243 results on '"Al-Dubai, Ahmed"'
Search Results
202. Special issue: Performance evaluation and optimization of ubiquitous computing and networked systems
- Author
-
Al-Dubai, Ahmed Y., primary, Min, Geyong, additional, Ould-Khaoua, Mohamed, additional, Jin, Xiaolong, additional, and Buchanan, William, additional
- Published
- 2010
- Full Text
- View/download PDF
203. Editorial: Special Issue: Performance evaluation of ubiquitous computing and networked systems
- Author
-
Al-Dubai, Ahmed Y., primary, Ould-Khaoua, Mohamed, additional, and Min, Geyong, additional
- Published
- 2010
- Full Text
- View/download PDF
204. A new adaptive broadcasting approach for mobile ad hoc networks
- Author
-
Bani Khalaf, Mustsfa, primary, Al-Dubai, Ahmed Y., additional, and Buchanan, William, additional
- Published
- 2010
- Full Text
- View/download PDF
205. Novel QoS-Aware Gateway Centralized Multi-hop Routing for Wireless Mesh Networks
- Author
-
Zhao, Liang, primary, Al-Dubai, Ahmed Y., additional, and Romdhani, Imed, additional
- Published
- 2010
- Full Text
- View/download PDF
206. The Effects of Network Density of a New Counter-based Broadcasting Scheme in Mobile Ad Hoc Networks
- Author
-
Masadeh, Muneer, primary, Nimer, Sanabel Fathi, additional, and Al-Dubai, Ahmed Y., additional
- Published
- 2010
- Full Text
- View/download PDF
207. Cross layer Neighbourhood Load Routing for Wireless Mesh Networks
- Author
-
Zhao, Liang, primary, Al-Dubai, Ahmed Y., additional, and Min, Geyong, additional
- Published
- 2010
- Full Text
- View/download PDF
208. A new probabilistic Linear Exponential Backoff scheme for MANETs
- Author
-
Ban, Muneer, primary, Manaseer, Saher, additional, Al-hassan, Asmahan Abu, additional, Taye', Zeinab Abu, additional, and Al-Dubai, Ahmed Y., additional
- Published
- 2010
- Full Text
- View/download PDF
209. Trade-Offs between Latency, Complexity, and Load Balancing with Multicast Algorithms
- Author
-
Al-Dubai, Ahmed Y., primary, Ould-Khaoua, Mohamed, additional, and Mackenzie, Lewis M., additional
- Published
- 2010
- Full Text
- View/download PDF
210. Performance modelling and optimization of integrated wireless LANs and multi-hop mesh networks
- Author
-
Min, Geyong, primary, Wu, Yulei, additional, Li, Keqiu, additional, and Al-Dubai, Ahmed Y., additional
- Published
- 2009
- Full Text
- View/download PDF
211. A Performance Model for Integrated Wireless Mesh Networks and WLANs with Heterogeneous Stations
- Author
-
Wu, Yulei, primary, Min, Geyong, additional, Li, Keqiu, additional, and Al-Dubai, Ahmed Y., additional
- Published
- 2009
- Full Text
- View/download PDF
212. Security and Routing Scoped IP Multicast Addresses
- Author
-
Romdhani, Imed, primary, Al-Dubai, Ahmed, additional, and Kellil, Mounir, additional
- Published
- 2009
- Full Text
- View/download PDF
213. Integrated many-to-many multicast addressing and access control method
- Author
-
Romdhani, Imed, primary and Yassin Al-Dubai, Ahmed, additional
- Published
- 2009
- Full Text
- View/download PDF
214. A QoS aware multicast algorithm for wireless mesh networks
- Author
-
Zhao, Liang, primary, Al-Dubai, Ahmed Yassin, additional, and Min, Geyong, additional
- Published
- 2009
- Full Text
- View/download PDF
215. Performance Analysis of Two-Tier Wireless Mesh Networks for Achieving Delay Minimisation
- Author
-
Min, Geyong, primary, Wu, Yulei, additional, Li, Keqiu, additional, and Al-Dubai, Ahmed Y., additional
- Published
- 2009
- Full Text
- View/download PDF
216. The impact of routing schemes on group communication throughput in scalable networks
- Author
-
Al-Dubai, Ahmed Yassin, primary
- Published
- 2008
- Full Text
- View/download PDF
217. On The Design of High Throughput Adaptive Multicast Communication
- Author
-
Al-Dubai, Ahmed Yassin, primary and Romdhani, Imed, additional
- Published
- 2007
- Full Text
- View/download PDF
218. New velocity aware probabilistic route discovery schemes for Mobile Ad hoc Networks.
- Author
-
Khalaf, Mustafa Bani, Al-Dubai, Ahmed Y., and Abed, Mourad
- Abstract
In this paper, we investigate efficient strategies for supporting velocity aware probabilistic route discovery in Mobile Ad hoc Networks (MANETs). MANETs usually use broadcast mechanisms to discover routes between nodes by flooding the network with RREQ packets. Usually, the routes of the high mobility nodes have frequent breakages which result in re-discovering the same routes frequently. Hence, uncontrolled RREQ packets can cause more channel contention and increase packets collision rate. This is well-known as the broadcast storm problem where different probabilistic solutions have been suggested to mitigate its side effect. To the best of our knowledge, this study is the first that considers the velocity vector probabilistic route discover in MANETs. Precisely, this study proposes a new Velocity Aware-Probabilistic (VAP) route discovery model, which can exclude unstable nodes while constructing routes between the source and its destination. Our simulation experiments confirm that our proposed model significantly outperforms existing well known solutions in terms of RREQ packet overhead and link stability. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
219. On High Performance Multicast Algorithms for Interconnection Networks.
- Author
-
Gerndt, Michael, Kranzlmüller, Dieter, Al-Dubai, Ahmed, Ould-Khaoua, Mohamed, and Romdhani, Imed
- Abstract
Although multicast communication, in interconnection networks has been a major avenue for a lot of research works found in literature, there are several key issues that should still be improved in order to meet the increasing demand for service quality in such systems. Apparently, most of the related works handle multicast communication within limited operating conditions such as low traffic load, specific network sizes and limited destination nodes. However, this paper investigates the multicast communication under different scenarios. It presents a comparison study of some well known multicast algorithms proposed for wormhole switched interconnection networks. Unlike the previous studies, this paper considers the multicast latency at both network and node levels. Performance evaluation results show that our proposed algorithm can greatly improve the performance of multicast operation. Keywords: Wormhole Switched Networks, Path-based Multicast, Routing Algorithms. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
220. Performance modelling and optimization of integrated wireless LANs and multi-hop mesh networks.
- Author
-
Geyong Min, Yulei Wu, Keqiu Li, and Al-Dubai, Ahmed Y.
