About
223
Publications
45,218
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,801
Citations
Citations since 2017
Introduction
Skills and Expertise
Additional affiliations
September 2021 - present
March 2005 - August 2021
January 2005 - present
Publications
Publications (223)
Various research approaches to COVID-19 are currently being developed by machine learning (ML) techniques and edge computing, either in the sense of identifying virus molecules or in anticipating the risk analysis of the spread of COVID-19. Consequently, these orientations are elaborating datasets that derive either from WHO, through the respective...
To satisfy the fast growth of Internet of Things (IoT) or development of applications in the fifth generation (5G) wireless networks, the expected systems need two main functions such as massive connectivity of IoT devices and the low latency. Fortunately, non-orthogonal multiple access (NOMA) has been recommended as a promising approach for 5G net...
The open radio access network (O-RAN) concept is changing the landscape of mobile networks (5G deployment and 6G research). O-RAN Alliance’s suggestions that O-RAN can offer openness and intelligence to the traditional RAN vendors will enable the capability for multi-vendors to re-shape the RAN structure and optimize the network. This paper positio...
Reliable data exchange and efficient image transfer are currently significant research challenges in health care systems. To incentivize data exchange within the Internet of Things (IoT) framework, we need to ensure data sovereignty by facilitating secure data exchange between trusted parties. The security and reliability of data-sharing infrastruc...
The ever-increasing number of internet-connected devices, along with the continuous evolution of cyber-attacks, in terms of volume and ingenuity, has led to a widened cyber-threat landscape, rendering infrastructures prone to malicious attacks. Towards addressing systems’ vulnerabilities and alleviating the impact of these threats, this paper prese...
These days, cyber-criminals target humans rather than machines since they try to accomplish their malicious intentions by exploiting the weaknesses of end users. Thus, human vulnerabilities pose a serious threat to the security and integrity of computer systems and data. The human tendency to trust and help others, as well as personal, social, and...
Delay-Tolerant Networks (DTNs) are networks where there are no permanent end-to-end connections, that is, they have a variable topology, with frequent partitions in the connections. Given the dynamic characteristics of these networks, routing protocols can take advantage of dynamic information, such as the node’s location, to route messages. Geoloc...
This chapter will tackle one of the most important disadvantages that will take place in the Vehicular Ad Hoc Network during a crisis scenario. Vehicular Ad Hoc Network which is abbreviated as VANET is a variation of Mobile Ad Hoc Network (MANET). VANET routing protocols are a wide research area due to their different classifications with the pros...
Reducing vehicle energy demand has been the subject of academic research for several years. Distributing energy equally and efficiently among vehicle wheels addresses challenges that may have an impact on energy consumption. Therefore, this chapter aims to contribute through the proposal of a novel system by integrating smart panels. The effects of...
This book gathers recent research works in emerging Artificial Intelligence (AI) methods for the convergence of communication, caching, control, and computing resources in cloud-based Internet of Vehicles (IoV) infrastructures. In this context, the book's major subjects cover the analysis and the development of AI-powered mechanisms in future IoV a...
Machine learning (ML) techniques will benefit immensely from the avalanche of data readily available from various (IoT) applications considered as the major contributor of new data for future intelligent network. Based on this new concept, network systems will further magnify their capacity to exploit variety of experimental data across a plethora...
Machine learning (ML) techniques will benefit immensely from the avalanche of data readily available from various (IoT) applications considered as the major contributor of new data for future intelligent network. Based on this new concept, network systems will further magnify their capacity to exploit variety of experimental data across a plethora...
Mobile Edge Computing (MEC) paradigm is designed to meet the user requirements by providing cloud services at the edge of the user network. Blockchain technology with the EC paradigm is reliable in delivering the edge services depending on user requirements and improving the distributed management of resources at ease. In this article, blockchain-a...
In a smart healthcare system, the sensor-embedded wearable devices have the ability to track various vital signs of a patient.
However, such devices need to be worn by the patients all the time. These devices have limitations such as their battery lifetime, charging mechanism, and hardware-related cost. Moreover, these devices transmit a huge amoun...
This paper proposes a two-phase algorithm for multi-criteria selection of packet forwarding in unmanned aerial vehicles (UAV), which communicate with the control station through commercial mobile network. The selection of proper data forwarding in the two radio link: From UAV to the antenna and from the antenna to the control station, are independe...
