Search Results - "Dubai, Ahmed Al"

Refine Results
  1. 1

    A Digital Twin-Assisted Intelligent Partial Offloading Approach for Vehicular Edge Computing by Zhao, Liang, Zhao, Zijia, Zhang, Enchao, Hawbani, Ammar, Al-Dubai, Ahmed, Tan, Zhiyuan, Hussain, Amir

    “…Vehicle Edge Computing (VEC) is a promising paradigm that exposes Mobile Edge Computing (MEC) to road scenarios. In VEC, task offloading can enable vehicles to…”
    Get full text
    Journal Article
  2. 2

    Novel Online Sequential Learning-Based Adaptive Routing for Edge Software-Defined Vehicular Networks by Zhao, Liang, Zhao, Weiliang, Hawbani, Ammar, Al-Dubai, Ahmed Y., Min, Geyong, Zomaya, Albert Y., Gong, Changqing

    “…To provide efficient networking services at the edge of Internet-of-Vehicles (IoV), Software-Defined Vehicular Network (SDVN) has been a promising technology…”
    Get full text
    Journal Article
  3. 3

    A Novel Chaotic Permutation-Substitution Image Encryption Scheme Based on Logistic Map and Random Substitution by Arif, Jameel, Khan, Muazzam A, Ghaleb, Baraq, Ahmad, Jawad, Munir, Arslan, Rashid, Umer, Al-Dubai, Ahmed

    Published in IEEE access (01-01-2022)
    “…Privacy is a serious concern related to sharing videos or images among people over the Internet. As a method to preserve images' privacy, chaos-based image…”
    Get full text
    Journal Article
  4. 4

    A Novel Generation-Adversarial-Network-Based Vehicle Trajectory Prediction Method for Intelligent Vehicular Networks by Zhao, Liang, Liu, Yufei, Al-Dubai, Ahmed Y., Zomaya, Albert Y., Min, Geyong, Hawbani, Ammar

    Published in IEEE internet of things journal (01-02-2021)
    “…Prediction of the future location of vehicles and other mobile targets is instrumental in intelligent transportation system applications. In fact, networking…”
    Get full text
    Journal Article
  5. 5
  6. 6

    MOSAIC: Simultaneous Localization and Environment Mapping Using mmWave Without A-Priori Knowledge by Yassin, Ali, Nasser, Youssef, Al-Dubai, Ahmed Y., Awad, Mariette

    Published in IEEE access (2018)
    “…Simultaneous localization and environment mapping (SLAM) is the core to robotic mapping and navigation as it constructs simultaneously the unknown environment…”
    Get full text
    Journal Article
  7. 7

    Recent Advances in Indoor Localization: A Survey on Theoretical Approaches and Applications by Yassin, Ali, Nasser, Youssef, Awad, Mariette, Al-Dubai, Ahmed, Ran Liu, Chau Yuen, Raulefs, Ronald, Aboutanios, Elias

    Published in IEEE Communications surveys and tutorials (01-01-2017)
    “…The availability of location information has become a key factor in today's communications systems allowing location based services. In outdoor scenarios, the…”
    Get full text
    Journal Article
  8. 8

    A Novel Prediction-Based Temporal Graph Routing Algorithm for Software-Defined Vehicular Networks by Zhao, Liang, Li, Zhuhui, Al-Dubai, Ahmed Y., Min, Geyong, Li, Jiajia, Hawbani, Ammar, Zomaya, Albert Y.

    “…Temporal information is critical for routing computation in the vehicular network. It plays a vital role in the vehicular network. Till now, most existing…”
    Get full text
    Journal Article
  9. 9

    A multi-UAV clustering strategy for reducing insecure communication range by Wu, Jiehong, Zou, Liangkai, Zhao, Liang, Al-Dubai, Ahmed, Mackenzie, Lewis, Min, Geyong

    “…Multi-unmanned aerial vehicle (UAV) flight formations can be deployed to monitor large areas. Individual UAVs communicate and exchange information while…”
    Get full text
    Journal Article
  10. 10

    A Survey of Limitations and Enhancements of the IPv6 Routing Protocol for Low-Power and Lossy Networks: A Focus on Core Operations by Ghaleb, Baraq, Al-Dubai, Ahmed Y., Ekonomou, Elias, Alsarhan, Ayoub, Nasser, Youssef, Mackenzie, Lewis M., Boukerche, Azzedine

    Published in IEEE Communications surveys and tutorials (01-01-2019)
    “…Driven by the special requirements of the low-power and lossy networks (LLNs), the IPv6 routing protocol for LLNs (RPL) was standardized by the IETF some six…”
    Get full text
    Journal Article
  11. 11