- Subjects
WIRELESS LANs ,WIRELESS communications ,LOCAL area networks ,MATHEMATICAL optimization ,SIMULATION methods & models - Abstract
The increasing demand for the coverage of high-speed wireless local area networks (WLANs) is driving the installation of a very large number of access points (APs). Wireless mesh networks (WMNs) have emerged as a promising technology in the next generation networks to provide economical and scalable broadband access to wireless interconnection of multiple APs that manage individual WLANs in order to extend the coverage of the conventional single WLANs. In this paper, we develop a new analytical model to investigate the quality-of-service (QoS) performance metrics in WMNs interconnecting multiple WLANs. The model takes the phenomenon of communication locality into consideration. Extensive simulation experiments are conducted to validate the accuracy of the analytical model. The proposed model is then used to obtain the maximum achievable throughput, which is a key performance metrics in wireless networks. Moreover, we utilize the model to evaluate the impact of communication locality on network performance and investigate its effects on the optimization of integrated WLANs and multi-hop mesh networks. Copyright © 2009 John Wiley & Sons, Ltd. [ABSTRACT FROM AUTHOR]
- Published
- 2010
- Full Text
- View/download PDF
221. A new probabilistic broadcasting scheme for mobile ad hoc on-demand distance vector (AODV) routed networks.
- Author
-
Yassein, Muneer Bani, Khalaf, Mustafa Bani, and Al-Dubai, Ahmed Y.
- Subjects
BROADCASTING industry ,MOBILE communication systems ,AD hoc computer networks ,WIRELESS communications ,COMPUTER networks - Abstract
Broadcast is a fundamental operation used in Mobile Ad hoc NETworks (MANETs) for many services, such as route discovery and sending information messages. The direct method to perform broadcast is a simple flooding, which can decrease the performance of MANET. Recently, a probabilistic approach to flooding has been proposed as one of most important suggested solutions to solve the broadcast storm problem, which leads to the collision, contention and duplicated messages. This paper presents the Smart Probabilistic Broadcasting (SPB) as a new probabilistic method to improve the performance of existing on-demand routing protocols by reducing the RREQ overhead during the rout discovery operation. The simulation results show that the combination of AODV and a suitable probabilistic rout discovery can reduce the average end-to-end delay as well as overhead, while achieving low normalized routing load, compared to AODV that uses fixed probability and blind flooding. Simulation experiments have been conducted to examine our proposed scheme. The results show that SPB outperforms its counterparts and opens up a promising framework towards optimal probabilistic broadcasting. [ABSTRACT FROM AUTHOR]
- Published
- 2010
- Full Text
- View/download PDF
222. Electromagnetic side-channel resilience against lightweight cryptography
- Author
-
Gunathilake, Nilupulee A. and Al-Dubai, Ahmed
- Abstract
Side-channel attacks are an unpredictable risk factor in cryptography. Therefore, observations of leakages through physical parameters, i.e., power and electromagnetic (EM) radiation, etc., of digital devices are essential to minimise vulnerabilities associated with cryptographic functions. Compared to costs in the past, performing side-channel attacks using inexpensive test equipment is becoming a reality. Internet-of-Things (IoT) devices are resource-constrained, and lightweight cryptography is a novel approach in progress towards IoT security. Thus, it would provide sufficient data and privacy protection in such a constrained ecosystem. Therefore, cryptanalysis of physical leakages regarding these emerging ciphers is crucial. EM side-channel attacks seem to cause a significant impact on digital forensics nowadays. Within existing literature, power analysis seems to have considerable attention in research whereas other phenomena, such as EM, should continue to be appropriately evaluated in playing a role in forensic analysis. The emphasis of this thesis is on lightweight cryptanalysis. The preliminary investigations showed no Correlation EManalysis (CEMA) of PRESENT lightweight algorithm. The PRESENT is a block cipher that promises to be adequate for IoT devices, and is expected to be used commercially in the future. In an effort to fill in this research gap, this work examines the capabilities of a correlation EM side-channel attack against the PRESENT. For that, Substitution box (S-box) of the PRESENT was targeted for its 1st round with the use of a minimum number of EM waveforms compared to other work in literature, which was 256. The attack indicates the possibility of retrieving 8 bytes of the secret key out of 10 bytes. The experimental process started from a Simple EMA (SEMA) and gradually enhanced up to a CEMA. The thesis presents the methodology of the attack modelling and the observations followed by a critical analysis. Also, a technical review of the IoT technology and a comprehensive literature review on lightweight cryptology are included.
