
Ibrahim AbualhaolCarleton University · Department of Systems and Computer Engineering
Ibrahim Abualhaol
Ph.D., P.Eng. SMIEEE
About
72
Publications
30,346
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
575
Citations
Citations since 2017
Introduction
Principal Data Scientist @ Huawei Technologies and Adjunct Research Professor @ Carleton University in Ottawa, Canada. Holds a B.Sc, an M.Sc, and a Ph.D. in Electrical and Computer Engineering. Holds an M.Eng in Technology Innovation Management. A senior member of IEEE and a Professional Engineer (P.Eng.) in Ontario, Canada. My interests include machine learning and real-time big-data analytics and its applications in the Internet-of-Things, Cybersecurity, and Wireless Communications.
Additional affiliations
January 2017 - June 2022
October 2015 - December 2016
VENUS Cybersecurity Corporation
Position
- Research Scientest
Description
- Working on processes to align collective intelligence with artificial intelligence to improve cyber-security. Hands-on experience in big data analysis and visualization using KNIME and Python.
September 2009 - January 2014
Electrical Engineering
Position
- Professor (Assistant)
Description
- ● Introduction to Professional Engineering (ENGR 110), ● Probability and Statistics (MATH 215) ● Wireless Communications (CMME 400) ● Communication Networks (CMME 320) ● Modulation and Coding Techniques (CMME 404) ● Digital Communications I (CMME 302)
Publications
Publications (72)
The design and optimization of wireless networks have mostly been based on strong mathematical and theoretical modeling. Nonetheless, as novel applications emerge in the era of 5G and beyond, unprecedented levels of complexity will be encountered in the design and optimization of the network. As a result, the use of Artificial Intelligence (AI) is...
As the smartphone market leader, Android has been a prominent target for malware attacks. The number of malicious applications (apps) identified for it has increased continually over the past decade, creating an immense challenge for all parties involved. For market holders and researchers, in particular, the large number of samples has made manual...
In recent years, the increase in non-Windows malware threats had turned the focus of the cybersecurity community. Research works on hunting Windows PE-based malwares are maturing, whereas the developments on Linux malware threat hunting are relatively scarce. With the advent of the Internet of Things (IoT) era, smart devices that are getting integr...
Current communication networks use design methodologies that prevent the realization of maximum network efficiency. In the first place, while users' perception of satisfactory service diverges widely, current networks are designed to be a "universal fit," where they are generally over-engineered to deliver services appealing to all types of users....
As the smartphone market leader, Android has been a prominent target for malware attacks. The number of malicious applications (apps) identified for it has increased continually over the past decade, creating an immense challenge for all parties involved. For market holders and researchers, in particular, the large number of samples has made manual...
Phishing is a Social Engineering attack technique that is commonly used to obtain usersensitive information such as login credentials, credit and debit card information, and so on. A phishing website has the same name and appearance as an official website. Also known as a fake website, which is designed to trick a person into stealing their identit...
The advances in efficient computation and data processing technologies have ushered in an entirely new era in which network connectivity applications are being revolutionized by Artificial Intelligence (AI). One of the emerging AI applications in wireless networks is network personalization. Personalized wireless networks are designed to track user...
In recent years, the increase in non-Windows malware threats had turned the focus of the cybersecurity community. Research works on hunting Windows PE-based malwares are maturing, whereas the developments on Linux malware threat hunting are relatively scarce. With the advent of the Internet of Things (IoT) era, smart devices that are getting integr...
The increasing demand for wireless connectivity and the emergence of the notion of the Internet of Everything require new communication paradigms that will ultimately enable a plethora of new applications and new disruptive technologies. In this context, the present contribution investigates the use of the recently introduced intelligent reflecting...
The advances in efficient computation and data processing technologies have ushered in an entirely new era in which network connectivity applications are being revolutionized by Artificial Intelligence (AI). One of the emerging AI applications in wireless networks is network personalization. Personalized wireless networks are designed to track user...
The design and optimization of wireless networks have mostly been based on strong mathematical and theoretical modeling. Nonetheless, as novel applications emerge in the era of 5G and beyond, unprecedented levels of complexity will be encountered in the design and optimization of the network. As a result, the use of Artificial Intelligence (AI) is...
A new framework¹ mixing evolutionary approach, discrete-event simulation and deep neural networks is proposed to achieve multi-asset collection/image acquisition scheduling in a surveillance context. It combines an extended graph-based hybrid genetic algorithm (GA) used for satellite image acquisition scheduling, with a predictive simulation-based...
It is envisioned that wireless networks of the future will support personalized, fine-grained services and decisions by predicting user satisfaction in real-time using machine learning and big data analytics. Data-driven personalization will empower wireless networks to further optimize resources while maintaining user expectations of networks. In...
Current wireless networks are over-provisioned in order to maintain an average acceptable user experience for most users on the network. Over-provisioned networks suffer from several issues, however, including network inefficiency and the inability to maintain a certain user satisfaction level for all users. Data-driven wireless network personaliza...
A smart city can be defined as a city that uses technology to automate and improve its services, making citizens' lives better. Smart cities solutions include traffic control systems, street lighting, smart grid, public transportation information systems, traffic cameras and surveillance, city management systems, seismic activity sensors, and many...