It is challenging to detect burn severity due to the long-time period needed to capture the ecosystem characteristics. Whether there is a warning from the IoT devices, multitemporal remote sensing data is being received via satellites to contribute to multitemporal observations before, during and after a bushfire, and enhance the difference on dete...
This chapter will introduce Vehicular Ad Hoc Network; abbreviated as VANET; which is a variation of Mobile Ad Hoc Network, MANET. In VANET the nodes are either vehicles or fixed roadside units considered as VANET infrastructure. This chapter will discuss the five categories of VANET routing protocols with some of the most known examples in each. Ea...
Medical images will be an inseparable part for evaluating medical conditions of a person in real-time. This process will become efficient by exploiting the characteristics that are offered by IoT in the healthcare sectoral issues. This will allow more efficiency in the processing of a medical image. However, the medical images are exposed to the ma...
Machine learning (ML) algorithms are already transforming the way data are collected and processed in the data center, where some form of AI has permeated most areas of computing. The integration of AI algorithms at the edge is the next logical step which is already under investigation. However, harnessing such algorithms at the edge will require m...
Today is the era of the Internet of Things (IoT). The recent advances in hardware and information technology have accelerated the deployment of billions of interconnected, smart and adaptive devices, in critical infrastructures like health, transportation, environmental control and home automation. Transferring data over a network without requiring...
This book gathers recent research work on emerging Artificial Intelligence (AI) methods for processing and storing data generated by cloud-based Internet of Things (IoT) infrastructures. Major topics covered include the analysis and development of AI-powered mechanisms in future IoT applications and architectures. Further, the book addresses new te...
Modern ICT ecosystems such as healthcare environments (hospitals, care-centers etc.), operate in different abstraction layers (cloud, fog, extreme-edge) and comprise large numbers of network entities such as terminals, devices, sensors or even specialized appliances (virtual or physical). It is common in such environments, that several network enti...
Devices with the ability to connect to the internet are growing in numbers day by day thus creating the need for a new way of manag-ing the way the produced traffic travels through data networks. Smart Cities, Vehicular Content Networks, Healthcare and Virtual Reality Videos are a few examples that require high volume data while maintaining low lat...
Mobile cloud computing is the model to ubiquitously access a shared pool of cloud computing resources, data and services on-demand. This paper introduces the elasticity debt analytics paradigm as a solution concept for the resource provisioning problem in mobile cloud computing environments, guaranteeing the quality of service requirements. A novel...
Composting is the delicate procedure of supervised decomposition of organic waste, which gradually transforms waste to nutrient-rich manure. It requires deep knowledge and constant attention by experts to achieve a quality outcome in a timely fashion. Nevertheless, due to the bizarre nature of the materials and the overall procedure, along with the...
The Internet of Things services provision, by using machine-to-machine (M2M) communication, plays a critical role in today's ubiquitous systems. This service provision offers reliability and consistency to the end user. In many cases, there are secondary devices that are interconnected (glasses, set-top-boxes, home furniture, etc.), playing an acti...
This paper belongs to a series of research documents describing the progress in the specification and development of the EMYNOS framework offering an IP based platform for emergency services. EMYNOS is an international research project funded by the European Commission. Although migrating to Next Generation 112 and 911 is not new as a topic, no rea...
Motivated by further examining recent advances in this field and promoting the optimization of the existing methodologies and/or approaches, this Special Issue aims to present recent advances in multimedia services provided over energy-efficient mobile computing environments, toward alleviating associated problems and addressing related challenges....
A mixed reality system is a set of interlinked real-time sensors’ and actuators’ data presented within a virtual world with graphics and texts. This paper describes a methodology for the implementation of mixed reality systems that interconnect real-world IoT systems with 3D virtual worlds. In particular, this paper presents the steps for integrati...
This book reports on the latest advances in mobile technologies for collecting, storing and processing mobile big data in connection with wireless communications. It presents novel approaches and applications in which mobile big data is being applied from an engineering standpoint and addresses future theoretical and practical challenges related to...
The proliferation of data warehouses and the rise of multimedia, social media and the Internet of Things (IoT) generate an increasing volume of structured, semi-structured and unstructured data. Towards the investigation of these large volumes of data, big data and data analytics have become emerging research fields, attracting the attention of the...