- Published
- 2023
- Full Text
- View/download PDF
223. Intelligence-driven mobile networks for smart cities.
- Author
-
Zhao, Liang, Hu, Jia, Al-Dubai, Ahmed, Wu, Celimuge, Wang, Qi, and Hawbani, Ammar
- Subjects
- *
SMART cities , *INTELLIGENT transportation systems , *WIRELESS sensor networks - Abstract
For the last twenty years, artificial intelligence (AI) has become a significant technology to influence our daily life with its ability of promoting the quality of living. Hence, they propose a repost network embedding-based diffusion popularity prediction algorithm for achieving the precise prediction. In addition, the paper entitled "LSTM based link quality confidence interval boundary prediction for wireless communication in smart grid" provided by sun et al., studies the link quality prediction of the wireless communication in smart grid. [Extracted from the article]
- Published
- 2021
- Full Text
- View/download PDF
224. Efficient algorithms for MAC layer duty cycling and frame delivery in wireless sensor network
- Author
-
Thomson, Craig James and Al-Dubai, Ahmed
- Abstract
In Wireless Sensor Networks, with small, limited capacity devices now more prevalent, the issue of Neighbour Discovery has shifted. These devices utilise duty cycling methods in order to conserve battery power. Hence, the main issue is now that these devices may be awake at the same time in order to discover each other. When mobility increases complexity further. Rather than attempt to negate the issue of mobility, instead this thesis seeks to utilise a predictable sink mobility pattern in order to influence the duty cycling of static nodes. Literature demonstrates a move towards Mobility Awareness in Neighbour Discovery in mobile Wireless Sensor Networks. However, there is a gap identified with sink mobility in use. Therefore, this thesis aims to establish to what extent the mobility pattern of a Mobile Sink Node in a Wireless Sensor Network may be exploited at the MAC layer, to influence the performance of static nodes. Such that network efficiency may be improved with energy consumption reduced and balanced across nodes. This study proposes three novel lightweight algorithms, with processing which does not add to the energy consumption within sensor nodes, these being Mobility Aware Duty Cycling Algorithm (MADCAL), Mobility Aware Duty Cycling and Dynamic Preambling Algorithm (MADCaDPAL) and Dynamic Mobility and Energy Aware Algorithm (DMEAAL). These located in the MAC layer of static nodes and utilising knowledge of predictable sink node mobility. This is in order to create a dynamic communication threshold between static nodes on the sink path and the sink itself. Subsequently lessening competition for sink communication between nodes. In MADCAL this threshold is used to influence the sleep function in order that static nodes only awake and move to Clear Channel Assessment once the sink is within their threshold, improving energy consumption by up to 15%. The MADCaDPAL algorithm takes this approach further, using the threshold to directly influence Clear Channel Assessment and the sending of preambles, as such, closing off the threshold when the sink leaves it. This shows energy consumption lessening by close to 80% with a significant improvement in frame delivery to the sink. Finally, the DMEAAL algorithm utilises previous results to influence energy consumption in real-time by utilising a cross-layer approach, comparing current consumption to optimal target energy consumption and adjusting the threshold for each static node accordingly. This shows benefit in evening out results across nodes, thus improving network lifetime. All algorithms are achieved without the energy-consuming beacon messaging associated with Neighbour Discovery. Analysis and simulation results, tested on a lightweight implementation of a carrier-sense multiple-access-based MAC protocol, show a significant improvement in energy consumption and frame delivery in both controlled and random environments. In utilising a cross-layer approach to access energy consumption in static nodes, is it also shown to be possible to even out energy consumption across nodes by altering the communication threshold in real-time. As such, improving network lifetime by removing spikes in energy consumption in individual nodes.
- Published
- 2021
- Full Text
- View/download PDF
225. Call for Papers for Special Issue on Trusted Network Computing.
- Author
-
Wu, Yulei, Wang, Guojun, Min, Geyong, and Al-Dubai, Ahmed
- Subjects
COMPUTER network security ,COMPUTER systems - Abstract
A call for paper on trusted network computing is presented.
- Published
- 2013
- Full Text
- View/download PDF
226. Performance Modelling and Analysis of Cognitive Mesh Networks.
- Author
-
Min, Geyong, Wu, Yulei, and Al-Dubai, Ahmed Y.
- Subjects
MATHEMATICAL models ,MESH networks ,COMPUTER simulation ,GATE array circuits ,WIRELESS communications ,NETWORK analysis (Communication) - Abstract
A new analytical model is proposed to investigate the delay and throughput in cognitive mesh networks. The validity of the model is demonstrated via extensive simulation experiments. The model is then used to evaluate the effects of the number of licensed channels and channel utilisation on the network performance. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
227. Towards efficient collective communication in multicomputer interconnection networks
- Author
-
Al-Dubai, Ahmed
- Subjects
- 004.35015181, QA75 Electronic computers. Computer science
- Published
- 2004
228. Efficient routing primitives for low-power and lossy networks in Internet of Things
- Author
-
Ghaleb, Baraq, Ekonomou, Elias, and Al-Dubai, Ahmed
- Subjects
004 ,Internet of Things ,Low-power and Lossy networks ,routing protocol ,efficiency ,reliability ,scalability ,power consumption ,routing maintenance algorithm ,004 Data processing & computer science ,QA75 Electronic computers. Computer science - Abstract
At the heart of the Internet of Things (IoTs) are the Low-power and Lossy networks (LLNs), a collection of interconnected battery-operated and resource-constrained tiny devices that enable the realization of a wide range of applications in multiple domains. For an efficient operation, such networks require the design of efficient protocols especially at the network layer of their communication stack. In this regards, the Routing Protocol for LLNs (RPL) has been developed and standardised by the IETF to fulfil the routing requirements in such networks. Proven efficient in tackling some major issues, RPL is still far from being optimal in addressing several other routing gaps in the context of LLNs. For instance, the RPL standard lacks in a scalable routing mechanism in the applications that require bidirectional communication. In addition, its routing maintenance mechanism suffers from relatively slow convergence time, limiting the applicability of the protocol in time-critical applications, and a high risk of incorrect configurations of its parameters, risking the creation of sub-optimal routes. Furthermore, RPL lacks in a fair load-distribution mechanism which may harm both energy and reliability of its networks. Motivated by the above-mentioned issues, this thesis aimed at overcoming the RPL's weaknesses by developing more efficient routing solutions, paving the way towards successful deployments and operations of the LLNs at different scales. Hence, to tackle the inefficiency of RPL's routing maintenance operations, a new routing maintenance algorithm, namely, Drizzle, has been developed characterized by an adaptive, robust and configurable nature that boosts the applicability of RPL in several applications. To address the scalability problem, a new downward routing solution has been developed rendering RPL more efficient in large-scale networks. Finally, a load-balancing objective function for RPL has been proposed that enhances both the energy efficiency and reliability of LLNs. The efficiency of the proposed solutions has been validated through extensive simulation experiments under different scenarios and operation conditions demonstrating significant performance enhancements in terms of convergence time, scalability, reliability, and power consumption.
