study explores how AI can enhance threat detection, anomaly detection, and predictive analytics, enabling real-time responses to cyber threats. It examines various AI methodologies, including machine learning and deep learning, to identify vulnerabilities and prevent attacks. It discusses the role of Blockchain in securing data integrity, improving transparency, and providing decentralized control over sensitive information. Blockchain’s tamper-proof ledger and smart contract capabilities offer innovative solutions for identity management, secure transactions, and data sharing among smart city stakeholders. The study also highlights how combining AI and Blockchain can create robust cybersecurity frameworks, enhancing resilience against emerging threats. The survey concludes by outlining future research directions and offering recommendations for policymakers, urban planners, and cybersecurity professionals. This study identifies emerging trends and applications for enhancing the security and resilience of smart cities through innovative technological solutions. The survey provides valuable insights for researchers and practitioners who aim to utilize AI and Blockchain to improve smart city cybersecurity.Item A survey on artificial intelligence in cybersecurity for smart agriculture: state-of-the-art, cyber threats, artificial intelligence applications, and ethical concerns.(Mesopotamian Academic Press, Imam Ja'afar Al-Sadiq University, 2024-07-20) Ali, Guma; Mijwil, Maad M.; Buruga, Bosco Apparatus; Abotaleb, Mostafa; Adamopoulos, IoannisWireless sensor networks and Internet of Things devices are revolutionizing the smart agriculture industry by increasing production, sustainability, and profitability as connectivity becomes increasingly ubiquitous. However, the industry has become a popular target for cyberattacks. This survey investigates the role of artificial intelligence (AI) in improving cybersecurity in smart agriculture (SA). The relevant literature for the study was gathered from Nature, Wiley Online Library, MDPI, ScienceDirect, Frontiers, IEEE Xplore Digital Library, IGI Global, Springer, Taylor & Francis, and Google Scholar. Of the 320 publications that fit the search criteria, 180 research papers were ultimately chosen for this investigation. The review described advancements from conventional agriculture to modern SA, including architecture and emerging technology. It digs into SA’s numerous uses, emphasizing its potential to transform farming efficiency, production, and sustainability. The growing reliance on SA introduces new cyber threats that endanger its integrity and dependability and provide a complete analysis of their possible consequences. Still, the research examined the essential role of AI in combating these threats, focusing on its applications in threat identification, risk management, and real-time response mechanisms. The survey also discusses ethical concerns such as data privacy, the requirement for high-quality information, and the complexities of AI implementation in SA. This study, therefore, intends to provide researchers and practitioners with insights into AI’s capabilities and future directions in the security of smart agricultural infrastructures. This study hopes to assist researchers, policymakers, and practitioners in harnessing AI for robust cybersecurity in SA, assuring a safe and sustainable agricultural future by comprehensively evaluating the existing environment and future trends.Item Advancing green hydrogen production in Algeria with opportunities and challenges for future directions(Springer Nature, 2025-02-14) Benchenina, Yacine; Zemmit, Abderrahim; Bouzaki, Mohammed Moustafa; Loukriz, Abdelouadoud; Elsayed, Salah K.; Alzaed, Ali; Ghoneim, Sherif S. M.Green hydrogen represents a sustainable energy solution capable of supporting the global shift away from fossil fuels. In Algeria, with its abundant solar resources, this potential is significant. However, challenges related to water resource management and the energy cost of production limit large-scale implementation. Addressing these issues is crucial for effectively harnessing Algeria’s renewable energy potential. This study conducts an in-depth analysis leveraging advanced simulation tools like HOMER Pro to compare photovoltaic (PV) productivity and hydrogen yields in Algerian regions. The study identifies both desert regions and non-desert areas for their potential, employing innovative methods such as seawater electrolysis and wastewater utilization for sustainable water sourcing. The potential integration of hydrogen fuel cells into microgrids is also explored for enhanced energy stability and storage. The findings reveal