Guiying Zhang | Computer Vision | Best Researcher Award

Dr. Guiying Zhang | Computer Vision | Best Researcher Award

Lecturer | Tianjin University of Technology and Education | China

Dr. Guiying Zhang is a dedicated researcher in microelectronics and communication engineering with expertise spanning electronic packaging reliability, wireless sensor networks, and antenna system design. Her notable contributions include advancing the understanding of lead-free solder joint reliability, developing innovative RFID chip structures, and proposing adaptive impedance matching systems capable of real-time optimization. Through her work, she has addressed critical challenges in electronic device reliability and wireless communication efficiency, demonstrating both technical depth and creativity. Her research outcomes are reflected in a strong record of publications in reputable journals and conferences, highlighting her sustained academic productivity. With an interdisciplinary approach integrating electronics, materials science, and signal processing, Dr. Zhang bridges theoretical research and practical applications. She continues to explore emerging technologies such as terahertz communication and intelligent sensor networks, positioning herself as a forward-looking scholar whose work has significant potential to influence future advancements in microelectronics and communication systems. She has six publications indexed in Scopus, with her work cited once by another document, reflecting an h-index of 1. These metrics demonstrate her emerging research contributions and measurable impact in her field.

Profile: Scopus

Featured Publication

1. Characterization of the Stress-optic Properties of Ceramics by Terahertz Time-domain Spectroscopy, Current Optics and Photonics, 2024.

 

Muawia Elsadig | Computer Science | Best Researcher Award

Dr. Muawia Elsadig | Computer Science | Best Researcher Award

Assistant Professor at Imam Abdulrahman Bin Faisal University, Saudi Arabia

Dr. Muawia A. Elsadig is an accomplished Assistant Professor at Imam Abdulrahman Bin Faisal University in Saudi Arabia, with extensive experience in computer science, particularly in cybersecurity, information security, AI, machine learning, and bioinformatics. He has held academic positions at renowned institutions across Sudan, the UAE, and Saudi Arabia. Dr. Elsadig has authored over 30 peer-reviewed publications, many of which appear in high-impact Q1 and Q2 journals such as IEEE Access. His recent research focuses on cyber threat detection, secure communications, AI applications, and ethical issues in emerging technologies. He also serves as a reviewer for several leading international journals and contributes actively to institutional research development through editing, reviewing, and ethical oversight roles. With a consistent research record, interdisciplinary expertise, and international teaching background, Dr. Elsadig demonstrates strong leadership and scholarly contributions, making him a highly deserving candidate for recognition through prestigious research awards.

Professional Profile 

Google Scholar
Scopus Profile
ORCID Profile 

Education

Dr. Muawia A. Elsadig holds a strong academic foundation in computer engineering and science. He earned his B.Sc. (Honors) in Computer Engineering from the University of Gezira, Sudan, in 2000, followed by an M.Sc. in Computer Engineering and Networks from the same institution in 2003, graduating with first-class honors. He later completed his Ph.D. in Computer Science, specializing in Information Security, at Sudan University of Science and Technology (SUST) in 2018. His academic progression reflects a focused commitment to cybersecurity and advanced computing disciplines. Each stage of his education laid a strong theoretical and technical groundwork, preparing him for a dynamic career in both academia and research. His doctoral studies, in particular, sharpened his expertise in network security and information assurance, providing a springboard for his subsequent contributions to the fields of cyber defense, machine learning, and secure systems. Dr. Elsadig’s educational background is both comprehensive and rigorously specialized.

Professional Experience

Dr. Muawia A. Elsadig has over two decades of professional experience in academia and industry, reflecting his deep engagement with computing disciplines. He has served in teaching and research roles at prominent universities including the University of Gezira in Sudan, the University of Sharjah in the UAE, and King Khalid University in Saudi Arabia. Since 2018, he has held the position of Assistant Professor at Imam Abdulrahman Bin Faisal University (IAU) in Saudi Arabia, contributing to both the Computer Science Department and the university’s Deanship of Scientific Research. His responsibilities span teaching, curriculum development, research supervision, and participation in ethical review processes as a member of the Institutional Review Board (IRB). He has also been involved in the editorial review of internal research grants. His industry experience complements his academic roles, providing a practical dimension to his teaching and research. Dr. Elsadig’s professional journey is marked by dedication, cross-cultural competence, and research leadership.

