Ali Al-Sherbaz

Ali Al-Sherbaz
University of Gloucestershire · School of Computing and Technology

PhD in Wireless Technologies

About

75
Publications
31,260
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
349
Citations
Additional affiliations
August 2006 - September 2011
The University of Buckingham
Position
  • Lecturer

Publications

Publications (75)
Article
Full-text available
Recently, video streaming services consumption has grown massively and is foreseen to increase even more in the future. The tremendous traffic usage has negatively impacted the network’s quality of service due to network congestion and end-to-end customers’ satisfaction represented by the quality of experience, especially during evening peak hours....
Conference Paper
Full-text available
After successful research into the use of blockchain technology outside of financial matters, healthcare researchers have gained wide interest in using this technology for security purposes. Although research in this area is fairly recent, it is growing rapidly which leads to the introduction of many survey studies that deal with this context. Howe...
Article
Full-text available
In-network softwarization, Network Slicing provides scalability and flexibility through various services such as Quality of Service (QoS) and Quality of Experience (QoE) to cover the network demands. For the QoS, a set of policies must be considered in real-time, accompanied by a group of functions and services to guarantee the end-user needs based...
Article
Full-text available
Recent years have witnessed a widespread interest in healthcare issues and the search for faster and safer service for patients. Electronic health record was established to provide advanced health services. Researchers seek to provide permanent and simplified ways to monitor patients remotely using remote patient monitors. One of these methods is t...
Article
Full-text available
Gestures are one of the best ways of communication between dumbs and other people using the expression of signs language. In this paper, we suggest an algorithm for recognizing hand gestures of Arabic words (اتمنى لك حیاة سعیدة-اقتباس) to by using dumb (through signs) and convert the sings into voice corresponding to sings words. The proposed algor...
Article
Full-text available
While the causes of power system outages are often complex and multi-faceted, an apparent deficit in generation compared to a known demand for electricity could be more alarming. A sudden hike in demand at any given time may ultimately result in the total failure of an electricity network. In this paper, algorithms to efficiently allocate the avail...
Conference Paper
Full-text available
There is no uncertainty that the chroma currency is very popular for the transaction information stored in the block of blocks. To initiate the importance of blocking, there is only one distributed ledger in which data is stored, since many of the centers in the blockchain network limit enough records for these records. This document proposes a dec...
Conference Paper
Full-text available
The demand for online distribution of high quality and high throughput content has led to non-cooperative competition of network resources between a growing number of media applications. This causes a significant impact on network efficiency, the quality of user experience (QoE) as well as a discrepancy of QoE across user devices. Within a multiuse...
Chapter
Providing the position of mobile devices from outdoors into indoors seamlessly is one of the most viable user demands in most location-based-service (LBS) applications. Mobile devices, when outdoors, use global navigation satellite systems (GNSS) information to define their location accurately. However, when indoors or in harsh environments, GNSS s...
Conference Paper
Full-text available
This paper presents a performance evaluation of intercell interference and packets collision in scalable Low Power Wide Area Networks (LPWANs). The collision problem is one of the most critical challenges in LPWANs because it can substantially affect network performance and reliability. The paper also offers a rigorous and flexible mathematical mod...
Article
This paper presents a modified receiver based on the conventional Rake receiver for Ultra-Wide Band (UWB) indoor channels of femtocell systems and aims to propose a new solution to mitigate the multipath phenomenon. Furthermore, this work proposes an upgrade for the conventional Rake receiver to fulfill the needs of 5G wireless systems through a ne...
Chapter
Full-text available
Developers of Software Defined Network (SDN) faces a lack of or difficulty in getting a physical environment to test their inventions and developments that drives them to use a virtual environment for their experiments. This work addresses the differences between the SDN virtual environment and physical SDN switches, which leads to equip a more rea...
Chapter
Full-text available
Web Real-Time Communication (WebRTC) offers peer-to-peer communications without any plug-ins. However, WebRTC cannot provide scalability because of its method that depends on a single server or due to the resource limitations and network topology in the architectural of the WebRTC. This paper aims to design a real environment using MATLAB simulatio...