- Published
- 2019
229. The evaluation of data filtering criteria in wind turbine power performance assessment
- Author
-
Davison, Brian, Muneer, Tariq, Al-Dubai, Ahmed, and Armitage, Alistair
- Subjects
004 ,wind turbines ,data filtering ,annual energy production (AEP) ,004 Data processing & computer science ,QA75 Electronic computers. Computer science ,Information Society ,Sustainable Communities - Abstract
The post-installation verification of wind turbine performance is an essential part of a wind energy project. Data collected from meteorological instruments and from the turbine is analysed to produce an estimate of the annual energy production (AEP) which is compared against expectations. However, turbine warranties can impose very strict data filtering criteria which can lead to high rates of data loss. As a consequence, measurement campaigns may last longer than expected and incur additional costs for the development. This project aims to investigate the extent of the problem and the potential of alternative data filtering strategies with respect to data loss, AEP estimates and the dispersion of points in the power curve scatter plot. In doing so, it targets a wide range of meteorological parameters with theoretical relationships to wind turbine power production with particularinterest in those not accounted for in the current standard. The identification of viable filtering strategies with lower data loss would provide significant benefits to wind energy development projects in terms of greater control over timescales and reduced costs. Data from a sample of power performance tests is analysed to explore the range and severity of the problem of data loss. It confirms the wide variation in warranty conditions, demonstrates the extent and likelihood of data losses and quantifies the financial implications within the limits of commercial sensitivity. When indirect costs are taken into consideration, the impact of extended measurement campaigns can theoretically reach tens of millions of pounds. A new, high-fidelity dataset is then compiled so that the effects of alternative filtering strategies can be examined. The dataset covers the whole of 2017 and consists of over 700 parameters of which 74 are selected for investigation here. The eFAST method of global sensitivity analysis is used in combination with correlation analysis to reduce this number to11 parameters which are then used to define alternative filtering criteria. Similar AEP estimates are obtained by application of conventional and experimental criteria to the research dataset. In the case of the experimental filters, however, the data loss was 11% compared to 63% data loss with conventional filters. Conventional filters were also shown to increase the dispersion in the power curve scatter plot by over 10%, while dispersion did not increase significantly with the experimental filters.
- Published
- 2019
230. Reliable and energy efficient mechanisms for wireless sensor networks
- Author
-
Ali, Alsnousi O. E. S., Al-Dubai, Ahmed, and Romdhani, Imed
- Subjects
004 ,wireless sensor networks ,scalability ,data reliability ,clustering ,energy consumption ,004 Data processing & computer science ,QA75 Electronic computers. Computer science ,Internet of Things ,Sensors ,Networks - Abstract
Sensor nodes and their underlying communication technologies are characterised by restricted power resources, restricted processing, limited storage capacities, low data rates and lossy links, and they may also comprise up to a thousand nodes. Wireless Sensor Networks (WSNs) require effective methods for data aggregation, forwarding and processing in order to preserve the limited nodes resource. Energy efficiency in WSNs has been widely investigated; it is still a challenging dilemma, and new mechanisms are required to fulfil the identified gaps in the literature. In most of WSNs applications, the energy cost has a significant effect on the network lifetime. Along with the energy efficiency, the Network Scalability and Data Reliability are other challenges affecting the performance of robust sensor network. Consequently, network reliability increases at the expense of energy consumption due to the traffic generated to maintain forwarding paths. On the other hand, scalability is a key component of WSNs because, for example, the network may need to grow to cover more space. Therefore, adding more nodes to the network will increase the number of data traffic within the network. Thus, these challenges impose the need to develop new mechanisms that cope with this sensor network requirements and be able to scale while providing efficient data routing and less energy consumption. Clustering mechanisms are among the most commonly recommended approaches by the research community to sustaining a sensor network throughout its lifetime and provide a scalable architecture and reliable data delivery. Despite a number of research activities associated with clustering in WSNs, some aspects of clustering have not yet been adequately investigated. The conflict between high energy consumption and reliability results in excessive energy waste; this is mainly caused by a high number of control messages exchanged to select cluster-head nodes and frequent re-clustering process in traditional cluster-based mechanisms. The re-clustering of the entire network in each round, or when one of the clusters depletes their energy, is not effective because of the extensive overhead and re-clustering process used. The former problems have been solved using tree novel mechanisms that enhance the network's Energy-Efficiency, Reliability and Scalability while considering the node's limited resources. The performance of the proposed mechanisms is validated under realistic network settings through extensive simulation experiments under different scenarios. The realistic energy consumption model is considered based on Chipcon CC2420 advanced radio modules implemented in Castalia simulator. The results obtained revealed that proposed mechanisms outperform the existing mechanisms in term of energy consumption while achieving reliability and scalability.