that desert regions, such as Tamanrasset and Adrar, exhibit the highest photovoltaic electricity productivity, generating 33.5 GWh/year and 32.9 GWh/year, respectively. This translates into green hydrogen production capacities of 679 tons/year and 668 tons/year. Meanwhile, northern regions like Tlemcen and Skikda demonstrate substantial potential, producing 29 GWh/year and 26.6 GWh/year of solar electricity, which results in green hydrogen production outputs of 589 tons/year and 539 tons/year, respectively. This underscores Algeria’s ability to leverage solar energy across diverse regions. The study highlights that while desert regions exhibit high solar and hydrogen production, northern areas provide a strategic advantage due to their proximity to European markets. Algeria’s existing infrastructure supports efficient export to European markets, offering a strategic advantage in green hydrogen trade.Item AI Driven railway crack detection system using Convolutional Neural Network and IoT(IEEE, 2025-06-02) Sudha, M.; Saranya, R.; Ali, Guma; Ganesh, C; Umamaheswari, S.The Railway Track fractures identification Using AI with IoT project aims to increase railway safety by automating the identification of fractures in railway tracks using artificial intelligence (AI) and Internet of Things (IoT) technology. Even minor cracks in railway tracks, which are crucial components of the transportation system, can cause major accidents if they not immediately identified also repaired. Conventional manual assessing technique are expensive, time-consuming, and error-prone. Convolutional Neural Networks, a kind deep learning model, will used in this study to automatically identify cracks in photos of railroad tracks. The model trained on a dataset of track photographs in order to discern parts are defective (cracked) and non-defective (intact). Once trained, The CNN model is employed to analyze images captured by cameras mounted on trains or inspection vehicles as part of a real-time monitoring system driven by the Internet of Things. Every time a fracture is discovered, the system sends the information to the Blynk IoT platform, notifying and alerting maintenance personnel. Additionally, an LCD display and a buzzer alarm are activated in the field to alert technicians to the detected defect. By combining AI and IoT, the initiative aims to reduce overall maintenance costs, improve safety through early fault detection, and speed up the track inspection process. By providing a more automated, accurate, and efficient method of tracking the present state of railroad lines, the system ultimately increases the harmlessness and reliability of railway transit.Item AI-driven pathogen detection systems for rapid and accurate diagnosis(IEEE, 2025-09-24) Deepika, M.; Murugan, Sundara Bala; Subasini, V.; Rufus, N. Herald Anantha; Atkinswestley, A.; Ali, GumaPathogen detection at speed along with precision serves as a basis for disease diagnosis and overall control effectiveness. Several current detection methods based on culture-based techniques and PCR face drawbacks of extended processing times, high expenses, and the need for expert operators. It adopts deep learning Convolutional Neural Networks with an attention mechanism in a system designed to overcome existing limitations of pathogen detection. The model was trained using a multi-modal dataset that combined spectral and biological signals through feature extraction optimization and privacy-protected training methods based on federated learning. The proposed system reaches a 96.8% detection accuracy together with 15% reduced false alarm rates and 35% faster operation speeds than conventional models. Experimental data measurements showed that this system achieved 92.3% F1-score together with 97.1% AUC for real-time identification of pathogens. AI has proven its effectiveness through these findings in changing the way pathogen diagnostics operate. Further work will concentrate on extending datasets while creating real-time deployment protocols for clinical use.Item An Editorial vision for civil engineering: navigating intelligence and innovation(Mesopotamian Academic Press, 2025-11-01) Mijwil, Maad M.; Adamopoulos, Ioannis; Ali, GumaThe integration of Artificial Intelligence in civil engineering has seen a major advancement over the applications of primitive data-driven models, reaching advanced hybrid physics-informed models. This evolution represents a significant change of paradigm from the basic predictive analytics to what is now called "structural cognition." But in this cutting-edge paradigm, the evolutionary learning of AI beyond the structural prediction is further developed, with the ability to learn