Research Interest

Dr. Muawia A. Elsadig’s research interests are broad and interdisciplinary, encompassing cybersecurity, information security, network security, artificial intelligence, machine learning, deep learning, and bioinformatics. His work explores both theoretical foundations and practical applications, with a strong focus on developing lightweight, efficient models for detecting cyber threats such as denial-of-service (DoS) attacks and covert channels. He is also interested in the ethical implications of emerging technologies, having published insightful work on the societal impacts of AI tools like ChatGPT and machine translation systems. Dr. Elsadig has applied machine learning techniques to critical areas such as breast cancer detection and secure data encryption, demonstrating a commitment to using AI for social good. His research often bridges technical rigor with applied innovation, and he collaborates on projects that integrate computing with healthcare and secure communications. This interdisciplinary approach makes his research both relevant and impactful in today’s fast-evolving technological landscape.

Award and Honor

Dr. Muawia A. Elsadig has received multiple awards and recognitions for his research excellence, particularly for publishing in high-impact, peer-reviewed international journals indexed in the Web of Science and Scopus (Q1 and Q2). These recognitions reflect the high quality and scholarly contribution of his research in fields such as cybersecurity, AI, and bioinformatics. He has also been acknowledged by his institutions for his active role in scientific research development, including grant proposal evaluations and ethical oversight. Beyond individual publications, his selection as a peer reviewer for top-tier journals like IEEE Access and Artificial Intelligence Review is an implicit honor, affirming his expertise and credibility in his research domains. While the profile does not list named external awards or grants, the consistent publication record, academic appointments, and responsibilities he holds at respected institutions are strong indicators of his professional esteem. These honors collectively highlight his value as a research leader and academic mentor.

Conclusion

In conclusion, Dr. Muawia A. Elsadig stands out as a highly accomplished academic and researcher in the domains of computer science and cybersecurity. With a solid educational background, extensive teaching experience, and a strong portfolio of international publications, he has made significant contributions to both theoretical advancements and practical solutions in his field. His work bridges artificial intelligence, secure systems, and bioinformatics, reflecting both depth and breadth in his research pursuits. Dr. Elsadig’s ongoing involvement in peer review, research ethics, and interdisciplinary collaboration highlights his commitment to advancing knowledge and ensuring research integrity. He is not only a prolific scholar but also an active academic citizen dedicated to mentoring, ethical governance, and the strategic development of research agendas. His achievements and leadership position him as a compelling candidate for prestigious honors such as the Best Researcher Award, and he continues to be a driving force in his academic community and beyond.

Publications Top Notes

  • Title: The Impact of Artificial Intelligence on Language Translation: A Review
    Authors: YA Mohamed, A Khanan, M Bashir, AHHM Mohamed, MAE Adiel, MA Elsadig
    Year: 2024
    Citations: 124

  • Title: Breast Cancer Detection Using Machine Learning Approaches: A Comparative Study
    Authors: MA Elsadig, A Altigani, HT Elshoush
    Year: 2023
    Citations: 60

  • Title: VANETs Security Issues and Challenges: A Survey
    Authors: MA Elsadig, YA Fadlalla
    Year: 2016
    Citations: 60

  • Title: Detection of Denial-of-Service Attack in Wireless Sensor Networks: A Lightweight Machine Learning Approach
    Author: MA Elsadig
    Year: 2023
    Citations: 52

  • Title: Covert Channel Detection: Machine Learning Approaches
    Authors: MA Elsadig, A Gafar
    Year: 2022
    Citations: 49

  • Title: A Polymorphic Advanced Encryption Standard – A Novel Approach
    Authors: A Altigani, S Hasan, B Barry, S Naserelden, MA Elsadig, HT Elshoush
    Year: 2021
    Citations: 46