    Impact of Relay Location of STANC Bi-Directional Transmission for Future Autonomous Internet of Things Applications by Tanoli, Shujaat Ali Khan, Shah, Syed Aziz, Khan, Muhammad Bilal, Nawaz, Faiza, Hussain, Amir, Al-Dubai, Ahmed Y., Khan, Imran, Shah, Syed Yaseen, Alsarhan, Ayoub

    Published in IEEE access (2020)
    “…Wireless communication using existing coding models poses several challenges for RF signals due to multipath scattering, rapid fluctuations in signal strength…”
    Get full text
    Journal Article
  12. 12

    Adaptive Resource Allocation and Provisioning in Multi-Service Cloud Environments by Alsarhan, Ayoub, Itradat, Awni, Al-Dubai, Ahmed Y., Zomaya, Albert Y., Geyong Min

    “…In the current cloud business environment, the cloud provider (CP) can provide a means for offering the required quality of service (QoS) for multiple classes…”
    Get full text
    Journal Article
  13. 13

    Reliable and Scalable Routing Under Hybrid SDVN Architecture: A Graph Learning Based Method by Li, Zhuhui, Zhao, Liang, Min, Geyong, Al-Dubai, Ahmed Y., Hawbani, Ammar, Zomaya, Albert Y., Luo, Chunbo

    “…Greedy routing efficiently achieves routing solutions for vehicular networks due to its simplicity and reliability. However, the existing greedy routing…”
    Get full text
    Journal Article
  14. 14

    A New Analytical Model for Multi-Hop Cognitive Radio Networks by Wu, Yulei, Min, Geyong, Al-Dubai, Ahmed Y.

    “…The cognitive radio (CR) is an emerging technique for increasing the utilisation of communication resources by allowing the unlicensed users to employ the…”
    Get full text
    Journal Article
  15. 15

    A New Spectrum Management Scheme for Road Safety in Smart Cities by Alsarhan, Ayoub, Al-Dubai, Ahmed Y., Min, Geyong, Zomaya, Albert Y., Bsoul, Mohammad

    “…Traffic management in roads is one of the major challenges faced in developing efficient intelligent transportation systems. Recently, wireless networks have…”
    Get full text
    Journal Article
  16. 16

    Performance modelling and optimization of integrated wireless LANs and multi-hop mesh networks by Min, Geyong, Wu, Yulei, Li, Keqiu, Al-Dubai, Ahmed Y.

    “…The increasing demand for the coverage of high‐speed wireless local area networks (WLANs) is driving the installation of a very large number of access points…”
    Get full text
    Journal Article
  17. 17

    Mitigation Mechanisms against the DAO Attack on the Routing Protocol for Low Power and Lossy Networks (RPL) by Wadhaj, Isam, Ghaleb, Baraq, Thomson, Craig, Al-Dubai, Ahmed, Buchanan, William J.

    Published in IEEE access (01-01-2020)
    “…Destination Advertisement Objects (DAOs) are sent upward by RPL nodes toward the DODAG root, to build the downward routing paths carrying traffic from the root…”
    Get full text
    Journal Article
  18. 18

    Controlling Calcium Oxalate Crystal Growth Using Pectin and Sodium Alginate Natural Polymers by ALDubai, Ahmed, Akyol, Emel

    Published in Chemical engineering & technology (01-10-2024)
    “…Calcium oxalate (CaOx) crystallization is a common phenomenon that contributes to various kidney disorders and stone formation, as well as the formation of…”
    Get full text
    Journal Article
  19. 19

    A new efficient cross-layer relay node selection model for Wireless Community Mesh Networks by Zhao, Liang, Al-Dubai, Ahmed, Li, Xianwei, Chen, Guolong, Min, Geyong

    Published in Computers & electrical engineering (01-07-2017)
    “…•Packet Priority-Oriented routing metric and Packet Priority-oriented QoS routing metric are the first to provide differentiated priorities and service levels…”
    Get full text
    Journal Article
  20. 20

    Dynamic S-Box and PWLCM-Based Robust Watermarking Scheme by Khan, Jan Sher, Kayhan, Sema Koç, Ahmed, Saygin Siddiq, Ahmad, Jawad, Siddiqa, Hafza Ayesha, Ahmed, Fawad, Ghaleb, Baraq, Al Dubai, Ahmed

    Published in Wireless personal communications (01-07-2022)
    “…Due to the increased number of cyberattacks, numerous researchers are motivated towards the design of such schemes that can hide digital information in a…”
    Get full text
    Journal Article