underlying causal relationships in complicated engineering systems. This not only allows them to diagnose potential problems, but also to proactively propose well-targeted remedial measures, giving engineers a greater understanding of the situation as well as better, better-informed decision-making with respect to infrastructure sustainability and safety [1], [2]. A critical element to this evolution is the emergence of "perceptive infrastructure." This idea is further greatly supported by similar inventions like wavelet-diffusion architectures, and it is very useful in the design of the most robust vision-based monitoring systems. The systems are especially well-suited to demanding environments, such as low-light and other bad weather conditions where conventional surveillance techniques tend to break down. By equipping infrastructure with the ability to sense and make real-time sense of their environment with high fidelity, these technologies are ushering in a new era of self-sensing, self-reporting and even self-predicting civil assets, heading toward constant intelligent self-diagnosis [1]. Figure 1 illustrates artificial intelligence tools in civil engineering.Item Analysing the connection between ai and industry 4.0 from a cybersecurity perspective: defending the smart revolution(Mesopotamian Journal of Big Data, 2023-05-05) Bala, Indu; Mijwil, Maad M.; Ali, Guma; Sadıkoğlu, EmreIn recent years, the significance and efficiency of business performance have become dependent heavily on digitization, as jobs in companies are seeking to be transformed into digital jobs based on smart systems and applications of the fourth industrial revolution. Cybersecurity systems must interact and continuously cooperate with authorized users through the Internet of Things and benefit from corporate services that allow users to interact in a secure environment free from electronic attacks. Artificial intelligence methods contribute to the design of the Fourth Industrial Revolution principles, including interoperability, information transparency, technical assistance, and decentralized decisions. Through this design, security gaps may be generated that attackers can exploit in order to be able to enter systems, control them, or manipulate them. In this paper, the role of automated systems for digital operations in the fourth industrial revolution era will be examined from the perspective of artificial intelligence and cybersecurity, as well as the most significant practices of artificial intelligence methods. This paper concluded that artificial intelligence methods play a significant role in defending and protecting cybersecurity and the Internet of Things, preventing electronic attacks, and protecting users' privacy.Item Arduino based smart energy saving system in Ugandan public universities: a case study of Muni university(International Journal of Innovative Research and Development, 2019-06) Nkamwesiga, Lawrence; Kazibwe, Julius Junior; Male, PaulThe application of internet of things in the real world offers numerous benefits including smart homes and offices, a technology that does not only save energy but also saves money. Office automation is becoming popular due to its numerous benefits as applied in the world of internet of things. The specific objectives of the study were: to assess the current energy usage, identify current energy saving measures, and design and implement a smart energy saving system for Muni University. System requirements were collected from the respondents who were staff of Muni University. The study considered 2 respondents from estates office, 2 from procurement, 1 from each of the three departments of education, Computer and Information Science, and Nursing Sciences. User requirements were gathered a qualitative protocol using focus group discuss and thematic analysis technique was employed. Heterogeneous home automation systems and technologies were considered in review with central controller-based Arduino, sensors, web based, email, Bluetooth, mobile, SMS, ZigBee, Dual Tone Multi Frequency, and cloud based. The study design utilized the Global system for mobile communication technology as a user interface using SMS based communication with Arduino as the central controller. The system supports internet of things concept that can be applied in saving electrical energy usage in public places including public universities. The study further recommends the Ugandan government to advocate for Arduino Based Smart Energy Saving System that can reduce electrical energy expenditure in Ugandan public universities Muni University inclusive.Item Artificial intelligence in corneal topography: A short article in enhancing