- Published
- 2019
231. Reliable and energy efficient scheduling protocols for Wireless Body Area Networks (WBAN)
- Author
-
Salayma, Marwa, Al-Dubai, Ahmed, and Romdhani, Imed
- Subjects
004.67 ,Wireless Body Area Network (WBAN) ,Time Division Multiple Access (TDMA) ,000 Computer science, information & general works ,QA75 Electronic computers. Computer science - Abstract
Wireless Body Area Network (WBAN) facilitates efficient and cost-effective e-health care and well-being applications. The WBAN has unique challenges and features compared to other Wireless Sensor Networks (WSN). In addition to battery power consumption, the vulnerability and the unpredicted channel behavior of the Medium Access Control (MAC) layer make channel access a serious problem. MAC protocols based on Time Division Multiple Access (TDMA) can improve the reliability and efficiency of WBAN. However, conventional static TDMA techniques adopted by IEEE 802.15.4 and IEEE 802.15.6 do not sufficiently consider the channel status or the buffer requirements of the nodes within heterogeneous contexts. Although there are some solutions that have been proposed to alleviate the effect of the deep fade in WBAN channel by adopting dynamic slot allocation, these solutions still suffer from some reliability and energy efficiency issues and they do not avoid channel deep fading. This thesis presents novel and generic TDMA based techniques to improve WBAN reliability and energy efficiency. The proposed techniques synchronise nodes adaptively whilst tackling their channel and buffer status in normal and emergency contexts. Extensive simulation experiments using various traffic rates and time slot lengths demonstrate that the proposed techniques improve the reliability and the energy efficiency compared to the de-facto standards of WBAN, i.e. the IEEE 802.15.4 and the IEEE 802.15.6. In normal situations, the proposed techniques reduce packet loss up to 61% and 68% compared to the IEEE 802.15.4 and IEEE 802.15.6 respectively. They also reduce energy consumption up to 7.3%. In emergencies, however, the proposed techniques reduce packets loss up to 63.4% and 90% with respect to their counterparts in IEEE 802.15.4 and 802.15.6. The achieved results confirm the significant enhancements made by the developed scheduling techniques to promote the reliability and energy efficiency of WBAN, opening up promising doors towards new horizons and applications.
- Published
- 2018
232. Load balancing and context aware enhancements for RPL routed Internet of Things
- Author
-
Qasem, Mamoun, Al-Dubai, Ahmed, and Romdhani, Imed
- Subjects
004.67 ,Internet of Things ,RPL ,Routing Protocol ,Objective Function ,000 Computer science, information & general works ,QA75 Electronic computers. Computer science - Abstract
Internet of Things (IoT) has been paving the way for a plethora of potential applications, which becomes more spatial and demanding. The goal of this work is to optimise the performance within the IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) in the network layer. RPL still suffers from unbalanced load traffic among the candidate parents. Consequently, the overloaded parent node drains its energy much faster than other candidate parent nodes. This may lead to an early disconnection of a part of the network topology and affect the overall network reliability. To solve this problem, a new objective function (OF) has been proposed to usher better load balancing among the bottleneck candidate parents, and keep the overloaded nodes lifetime thriving to longer survival. Moreover, several IoT applications have antagonistic requirements but pertinent, which results in a greater risk of affecting the network reliability, especially within the emergency scenarios. With the presence of this challenging issue, the current standardised RPL OFs cannot sufficiently fulfil the antagonistic needs of Low-power and Lossy Networks (LLNs) applications. In response to the above issues, a context adaptive OF has been proposed to facilitate exchanging the synergy information between the application and network layers. Thus, the impact of the antagonistic requirements based on context parameters will be mitigated via rationalizing the selection decision of the routing path towards the root node. We implemented the proposed protocol and verified all our findings through excessive measurements via simulations and a realistic deployment using a real testbed of a multi-hop LLNs motes. The results proved the superiority of our solution over the existing ones with respect to end-to-end delay, packet delivery ratio and network lifetime. Our contribution has been accepted initially to be adopted within the standard body Internet Engineering Task Force (IETF).
- Published
- 2018
233. Mango : a model-driven approach to engineering green Mobile Cloud Applications
- Author
-
Chinenyeze, Samuel Jaachimma and Al-Dubai, Ahmed
- Subjects
004 ,Mobile devices ,MCA ,green computing ,mobile to cloud ,MCC ,Software systems - Abstract
With the resource constrained nature of mobile devices and the resource abundant offerings of the cloud, several promising optimisation techniques have been proposed by the green computing research community. Prominent techniques and unique methods have been developed to offload resource/computation intensive tasks from mobile devices to the cloud. Most of the existing offloading techniques can only be applied to legacy mobile applications as they are motivated by existing systems. Consequently, they are realised with custom runtimes which incur overhead on the application. Moreover, existing approaches which can be applied to the software development phase, are difficult to implement (based on manual process) and also fall short of overall (mobile to cloud) efficiency in software qualityattributes or awareness of full-tier (mobile to cloud) implications. To address the above issues, the thesis proposes a model-driven architecturefor integration of software quality with green optimisation in Mobile Cloud Applications (MCAs), abbreviated as Mango architecture. The core aim of the architecture is to present an approach which easily integrates software quality attributes (SQAs) with the green optimisation objective of Mobile Cloud Computing (MCC). Also, as MCA is an application domain which spans through the mobile and cloud tiers; the Mango architecture, therefore, takesinto account the specification of SQAs across the mobile and cloud tiers, for overall efficiency. Furthermore, as a model-driven architecture, models can be built for computation intensive tasks and their SQAs, which in turn drives the development – for development efficiency. Thus, a modelling framework (called Mosaic) and a full-tier test framework (called Beftigre) were proposed to automate the architecture derivation and demonstrate the efficiency of Mango approach. By use of real world scenarios/applications, Mango has been demonstrated to enhance the MCA development process while achieving overall efficiency in terms of SQAs (including mobile performance and energy usage compared to existing counterparts).
