Skip to main content

Research Repository

Advanced Search

Prof Ahmed Al-Dubai's Outputs (213)

Arabic Cyberbullying Detection: A Comprehensive Review of Datasets and Methodologies (2025)
Journal Article
Aljalaoud, H., Dashtipour, K., & AI_Dubai, A. (2025). Arabic Cyberbullying Detection: A Comprehensive Review of Datasets and Methodologies. IEEE Access, 13, 69021-69038. https://doi.org/10.1109/access.2025.3561132

The freedom of speech in online spaces has substantially promoted engagement on social media platforms, where cyberbullying has emerged as a significant consequence. While extensive research has been conducted on cyberbullying detection in English, e... Read More about Arabic Cyberbullying Detection: A Comprehensive Review of Datasets and Methodologies.

Arabic Short-text Dataset for Sentiment Analysis of Tourism and Leisure Events (2025)
Journal Article
Basabain, S., Al‐Dubai, A., Cambria, E., Alomar, K., & Hussain, A. (2025). Arabic Short-text Dataset for Sentiment Analysis of Tourism and Leisure Events. Expert Systems, 42(5), Article e70030. https://doi.org/10.1111/exsy.70030

The focus of this study is to present the detailed process of collecting a dataset of Arabic short-text in the tourism context and annotating this dataset for the task of sentiment analysis using an automatic zero-shot labelling technique utilising t... Read More about Arabic Short-text Dataset for Sentiment Analysis of Tourism and Leisure Events.

Wireless Rechargeable Sensor Networks: Energy Provisioning Technologies, Charging Scheduling Schemes, and Challenges (2025)
Journal Article
Abdel Aziz, S., Wang, X., Hawbani, A., Qureshi, . B., Alsamhi, S. H., Alabsi, A., Zhao, L., Al-Dubai, A., & Ismail, . A. (online). Wireless Rechargeable Sensor Networks: Energy Provisioning Technologies, Charging Scheduling Schemes, and Challenges. IEEE Transactions on Sustainable Computing, https://doi.org/10.1109/TSUSC.2025.3549414

Recently, a plethora of promising green energy provisioning technologies has been discussed in the orientation of prolonging the lifetime of energy-limited devices (e.g., sensor nodes). Wireless rechargeable sensor networks (WRSNs) have emerged among... Read More about Wireless Rechargeable Sensor Networks: Energy Provisioning Technologies, Charging Scheduling Schemes, and Challenges.

Accurate AI-Driven Emergency Vehicle Location Tracking in Healthcare ITS’s Digital Twin (2025)
Presentation / Conference Contribution
Al-Shareeda, S., Celik, Y., Bilgili, B., Al-Dubai, A., & Canberk, B. (2025, February). Accurate AI-Driven Emergency Vehicle Location Tracking in Healthcare ITS’s Digital Twin. Presented at 2025 5th IEEE Middle East and North Africa Communications Conference (MENACOMM), Byblos, Lebanon

Creating a Digital Twin (DT) for Healthcare Intelligent Transportation Systems (HITS) is a hot research trend focusing on enhancing HITS management, particularly in emergencies where ambulance vehicles must arrive at the crash scene on time, and trac... Read More about Accurate AI-Driven Emergency Vehicle Location Tracking in Healthcare ITS’s Digital Twin.

IoT Authentication Protocols: Challenges, and Comparative Analysis (2025)
Journal Article
Alsheavi, A., Hawbani, A., Othman, W., Wang, X., Qaid, G. R. S., Zhao, L., Al-Dubai, A., Liu, Z., Ismail, A., Haveri, R. H., Alsamhi, S. H., & Al-Qaness, M. A. A. (2025). IoT Authentication Protocols: Challenges, and Comparative Analysis. ACM computing surveys, 57(5), Article 116. https://doi.org/10.1145/3703444

In the ever-evolving information technology landscape, the Internet of Things (IoT) is a groundbreaking concept that bridges the physical and digital worlds. It is the backbone of an increasingly sophisticated interactive environment, yet it is a sub... Read More about IoT Authentication Protocols: Challenges, and Comparative Analysis.

