About
225
Publications
134,223
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,868
Citations
Introduction
Publications
Publications (225)
According to the Global Organization for Stress, 80 percent of people are stressed at work and according to the American Institute of Stress, stress causes 48 percent of people to have difficulty sleeping. Relaxation reduces stress, depression, and anxiety. Electroencephalography (EEG) is used by scientists to analyze the brainwave signals that exp...
With the proliferation of fifth-generation (5G) mobile communication wireless networks, the investigation into the performance of physical layer secrecy is increasingly becoming the center of attention of recent studies. Physical layer security (PLS) is the pivotal notion of enhancing the secrecy of mobile communication wireless networks against ea...
Background
Tele-mentoring during surgery facilitates the transfer of surgical knowledge from a mentor (specialist surgeon) to a mentee (operating surgeon). The aim of this work is to develop a tele-mentoring system tailored for minimally invasive surgery (MIS) where the mentor can remotely demonstrate to the mentee the required motion of the surgic...
Background:
Recent tele-mentoring technologies for minimally invasive surgery (MIS) augments the operative field with movements of virtual surgical instruments as visual cues. The objective of this work is to assess different user-interfaces that effectively transfer mentor's hand gestures to the movements of virtual surgical instruments.
Methods...
p>This paper investigates the synergy between 6G and AI. It argues that they can unlock future horizons, by discussing how they can address future challenges in healthcare, transportation, virtual reality, education, resource management, robotics, in addition to public safety and warfare. However, these great opportunities come also with greater ri...
The chapter investigates the scheduling load added on a long-term evolution (LTE) and/or LTE-Advanced (LTEA) network when automatic meter reading (AMR) in advanced metering infrastructures (AMI) is performed using internet of things (IoT) deployments of smart meters in the smart grid. First, radio resource management algorithms to perform dynamic s...
Edge machine learning (Edge ML) is expected to serve as a key enabler for real-time mobile health (mHealth) applications. However, its reliability is governed by the limited energy and computing resources of user equipment (UE), along with the wireless channel variations and dynamic resource allocation at edge servers. In this letter, we incorporat...
Internet of Things (IoT) deployments face significant security challenges due to the limited energy and computational power of IoT devices. These challenges are more serious in the quantum communications era, where certain attackers might have quantum computing capabilities, which renders IoT devices more vulnerable. This paper addresses the proble...
Due to the necessity for using the security to the end-users, the conventional methods for security are not sufficient for the highly equipped attacker and new ways to violate security. Moreover, the quantum age is coming and brings more vulnerability to classical security techniques. On the other hand, Quantum security relies on the natural physic...
Background
Tele-mentoring facilitates the transfer of surgical knowledge. The objective of this work is to develop a tele-mentoring framework that enables a specialist surgeon to mentor an operating surgeon by transferring information in a form of surgical instruments’ motion required during a minimally invasive surgery.
Method
A tele-mentoring fr...
This paper investigates the use of unmanned aerial vehicles (UAVs)/drones for providing high data rates to mobile relays (MRs) placed on top of high speed train wagons, thus introducing the concept of Travel Hopping Enabled Resource Allocation (THEResA). The objective is to provide high data rate connectivity to train passengers in 5G+/6G networks....
Telemedicine is a technique that allows patients to have health-related consultations without the need to be physically present in the hospital through phone and video calling technologies. In recent years, researchers have made many contributions to reform and facilitate better telemedicine services through the use of body area networks or wireles...
The wide spread of the novel COVID-19 virus all over the world has caused major economical and social damages combined with the death of more than two million people so far around the globe. Therefore, the design of a model that can predict the persons that are most likely to be infected is a necessity to control the spread of this infectious disea...
The open nature of the wireless communication medium renders it vulnerable to jamming attacks by malicious users. To detect their presence and to avoid such attacks, several techniques are present in the literature. Most of these techniques aim to reduce the effect of the jamming signals by increasing the transmission power or by using complex coor...