- Published
- 2017
234. Adaptive energy management mechanisms for cluster based routing wireless sensor networks
- Author
-
Eshaftri, Mohamed, Al-Dubai, Ahmed, and Romdhani, Imed
- Subjects
621.389 ,Wireless Sensor Network ,Energy Management Mechanisms ,Clusters ,621.389 Computer engineering ,QA75 Electronic computers. Computer science - Abstract
Wireless Sensor Network (WSN) technology has been one of the major avenues of Internet of Things (IoT) due to their potential role in digitising smart physical environments. WSNs are typically composed of a vast number of low-power, low–cost and multifunctional sensor nodes within an area that automatically cooperate to complete the application task. This emerging technology has already contributed to the advancement of a broad range of applications. Nevertheless, the development of WSNs is a challenging issue due to significant concerns, which need to be resolved to take full benefit of this remarkable technology. One of the main challenges of WSNs is how to reduce the energy consumption of a single node, in order to extend the network lifetime and improves the quality of service. For that reason, a newly design energy efficient communication protocol is required to tackle the issue. The clustering protocols designed for communication are alleged to be one of the most efficient solutions that can contribute to network scalability and energy consumption in WSNs. While different clustering protocols have been proposed to tackle the aforementioned issue, those solutions are either not scalable or do not provide the mechanisms to avoid a heavy loaded area. This thesis presents new adaptive energy management mechanisms, through which the limited critical energy source can be wisely managed so that the WSN application can achieve its intended design goals. Three protocols are introduced to manage the energy use. The first protocol presents an intra-cluster CH rotation approach that reduces the need for the execution of a periodical clustering process. The second protocol relates to load balancing in terms of the intra and inter-cluster communication patterns of clusters of unequal sizes. This proposed approach involves computing a threshold value that, when reached, triggers overall network re-clustering, with the condition that the network will be reconfigured into unequal cluster size. The third protocol proposes new performance factors in relation to CH selection. Based on these factors, the aggregated weight of each node is calculated, and the most suitable CH is selected. A comparison with existing communication protocols reveals that the proposed approaches balance effectively the energy consumption among all sensor nodes and significantly increase the network lifetime.
- Published
- 2017
235. A mobility aware duty cycling and preambling solution for wireless sensor network with mobile sink node.
- Author
-
Thomson, Craig, Wadhaj, Isam, Tan, Zhiyuan, and Al-Dubai, Ahmed
- Subjects
- *
WIRELESS sensor networks , *WIRELESS sensor nodes , *ENERGY consumption - Abstract
Utilising the mobilisation of a sink node in a wireless sensor network to combat the energy hole, or hotspot issue, is well referenced. However, another issue, that of energy spikes may remain. With the mobile sink node potentially communicating with some nodes more than others. In this study we propose the Mobility Aware Duty Cycling and Dynamic Preambling Algorithm (MADCaDPAL). This algorithm utilises an existing solution where a communication threshold is built between a mobile sink node using predictable mobility and static nodes on its path. MADCaDPAL bases decisions relating to node sleep function, moving to clear channel assessment and the subsequent sending of preambles on the relation between the threshold built by the static node and the position of the mobile sink node. MADCaDPAL achieves a reduction in average energy consumption of up to 80%, this when used in conjunction with a lightweight carrier-sense multiple access based MAC implementation. Maximum energy consumption amongst individual nodes is also brought closer to the average, reducing energy spikes and subsequently improving network lifetime. Additionally, frame delivery to the sink is improved overall. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
236. Dynamic probabilistic routing discovery and broadcast schemes for high mobility ad-hoc networks
- Author
-
Bani Khalaf, Mustafa and Al-Dubai, Ahmed
- Subjects
004 ,QA75 Electronic computers. Computer science - Abstract
Mobile Ad-hoc Networks (MANETs) have lately come to be widely used in everyday applications. Their usability and capability have attracted the interest of both commercial organizations and research communities. Recently, the Vehicular Ad-hoc Network (VANET) is a promising application of MANETs. It has been designed to offer a high level of safety for the drivers in order to minimize a number of roads accidents. Broadcast communication in MANETs and VANETs, is essential for a wide range of important services such as propagating safety messages and Route REQuest (RREQ) packets. Routing is one of the most challenging issues in MANETs and VANETs, which requires high efficient broadcast schemes. The primitive and widely deployed method of implementing the broadcast is simple ‘flooding'. In this approach, each node ‘floods' the network, with the message that it has received, in order to guarantee that other nodes in the network have been successfully reached. Although flooding is simple and reliable, it consumes a great deal of network resources, since it swamps the network with many redundant packets, leading to collisions contention and huge competition, while accessing the same shared wireless medium. This phenomenon is well-known in MANETs, and is called the Broadcast Storm Problem. The first contribution of this thesis is to design and develop an efficient distributed route discovery scheme that is implemented based on the probabilistic concept, in order to suppress the broadcast storm problem. The proposed scheme is called a Probabilistic Disturbed Route Discovery scheme (PDRD), and it prioritizes the routing operation at each node with respect to different network parameters such as the number of duplicated packets, and local and global network density. The performance of the proposed scheme PDRD has been examined in MANETs, in terms of a number of important metrics such as RREQ rebroadcast number and RREQ collision number. Experimental results confirm the superiority of the proposed scheme over its counterparts, including the Hybrid Probabilistic-Based Counter (HPC) scheme and the Simple Flooding (SF) scheme. The second contribution of this thesis is to tackle the frequent link breakages problem in MANETs. High mobility nodes often have frequent link breakages; this potentially leads to re-discovery of the same routes. Although different probabilistic solutions have been suggested to optimize the routing in MANETs, to the best of our knowledge they have not focused on the problem of frequent link breakages and link stability. II Unlike other existing probabilistic solutions, this thesis proposes a new Velocity Aware-Probabilistic (VAP) route discovery scheme, which can exclude unstable nodes from constructing routes between source and destination. The main idea behind the proposed schemes is to use velocity vector information to determine the stable nodes and unstable nodes. A proper rebroadcast probability and timer are set dynamically according to the node stability. Simulation results confirm that the new proposed scheme has much better performance in terms of end-to-end delay, RREQ rebroadcast number and link stability. The routing in VANETs is very critical and challenging in terms of the number of broken links and packet overheads. This is mainly due to the fast vehicles' speed and different vehicles' movement directions. A large number of routing protocols such as Ad-hoc On-demand Distance Vector (AODV) and Dynamic Source Routing (DSR) have been proposed to deal with the routing in MANETs. However, these protocols are not efficient and cannot be applied directly to VANETs context due to its different characteristics. Finally toward this end, this thesis proposes new probabilistic and timer probabilistic routing schemes in order to improve the routing in VANETs. The main aim of the proposed schemes is to set up the most stable routes to avoid any possible link breakage. These schemes also enhance the overall network performance by suppressing the broadcast storm problem, which occurs during the route discovery process. The proposed schemes also make AODV protocol suitable and applicable for VANETs. Simulation results show the benefit of the new routing schemes in terms of a number of metrics such as RREQ rebroadcast number, link stability and end-to-end delay.
