Skip to main content

Research Repository

Advanced Search

All Outputs (19)

Ontology-based Course Teacher Assignment within Universities (2020)
Journal Article
Ashour, G., Al-Dubai, A., & Romdhani, I. (2020). Ontology-based Course Teacher Assignment within Universities. International Journal of Advanced Computer Science and Applications, 11(7), https://doi.org/10.14569/ijacsa.2020.0110787

Educational institutions suffer from the enormous amount of data that keeps growing continuously. These data are usually scattered and unorganised, and it comes from different resources with different formats. Besides, modernization vision within the... Read More about Ontology-based Course Teacher Assignment within Universities.

PoNW: A Secure and Scalable Proof-of-Notarized-Work-Based Consensus Mechanism (2020)
Presentation / Conference Contribution
Abubakar, M. A., Jaroucheh, Z., Al-Dubai, A., & Buchanan, B. (2020). PoNW: A Secure and Scalable Proof-of-Notarized-Work-Based Consensus Mechanism. In ICVISP 2020: Proceedings of the 2020 4th International Conference on Vision, Image and Signal Processin

The original consensus algorithm - Proof of Work (PoW) has been widely utilized in the blockchain systems and is been adopted by many cryptocurrencies, such as Bitcoin and Ethereum, among many others. Nevertheless, the concept has received criticisms... Read More about PoNW: A Secure and Scalable Proof-of-Notarized-Work-Based Consensus Mechanism.

Novel Online Sequential Learning-Based Adaptive Routing for Edge Software-Defined Vehicular Networks (2020)
Journal Article
Zhao, L., Zhao, W., Hawbani, A., Al-Dubai, A. Y., Min, G., Zomaya, A., & Gong, C. (2021). Novel Online Sequential Learning-Based Adaptive Routing for Edge Software-Defined Vehicular Networks. IEEE Transactions on Wireless Communications, 20(5), 2991-3004

To provide efficient networking services at the edge of Internet-of-Vehicles (IoV), Software-Defined Vehicular Network (SDVN) has been a promising technology to enable intelligent data exchange without giving additional duties to the resource constra... Read More about Novel Online Sequential Learning-Based Adaptive Routing for Edge Software-Defined Vehicular Networks.

Stratified Opposition-Based Initialization for Variable-Length Chromosome Shortest Path Problem Evolutionary Algorithms (2020)
Journal Article
Ghanami, A., Li, . J., Hawbani, A., & Al-Dubai, A. (2021). Stratified Opposition-Based Initialization for Variable-Length Chromosome Shortest Path Problem Evolutionary Algorithms. Expert Systems with Applications, 170, Article 114525. https://doi.org/10.1

Initialization is the first and a major step in the implementation of evolutionary algorithms (EAs). Although there are many common general methods to initialize EAs such as the pseudo-random number generator (PRNG), there is no single method that ca... Read More about Stratified Opposition-Based Initialization for Variable-Length Chromosome Shortest Path Problem Evolutionary Algorithms.

PoNW: A Secure and Scalable Proof-of-Notarized-Work Based Consensus Mechanism (2020)
Presentation / Conference Contribution
Abubakar, M., Jaroucheh, Z., Al-Dubai, A., & Buchanan, W. (2020). PoNW: A Secure and Scalable Proof-of-Notarized-Work Based Consensus Mechanism. In ICVISP 2020: Proceedings of the 2020 4th International Conference on Vision, Image and Signal Processing.

The original consensus algorithm-Proof of Work (PoW) has been widely utilized in the blockchain systems and is been adopted by many cryptocurrencies, such as Bitcoin and Ethereum, among many others. Nevertheless, the concept has received criticisms o... Read More about PoNW: A Secure and Scalable Proof-of-Notarized-Work Based Consensus Mechanism.

Recent Advances and Trends in Lightweight Cryptography for IoT Security (2020)
Presentation / Conference Contribution
Gunathilake, N. A., Al-Dubai, A., & Buchanan, W. J. (2020, November). Recent Advances and Trends in Lightweight Cryptography for IoT Security. Presented at 2020 16th International Conference on Network and Service Management (CNSM), Izmir, Turkey

Lightweight cryptography is a novel diversion from conventional cryptography to minimise its high level of resource requirements, thus it would impeccably fit in the internet-of-things (IoT) environment. The IoT platform is constrained in terms of ph... Read More about Recent Advances and Trends in Lightweight Cryptography for IoT Security.