  • Title: Survey on Covert Storage Channel in Computer Network Protocols: Detection and Mitigation Techniques
    Authors: MA Elsadig, YA Fadlalla
    Year: 2016
    Citations: 37

  • Title: Security Issues and Challenges on Wireless Sensor Networks
    Authors: MA Elsadig, A Altigani, MA Baraka
    Year: 2019
    Citations: 26

  • Title: Network Protocol Covert Channels: Countermeasures Techniques
    Authors: MA Elsadig, YA Fadlalla
    Year: 2017
    Citations: 26

  • Title: Information Extraction Methods and Techniques in Chemical Documents: Survey
    Authors: M Abdelmagid, AA, Mubarak Himmat
    Year: 2015
    Citations: 24

  • Title: Mobile Ad Hoc Network Routing Protocols: Performance Evaluation and Assessment
    Authors: MA Elsadig, A Yahia
    Year: 2018
    Citations: 22

  • Title: Packet Length Covert Channel: A Detection Scheme
    Authors: MA Elsadig, YA Fadlalla
    Year: 2018
    Citations: 20

  • Title: A Balanced Approach to Eliminate Packet Length-Based Covert Channels
    Authors: MA Elsadig, YA Fadlalla
    Year: 2017
    Citations: 17

  • Title: Analyzing the Performance of the AES Block Cipher Modes of Operation
    Authors: A Altigani, M Abdelmagid, B Barry
    Year: 2016
    Citations: 13

  • Title: ChatGPT and Cybersecurity: Risk Knocking the Door
    Author: MA Elsadig
    Year: 2024
    Citations: 10

Feixiang Li | Computer Science | Best Researcher Award

Dr. Feixiang Li | Computer Science | Best Researcher Award

Senior Eengineer at The 15th Research Institute of China Electronics Technology Corporation, China

Feixiang Li is a dedicated researcher and senior engineer specializing in Mobile Edge Computing, Software Defined Networks (SDN), and Evolutionary Algorithms. He earned his Ph.D. from Beijing University of Technology in 2020 and currently holds a senior engineering position at the 15th Research Institute of China Electronics Technology Corporation. His research has resulted in numerous publications in prestigious, high-impact journals such as IEEE Transactions on Industrial Informatics and IEEE Transactions on Mobile Computing. Feixiang has demonstrated a strong ability to bridge theoretical research with practical applications, contributing to fields essential to next-generation communication technologies. His work showcases consistent academic productivity, interdisciplinary problem-solving, and real-world relevance. While there is potential to expand international collaborations and increase innovation leadership, his achievements to date mark him as a significant contributor to his field. Feixiang Li stands out as a promising candidate for honors recognizing research excellence in computer science and telecommunications.

Professional Profile

ORCID Profile

Education

Feixiang Li completed his Ph.D. in Computer Science at Beijing University of Technology in June 2020. His doctoral research focused on Mobile Edge Computing and Software Defined Networks, integrating theoretical frameworks with real-world computing challenges. His academic training equipped him with a solid foundation in advanced algorithms, optimization methods, and emerging communication technologies. During his Ph.D., he began publishing in high-impact journals and enaging in collaborative research with leading scholars in the field. His academic journey reflects a strong emphasis on applied research and innovative problem-solving in the domain of network systems and intelligent computing. This solid educational background has not only shaped his technical expertise but also laid the groundwork for his ongoing contributions to both academia and industry. The combination of deep theoretical knowledge and practical insights defines his educational experience and positions him well for leading-edge research in evolving digital infrastructure and smart network systems.

Professional Experience

After earning his Ph.D., Feixiang Li joined the 15th Research Institute of China Electronics Technology Corporation as an engineer in July 2020. His role focused on the development and optimization of network systems, with a particular emphasis on edge computing solutions and SDN architecture. In November 2022, he was promoted to Senior Engineer, reflecting recognition of his technical leadership and innovative contributions. In this capacity, Feixiang has worked on high-impact projects with national relevance, integrating academic research into practical implementations that advance China’s communication technology infrastructure. His experience bridges the gap between academic innovation and industrial application, allowing him to contribute meaningfully to both spheres. With a strong command of evolving digital technologies and hands-on experience in designing and deploying scalable systems, he continues to push the boundaries of what is technically possible in his field. His professional trajectory demonstrates steady growth, leadership, and a commitment to innovation-driven development.

