Abdelmajid Khelil

Abdelmajid Khelil
Hochschule Landshut · Computer Science

Professor

About

44
Publications
10,039
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
670
Citations

Publications

Publications (44)
Article
Recently, Technology Transfer plays a crucial role in transferring knowledge and technologies from academia to the industry and society through a centralized web repository. However, due to the large volume of the data transfer and lack of quality and inconsistency, the search engine may not easily be able to understand the user’s interests that le...
Conference Paper
Full-text available
Bandwidth is a valuable and scarce resource in mobile networks. Therefore, bandwidth reservation may become necessary to support time-sensitive and safety-critical networked vehicular applications such as autonomous driving. Such applications require individual and deterministic approaches for reservations. This is challenging as vehicles usually h...
Chapter
Full-text available
The digitalisation or virtualisation of lab equipment in higher education promises numerous benefits for all those involved. Economic benefits from sharing lab infrastructures, convenient remote access to labs anytime and anywhere, as well as the sharing and linking of lab-based lectures are just some of the advantages that come to mind when thinki...
Chapter
This paper addresses the bandwidth slicing for different types of connected vehicle applications with diverse demands in heterogeneous networks. We develop a joint network and device levels slicing scheme based on bandwidth reservation and allocation optimization. The scheme enables vehicles to reserve bandwidth in advance for their critical applic...
Conference Paper
Full-text available
This paper addresses the bandwidth slicing for different types of connected vehicle applications with diverse demands in heterogeneous networks. We develop a joint network and device levels slicing scheme based on bandwidth reservation and allocation optimization. The scheme enables vehicles to reserve bandwidth in advance for their critical applic...
Conference Paper
The steady progression of the digital transformation within all business sectors and society thrive the importance of Cyber-Physical Systems (CPSs), whereas their areas of application grow and expand to an unmanageable amount. Since the model-based engineering concept has been used for an integral part of CPSs, i.e., embedded devices, these methodo...
Conference Paper
With the emergence of highly automated and autonomous connected vehicles, rigorous requirements in terms of responsiveness, security and scalability become necessary to enable new services that improve efficiency and safety on the road. In future networks, vehicles need to frequently perform handover procedures while crossing various dense heteroge...
Article
Full-text available
Crowdsourcing offers great opportunities to recognise user context and prescribe relevant services for both offline and real-time activities. In this work, we present a zoning model that leverages spatio-temporal dimensions and then employs different contexts to recommend necessary customised services. The context model takes into consideration thr...
Article
Full-text available
In the Internet of things, a large number of objects can be embedded over a region of interest where almost every device is connected to the Internet. This work scrutinizes the broadcast overhead problem in an Internet of things network, containing a very large number of objects. The work proposes a probabilistic structure (bloom filter)-based tech...
Article
Full-text available
Today, the Internet of Things (IoT) comprises vertically oriented platforms for things. Developers who want to use them need to negotiate access individually and adapt to the platform-specific API and information models. Having to perform these actions for each platform often outweighs the possible gains from adapting applications to multiple platf...
Article
A key task in Wireless Sensor Networks (WSNs) is to deliver specific information about a spatial phenomenon of interest. However, in WSNs the operating conditions and/or user requirements are often desired to be evolvable, whether driven by changes of the monitored parameters or WSN properties. To this end, few sensor nodes sample the phenomenon an...
Article
The presence medicine usually leads to explosive costs for a full medical coverage in particular for rural areas, frequent nomadic patients and mass casualty incidents. Therefore, advanced tele-medicine such as mobile health (m-Health) is gaining at importance. Body Sensor Networks (BSN) represent a fundamental tool to enable future tele-medicine....
Article
Full-text available
The reliable delivery of data is important in designing Wireless Body Area Networks (WBANs) employed for critical applications such as e-health. In order to communicate the data reliably from the sensors to the base station, the data transmission technique (star or multi-hop) and the transmission power plays a very important role. As transmission p...
Conference Paper
Full-text available
We propose a context aware framework that offers a set of cloud-based services to support a very large Hajj and Umrah crowd by capturing their contexts using smartphones. The proposed framework captures the individual's context, provides a set of adapted services, and allows being in touch with a subset of one's community of interest. We leverage t...