Integrating Reality: A Hybrid SDN Testbed for Enhanced Realism in Edge Computing Simulations (2024)
Presentation / Conference Contribution
Almaini, A., Koßmann, T., Folz, J., Schramm, M., Heigl, M., & Al-Dubai, A. (2024, June). Integrating Reality: A Hybrid SDN Testbed for Enhanced Realism in Edge Computing Simulations. Presented at UNet24: The International Conference on Ubiquitous Networking, Marrakesh, Morocco

Recent advancements in Software-Defined Networking (SDN) have facilitated its deployment across diverse network types, including edge networks. Given the broad applicability of SDN and the complexity of large-scale environments, establishing a compre... Read More about Integrating Reality: A Hybrid SDN Testbed for Enhanced Realism in Edge Computing Simulations.

A Novel Cosine-Modulated-Polynomial Chaotic Map to Strengthen Image Encryption Algorithms in IoT Environments (2024)
Presentation / Conference Contribution
Khan, M. S., Ahmad, J., Al-Dubai, A., Pitropakis, N., Driss, M., & Buchanan, W. J. (2024, September). A Novel Cosine-Modulated-Polynomial Chaotic Map to Strengthen Image Encryption Algorithms in IoT Environments. Presented at 28th International Conference on Knowledge Based and Intelligent information and Engineering Systems (KES 2024), Spain

With the widespread use of the Internet of Things (IoT), securing the storage and transmission of multimedia content across IoT devices is a critical concern. Chaos-based Pseudo-Random Number Generators (PRNGs) play an essential role in enhancing the... Read More about A Novel Cosine-Modulated-Polynomial Chaotic Map to Strengthen Image Encryption Algorithms in IoT Environments.

An Enhanced and Robust Data Publishing Scheme for Private and Useful 1:M Microdata (2024)
Journal Article
Rizwan, M., Hawbani, A., Xingfu, W., Anjum, A., Angin, P., Sever, Y., Chen, S., Zhao, L., & Al-Dubai, A. (online). An Enhanced and Robust Data Publishing Scheme for Private and Useful 1:M Microdata. IEEE Transactions on Big Data, https://doi.org/10.1109/TBDATA.2024.3495497

A data publishing deal conducted with anonymous microdata can preserve the privacy of people. However, anonymizing data with multiple records of an individual (1:M dataset) is still a challenging problem. After anonymizing the 1:M microdata, the vert... Read More about An Enhanced and Robust Data Publishing Scheme for Private and Useful 1:M Microdata.

CAST: Efficient Traffic Scenario Inpainting in Cellular Vehicle-to-Everything Systems (2024)
Journal Article
Zhao, L., Mao, C., Wan, S., Hawbani, A., Al-Dubai, A. Y., Min, G., & Zomaya, A. Y. (2025). CAST: Efficient Traffic Scenario Inpainting in Cellular Vehicle-to-Everything Systems. IEEE Transactions on Mobile Computing, 24(3), 2331-2345. https://doi.org/10.1109/tmc.2024.3492148

As a promising vehicular communication technology, Cellular Vehicle-to-Everything (C-V2X) is expected to ensure the safety and convenience of Intelligent Transportation Systems (ITS) by providing global road information. However, it is difficult to o... Read More about CAST: Efficient Traffic Scenario Inpainting in Cellular Vehicle-to-Everything Systems.