- Published
- 2013
237. Efficient routing and communication algorithms for wireless mesh networks
- Author
-
Zhao, Liang and Al-Dubai, Ahmed
- Subjects
004 ,QA75 Electronic computers. Computer science - Published
- 2011
238. A novel nomad migration-inspired algorithm for global optimization.
- Author
-
Lin, Na, Fu, Luwei, Zhao, Liang, Hawbani, Ammar, Tan, Zhiyuan, Al-Dubai, Ahmed, and Min, Geyong
- Subjects
- *
GLOBAL optimization , *MATHEMATICAL proofs , *MATHEMATICAL optimization , *NOMADS - Abstract
Nature-inspired computing (NIC) has been widely studied for many optimization scenarios. However, miscellaneous solution space of real-world problem causes it is challenging to guarantee the global optimum. Besides, cumbersome structure and complex parameters setting-up make the existed algorithms hard for most users who are not specializing in NIC, to understand and use. To alleviate these limitations, this paper devises a succinct and efficient optimization algorithm called Nomad Algorithm (NA). It is inspired by the migratory behavior of nomadic tribes on the prairie. Extensive experiments are implemented with respects to accuracy, rate, stability, and cost of optimization. Mathematical proof is given to guarantee the global convergence, and the nonparametric tests are conducted to confirm the significance of experiment results. The statistical results of optimization accuracy denote NA outperforms its rivals for most cases (23/28) by orders of magnitude significantly. It is considered as a promising optimizer with excellent efficiency and adaptability. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
239. Stratified opposition-based initialization for variable-length chromosome shortest path problem evolutionary algorithms.
- Author
-
Ghannami, Aiman, Li, Jing, Hawbani, Ammar, and Al-Dubai, Ahmed
- Subjects
- *
PARTICLE swarm optimization , *GENETIC algorithms , *CHROMOSOMES , *EVOLUTIONARY algorithms , *PHENOTYPES - Abstract
• Stratified sampling reduces genotype diversify thus reducing exploration time. • Opposition-Based guessing increases initial population fitness. • Path Length diversity is more important during the initialization phase. • The repair function can introduce diversity to population. Initialization is the first and a major step in the implementation of evolutionary algorithms (EAs). Although there are many common general methods to initialize EAs such as the pseudo-random number generator (PRNG), there is no single method that can fit every problem. This study provides a new, flexible, diversity-aware, and easy-to-implement initialization method for a genetic algorithm for the shortest path problem. The proposed algorithm, called stratified opposition-based sampling (SOBS), considers phenotype and genotype diversity while striving to achieve the best fitness for the initialization population. SOBS does not depend on a specific type of sampling, because the main goal is to stratify the sampling space. SOBS aims at an initial population with higher fitness and diversity in the phenotype and genotype. To investigate the performance of SOBS, four network models were used to simulate real-world networks. Compared with the most frequently used initialization method, that is, PRNG, SOBS provides more accurate solutions, better running time with less memory usage, and an initial population with higher fitness. Statistical analysis showed that SOBS yields solutions with higher accuracy in 68–100% of the time. Although this study was focused on the genetic algorithm, it can be applied to other population-based EAs that solve the shortest path problem and use the same direct population representation such as particle swarm optimization (PSO). [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
240. A lightweight and efficient digital image encryption using hybrid chaotic systems for wireless network applications.
- Author
-
Almalkawi, Islam T., Halloush, Rami, Alsarhan, Ayoub, Al-Dubai, Ahmed, and Al-karaki, Jamal N.
- Subjects
- *
IMAGE encryption , *PIXELS , *WIRELESS communications , *STATISTICAL correlation , *DATA security - Abstract
Due to limited processing capabilities and other constraints of most wireless networks, many existing security algorithms do not consider the network efficiency. This is because most of these security solutions exhibit intolerable overhead and consider only securing scalar data, which are not suitable for other data types such as digital images, hence affecting the provided security level and network performance. Thus, in this paper, we propose a lightweight and efficient security scheme based on chaotic algorithms to efficiently encrypt digital images. Our proposed algorithm handles digital images in two phases: Firstly, digital images are split into blocks and compressed by processing them in frequency domain instead of Red-Green-Blue (RGB) domain. The ultimate goal is to reduce their sizes to speed up the encryption process and to break the correlation among image pixel values. Secondly, 2D Logistic chaotic map is deployed in key generation, permutation, and substitution stages for image pixel shuffling and transposition. In addition, 2D Henon chaotic map is deployed to change the pixel values in the diffusion stage in order to enhance the required level of security and resist various security attacks. Security performance analysis based on standard test images shows that our proposed scheme overcomes the performance of other existing techniques. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
241. A formally verified device authentication protocol using Casper/FDR
- Author
-
Raphael C.-W. Phan, Glenford Mapp, Jonathan Loo, Mahdi Aiash, Aboubaker Lasebae, Min, Geyong, Wu, Yulei, Liu, Lei (Chris), Jin, Xiaolong, Jarvis, Stephen, and Al-Dubai, Ahmed Y.
