E. Yaacoub

E. Yaacoub

PhD in ECE

About

225
Publications
134,223
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,868
Citations
Additional affiliations
November 2014 - February 2016
Strategic Decisions Group (SDG)
Position
  • Consultant
November 2010 - December 2014
Qatar Mobility Innovations Center
Position
  • Research Scientist and Technology Team Lead for the Broadband Wireless Access Group
February 2004 - July 2005
American University of Beirut
Position
  • Research Assistant

Publications

Publications (225)
Conference Paper
According to the Global Organization for Stress, 80 percent of people are stressed at work and according to the American Institute of Stress, stress causes 48 percent of people to have difficulty sleeping. Relaxation reduces stress, depression, and anxiety. Electroencephalography (EEG) is used by scientists to analyze the brainwave signals that exp...
Article
Full-text available
With the proliferation of fifth-generation (5G) mobile communication wireless networks, the investigation into the performance of physical layer secrecy is increasingly becoming the center of attention of recent studies. Physical layer security (PLS) is the pivotal notion of enhancing the secrecy of mobile communication wireless networks against ea...
Article
Full-text available
Background Tele-mentoring during surgery facilitates the transfer of surgical knowledge from a mentor (specialist surgeon) to a mentee (operating surgeon). The aim of this work is to develop a tele-mentoring system tailored for minimally invasive surgery (MIS) where the mentor can remotely demonstrate to the mentee the required motion of the surgic...
Article
Background: Recent tele-mentoring technologies for minimally invasive surgery (MIS) augments the operative field with movements of virtual surgical instruments as visual cues. The objective of this work is to assess different user-interfaces that effectively transfer mentor's hand gestures to the movements of virtual surgical instruments. Methods...
Preprint
Full-text available
p>This paper investigates the synergy between 6G and AI. It argues that they can unlock future horizons, by discussing how they can address future challenges in healthcare, transportation, virtual reality, education, resource management, robotics, in addition to public safety and warfare. However, these great opportunities come also with greater ri...
Chapter
The chapter investigates the scheduling load added on a long-term evolution (LTE) and/or LTE-Advanced (LTEA) network when automatic meter reading (AMR) in advanced metering infrastructures (AMI) is performed using internet of things (IoT) deployments of smart meters in the smart grid. First, radio resource management algorithms to perform dynamic s...
Article
Edge machine learning (Edge ML) is expected to serve as a key enabler for real-time mobile health (mHealth) applications. However, its reliability is governed by the limited energy and computing resources of user equipment (UE), along with the wireless channel variations and dynamic resource allocation at edge servers. In this letter, we incorporat...
Article
Full-text available
Internet of Things (IoT) deployments face significant security challenges due to the limited energy and computational power of IoT devices. These challenges are more serious in the quantum communications era, where certain attackers might have quantum computing capabilities, which renders IoT devices more vulnerable. This paper addresses the proble...
Article
Due to the necessity for using the security to the end-users, the conventional methods for security are not sufficient for the highly equipped attacker and new ways to violate security. Moreover, the quantum age is coming and brings more vulnerability to classical security techniques. On the other hand, Quantum security relies on the natural physic...
Article
Full-text available
Background Tele-mentoring facilitates the transfer of surgical knowledge. The objective of this work is to develop a tele-mentoring framework that enables a specialist surgeon to mentor an operating surgeon by transferring information in a form of surgical instruments’ motion required during a minimally invasive surgery. Method A tele-mentoring fr...
Article
This paper investigates the use of unmanned aerial vehicles (UAVs)/drones for providing high data rates to mobile relays (MRs) placed on top of high speed train wagons, thus introducing the concept of Travel Hopping Enabled Resource Allocation (THEResA). The objective is to provide high data rate connectivity to train passengers in 5G+/6G networks....
Conference Paper
Telemedicine is a technique that allows patients to have health-related consultations without the need to be physically present in the hospital through phone and video calling technologies. In recent years, researchers have made many contributions to reform and facilitate better telemedicine services through the use of body area networks or wireles...
Article
Full-text available
The wide spread of the novel COVID-19 virus all over the world has caused major economical and social damages combined with the death of more than two million people so far around the globe. Therefore, the design of a model that can predict the persons that are most likely to be infected is a necessity to control the spread of this infectious disea...
Article