To meet the increasing demands for passenger data rates, modern railway communication networks face significant challenges. The advent of 5G communications after the long-term evolution (LTE) and LTE-Advanced (LTE-A) systems provides several technological advances to address these challenges. In this paper, after reviewing the main 5G communication...
Military communications need to be secure in harsh operational conditions under constant enemy attacks and attempts to eavesdrop, jam, or decrypt the communications. Physical layer security (PLS) can be used in conjunction with traditional cryptographic techniques to ensure an additional layer of security for military communications. In this articl...
In this paper, internet of things (IoT) connectivity in rural areas is investigated. Both fronthaul and backhaul considerations are studied. First, intelligent radio resource management (RRM) and network planning techniques are discussed for IoT access/fronthaul networks. The proposed RRM scheduling approach was shown to lead to good performance in...
In scenarios, like critical public safety communication networks, On-Scene Available (OSA) user equipment (UE) may be only partially connected with the network infrastructure, e.g., due to physical damages or on-purpose deactivation by the authorities. In this work, we consider multi-hop Device-to-Device (D2D) communication in a hybrid infrastructu...
The rapid evolution of remote health monitoring applications is foreseen to be a crucial solution for facing unpredictable health crisis and improving quality of life. However, such applications come with many challenges, including: the transmission of large amount of private medical data and the limited power budget for battery-operated devices. T...
In remote rural areas without continuous Internet connectivity, it is hard to envisage the use of mHealth applications for remote patient monitoring. In such areas, patients need to travel long distances to reach the nearest health center. In this article, we propose an approach that solves this problem by transmitting mHealth monitoring data, coll...
Providing connectivity to around half of the world population living in rural or underprivileged areas is a tremendous challenge, but, at the same time, a unique opportunity. Access to the Internet would provide the population living in these areas a possibility to progress on the educational, health, environment, and business levels. In this artic...
Providing connectivity to around half of the world population living in rural or underprivileged areas is a tremendous challenge, but also a unique opportunity. Access to the internet would provide the population living in these areas a possibility to progress on the educational, health, environment, and business levels. In this paper, a survey of...
Traditional health-care systems suffer from new challenges associated with the constant increase in the number of patients. In order to address this issue, and to increase the accuracy, reliability, efficiency, and effectiveness of the health-care domain, the Internet of Medical Things (IoMT) was proposed. IoMT can be considered as an enhancement a...
p> In this paper, internet of things (IoT) connectivity in rural areas is investigated. Both fronthaul and backhaul considerations are studied. First, intelligent radio resource management (RRM) and network planning techniques are discussed for IoT access/fronthaul networks. The proposed RRM scheduling approach was shown to lead to good performance...
b>To meet the increasing demands for passenger data rates, modern railway communication networks face significant challenges. The advent of 5G communications after the long-term evolution (LTE) and LTE-Advanced (LTE-A) systems provides several technological advances to address these challenges. In this paper, after reviewing the main 5G communicati...
b>To meet the increasing demands for passenger data rates, modern railway communication networks face significant challenges. The advent of 5G communications after the long-term evolution (LTE) and LTE-Advanced (LTE-A) systems provides several technological advances to address these challenges. In this paper, after reviewing the main 5G communicati...
Providing connectivity to around half of the World population living in rural or underprivileged areas is a tremendous challenge, but also a unique opportunity. In this paper, a survey of technologies for providing connectivity to rural areas, and that can help address this challenge, is provided. Fronthaul and backhaul techniques are discussed. In...
Military communications need to be secure in harsh operational conditions under constant enemy attacks and attempts to eavesdrop, jam, or decrypt the communications. Physical layer security (PLS) can be used in conjunction with traditional cryptographic techniques to ensure an additional layer of security for military communications. In this articl...
eHealth and mHealth applications are gaining increasing importance with advances in the IoT and the ubiquity of sensor deployments. Measured IoT mHealth data needs to be captured, transmitted, and stored securely, without having the security measures hinder or delay the response of medical personnel in case of emergency. In this article, we present...