eye care(Mesopotamian Journal of Artificial Intelligence in Healthcare, 2023-06-17) Ali, Guma; Eid, Marwa M.; Ahmed, Omar G.; Abotaleb, Mostafa; Alaabdin, Anas M. Zein; Buruga, Bosco ApparatusThe eye is a critical part of the human being, as it provides complete vision and the ability to receive and process visual details, and any deficiency in it may affect vision and loss of sight. Corneal topography is one of the essential diagnostic tools in the field of ophthalmology, as it can provide important information about the cornea and the problems that appear in it. Artificial intelligence strategies contribute to the development of the healthcare domain through a group of approaches that have a significant and vital impact on improving the field of ophthalmology. The primary purpose of this paper is to highlight the efficiency of artificial intelligence in extracting features from corneal topography and how these techniques contribute to helping ophthalmologists diagnose corneal topography. Furthermore, the focus is on the performance of AI algorithms, their diagnostic capabilities, and their importance in helping physicians and patients. The effects of this paper confirm the effectiveness and efficiency of artificial intelligence algorithms in the clinical diagnosis of various eye concerns.Item Artificial intelligence solutions for health 4.0: overcoming challenges and surveying applications(Mesopotamian Journal of Artificial Intelligence in Healthcare, 2023-03-10) Al-Mistarehi, Abdel-Hameed; Mijwil, Maad M.; Filali, Youssef; Bounabi, Mariem; Ali, Guma; Abotaleb, MostafaIn recent years, the term Health 4.0 has appeared in health services and is related to the concept of Industry 4.0. The term Health 4.0 focuses on replacing traditional care in hospitals and medical clinics with home health services that are based on artificial intelligence techniques through the use of telemedicine applications that allow the monitoring of patients in a virtual environment. This term is utilized to represent digital change in the healthcare sector. Governments aim to develop the level of medical care in hospitals and clinics to ensure the provision of healthcare benefits at low costs and increase patient satisfaction. It has become vital for hospitals to grow their environment into digital environments in their services through the use of a set of computer programs based on artificial intelligence. Artificial intelligence techniques in Health 4.0 provide a set of procedures that benefit patients and healthcare workers, including early diagnosis, make inquiries into treatment, data analysis, reports on the patient's condition, and others. The primary purpose of this article is to determine the significance of Health 4.0 and AI techniques in healthcare by mentioning the most important benefits and weaknesses of using AI techniques in healthcare.Item Assessing organisational information systems security by human insiders in private and public universities in Uganda(IMPACT: International Journal of Research in Engineering & Technology, 2015) Businge, Phelix MbabaziInformation system security management is expected to be a high priority for organizational success, given that Information is critical both as input and output of an organization. Hence, there is need to have a secure information system to conduct any business related activities to ensure six objectives of information security: confidentiality; integrity; availability; legitimate use (identification, authentication, and authorization); auditing or traceability; and non-repudiation of the information. This study identified the objectives of information security, key human insider threats which affect information system security of Business organization and the level of information security policy compliance in organizations. The study was carried out in two Universities one private and another Public University where forty (40) Questionnaires were distributed and the findings showed Institutional data security (protecting company information assets) with mean of 3.79 and Employees (safety, satisfaction, retention) with mean of 3.00 which helps to motivate insider to feel part of organization were given law priority and Respondents also identified Laptops ranked as number 1 (mean =3.91) as frequently used device in the institution to cause threat on institutional data security followed by Mobile phones ranked as Number 2(mean=3.75). The study also further discovered that Policies on cyber security (use of social medias e.g. face book) (mean=2.45) was not implemented, Policies on Bring Your Own Device to be used at the Institution (Mean =2.53) was not implemented and Data destruction policies