- Subjects
Network security ,business.industry ,Computer science ,Mobile computing ,Cryptographic protocol ,Formal methods ,Computer security ,computer.software_genre ,Authentication protocol ,Next-generation network ,business ,Mobile device ,Protocol (object-oriented programming) ,computer ,Computer network - Abstract
For communication in Next Generation Networks, highly-developed mobile devices will enable users to store and manage a lot of credentials on their terminals. Furthermore, these terminals will represent and act on behalf of users when accessing different networks and connecting to a wide variety of services. In this situation, it is essential for users to trust their terminals and for all transactions using them to be secure. This paper analyses a number of the Authentication and Key Agreement protocols between the users and mobile terminals, then proposes a novel device authentication protocol. The proposed protocol is analysed and verified using a formal methods approach based on Casper/FDR compiler.
- Published
- 2012
242. ADVANCING THE UNDERSTANDING OF CLINICAL SEPSIS USING GENE EXPRESSION-DRIVEN MACHINE LEARNING TO IMPROVE PATIENT OUTCOMES.
- Author
-
Rashid A, Al-Obeida F, Hafez W, Benakatti G, Malik RA, Koutentis C, Sharief J, Brierley J, Quraishi N, Malik ZA, Anwary A, Alkhzaimi H, Zaki SA, Khilnani P, Kadwa R, Phatak R, Schumacher M, Shaikh G, Al-Dubai A, and Hussain A
- Subjects
- Humans, Algorithms, Machine Learning, Gene Expression, Sepsis genetics, Physicians
- Abstract
Abstract: Sepsis remains a major challenge that necessitates improved approaches to enhance patient outcomes. This study explored the potential of machine learning (ML) techniques to bridge the gap between clinical data and gene expression information to better predict and understand sepsis. We discuss the application of ML algorithms, including neural networks, deep learning, and ensemble methods, to address key evidence gaps and overcome the challenges in sepsis research. The lack of a clear definition of sepsis is highlighted as a major hurdle, but ML models offer a workaround by focusing on endpoint prediction. We emphasize the significance of gene transcript information and its use in ML models to provide insights into sepsis pathophysiology and biomarker identification. Temporal analysis and integration of gene expression data further enhance the accuracy and predictive capabilities of ML models for sepsis. Although challenges such as interpretability and bias exist, ML research offers exciting prospects for addressing critical clinical problems, improving sepsis management, and advancing precision medicine approaches. Collaborative efforts between clinicians and data scientists are essential for the successful implementation and translation of ML models into clinical practice. Machine learning has the potential to revolutionize our understanding of sepsis and significantly improve patient outcomes. Further research and collaboration between clinicians and data scientists are needed to fully understand the potential of ML in sepsis management., Competing Interests: Conflict of interest declaration: The authors declare that they have no affiliations with or involvement in any organization or entity with any financial interest in the subject matter or materials discussed in this manuscript., (Copyright © 2023 The Author(s). Published by Wolters Kluwer Health, Inc. on behalf of the Shock Society.)
- Published
- 2024
- Full Text
- View/download PDF
243. A TRANSCRIPTOMIC APPRECIATION OF CHILDHOOD MENINGOCOCCAL AND POLYMICROBIAL SEPSIS FROM A PRO-INFLAMMATORY AND TRAJECTORIAL PERSPECTIVE, A ROLE FOR VASCULAR ENDOTHELIAL GROWTH FACTOR A AND B MODULATION?
- Author
-
Rashid A, Brusletto BS, Al-Obeidat F, Toufiq M, Benakatti G, Brierley J, Malik ZA, Hussain Z, Alkhazaimi H, Sharief J, Kadwa R, Sarpal A, Chaussabe D, Malik RA, Quraishi N, Khilnani P, Zaki SA, Nadeem R, Shaikh G, Al-Dubai A, Hafez W, and Hussain A
- Subjects
- Humans, Transcriptome, Vascular Endothelial Growth Factor B, Cross-Sectional Studies, Biomarkers, Vascular Endothelial Growth Factor A genetics, Vascular Endothelial Growth Factor A metabolism, Sepsis genetics
- Abstract
Abstract: This study investigated the temporal dynamics of childhood sepsis by analyzing gene expression changes associated with proinflammatory processes. Five datasets, including four meningococcal sepsis shock (MSS) datasets (two temporal and two longitudinal) and one polymicrobial sepsis dataset, were selected to track temporal changes in gene expression. Hierarchical clustering revealed three temporal phases: early, intermediate, and late, providing a framework for understanding sepsis progression. Principal component analysis supported the identification of gene expression trajectories. Differential gene analysis highlighted consistent upregulation of vascular endothelial growth factor A (VEGF-A) and nuclear factor κB1 (NFKB1), genes involved in inflammation, across the sepsis datasets. NFKB1 gene expression also showed temporal changes in the MSS datasets. In the postmortem dataset comparing MSS cases to controls, VEGF-A was upregulated and VEGF-B downregulated. Renal tissue exhibited higher VEGF-A expression compared with other tissues. Similar VEGF-A upregulation and VEGF-B downregulation patterns were observed in the cross-sectional MSS datasets and the polymicrobial sepsis dataset. Hexagonal plots confirmed VEGF-R (VEGF receptor)-VEGF-R2 signaling pathway enrichment in the MSS cross-sectional studies. The polymicrobial sepsis dataset also showed enrichment of the VEGF pathway in septic shock day 3 and sepsis day 3 samples compared with controls. These findings provide unique insights into the dynamic nature of sepsis from a transcriptomic perspective and suggest potential implications for biomarker development. Future research should focus on larger-scale temporal transcriptomic studies with appropriate control groups and validate the identified gene combination as a potential biomarker panel for sepsis., Competing Interests: The authors report no conflicts of interest., (Copyright © 2023 The Author(s). Published by Wolters Kluwer Health, Inc. on behalf of the Shock Society.)
- Published
- 2023
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.