Research Interest

Feixiang Li’s research interests lie at the intersection of Mobile Edge Computing, Software Defined Networks (SDN), and Evolutionary Algorithms. His work addresses critical challenges in network optimization, resource allocation, and intelligent control in dense communication environments. He has published influential studies on computation offloading using game theory and auction-based models, reflecting his expertise in both algorithm design and systems thinking. Feixiang is particularly interested in how emerging network paradigms like SDN and edge computing can be made more efficient and adaptive through intelligent algorithms. His research not only contributes theoretical models but also delivers practical tools for enhancing communication systems in the era of IoT and 5G. These interests position him at the forefront of digital infrastructure innovation. As networks become more complex and data-driven, his work provides scalable, intelligent solutions to meet future demands, reinforcing his role as a vital contributor to the advancement of modern communication technologies.

Award and Honor

While specific individual awards and honors are not listed in the provided resume, Feixiang Li’s track record reflects recognition through peer-reviewed publications in high-impact journals such as IEEE Transactions on Industrial Informatics and IEEE Transactions on Mobile Computing. These publications, often co-authored with respected researchers, indicate scholarly recognition and professional credibility in the field of computer science and communication networks. His promotion to Senior Engineer at a prominent national research institute also suggests internal recognition of his expertise and leadership. Participation in major international conferences and acceptance of his work in top-tier venues serve as further evidence of his standing within the academic and professional community. Although formal awards are not explicitly mentioned, the quality, volume, and impact of his research contributions suggest a strong foundation for future honors and positions him as a valuable candidate for accolades such as the Best Researcher Award or other academic distinctions in technology and engineering.

Conclusion

Feixiang Li is a highly capable researcher and engineer whose work bridges academic innovation and real-world technology implementation. With a strong educational foundation, extensive experience in a national research institute, and a focused research agenda in high-impact areas like edge computing and SDNs, he stands out as a leader in his field. His publications in top-tier journals and his growing professional responsibilities underscore his commitment to advancing the state of digital communication systems. While there is room to expand his global research network and innovation leadership, his current achievements reflect a robust trajectory of growth, influence, and potential. Feixiang’s career exemplifies the integration of theoretical rigor with applied engineering, making him a strong candidate for awards and honors that recognize excellence in research and technological innovation. As he continues to evolve professionally and academically, he is well-positioned to make further meaningful contributions to the future of intelligent networked systems.

Publications Top Notes

  1. Title: A Deep Reinforcement Learning-Based Topology Optimisation Method for Distributed Trial Networks

  2. Title: A Transformer-GRU-Based Edge Computing Method for Vessel Trajectory Prediction

  3. Title: Constant-Time Discrete Gaussian Sampling for Edge Computing Based on DPWGAN

  4. Title: Semi-supervised Remote Sensing Image Classification for Edge Computing via Contrastive Learning

  1. Title: Collaborative Computation Offloading and Resource Management in Space–Air–Ground Integrated Networking

  2. Title: Intelligent Computation Offloading Mechanism with Content Cache in Mobile Edge Computing

  3. Title: Auction Design for Edge Computation Offloading in SDN-Based Ultra Dense Networks

    • Authors: Feixiang Li, Haipeng Yao, Jun Du, Chunxiao Jiang, Zhu Han, Yunjie Liu

    • Journal: IEEE Transactions on Mobile Computing

    • Year: 2022

    • DOI: 10.1109/TMC.2020.3026319

  4. Title: Stackelberg Game-Based Computation Offloading in Social and Cognitive IIoT

    • Authors: Feixiang Li, Haipeng Yao, Jun Du, Chunxiao Jiang, Yi Qian

    • Journal: IEEE Transactions on Industrial Informatics

    • Year: 2020

    • DOI: 10.1109/TII.2019.2961662

  5. Title: Multi-Controller Resource Management for Software-Defined Wireless Networks

    • Authors: Feixiang Li, Xiaobin Xu, Haipeng Yao, Jingjing Wang, Chunxiao Jiang, Song Guo