A New Mobility Aware Duty Cycling and Dynamic Preambling Algorithm for Wireless Sensor Network (2020)
Presentation / Conference Contribution
Thomson, C., Wadhaj, I., Al-Dubai, A., & Tan, Z. (2020, April). A New Mobility Aware Duty Cycling and Dynamic Preambling Algorithm for Wireless Sensor Network. Presented at IEEE 6th World Forum on Internet of Things, New Orleans, Louisiana, USA

The issue of energy holes, or hotspots, in wireless sensor networks is well referenced. As is the proposed mobilisa-tion of the sink node in order to combat this. However, as the sink node shall still pass some nodes more closely and frequently than... Read More about A New Mobility Aware Duty Cycling and Dynamic Preambling Algorithm for Wireless Sensor Network.

Novel Architecture and Heuristic Algorithms for Software-Defined Wireless Sensor Networks (2020)
Journal Article
Hawbani, A., Wang, X., Zhao, L., Al-Dubai, A., Min, G., & Busaileh, O. (2020). Novel Architecture and Heuristic Algorithms for Software-Defined Wireless Sensor Networks. IEEE/ACM Transactions on Networking, 28(6), 2809-2822. https://doi.org/10.1109/TNET.2

This article extends the promising software-defined networking technology to wireless sensor networks to achieve two goals: 1) reducing the information exchange between the control and data planes, and 2) counterbalancing between the sender's waiting... Read More about Novel Architecture and Heuristic Algorithms for Software-Defined Wireless Sensor Networks.

Machine Learning-driven Optimization for Intrusion Detection in Smart Vehicular Networks (2020)
Journal Article
Alsarhan, A., Al-Ghuwairi, A., Almalkaw, I., Alauthman, M., & Al-Dubai, A. (2021). Machine Learning-driven Optimization for Intrusion Detection in Smart Vehicular Networks. Wireless Personal Communications, 117, 3129-3152 (2021). https://doi.org/10.1007/s

An essential element in the smart city vision is providing safe and secure journeys via intelligent vehicles and smart roads. Vehicular ad hoc networks (VANETs) have played a significant role in enhancing road safety where vehicles can share road inf... Read More about Machine Learning-driven Optimization for Intrusion Detection in Smart Vehicular Networks.

Tuft: Tree Based Heuristic Data Dissemination for Mobile Sink Wireless Sensor Networks (2020)
Journal Article
Busaileh, O., Hawbani, A., Xingfu, W., Liu, P., Zhao, L., & Al-Dubai, A. (2022). Tuft: Tree Based Heuristic Data Dissemination for Mobile Sink Wireless Sensor Networks. IEEE Transactions on Mobile Computing, 21(4), 1520-1536. https://doi.org/10.1109/TMC.2

Wireless sensor networks (WSNs) with a static sink suffer from concentrated data traffic in the vicinity of the sink, which increases the burden on the nodes surrounding the sink, and impels them to deplete their batteries faster than other nodes in... Read More about Tuft: Tree Based Heuristic Data Dissemination for Mobile Sink Wireless Sensor Networks.

A Novel Generation-Adversarial-Network-Based Vehicle Trajectory Prediction Method for Intelligent Vehicular Networks (2020)
Journal Article
Zhao, L., Liu, Y., Al-Dubai, A. Y., Zomaya, A. Y., Min, G., & Hawbani, A. (2021). A Novel Generation-Adversarial-Network-Based Vehicle Trajectory Prediction Method for Intelligent Vehicular Networks. IEEE Internet of Things Journal, 8(3), 2066-2077. https

Prediction of the future location of vehicles and other mobile targets is instrumental in intelligent transportation system applications. In fact, networking schemes and protocols based on machine learning can benefit from the results of such accurat... Read More about A Novel Generation-Adversarial-Network-Based Vehicle Trajectory Prediction Method for Intelligent Vehicular Networks.

Evaluation of Ensemble Learning for Android Malware Family Identification (2020)
Journal Article
Wylie, J., Tan, Z., Al-Dubai, A., & Wang, J. (2020). Evaluation of Ensemble Learning for Android Malware Family Identification. Journal of Guangzhou University (Natural Science Edition), 19(4), 28-41

Every Android malware sample generally belongs to a specific family that performs a similar set of actions and characteristics. Having the ability to effectively identify Android malware families can assist in addressing the damage caused by malware.... Read More about Evaluation of Ensemble Learning for Android Malware Family Identification.

Lightweight edge authentication for software defined networks (2020)
Journal Article
Almaini, A., Al-Dubai, A., Romdhani, I., Schramm, M., & Alsarhan, A. (2021). Lightweight edge authentication for software defined networks. Computing, 103, https://doi.org/10.1007/s00607-020-00835-4

OpenFlow is considered as the most known protocol for Software Defined Networking (SDN). The main drawback of OpenFlow is the lack of support of new header definitions, which is required by network operators to apply new packet encapsulations. While... Read More about Lightweight edge authentication for software defined networks.