The highly computationally capable mobile devices and the continuously increasing demand for high data rates and mobility, which are required by several mobile network services, enabled the research on fifth-generation (5G) mobile networks that are expected to be deployed beyond the year 2020 in order to support services and applications with more...
Traditionally, emergency communications between citizens and public authorities relied on legacy telecommunication technologies unable to cope with the agile, rich-media-content communications that mobile users are already using. This is due to the lack of harmonization and interoperable IP-based networking solutions. With the operators currently m...
This article presents a unified computing, caching, and communication (3C) solution for the upcoming 5G environment that will allow service, content, and function providers to deploy their services/ content/functions near the end users (EUs); to allow network providers to virtually deploy their connectivity services over commodity hardware; and to...
This paper proposes an energy-efficient routing scheme that is based on a resource intensive traffic-aware approach, enabling for the maximization of the energy conservation in cognitive radio networks. The proposed approach interrelates the moments of the backward difference traffic, together with the sleep-time duration, towards tuning the activi...
Currently there is an active debate about how the existing cloud paradigm can cope with the volume, variety and velocity of the data generated by the end devices (e.g. Internet of Things sensors)—it is expected to have over 50 billion of these devices by 2020, which will create more than two Exabyte’s worth of data each day. Additionally, the vast...
The book will present frameworks and schemes of Cloud and Fog paradigms for their proper exploitation in emerging mobile networking architectures. Topics such as Internet of Things, wireless sensor networks, Peer-to-Peer networks, Software Defined Networking and Network Function Virtualization schemes under the 5G mobile computing era will be cover...
The ''Internet of Things'' (IoT) is becoming an increasingly growing topic of conversation worldwide that it promises to offer a revolutionary fully connected ''smart'' world. IoT represents a vision, in which the Internet extends into the real world involving everyday objects equipped with sensors, processing, and communications capabilities that...
Home automation and intelligent building are the areas where Internet of Things (IoT) has been applied relatively early. Everyday intuitive use of smart things can increase comfort at home and productivity at work. Introducing new solutions for smart devices controlling the natural human environment rises challenges— especially when fast and reliab...
The Web of Things (WoT) can be considered as a step towards the Internet of Everything development. The concept of WoT assumes that objects of the Internet of Things (IoT) seamlessly interact with the Web by re-using web protocols wherever possible. One of the most desirable service in the WoT is real-time communication, due to the event-driven cha...
The major subjects of the book cover modeling, analysis and efficient management of information in Internet of Everything (IoE) applications and architectures. As the first book of its kind, it addresses the major new technological developments in the field and will reflect current research trends, as well as industry needs. It comprises of a good...
The peer-to-peer (P2P) computing paradigm is considered to be a scalable and cost-effective solution for content distribution that is becoming widely deployed over the current Internet infrastructure. Moreover, several commercial deployments already exist, providing video on demand and IPTV services to a large number of end-users and customers. Whe...
This paper belongs to the series of research documents describing the progress in the specification and development of the T-NOVA framework offering a marketplace for virtual network functions. T-NOVA is an international research project co-funded by the European Commission.
Objective: Although, the idea of having a marketplace enabling buying, co...
The highly computationally capable mobile devices and the continuously increasing demand for high data rates and mobility, which are required by several mobile network services, enabled the research on fifth-generation (5G) mobile networks that are expected to be deployed beyond the year 2020 in order to support services and applications with more...
The proliferation of data warehouses and the rise of multimedia, social media and the Internet of Things (IoT) generate an increasing volume of structured, semi-structured and unstructured data. Towards the investigation of these large volumes of data, big data and data analytics have become emerging research fields, attracting the attention of the...
The proliferation of data warehouses and the rise of multimedia, social media and the Internet of Things (IoT) generate an increasing volume of structured, semi-structured and unstructured data. Towards the investigation of these large volumes of data, big data and data analytics have become emerging research fields, attracting the attention of the...
Current emergency systems and 112 services are based on legacy telecommunication technologies, which cannot cope with IP-based services that European citizens use every day. Some of the related limitations are the partial media support, the lack of integration of social media, and the use of an analogue modem for providing emergency Call (eCall) se...
The emergence of ubiquitous computing paradigms, empowered by the upcoming 5th generation networking (5G), as well as emerging smart Ambient Intelligence environments, might play a crucial role, towards creating better living environments for activity-challenged individuals, such as disabled, or elderly people that require constant care. In additio...