    • Journal: IEEE Communications Letters

    • Year: 2019

    • DOI: 10.1109/LCOMM.2019.2891527

    • Citations: 18 (Scopus)

  6. Title: Bat Algorithm with Principal Component Analysis

    • Authors: Zhihua Cui, Feixiang Li, Wensheng Zhang

    • Journal: International Journal of Machine Learning and Cybernetics

    • Year: 2019

    • DOI: 10.1007/s13042-018-0888-4

Wenming Wang | Computer Science | Best Researcher Award

Dr. Wenming Wang | Computer Science | Best Researcher Award

Dr. at Anqing Normal University, China

Dr. Wenming Wang is an esteemed scholar in the field of information security, currently serving as an associate professor at the School of Computer and Information, Anqing Normal University, China. With a strong academic background and a passion for cybersecurity, he has contributed significantly to research on secure communication and network protection. His expertise spans various domains, including IoT security, vehicular ad hoc networks, and cloud computing security. Dr. Wang is committed to advancing knowledge in these critical areas, helping to develop innovative solutions for modern cybersecurity challenges. Throughout his career, he has been actively engaged in both academia and research, striving to bridge the gap between theoretical advancements and practical applications. His dedication to fostering cybersecurity awareness and enhancing network security protocols has made him a respected figure in his field.

Professional Profile

Education

Dr. Wang obtained his Master of Science (M.S.) degree from Jinan University, Guangzhou, China, in 2014, where he built a strong foundation in information technology and security. Pursuing further academic excellence, he earned his Ph.D. in Information Security from Nanjing University of Posts and Telecommunications, Nanjing, China, in 2022. His doctoral research focused on advanced cybersecurity frameworks and encryption mechanisms, contributing to the development of innovative security solutions for emerging technologies. His academic journey reflects a deep commitment to continuous learning and research excellence, enabling him to address complex security challenges in the digital landscape. With a solid educational background and specialized training, Dr. Wang has established himself as a knowledgeable researcher in cybersecurity, equipping him with the skills and expertise required to tackle modern information security threats and vulnerabilities.

Professional Experience

Dr. Wenming Wang is currently an associate professor at the School of Computer and Information, Anqing Normal University, China. In this role, he is actively involved in teaching, mentoring students, and conducting cutting-edge research in the field of information security. Before joining Anqing Normal University, he gained extensive experience in cybersecurity research, focusing on network security, cryptography, and secure communication technologies. Throughout his career, he has collaborated with esteemed researchers and institutions to enhance cybersecurity measures across various domains. His role as an educator has allowed him to shape the next generation of cybersecurity professionals by imparting both theoretical knowledge and practical insights. Dr. Wang’s professional experience demonstrates his dedication to academic excellence and his commitment to advancing research in information security through collaboration and innovation.

Research Interests

Dr. Wang’s research primarily focuses on IoT security, vehicular ad hoc networks, and cloud computing security—three crucial areas in today’s rapidly evolving technological landscape. His work aims to develop robust security protocols that protect data integrity, confidentiality, and network resilience against cyber threats. In IoT security, he explores authentication and encryption techniques to safeguard smart devices from unauthorized access. His research in vehicular ad hoc networks emphasizes secure vehicle-to-vehicle communication to ensure safe and reliable transportation systems. Additionally, his studies on cloud computing security involve designing advanced cryptographic methods to enhance data privacy and prevent cyberattacks in cloud environments. His research contributions play a pivotal role in shaping the future of secure digital ecosystems by addressing critical vulnerabilities and proposing innovative security mechanisms.

