Skip to main content

Research Repository

Advanced Search

Outputs (18)

Integrating Reality: A Hybrid SDN Testbed for Enhanced Realism in Edge Computing Simulations (2024)
Presentation / Conference Contribution
Almaini, A., Koßmann, T., Folz, J., Schramm, M., Heigl, M., & Al-Dubai, A. (2024, June). Integrating Reality: A Hybrid SDN Testbed for Enhanced Realism in Edge Computing Simulations. Presented at UNet24: The International Conference on Ubiquitous Networking, Marrakesh, Morocco

Recent advancements in Software-Defined Networking (SDN) have facilitated its deployment across diverse network types, including edge networks. Given the broad applicability of SDN and the complexity of large-scale environments, establishing a compre... Read More about Integrating Reality: A Hybrid SDN Testbed for Enhanced Realism in Edge Computing Simulations.

A Novel Cosine-Modulated-Polynomial Chaotic Map to Strengthen Image Encryption Algorithms in IoT Environments (2024)
Presentation / Conference Contribution
Khan, M. S., Ahmad, J., Al-Dubai, A., Pitropakis, N., Driss, M., & Buchanan, W. J. (2024, September). A Novel Cosine-Modulated-Polynomial Chaotic Map to Strengthen Image Encryption Algorithms in IoT Environments. Presented at 28th International Conference on Knowledge Based and Intelligent information and Engineering Systems (KES 2024), Spain

With the widespread use of the Internet of Things (IoT), securing the storage and transmission of multimedia content across IoT devices is a critical concern. Chaos-based Pseudo-Random Number Generators (PRNGs) play an essential role in enhancing the... Read More about A Novel Cosine-Modulated-Polynomial Chaotic Map to Strengthen Image Encryption Algorithms in IoT Environments.

An Enhanced and Robust Data Publishing Scheme for Private and Useful 1:M Microdata (2024)
Journal Article
Rizwan, M., Hawbani, A., Xingfu, W., Anjum, A., Angin, P., Sever, Y., Chen, S., Zhao, L., & Al-Dubai, A. (online). An Enhanced and Robust Data Publishing Scheme for Private and Useful 1:M Microdata. IEEE Transactions on Big Data, https://doi.org/10.1109/TBDATA.2024.3495497

A data publishing deal conducted with anonymous microdata can preserve the privacy of people. However, anonymizing data with multiple records of an individual (1:M dataset) is still a challenging problem. After anonymizing the 1:M microdata, the vert... Read More about An Enhanced and Robust Data Publishing Scheme for Private and Useful 1:M Microdata.

CAST: Efficient Traffic Scenario Inpainting in Cellular Vehicle-to-Everything Systems (2024)
Journal Article
Zhao, L., Mao, C., Wan, S., Hawbani, A., Al-Dubai, A. Y., Min, G., & Zomaya, A. Y. (2025). CAST: Efficient Traffic Scenario Inpainting in Cellular Vehicle-to-Everything Systems. IEEE Transactions on Mobile Computing, 24(3), 2331-2345. https://doi.org/10.1109/tmc.2024.3492148

As a promising vehicular communication technology, Cellular Vehicle-to-Everything (C-V2X) is expected to ensure the safety and convenience of Intelligent Transportation Systems (ITS) by providing global road information. However, it is difficult to o... Read More about CAST: Efficient Traffic Scenario Inpainting in Cellular Vehicle-to-Everything Systems.

Stretchable electrospun PVDF/TPU nanofibers membranes: Acoustic signals detectors (2024)
Journal Article
Nair, R., El-kadery, A., Khalil, A. M., El-kaliuoby, M. I., Kandas, I., Jain, A., Omran, N., Gamal, M., Noman, S., Magdy, G., Maree, K., El-Khatib, A. M., Hassanin, A. H., Shyha, I., Jaradat, S., Al-Dubai, A., Trabelsi, M., Al Othman, B., & Shehata, N. (2024). Stretchable electrospun PVDF/TPU nanofibers membranes: Acoustic signals detectors. MRS Energy and Sustainability, 11, 659–668. https://doi.org/10.1557/s43581-024-00111-4

Devices that harvest energy are crucial for reducing reliance on energy transmission and distribution systems. This helps minimize energy loss and mitigate environmental impacts. In this study, we focused on manufacturing nanocomposites using various... Read More about Stretchable electrospun PVDF/TPU nanofibers membranes: Acoustic signals detectors.