Conference Paper
Full-text available
We propose a context aware framework that offers a set of cloud-based services to support a very large Hajj and Umrah crowd by capturing their contexts using smartphones. The proposed framework captures the individual's context, provides a set of adapted services, and allows being in touch with a subset of one's community of interest. We leverage t...
Conference Paper
Full-text available
We propose a context aware framework that offers a set of cloud-based services to support a very large Hajj and Umrah crowd by capturing their contexts using smartphones. The proposed framework captures the individual's context, provides a set of adapted services, and allows being in touch with a subset of one's community of interest. We leverage t...
Article
Multiple applications in wireless sensor networks (WSN) require node-level accuracy. One popular example of these applications is the map-based visualization of live spatial sensor data. The specific WSN properties such as energy imply that the data collection and/or the in-network map construction should carefully address the tradeoff between ener...
Conference Paper
In this paper, we explore recent Device-to-Device (D2D) research efforts and review their suitability to safety-critical Internet of Vehicles (IoV) applications, such as cooperative or autonomous driving. Typical to the IoV environment is the high node mobility along with strict Quality of Service (QoS) requirements, especially in terms of delay an...
Book
This book is the second volume on Cooperative Robots and Sensor Networks. The primary objective of this book is to provide an up-to-date reference for cutting-edge studies and research trends related to mobile robots and wireless sensor networks, and in particular for the coupling between them. Indeed, mobile robots and wireless sensor networks hav...
Book
Mobile robots and Wireless Sensor Networks (WSNs) have enabled great potentials and a large space for ubiquitous and pervasive applications. Robotics and WSNs have mostly been considered as separate research fields and little work has investigated the marriage between these two technologies. However, these two technologies share several features, e...
Article
Full-text available
Mobile environments increasingly require distributed atomic transactions to support the growing diversity of financial, gaming, social networking and many other applications. The underlying mobile infrastructure is correspondingly evolving with increasingly diverse wired and wireless elements and also with increasing exposure to a variety of operat...
Conference Paper
Full-text available
Data collection is a key ingredient for a plethora of distributed systems. Strict responsiveness, i.e., the reliable and timely data delivery is a mandatory requirement for critical applications. For a widened application focus towards large scale critical applications in heterogeneous operational environments, data dissemination infrastructures ar...
Conference Paper
Full-text available
A key task in wireless sensor networks is to deliver information from sensor nodes to the sink. Many applications require the delivery to be reliable and timely. However, increasing reliability/timeliness comes at the cost of higher energy consumption as in both cases additional messages have to be sent: Retransmissions to increase reliability and...
Conference Paper
Full-text available
A key task in Wireless Sensor Networks (WSNs) is to deliver specific information about a spatial phenomenon of interest. To this end, a few Sensor Nodes (SNs) sample the phenomenon and transmit the acquired samples, typically multihop, to the application through a gateway called sink. Many applications require the spatial sampling to be accurate an...
Conference Paper
A key task in Wireless Sensor Networks (WSNs) is to deliver specific information about a spatial phenomenon of interest. To this end, a few Sensor Nodes (SNs) sample the phenomenon and transmit the acquired samples, typically multihop, to the application through a gateway called sink. Many applications require the spatial sampling to be accurate an...
Conference Paper
Full-text available
Peer-to-Peer (P2P) protocols are susceptible to Localized Eclipse Attacks (LEA), i.e., attacks where a victim peer's environment is masked by malicious peers which are then able to instigate progressively insidious security attacks. To obtain effective placement of malicious peers, LEAs significantly benefit from overlay topology-awareness. Hence,...
Article
Wireless sensor networks (WSNs) constitute the transportation conduit for the results of the in-network processing of the raw data. In WSNs the sensor node and communication level perturbations are often the norm than the exception due to varied environmental conditions. Consequently, the diverse applications supported by WSNs stipulate their indiv...
Article
For rescue and surveillance scenarios, the Mixed-Mode Environments (MMEs) for data acquisition, processing, and dissemination have been proposed. Evaluation of the algorithms and protocols developed for such environments before deployment is vital. However, there is a lack of realistic testbeds for MMEs due to reasons such as high costs for their s...

Network

Cited By