This paper presents a setup for the real-time extraction of Electroencephalography (EEG) and Electrocardiogram (ECG) features indicating the level of focus, relaxation, or meditation of a given subject. An algorithm for detecting meditation in real-time using the extracted ECG features is designed and shown to lead to accurate results using an onli...
Providing connectivity to around half of the World population living in rural or underprivileged areas is a tremendous challenge, but also a unique opportunity. In this paper, a survey of technologies for providing connectivity to rural areas, and that can help address this challenge, is provided. Fronthaul and backhaul techniques are discussed. In...
Providing connectivity to around half of the World population living in rural or underprivileged areas is a tremendous challenge, but also a unique opportunity. In this paper, a survey of technologies for providing connectivity to rural areas, and that can help address this challenge, is provided. Fronthaul and backhaul techniques are discussed. In...
This paper introduces circular color shift keying (CSK) constellations in a visible light communications (VLC) system using a camera-based receiver with applications to vehicular communications, where vehicle-to-vehicle (V2V) and vehicleto- infrastructure (V2I) communications are required to improve the safety of vehicles in high traffic density. T...
In this paper, a novel approach for physical layer security is implemented using massive cylindrical antenna arrays. Part of the arrays are used for transmitting a signal reliably from source to destination using highly directive beams. At the same time, the remaining part can be used to mitigate eavesdropping by transmitting a jamming signal throu...
Mobile Crowd-Sensing (MCS) is a new sensing paradigm that takes advantage of extensive use of mobile phones that collect data efficiently and enable several significant applications. MCS paves the way to explore new monitoring applications in different fields such as social networks, lifestyle, healthcare, green applications, and intelligent transp...
Device-to-device (D2D) communications in the long term evolution (LTE) Advanced (LTE-A) cellular system are investigated. The objective is to form collaborative D2D groups for transmitting/receiving data in the uplink (UL) and downlink (DL) in an energy efficient manner. The energy minimization problem using multihop D2D is formulated as a binary i...
Mobile devices are an intrinsic part of the Internet of Things (IoT) paradigm. Device-to-device (D2D) communication is emerging as one of the viable solutions for the radio resource optimization in an IoT infrastructure. However, it also comes with the challenges associated with power allocation as it causes severe interference by reusing the spect...
In an mHealth remote patient monitoring scenario, usually control units/data aggregators receive data from the body area network (BAN) sensors then send it to the network or “cloud”. The control unit would have to transmit the measurement data to the home access point (AP) using WiFi for example, or directly to a cellular base station (BS), e.g. us...
In the past decade, Cloud-Computing emerged as a new computing concept with a distributed nature using virtual network and systems. Many businesses rely on this technology to keep their systems running but concerns are rising about security breaches in cloud computing. This work presents a secure approach for storing data on the cloud. the proposed...
The chapter investigates the scheduling load added on a long-term evolution (LTE) and/or LTE-Advanced (LTEA) network when automatic meter reading (AMR) in advanced metering infrastructures (AMI) is performed using internet of things (IoT) deployments of smart meters in the smart grid. First, radio resource management algorithms to perform dynamic s...
Device-to-device (D2D) communication is an essential feature for the future cellular networks as it increases spectrum efficiency by reusing resources between cellular and D2D users. However, the performance of the overall system can degrade if there is no proper control over interferences produced by the D2D users. Efficient resource allocation am...
Wireless sensor networks consisting of several sensors deployed in a given area, under an internet of things (IoT) paradigm, are considered. Sensor nodes may or may not be close enough to communicate with each other in order to perform collaborative transmissions. A communication protocol based on random access and orthogonal frequency division mul...
This paper proposes and investigates a green virtualization framework for infrastructure sharing among multiple cellular operators whose networks are powered by a combination of conventional and renewable sources of energy. Under the proposed framework, the virtual network formed by unifying radio access infrastructures of all operators is optimize...