Chapter
Full-text available
Web Real-Time Communication (WebRTC) has been interested in many developers for video conferencing. The major aim is to create a scalable WebRTC signalling mechanism called (WebNSM) for bi-directional video conferencing via Ethernet of LAN and WAN networks. WebNSM was designed for many users over star topology (one-to-many) using Socket.io (API) me...
Chapter
Due to the dramatic increase in population and the rapid developments of the automobile industry, tremendous issues have emerged in road traffic systems, such as traffic congestion. In some big cities, traffic congestion occurs due to several factors, such as roadworks, car accidents, and drivers’ behaviour. Consequently, it negatively impacts on e...
Conference Paper
A novel physical layer (PHY) transmission technique for increasing the channel capacity of single carrier transmission, termed as Orthogonal Generalized Frequency Division Multiplexing (OGFDM), has been proposed, investigated and evaluated in this paper. A combination of the Digital Hilbert Filter (DHF) with Generalized Frequency Division Multiplex...
Chapter
Full-text available
Lameness is a vital welfare issue in most sheep farming countries, including the UK. The pre-detection at the farm level could prevent the disease from becoming chronic. The development of wearable sensor technologies enables the idea of remotely monitoring the changes in animal movements which relate to lameness. In this study, 3D-acceleration, 3D...
Conference Paper
Full-text available
Nowadays, road congestion issue is considered one of the most serious problems facing road users in various cities of the world. Therefore, tremendous research has been done in this field. Road information could significantly help to estimate congestion level on streets, leading to reduce traffic jams and decrease journey time, fuel consumption and...
Poster
Full-text available
This poster is presented in STEM for Britain 2018. 180 posters were shortlisted out of 600 to present their work at House of Commons at the UK Parliament in STEM for Britain 2018 poster competition.
Article
Full-text available
WebRTC (Web Real-Time Communication) is a technology that enables browser-to-browser communication. Therefore, a signalling mechanism must be negotiated to create a connection between peers. The main aim of this paper is to create and implement a WebRTC hybrid signalling mechanism named (WebNSM) for video conferencing based on the Socket.io (API) m...
Conference Paper
Full-text available
Web Real-Time Communication (WebRTC) offers peer-to-peer communications without any plug-ins. However, WebRTC cannot provide scalability because of its method that depends on a single server or due to the resource limitations and network topology in the architectural of the WebRTC. This paper aims to design a real environment using MATLAB simulatio...
Conference Paper
Full-text available
Many developers are interested in using Web Real-Time Communication (WebRTC) for video conferencing. But, selecting the appropriate topology in the architectural design of the WebRTC application is considered as one of the most potential issues. This paper aims to create a novel WebRTC signalling mechanism called WebNSM for one-to-many (bi-directio...
Conference Paper
There are different techniques used by Machineto- machine (M2M) communications technologies to mitigate collision problem and data loss. One of these techniques is Frequency Hopping (FH), which is used by Weightless-N technology with a special random channel selection algorithm. In such a system, the probability of a message collision mainly depend...
Article
RESUME La technologie de l'Ultra-Large Bande (ULB) consiste à transmettre des impulsions très fines de l'ordre de nanoseconde, ce qui implique dans le domaine fréquentiel une bande de fréquences très large. Le sujet principal à aborder dans ce travail est de confronter et faire face au phénomène des multi-trajets dans les communications ULB. Pour c...
Article
Full-text available
Modern wireless communication systems suffer from phase shifting and, more importantly, from interference caused by multipath propagation. Multipath propagation results in an antenna receiving two or more copies of the signal sequence sent from the same source but that has been delivered via different paths. Multipath components are treated as redu...
Conference Paper
Full-text available
Lameness is a clinical symptom referring to locomotion changes that widely differ from normal gait or posture [1]. Lameness has a negative impact on both farm productivity and sheep welfare. The annual loss to the British sheep industry, because of the footrot only ;which is one of the common lameness causes, is estimated by £10 for each ewe[2]. S...
Article
In wireless communication, there exists a phenomenon know as `multipath'. This phenomenon is considered as a disadvantage because it causes interference. The multipath phenomenon results in an antenna receiving two or more signals from the same sent signal from different paths. This paper considers them as redundant copies of the transmitted data a...