for your Institutional data materials that contain sensitive information (mean=2.52) was not implemented. The following behaviors were ranked top which need to be worked on; usage of secondary storage devices like flash discs, CD, Hard disks (mean=3.88), Sharing of secondary storage devices like flash discs, CD, Hard disks (Mean=3.48) was also frequent and using of personally owned mobile devices to do office work (mean=3.27) was also ranked among the top behaviors.Item Assessment of how users perceive the usage of biometric technology applications(IntechOpen, 2022-07-27) Habibu, Taban; Luhanga, Edith; Sam, AnaelBiometrics applications are progressively widespread as a means of authenticating end-users owing to the extensive range of benefits over traditional authentication (token-base-authentication). However, the transaction involves taking into account the perceptions and responses of end-users. If end-users are fearful, hesitant about these biometric technology-applications, misuse and implementation-complications can surely overshadow. The goal of this study is to sightsee the user’s-motivation, understanding, consciousness and acceptance towards utilization of biometric technology-applications. A 300-person survey was conducted to evaluate public-opinion on the use and adoption of biometrics. Stratified sample technique was used to administer the surveys. The results presented that perceived ease-of-use, user-motivation and attitude are more important-factors when deciding whether to accept new technology-applications. Although many end-users have become more familiar with biometric technology-applications (e.g., Fingerprints or facial-recognition), many individuals still have a negative-perception of the technology. Concerns regarding confidentiality and security i.e., storing and protecting personal-identification data, the fear of intruding into a person’s daily-life and disclosing personal-information remain a major problem. Some end-users claim that despite the potential resilience to biometrics, designers must mentally and psychologically prepare the general public for the new use of biometric technology. This will make it possible to transform negative user-perceptions into a positive-experience. Thus, this study can help end-users and companies understand and make the right decisions to promote the use of biometric-applications and services. The study is expected to be an important research-discovery that will greatly contribute to Uganda’s digital-economy.Item Augmented heritage: AR and QR code integration for interactive cultural storytelling in the UAE(IEEE, 2025-12-05) Lal, Mily; Dash, Soumyakant; Keerthika, J; Kumar, Bura Vijay; Ali, Guma; Shukla, Vinod KumarThis study has outlined a mobile-augmented reality (AR) storytelling framework utilizing Quick Response (QR) code technology to provide cultural engagement at heritage sites in the United Arab Emirates. The project set out to merge traditional heritage with augmented immersive technology and focused on a four-phase methodology: (1) Content curation and narrative design through historians and cultural experts; (2) Planning QR codes in spaces cooperatively designed through spatial design and semiotics of culture; (3) Content development of AR experiences in Unity and Vuforia using finite state machine for stability and usability; and (4) User testing in three major heritage locations. The quantitative and qualitative evaluations measured user engagement, narrative retention, usability of the system, and cultural sensemaking. Relative to baseline digital experiences, the AR-QR platform saw significant gains: 25-30% improvement in engagement; 20-25% improvement in narrative retention; and over 15% improvement in usability and cultural relevance. The study evidence demonstrates the promise of AR-QR storytelling and approach to deliver contextually rich and interactive heritage experiences. Although there are limitations in device affordances/conceivability and longer-term evaluations, this study suggests---immersive storytelling can make heritage more engaging, accessible, and meaningful to a diverse population.Item Blockchain and deep Q-learning for trusted cloud-enabled drone network in smart forestry: A Survey(Imam Ja’afar Al-Sadiq University, 2025-12-14) Ali, Guma; Wamusi, Robert; Mijwil, Maad M.; Al-Hamzawi, Hassan A. Hameed; Al Sailawi, Ali S. Abed; Salau, Ayodeji OlalekanThe convergence of drone technology, cloud computing, and intelligent decision-making is revolutionizing precision forestry. However, deploying large-scale drone networks in smart forestry faces challenges such as trust, security, data integrity, and autonomous coordination. This survey