Stretchable electrospun PVDF/TPU nanofibers membranes: Acoustic signals detectors (2024)
Journal Article
Nair, R., El-kadery, A., Khalil, A. M., El-kaliuoby, M. I., Kandas, I., Jain, A., Omran, N., Gamal, M., Noman, S., Magdy, G., Maree, K., El-Khatib, A. M., Hassanin, A. H., Shyha, I., Jaradat, S., Al-Dubai, A., Trabelsi, M., Al Othman, B., & Shehata, N. (2024). Stretchable electrospun PVDF/TPU nanofibers membranes: Acoustic signals detectors. MRS Energy and Sustainability, 11, 659–668. https://doi.org/10.1557/s43581-024-00111-4

Devices that harvest energy are crucial for reducing reliance on energy transmission and distribution systems. This helps minimize energy loss and mitigate environmental impacts. In this study, we focused on manufacturing nanocomposites using various... Read More about Stretchable electrospun PVDF/TPU nanofibers membranes: Acoustic signals detectors.

Novel Lagrange Multipliers-Driven Adaptive Offloading for Vehicular Edge Computing (2024)
Journal Article
Zhao, L., Li, T., Meng, G., Hawbani, A., Min, G., Al-Dubai, A., & Zomaya, A. (2024). Novel Lagrange Multipliers-Driven Adaptive Offloading for Vehicular Edge Computing. IEEE Transactions on Computers, 73(12), 2868-2881. https://doi.org/10.1109/TC.2024.3457729

Vehicular Edge Computing (VEC) is a transportation-specific version of Mobile Edge Computing (MEC) designed for vehicular scenarios. Task offloading allows vehicles to send computational tasks to nearby Roadside Units (RSUs) in order to reduce the co... Read More about Novel Lagrange Multipliers-Driven Adaptive Offloading for Vehicular Edge Computing.

Context-Aware Audio-Visual Speech Enhancement Based on Neuro-Fuzzy Modelling and User Preference Learning (2024)
Journal Article
Chen, S., Kirton-Wingate, J., Doctor, F., Arshad, U., Dashtipour, K., Gogate, M., Halim, Z., Al-Dubai, A., Arslan, T., & Hussain, A. (2024). Context-Aware Audio-Visual Speech Enhancement Based on Neuro-Fuzzy Modelling and User Preference Learning. IEEE Transactions on Fuzzy Systems, 32(10), 5400-5412. https://doi.org/10.1109/tfuzz.2024.3435050

It is estimated that by 2050 approximately one in ten individuals globally will experience disabling hearing impairment. In the presence of everyday reverberant noise, a substantial proportion of individual users encounter challenges in speech compre... Read More about Context-Aware Audio-Visual Speech Enhancement Based on Neuro-Fuzzy Modelling and User Preference Learning.

VisCrypt: Image Encryption Featuring Novel Chaotic Key Generation and Block Permutation Techniques with Visual Cryptography (2024)
Presentation / Conference Contribution
Khan, M. S., Ahmad, J., Ali, M., Al Dubai, A., Pitropakis, N., & Buchanan, W. J. (2024, July). VisCrypt: Image Encryption Featuring Novel Chaotic Key Generation and Block Permutation Techniques with Visual Cryptography. Presented at 2024 IEEE 7th International Conference on Advanced Technologies, Signal and Image Processing (ATSIP), Sousse, Tunisia

In this digital era, ensuring the security of data transmission is critically important. Digital data, especially image data, needs to be secured against unauthorized access. In this regards, this paper presents a robust image encryption scheme named... Read More about VisCrypt: Image Encryption Featuring Novel Chaotic Key Generation and Block Permutation Techniques with Visual Cryptography.

User Preferences-Based Proactive Content Caching with Characteristics Differentiation in HetNets (2024)
Journal Article
Lin, N., Wang, Y., Zhang, E., Wan, S., Al-Dubai, A., & Zhao, L. (2025). User Preferences-Based Proactive Content Caching with Characteristics Differentiation in HetNets. IEEE Transactions on Sustainable Computing, 10(2), 333-344. https://doi.org/10.1109/TSUSC.2024.3441606

With the proliferation of mobile applications, the explosion of mobile data traffic imposes a significant burden on backhaul links with limited capacity in heterogeneous cellular networks (HetNets). To alleviate this challenge, content caching based... Read More about User Preferences-Based Proactive Content Caching with Characteristics Differentiation in HetNets.