Conference Paper
In wireless communication, there exists a phenomenon know as ‘multipath’. This phenomenon is considered as a disadvantage because it causes interference. The multipath phenomenon results in an antenna receiving two or more signals from the same sent signal from different paths. This paper considers them as redundant copies of the transmitted data a...
Conference Paper
Full-text available
There has been a strong focus on the evaluation of Quality of Service (QoS) and multimedia transmission over protocols of internet protocol (IP). The main goal of this paper is to evaluate the performance of QoS in real implementation, also a comparison of an appropriate video and voice (CODECS) over IP schemes depending on the SIP and IAX2 protoco...
Presentation
Full-text available
Lameness is a clinical symptom referring to locomotion changes, resulting in impaired and erratic movements that differ widely from normal gait or posture. Lameness has an adverse impact on both sheep welfare and farm economy; therefore, the preclinical detection of lameness will improve both sheep health and, in turn, support farming businesses. A...
Conference Paper
Full-text available
Abstract- Software Defined Network (SDN) provides a new fine-grained interface enables the routing algorithm to have an a global view of the network throughputs, connectivity and flows at the data-path. This paper aims to provide a novel approach for dynamic routing algorithm for Software Defined Network in Wide Area Network (SDN-WAN); based on usi...
Conference Paper
Full-text available
Abstract—Location-based services (LBS) are becoming important services on today’s smartphones (SPs), tablets and wearable devices. Seamless outdoors-indoors navigation, and especially for accurate indoors localization, is the main demand of LBS users. Onboard WiFi, Bluetooth (BT) or inertial sensors technologies have been proven to somewhat provide...
Article
Full-text available
Security research and training is attracting a lot of investment and interest from governments and the private sector. Most efforts have focused on physical security, while cyber security or digital security has been given less importance. With recent high-profile attacks it has become clear that training in cyber security is needed. Serious Games...
Presentation
Full-text available
The Management of Distributed Software Defined Network in Smart cities (Presentation) Ameer Al-Sadi, Ali Al-Sherbaz, James Xue, Scott Turner The University of Northampton School of Science and Technology Department of Computing and Immersive Technologies Keywords: SDN, Software-Defined Network, NFV, Network Function Virtualization. The emergence of...
Conference Paper
Full-text available
It is noticeable that most of VANETs communications tests are assessed through simulation. In a majority of simulation results, the physical layer is often affected by an apparent lack of realism. Therefore, vehicular channel model has become a critical issue in the field of intelligent transport systems (ITS). To overcome the lack of realism probl...
Conference Paper
Full-text available
The future internet will include a cloud of assisted living and smart applications that serve a user by providing a remote communication and management for specific resources. It will contain a numerous number of fixed and movable devices, sensors, and actuators. This requires very fast and dynamic communication, which is performed by a novel parad...
Conference Paper
Full-text available
It is noticeable that most of VANETs communications tests are assessed through simulation. In a majority of simulation results, the physical layer is often affected by an apparent lack of realism. Therefore, vehicular channel model has become a critical issue in the field of intelligent transport systems (ITS). To overcome the lack of realism probl...
Presentation
Full-text available
A brief description of network innovations such as Software Defined Network (SDN) and Network Function Visualization (NFV). How they support each others. How they are different from a current network. What are the new requirements of the future internet? Finally, How they could be used to optimize the management of the future internet.
Poster
Full-text available
A brief description of network innovations such as Software Defined Network (SDN) and Network Function Visualization (NFV). How they support each others. How they are different from a current network. What are the new requirements of the future internet? Finally, How they could be used to optimize the management of the future internet.
Conference Paper
Full-text available
Vehicular ad hoc networks VANETs has recently received significant attention in intelligent transport systems (ITS) research. It provides the driver with information regarding traffic and road conditions which is needed to reduce accidents, which will save many people’s lives. In Vehicle-to-vehicle V2V communication the high-speed mobility of the n...
Chapter
Vehicular ad hoc networks VANETs has recently received significant attention in intelligent transport system (ITS) research. It provides the driver with information regarding traffic and road conditions which is needed to reduce accidents , which will save many people's lives. In Vehicle-to-vehicle V2V communication the high-speed mobility of the n...