examines how combining Blockchain technology with deep Q-learning (DQL) can address these issues within cloud-enabled drone networks. Drawing on 102 peer-reviewed sources published between 2022 and 2025 from reputable platforms such as ACM Digital Library, Frontiers, Wiley Online Library, PLoS, Nature, Springer, ScienceDirect, MDPI, IEEE Xplore Digital Library, Taylor & Francis, Sage, and Google Scholar, this work highlights recent advancements in secure and intelligent drone ecosystems. Blockchain provides a decentralized, tamper-resistant framework for validating transactions and securing data exchange among autonomous drones, ensuring the integrity, confidentiality, and authenticity of environmental data. This is critical in forestry, where data manipulation and unauthorized access pose significant risks. Complementing this, DQL enables drones to make autonomous decisions by interpreting real-time environmental data and learning from past experiences, allowing drones to adjust their flight paths, optimize resource utilization, and enhance data collection in dynamic forest environments, such as wildfires or illegal logging operations. Together, Blockchain and DQL create a resilient, scalable architecture that supports secure, real-time, and intelligent forest monitoring. This framework lays the groundwork for developing autonomous and trustworthy drone networks that promote sustainable and climate-smart forestry management.Item Blockchain and federated learning in edge-fog-cloud computing environments for smart logistics(Mesopotamian Academic Press, 2025-07-22) Ali, Guma; Adebo, Thomas; Mijwil, Maad M.; Al-Mahzoum, Kholoud; Sallam, Malik; Salau, Ayodeji Olalekan; Adamopoulos, Ioannis; Bala, Indu; Al-jubori, Aseed Yaseen RashidThe rapid growth of smart logistics, driven by IoT devices and data-intensive applications, necessitates secure, scalable, and efficient computing frameworks. As the edge-fog-cloud (EFC) paradigm supports real-time data processing, it faces significant security threats and attacks, including privacy risks, data breaches, and unauthorized access. To address these security threats and attacks, blockchain and federated learning (FL) have gained popularity as potential solutions in EFC computing environments for smart logistics. This survey reviews the current landscape in EFC computing environments for smart logistics, highlighting the existing benefits and challenges identified in 134 research studies published between January 2023 and June 2025. The applications of blockchain and FL demonstrate their ability to enhance data security and privacy, improve real-time tracking and monitoring, and ensure inventory and supply chain optimization. Although these technologies offer promising solutions, challenges such as scalability issues, data quality, interoperability and standardization hinder their effective implementation. The survey suggests future research directions focused on developing advanced blockchain and FL, integrating emerging technologies, developing policies and regulations, fostering collaborative research, and ensuring cross-industry adoption and interoperability. Integrating blockchain and FL within the EFC model offers a transformative path toward building secure, intelligent, and resilient logistics systems.Item Blockchain and quantum machine learning approach for securing smart water management systems: A Scoping review.(Peninsula Publishing Press, 2025-09-01) Ali, Guma; Mijwil, Maad M.; Adamopoulo, Ioannis; Dhoska, KlodianSmart water management systems (SWMS) increasingly rely on Internet of Things (IoT) devices to enhance water distribution, detect leaks, and support sustainable resource use, but this reliance also heightens exposure to cyberattacks, data manipulation, and privacy risks. Conventional security approaches often fall short due to the decentralized design and real-time demands of these systems. This scoping review analyzes 266 studies published between January 2022 and December 2025 to assess how integrating Blockchain and quantum machine learning (QML) can strengthen the security, privacy, and reliability of SWMS. The review examines Blockchain-enabled water management, quantum computing applications, and QML-based security frameworks, using thematic analysis to categorize emerging architectures and challenges. Findings of the focused studies show growing adoption of Blockchain for secure data logging, access control, and tamper-proof auditing. At the same time, QML demonstrates strong potential in anomaly detection, predictive maintenance, and optimizing distribution networks. Although these technologies offer a promising foundation for resilient water infrastructure, most research