The open nature of the wireless communication medium renders it vulnerable to jamming attacks by malicious users. To detect their presence and to avoid such attacks, several techniques are present in the literature. Most of these techniques aim to reduce the effect of the jamming signals by increasing the transmission power or by using complex coor...
Article
Full-text available
To meet the increasing demands for passenger data rates, modern railway communication networks face significant challenges. The advent of 5G communications after the long-term evolution (LTE) and LTE-Advanced (LTE-A) systems provides several technological advances to address these challenges. In this paper, after reviewing the main 5G communication...
Chapter
Military communications need to be secure in harsh operational conditions under constant enemy attacks and attempts to eavesdrop, jam, or decrypt the communications. Physical layer security (PLS) can be used in conjunction with traditional cryptographic techniques to ensure an additional layer of security for military communications. In this articl...
Article
In this paper, internet of things (IoT) connectivity in rural areas is investigated. Both fronthaul and backhaul considerations are studied. First, intelligent radio resource management (RRM) and network planning techniques are discussed for IoT access/fronthaul networks. The proposed RRM scheduling approach was shown to lead to good performance in...
Article
Full-text available
In scenarios, like critical public safety communication networks, On-Scene Available (OSA) user equipment (UE) may be only partially connected with the network infrastructure, e.g., due to physical damages or on-purpose deactivation by the authorities. In this work, we consider multi-hop Device-to-Device (D2D) communication in a hybrid infrastructu...
Article
Full-text available
The rapid evolution of remote health monitoring applications is foreseen to be a crucial solution for facing unpredictable health crisis and improving quality of life. However, such applications come with many challenges, including: the transmission of large amount of private medical data and the limited power budget for battery-operated devices. T...
Article
In remote rural areas without continuous Internet connectivity, it is hard to envisage the use of mHealth applications for remote patient monitoring. In such areas, patients need to travel long distances to reach the nearest health center. In this article, we propose an approach that solves this problem by transmitting mHealth monitoring data, coll...
Article
Providing connectivity to around half of the world population living in rural or underprivileged areas is a tremendous challenge, but, at the same time, a unique opportunity. Access to the Internet would provide the population living in these areas a possibility to progress on the educational, health, environment, and business levels. In this artic...
Preprint
Providing connectivity to around half of the world population living in rural or underprivileged areas is a tremendous challenge, but also a unique opportunity. Access to the internet would provide the population living in these areas a possibility to progress on the educational, health, environment, and business levels. In this paper, a survey of...
Article
Traditional health-care systems suffer from new challenges associated with the constant increase in the number of patients. In order to address this issue, and to increase the accuracy, reliability, efficiency, and effectiveness of the health-care domain, the Internet of Medical Things (IoMT) was proposed. IoMT can be considered as an enhancement a...
Preprint
p> In this paper, internet of things (IoT) connectivity in rural areas is investigated. Both fronthaul and backhaul considerations are studied. First, intelligent radio resource management (RRM) and network planning techniques are discussed for IoT access/fronthaul networks. The proposed RRM scheduling approach was shown to lead to good performance...
Preprint
Full-text available
b>To meet the increasing demands for passenger data rates, modern railway communication networks face significant challenges. The advent of 5G communications after the long-term evolution (LTE) and LTE-Advanced (LTE-A) systems provides several technological advances to address these challenges. In this paper, after reviewing the main 5G communicati...
Preprint
b>To meet the increasing demands for passenger data rates, modern railway communication networks face significant challenges. The advent of 5G communications after the long-term evolution (LTE) and LTE-Advanced (LTE-A) systems provides several technological advances to address these challenges. In this paper, after reviewing the main 5G communicati...
Preprint
Providing connectivity to around half of the World population living in rural or underprivileged areas is a tremendous challenge, but also a unique opportunity. In this paper, a survey of technologies for providing connectivity to rural areas, and that can help address this challenge, is provided. Fronthaul and backhaul techniques are discussed. In...
Article
Military communications need to be secure in harsh operational conditions under constant enemy attacks and attempts to eavesdrop, jam, or decrypt the communications. Physical layer security (PLS) can be used in conjunction with traditional cryptographic techniques to ensure an additional layer of security for military communications. In this articl...
Article