An Ontological Model for Courses and Academic Profiles Representation: A case study of King Abdulaziz University (2020)
Presentation / Conference Contribution
Ashour, G., Al-Dubai, A., Romdhani, I., & Aljohani, N. (2020). An Ontological Model for Courses and Academic Profiles Representation: A case study of King Abdulaziz University. In 2020 International Conference Engineering Technologies and Computer Scienc

Educational data is growing continuously. This huge amount of data that is scattered and come from different resources with different formats usually is noisy, duplicated, inconsistent, and unorganized. These data can be more efficient and usable whe... Read More about An Ontological Model for Courses and Academic Profiles Representation: A case study of King Abdulaziz University.

A Novel Multimodal Collaborative Drone-Assisted VANET Networking Model (2020)
Journal Article
Lin, N., Fu, L., Zhao, L., Min, G., Al-Dubai, A., & Gacanin, H. (2020). A Novel Multimodal Collaborative Drone-Assisted VANET Networking Model. IEEE Transactions on Wireless Communications, 19(7), 4919-4933. https://doi.org/10.1109/TWC.2020.2988363

Drones can be used in many assistance roles in complex communication situations and play key roles as aerial wireless relays to help terrestrial network communications. Although a great deal of emphasis has been placed on the drone-assisted networks,... Read More about A Novel Multimodal Collaborative Drone-Assisted VANET Networking Model.

Routing Schemes in Software-Defined Vehicular Networks: Design, Open Issues and Challenges (2020)
Journal Article
Zhao, L., Al-Dubai, A., Zomaya, A. Y., Min, G., Hawbani, A., & Li, J. (2021). Routing Schemes in Software-Defined Vehicular Networks: Design, Open Issues and Challenges. IEEE Intelligent Transportation Systems Magazine, 13(4), 217-226. https://doi.org/10.

Software-defined vehicular networks (SDVN) is a promising technology to overcome the limitations of current vehicular networking. However, existing vehicular routing schemes are not equipped to handle communication in SDVNs. In addition, routing sche... Read More about Routing Schemes in Software-Defined Vehicular Networks: Design, Open Issues and Challenges.

Mitigation Mechanisms Against the DAO Attack on the Routing Protocol for Low Power and Lossy Networks (RPL) (2020)
Journal Article
Wadhaj, I., Ghaleb, B., Thomson, C., Al-Dubai, A., & Buchanen, B. (2020). Mitigation Mechanisms Against the DAO Attack on the Routing Protocol for Low Power and Lossy Networks (RPL). IEEE Access, 8, 43665-43675. https://doi.org/10.1109/ACCESS.2020.2977476

Destination Advertisement Objects (DAOs) are sent upward by RPL nodes toward the DODAG root, to build the downward routing paths carrying traffic from the root to its associated nodes. This routing mechanism can be exploited by a malicious node perio... Read More about Mitigation Mechanisms Against the DAO Attack on the Routing Protocol for Low Power and Lossy Networks (RPL).

Impact of Relay Location of STANC Bi-Directional Transmission for Future Autonomous Internet of Things Applications (2020)
Journal Article
Tanoli, S. A. K., Shah, S. A., Khan, M. B., Nawaz, F., Hussain, A., Al-Dubai, A. Y., Khan, I., Shah, S. Y., & Alsarhan, A. (2020). Impact of Relay Location of STANC Bi-Directional Transmission for Future Autonomous Internet of Things Applications. IEEE Ac

Wireless communication using existing coding models poses several challenges for RF signals due to multipath scattering, rapid fluctuations in signal strength and path loss effect. Unlike existing works, this study presents a novel cod... Read More about Impact of Relay Location of STANC Bi-Directional Transmission for Future Autonomous Internet of Things Applications.

Delegation of Authentication to the Data Plane in Software-Defined Networks (2020)
Presentation / Conference Contribution
Almaini, A., Al-Dubai, A., Romdhani, I., & Schramm, M. (2019, October). Delegation of Authentication to the Data Plane in Software-Defined Networks. Presented at 2019 IEEE International Conferences on Ubiquitous Computing & Communications (IUCC) and Data

OpenFlow is considered as the most known protocol for Software Defined Networking (SDN). The main drawback of OpenFlow is the lack of support of new header definitions, which is required by network operators to apply new packet encapsulations. While... Read More about Delegation of Authentication to the Data Plane in Software-Defined Networks.