Awards and Honors

Dr. Wang has received recognition for his contributions to cybersecurity research through various academic and professional accolades. While specific awards and honors are not listed, his work has likely been acknowledged through research grants, conference presentations, and journal publications. He has actively participated in national and international cybersecurity forums, presenting his findings and engaging with the global research community. His commitment to excellence has also earned him opportunities to collaborate with leading experts in the field. As he continues to expand his research impact, he is poised to achieve further recognition for his pioneering work in information security. His dedication to academic and research excellence positions him as a key figure in advancing cybersecurity innovations.

Conclusion

Dr. Wenming Wang appears to be a promising researcher with expertise in cybersecurity-related fields. However, based on the given information, his suitability for the Best Researcher Award depends on the depth of his research contributions, publication impact, and academic recognition. If he has high-impact publications, significant citations, or major research projects, he would be a strong candidate.

Publications Top Notes

  • Publication: Malicious Vehicle Detection Scheme Based on UAV and Vehicle Cooperative Authentication in Vehicular Networks

    • Author(s): W. Wang, Wenming; Z. Liu, Zhiquan; L. Xue, Lingyan; H. Huang, Haiping; N.R. Lavuri, Nageswara Rao

    • Journal: Computer Networks

    • Year: 2025

    • Citations: 0

  • Publication: A Cross-Domain Authentication Scheme for Vehicular Networks Based on Mobile Edge Computing

    • Author(s): G. Liu, Guijiang; H. Lu, Hao; W. Wang, Wenming; Z. Liu, Zhiquan; H. Huang, Haiping

    • Journal: IEEE Internet of Things Journal

    • Year: 2025

    • Citations: 0

 

Ladislav Karrach | Computer Vision | Best Researcher Award

Dr. Ladislav Karrach | Computer Vision | Best Researcher Award

Post student, Technical University in Zvolen, Slovakia

Ladislav Karrach is a seasoned computer programmer and systems analyst from Kremnica, Slovakia. With a robust background in computer network administration and ERP systems, he has contributed significantly to the field of applied informatics since 1995. His dedication to technology and innovation has positioned him as a key player in developing internal information systems and enhancing client-server applications. 🖥️

Publication Profile

ORCID

Education

Ladislav holds a Ph.D. in Environmental and Manufacturing Technology from the Technical University in Zvolen, where he focused on text recognition in images and its applications in manufacturing processes. He also earned his Ing. (MSc) degree in Applied Informatics from the University of Žilina, specializing in information and control systems. 🎓

Experience

Since 1995, Ladislav has been working as a computer programmer and systems designer at Mint Kremnica, where he manages database servers, designs information systems, and develops client-server applications. His extensive experience includes web programming and administration of ERP systems, making him a versatile professional in the tech industry. 💻

Research Focus

Ladislav’s research interests lie in the fields of image processing, particularly focusing on text recognition methods, data matrix codes, and character recognition technologies. He is dedicated to optimizing production processes through innovative technological solutions and is involved in various research projects that explore the applications of image recognition in manufacturing. 🔍

Awards and Honours

Ladislav has been recognized for his contributions to the field of informatics and manufacturing technology through various publications and collaborative projects. His work is highly regarded in academic circles, showcasing his commitment to advancing technology in practical applications. 🏅

Publication Top Notes

 Data Matrix Code Location Marked with Laser on Surface of Metal Tools. Acta Facultatis Technicae, XXII, 2017 (2), 29–38. – Cited by 1

 Data matrix code location in images acquired by camera. In Manufacturing and automation technology: book of abstracts, 15. – Cited by 0

The analysis of various methods for location of Data matrix codes in images. In ELEKTRO 2018: conference proceedings. – Cited by 2

 Comparing the impact of different cameras and image resolution to recognize the data matrix codes. Journal of Electrical Engineering, 286-292. – Cited by 4

 Optimizatio of manipulation logistics using data matrix codes. Advances in Science and Technology Research Journal, 173-180. – Cited by 3

 Recognition of Data Matrix Codes in Images and their Applications in Production Processes. Management Systems in Production Engineering, 154-161. – Cited by 5

 Using Different Types of Artificial Neural Networks to Classify 2D Matrix Codes and Their Rotations — A Comparative Study. J. Imaging, 188. – Cited by 1