ML-Driven Attack Detection in RPL Networks: Exploring Attacker Position's Significance (2024)
Presentation / Conference Contribution
Ghaleb, B., Al-Dubai, A., Romdhani, I., Ahmad, J., Aldhaheri, T., & Kulkarni, S. (2024, January). ML-Driven Attack Detection in RPL Networks: Exploring Attacker Position's Significance. Presented at 2024 International Conference on Information Networking (ICOIN), Ho Chi Minh City, Vietnam

The Routing Protocol for Low Power and Lossy Networks (RPL) plays a pivotal role in IoT communication, employing a rank-based topology to guide routing decisions. However, RPL is vulnerable to Decreased Rank Attacks, where malicious nodes illegitimat... Read More about ML-Driven Attack Detection in RPL Networks: Exploring Attacker Position's Significance.

A Novel Autonomous Adaptive Frame Size for Time-Slotted LoRa MAC Protocol (2024)
Journal Article
Alahmadi, H., Bouabdallah, F., Al-Dubai, A., & Ghaleb, B. (2024). A Novel Autonomous Adaptive Frame Size for Time-Slotted LoRa MAC Protocol. IEEE Transactions on Industrial Informatics, 20(10), 12284-12293. https://doi.org/10.1109/tii.2024.3417308

LoRa networks represent a promising technology for IoT applications due to their long range, low cost, and energy efficiency. However, their ALOHA-based access method and duty cycle restrictions can limit their scalability and reliability in high-den... Read More about A Novel Autonomous Adaptive Frame Size for Time-Slotted LoRa MAC Protocol.

Chaotic Quantum Encryption to Secure Image Data in Post Quantum Consumer Technology (2024)
Journal Article
Khan, M. S., Ahmad, J., Al-Dubai, A., Pitropakis, N., Ghaleb, B., Ullah, A., Khan, M. A., & Buchanan, W. J. (2024). Chaotic Quantum Encryption to Secure Image Data in Post Quantum Consumer Technology. IEEE Transactions on Consumer Electronics, 70(4), 7087 - 7101. https://doi.org/10.1109/tce.2024.3415411

The rapid advancement in consumer technology has led to an exponential increase in the connected devices, resulting in an enormous and continuous flow of data, particularly the image data. This data needs to be processed, managed, and secured efficie... Read More about Chaotic Quantum Encryption to Secure Image Data in Post Quantum Consumer Technology.

AI-enabled data management for digital twin networks (2024)
Book Chapter
Ak, E., Yurdakul, G., Al-Dubai, A., & Canberk, B. (2024). AI-enabled data management for digital twin networks. In H. Ahmadi, T. Q. Duong, A. Nag, V. Sharma, B. Canberk, & O. A. Dobre (Eds.), . Institution of Engineering and Technology (IET). https://doi.org/10.1049/pbte109e_ch3

As we have discussed in previous chapters, digital twins establish contextual relationships with the surrounding entities, providing a holistic view of interconnected systems and environments. With the growing complexity and abundance of data generat... Read More about AI-enabled data management for digital twin networks.

Overtaking Feasibility Prediction for Mixed Connected and Connectionless Vehicles (2024)
Journal Article
Zhao, L., Qian, H., Hawbani, A., Al-Dubai, A. Y., Tan, Z., Yu, K., & Zomaya, A. Y. (2024). Overtaking Feasibility Prediction for Mixed Connected and Connectionless Vehicles. IEEE Transactions on Intelligent Transportation Systems, 25(10), 15065-15080. https://doi.org/10.1109/TITS.2024.3398602

Intelligent transportation systems (ITS) utilize advanced technologies to enhance traffic safety and efficiency, contributing significantly to modern transportation. The integration of Vehicle-to-Everything (V2X) further elevates road safety and fost... Read More about Overtaking Feasibility Prediction for Mixed Connected and Connectionless Vehicles.