remains conceptual, with limited real-world deployment or scalability assessments. Integrating Blockchain with QML could create robust, privacy-preserving SWMS frameworks. However, significant barriers persist, including the computational intensity of quantum models, interoperability issues with existing IoT infrastructures, and the absence of standardized protocols. Addressing these gaps is essential for practical implementation. This review underscores the need for scalable hybrid designs, applied validation, and cross-disciplinary standards to advance secure, efficient, and sustainable smart water management solutions.Item Chinese generative AI models challenge western AI in clinical chemistry MCQs: A Benchmarking follow-up study on AI use in health education(Mesopotamian Press, 2025-02-08) Sallam, Malik; Al-Mahzoum, Kholoud; Eid, Huda; Al-Salahat, Khaled; Sallam, Mohammed; Ali, Guma; Mijwil, Maad M.Background: The emergence of Chinese generative AI (genAI) models, such as DeepSeek and Qwen, has introduced strong competition to Western genAI models. These advancements hold significant potential in healthcare education. However, benchmarking the performance of genAI models in specialized medical disciplines is crucial to assess their strengths and limitations. This study builds on prior research evaluating ChatGPT (GPT-3.5 and GPT-4), Bing, and Bard against human postgraduate students in Medical Laboratory Sciences, now incorporating DeepSeek and Qwen to assess their effectiveness in Clinical Chemistry Multiple-Choice Questions (MCQs). Methods: This study followed the METRICS framework for genAI-based healthcare evaluations, assessing six models using 60 Clinical Chemistry MCQs previously administered to 20 MSc students. The facility index and Bloom’s taxonomy classification were used to benchmark performance. GenAI models included DeepSeek-V3, Qwen 2.5-Max, ChatGPT-4, ChatGPT-3.5, Microsoft Bing, and Google Bard, evaluated in a controlled, non-interactive environment using standardized prompts. Results: The evaluated genAI models showed varying accuracy across Bloom’s taxonomy levels. DeepSeek-V3 (0.92) and ChatGPT-4 (1.00) outperformed humans (0.74) in the Remember category, while Qwen 2.5-Max (0.94) and ChatGPT-4 (0.94) surpassed human performance (0.61) in the Understand category. ChatGPT-4 (+23.25%, p < 0.001), DeepSeek-V3 (+18.25%, p = 0.001), and Qwen 2.5-Max (+18.25%, p = 0.001) significantly outperformed human students. Decision tree analysis identified cognitive category as the strongest predictor of genAI accuracy (p < 0.001), with Chinese AI models performing comparably to ChatGPT-4 in lower-order tasks but exhibiting lower accuracy in higher-order domains. Conclusions: The findings highlighted the growing capabilities of Chinese genAI models in healthcare education, proving that DeepSeek and Qwen can compete with, and in some areas outperform, Western genAI models. However, their relative weakness in higher-order reasoning raises concerns about their ability to fully replace human cognitive processes in clinical decision-making. As genAI becomes increasingly integrated into health education, concerns regarding academic integrity, genAI dependence, and the validity of MCQ-based assessments must be addressed. The study underscores the need for a re-evaluation of medical assessment strategies, ensuring that students develop critical thinking skills rather than relying on genAI for knowledge retrieval.Item Comparative analysis of PWM AC choppers with different loads with and without neural network application.(Wasit Journal of Computer and Mathematics Science, 2023-09) Bounab, Mariem; Ali, GumaIn this paper, we focus on the "Artificial Neural Network (ANN) based PWM-AC chopper". This system is based on the PWM AC chopper-encouraged single-phase induction motor. The main purpose of this paper is to design and implement an ideal technique regarding speed control. Here analyzed PWM-based AC-AC converter with resistive load, R-L load and finally, the PWM AC chopper is fed to single phase induction for speed control. Using other soft computing and optimization techniques such as Artificial Neural Networks, Fuzzy Logic, Convolution algorithm, PSO, and Neuro Fuzzy can control the Speed. We used Artificial Neural Network to control the Speed of the PWM-AC Single phase induction motor drive. The Neural Network toolbox has been further used for getting desired responses. Neural system computer programs are executed in MATLAB. The performance of the proposed method of ANN system of PWM AC Chopper fed single phase induction motor drive is better than other traditional and base methods for controlling the Speed, based on the MOSFET.