eHealth and mHealth applications are gaining increasing importance with advances in the IoT and the ubiquity of sensor deployments. Measured IoT mHealth data needs to be captured, transmitted, and stored securely, without having the security measures hinder or delay the response of medical personnel in case of emergency. In this article, we present...
Conference Paper
This paper presents a setup for the real-time extraction of Electroencephalography (EEG) and Electrocardiogram (ECG) features indicating the level of focus, relaxation, or meditation of a given subject. An algorithm for detecting meditation in real-time using the extracted ECG features is designed and shown to lead to accurate results using an onli...
Preprint
Full-text available
Providing connectivity to around half of the World population living in rural or underprivileged areas is a tremendous challenge, but also a unique opportunity. In this paper, a survey of technologies for providing connectivity to rural areas, and that can help address this challenge, is provided. Fronthaul and backhaul techniques are discussed. In...
Preprint
Full-text available
Providing connectivity to around half of the World population living in rural or underprivileged areas is a tremendous challenge, but also a unique opportunity. In this paper, a survey of technologies for providing connectivity to rural areas, and that can help address this challenge, is provided. Fronthaul and backhaul techniques are discussed. In...
Article
This paper introduces circular color shift keying (CSK) constellations in a visible light communications (VLC) system using a camera-based receiver with applications to vehicular communications, where vehicle-to-vehicle (V2V) and vehicleto- infrastructure (V2I) communications are required to improve the safety of vehicles in high traffic density. T...
Article
In this paper, a novel approach for physical layer security is implemented using massive cylindrical antenna arrays. Part of the arrays are used for transmitting a signal reliably from source to destination using highly directive beams. At the same time, the remaining part can be used to mitigate eavesdropping by transmitting a jamming signal throu...
Article
Mobile Crowd-Sensing (MCS) is a new sensing paradigm that takes advantage of extensive use of mobile phones that collect data efficiently and enable several significant applications. MCS paves the way to explore new monitoring applications in different fields such as social networks, lifestyle, healthcare, green applications, and intelligent transp...
Article
Full-text available
Device-to-device (D2D) communications in the long term evolution (LTE) Advanced (LTE-A) cellular system are investigated. The objective is to form collaborative D2D groups for transmitting/receiving data in the uplink (UL) and downlink (DL) in an energy efficient manner. The energy minimization problem using multihop D2D is formulated as a binary i...
Conference Paper
Full-text available
Mobile devices are an intrinsic part of the Internet of Things (IoT) paradigm. Device-to-device (D2D) communication is emerging as one of the viable solutions for the radio resource optimization in an IoT infrastructure. However, it also comes with the challenges associated with power allocation as it causes severe interference by reusing the spect...
Conference Paper
In an mHealth remote patient monitoring scenario, usually control units/data aggregators receive data from the body area network (BAN) sensors then send it to the network or “cloud”. The control unit would have to transmit the measurement data to the home access point (AP) using WiFi for example, or directly to a cellular base station (BS), e.g. us...
Conference Paper
In the past decade, Cloud-Computing emerged as a new computing concept with a distributed nature using virtual network and systems. Many businesses rely on this technology to keep their systems running but concerns are rising about security breaches in cloud computing. This work presents a secure approach for storing data on the cloud. the proposed...
Chapter
The chapter investigates the scheduling load added on a long-term evolution (LTE) and/or LTE-Advanced (LTEA) network when automatic meter reading (AMR) in advanced metering infrastructures (AMI) is performed using internet of things (IoT) deployments of smart meters in the smart grid. First, radio resource management algorithms to perform dynamic s...
Article
Full-text available
Device-to-device (D2D) communication is an essential feature for the future cellular networks as it increases spectrum efficiency by reusing resources between cellular and D2D users. However, the performance of the overall system can degrade if there is no proper control over interferences produced by the D2D users. Efficient resource allocation am...
Chapter
Wireless sensor networks consisting of several sensors deployed in a given area, under an internet of things (IoT) paradigm, are considered. Sensor nodes may or may not be close enough to communicate with each other in order to perform collaborative transmissions. A communication protocol based on random access and orthogonal frequency division mul...
Article
Full-text available
This paper proposes and investigates a green virtualization framework for infrastructure sharing among multiple cellular operators whose networks are powered by a combination of conventional and renewable sources of energy. Under the proposed framework, the virtual network formed by unifying radio access infrastructures of all operators is optimize...