Article
Full-text available
The energy inefficiency of electronic devices is the major limiting factor for the adoption of these devices in Machine–to–Machine Communications (M2M)/Internet of Things (IoT). In order to address this, different emerging M2M communications standardisation organisations have proposed perceived energy efficient protocols. The essence of this paper...
Article
Full-text available
The vast growths in mobile and wireless applications would contain lacks of using suitable security concepts during the development process which worries the information security research community. This paper reviews most of the encryption techniques which adopt chaos based cryptography, and illustrates the used of chaos based voice encryption tec...
Article
Full-text available
The IEEE 1609.4 was developed to support multi-channel operation and channel switching procedure in order to provide both safety and non-safety vehicular applications. However, this protocol has some drawback because it does not make efficient usage of channel bandwidth resources for single radio WAVE devices and suffer from high bounded delay and...
Article
Full-text available
The IEEE 1609.4 was developed to support multi-channel operation and channel switching procedure in order to provide both safety and non-safety vehicular applications. However, this protocol has some drawback because it does not make efficient usage of channel bandwidth resources for single radio WAVE devices and suffer from high bounded delay and...
Conference Paper
Full-text available
In the recent year’s vehicular ad hoc networks VANETs has received significant attention in the intelligent transport system research. Vehicle-to-vehicle V2V communication can be considered an important approach to help the drivers to satisfy requirements like less congestion, accident warning, road exploration, etc. The propagation issues such as...
Conference Paper
Full-text available
In the recent year's vehicular ad hoc networks VANETs has received significant attention in the intelligent transport system research. Vehicle-to-vehicle V2V communication can be considered an important approach to help the drivers to satisfy requirements like less congestion, accident warning, road exploration, etc. The propagation issues such as...
Article
Full-text available
Radio frequency identification system technology is employed in this proposed security system in order to create high level of accuracy as possible. Whereas the accuracy is considered as a heart of system because any simple error may lead to breach whole security system. Beside the accuracy we should close all the expected Illegals methods which co...
Patent
Full-text available
The invention proposed in this patent is named Prime-IP. Prime-IP is a novel routing algorithm for Wireless Mesh Networks (WMN). Prime-IP achieves higher Quality of Service than standard WMN implementations because it will always choose the optimum route path between the source node and the destination node. i.e. Prime-IP achieves more reliable r...
Conference Paper
Full-text available
Energy efficiency of machine to machine (M2M) communications terminals is one of the major design goals of M2M networks, resulting from anticipated over 50 billion M2M communications devices to be deployed into the networks by 2020. The stakeholders in the M2M communications have observed that it will be environmental and economic catastrophic to d...
Book
The focus of this book is to investigate solutions that, when implemented in any heterogeneous wireless network, shall enhance the existing standard without impacting the standard or changing the wireless transceiver’s functions. Thus achieving efficient interoperability at much reduced overheads. The techniques proposed in this research are centre...
Conference Paper
Full-text available
Vehicular Ad hoc network (VANET) has recently been attracting the attention of researchers as a new technology in the wireless communication system. Vehicle-to-vehicle V2V communication can be considered an important way to help the drivers to satisfy requirements such as less congestion, accident warning, road exploration, etc. The propagation iss...
Article
There have been many attempts to converge wireless teraservers functionality and implementation at various layers. The approach of this work is to explore the similarities of the OFDM signals, as used in WiMax and WiFi, to converge their baseband implementation at the physical layer. The proposed W2BC solution reduces implementation complexity, siz...
Conference Paper
Full-text available
When disaster strikes, optimal access to real-time information of the disaster situation during ‘blind time’ – the time prior to the arrival of the first responders - and during response and recovery stages is essential to improve the effectiveness of the first responders and recovery. This paper describes a disaster management system, iSurvival, w...
Article
The measurements of physical level parameters can become the area where decisions about cognitive radio will have the most striking effect. Field-programmable gate array (FPGA) enables real-time analyses of physical layer data to satisfy constraints like dynamic spectrum allocations, data throughput, and the coding rate. Cognitive radio will be bas...
Article
Full-text available
Horizontal developments in communication systems have led to the emergence of new wireless technologies like WiMAX, 3G and 4G. These expansions can provide new opportunities for further advances and exciting applications in particular if we can integrate different technology standards into heterogeneous wireless networks. WiMAX and WiFi wireless ne...