Novel Lagrange Multipliers-Driven Adaptive Offloading for Vehicular Edge Computing (2024)
Journal Article
Zhao, L., Li, T., Meng, G., Hawbani, A., Min, G., Al-Dubai, A., & Zomaya, A. (2024). Novel Lagrange Multipliers-Driven Adaptive Offloading for Vehicular Edge Computing. IEEE Transactions on Computers, 73(12), 2868-2881. https://doi.org/10.1109/TC.2024.3457729

Vehicular Edge Computing (VEC) is a transportation-specific version of Mobile Edge Computing (MEC) designed for vehicular scenarios. Task offloading allows vehicles to send computational tasks to nearby Roadside Units (RSUs) in order to reduce the co... Read More about Novel Lagrange Multipliers-Driven Adaptive Offloading for Vehicular Edge Computing.

Context-Aware Audio-Visual Speech Enhancement Based on Neuro-Fuzzy Modelling and User Preference Learning (2024)
Journal Article
Chen, S., Kirton-Wingate, J., Doctor, F., Arshad, U., Dashtipour, K., Gogate, M., Halim, Z., Al-Dubai, A., Arslan, T., & Hussain, A. (2024). Context-Aware Audio-Visual Speech Enhancement Based on Neuro-Fuzzy Modelling and User Preference Learning. IEEE Transactions on Fuzzy Systems, 32(10), 5400-5412. https://doi.org/10.1109/tfuzz.2024.3435050

It is estimated that by 2050 approximately one in ten individuals globally will experience disabling hearing impairment. In the presence of everyday reverberant noise, a substantial proportion of individual users encounter challenges in speech compre... Read More about Context-Aware Audio-Visual Speech Enhancement Based on Neuro-Fuzzy Modelling and User Preference Learning.

VisCrypt: Image Encryption Featuring Novel Chaotic Key Generation and Block Permutation Techniques with Visual Cryptography (2024)
Presentation / Conference Contribution
Khan, M. S., Ahmad, J., Ali, M., Al Dubai, A., Pitropakis, N., & Buchanan, W. J. (2024, July). VisCrypt: Image Encryption Featuring Novel Chaotic Key Generation and Block Permutation Techniques with Visual Cryptography. Presented at 2024 IEEE 7th International Conference on Advanced Technologies, Signal and Image Processing (ATSIP), Sousse, Tunisia

In this digital era, ensuring the security of data transmission is critically important. Digital data, especially image data, needs to be secured against unauthorized access. In this regards, this paper presents a robust image encryption scheme named... Read More about VisCrypt: Image Encryption Featuring Novel Chaotic Key Generation and Block Permutation Techniques with Visual Cryptography.

User Preferences-Based Proactive Content Caching with Characteristics Differentiation in HetNets (2024)
Journal Article
Lin, N., Wang, Y., Zhang, E., Wan, S., Al-Dubai, A., & Zhao, L. (2025). User Preferences-Based Proactive Content Caching with Characteristics Differentiation in HetNets. IEEE Transactions on Sustainable Computing, 10(2), 333-344. https://doi.org/10.1109/TSUSC.2024.3441606

With the proliferation of mobile applications, the explosion of mobile data traffic imposes a significant burden on backhaul links with limited capacity in heterogeneous cellular networks (HetNets). To alleviate this challenge, content caching based... Read More about User Preferences-Based Proactive Content Caching with Characteristics Differentiation in HetNets.

A Novel Autonomous Adaptive Frame Size for Time-Slotted LoRa MAC Protocol (2024)
Journal Article
Alahmadi, H., Bouabdallah, F., Al-Dubai, A., & Ghaleb, B. (2024). A Novel Autonomous Adaptive Frame Size for Time-Slotted LoRa MAC Protocol. IEEE Transactions on Industrial Informatics, 20(10), 12284-12293. https://doi.org/10.1109/tii.2024.3417308

LoRa networks represent a promising technology for IoT applications due to their long range, low cost, and energy efficiency. However, their ALOHA-based access method and duty cycle restrictions can limit their scalability and reliability in high-den... Read More about A Novel Autonomous Adaptive Frame Size for Time-Slotted LoRa MAC Protocol.