In this paper, we introduce three maritime Port Congestion Indicators (PCIs) mined using Automatic Identification System (AIS) static and dynamic messages. The proposed indicators are spatial complexity, spatial density, and time criticality. To calculate the PCIs, we proposed three Big AIS Data mining algorithms to find the geohash area for certai...
Liner shipping is vulnerable to many disruptive factors such as port congestion or harsh weather, which could result to delay in arriving at the ports. It could result in both financial and reputation losses. The vessel schedule recovery problem (VSRP) is concerned with different possible actions to reduce the effect of disruption. In this work, we...
The Automatic Identification System (AIS) is a vessel tracking system that automatically provides updates on a vessel's movement and other relevant voyage data to vessel traffic management centres and operators. Aside from assisting in real-time tracking and monitoring marine traffic, this system is used in the analysis of historical navigation pat...
For single-input multiple-output (SIMO) systems, Maximum Ratio Combining (MRC), employed at the receiver,
achieves the best performance compared to other combining schemes in the literature, such as Selection Combining (SC) and Equal Gain Combining (EGC). However, for cooperative relay-based systems, MRC has limited performance due to the lack of r...
Abstract—For single-input multiple-output (SIMO) systems, Maximum Ratio Combining (MRC), employed at the receiver, achieves the best performance compared to other combining schemes in the literature, such as Selection Combining (SC) and Equal Gain Combining (EGC). However, for cooperative relay-based systems, MRC has limited performance due to the...
For single-input multiple-output (SIMO) systems, Maximum Ratio Combining (MRC), employed at the receiver, achieves the best performance compared to other combining schemes in the literature, such as Selection Combining (SC) and Equal Gain Combining (EGC). However, for cooperative relay-based systems, MRC has limited performance due to the lack of r...
This paper describes the design and initial evaluation of a leader-driven open collaboration platform for exploring new domains. The goal of this platform is to enable the collaboration of subject matter experts across knowledge boundaries. Traditionally, new domains are explored from within a single specialist or a focused group perspective. Howev...
Developers of cybersecurity software often include and rely upon open source software packages in their commercial software products. Before open source code is absorbed into a proprietary product, developers must check the package license to see if the project is permissively licensed, thereby allowing for commercial-friendly inheritance and redis...
Diversity combining is a form of spatial diversity which is of primary importance in wireless communications. Maximum Ratio Combining (MRC) is known as the best combining scheme because it effectively uses the Channel State Information (CSI) at the receiver in the combining process. However, in cooperative relay-based systems employing relay detect...
The error probability is one of the important metrics used to measure the performance of cooperative relay-based systems. Conventionally, the error probability analysis assumes no information about the condition of the Source-Relay link. In this paper, we show that this assumption could result in over or under estimation of the error probability an...
Vehicular Ad-Hoc Networks (VANETs) are a critical component of the Intelligent Transportation Systems (ITS), which involve the applications of advanced information processing, communications, sensing, and controlling technologies in an integrated manner to improve the functionality and the safety of transportation systems, providing drivers with ti...
Device-to-Device (D2D) communications has been proposed to cellular networks in order to optimize spectrum efficiency and resources utilization. In D2D-assisted networks, the traditional cellular communication techniques are not applicable but rather need to be redesigned to fulfill new requirements. Therefore, new communication techniques are prop...
Vehicular Ad-Hoc Networks (VANETs) are a critical component of the Intelligent Transportation Systems (ITS), which involve the applications of advanced information processing, communications, sensing, and controlling technologies in an integrated manner to improve the functionality and the safety of transportation systems, providing drivers with ti...
Research on non-coherent detection for cooperative communications is at an early stage and many fundamental problems are still open. We will be working on an important open problems in broadband cooperative wireless communications. A novel non-coherent detection scheme for a multi-relay cooperative orthogonal frequency division multiplexing (OFDM)...
In this paper, we investigate a non-coherent detection recursive scheme for a multi-relay cooperative orthogonal frequency division multiplexing (C-OFDM) wireless system. We consider a distributed space-time block code (STBC) system over time-varying fading channels, in which source-relay, relay-destination, and source-destination links experience...
In this paper, a novel approximation for the Gaussian Q-function in the form of Q(√x) is presented. The proposed approximation is compared with other known closed-form approximations of the Q-function in terms of accuracy and applicability. This approximation can be effciently used to simplify intractable problems which do not have explicit solutio...
This paper presents simple and accurate approximation of the normalized incomplete upper and lower gamma functions that frequently appear in Nakagami-m fading channels. Based on the proposed approximation and in conjunction with the approximation of the Q-function proposed by Chiani, Dardari, and Simon [1], simple and accurate generalized closed-fo...
Cooperative communication techniques are used in vehicular ad hoc networks (VANETs) to enhance system performance through distributed spatial diversity. In this paper, the average error rate performance of a VANET Cooperative Selection-Combining Receiver (CO-SCR) is analyzed over generalized statistically measured fading channels. Source-Destinatio...
Based on the approximated expression of the Q-function by Chiani, Dardari, and Simon, a simple and accurate generalized closed-form expression for the bit error rate (BER) over Nakagami-m fading channel is derived. The expression is given as a product of the well-known gamma function and a finite sum of functions of the Nakagami-m fading parameter....
In this paper, we investigate a novel random selection strategy for dual-hop Single-Carrier Frequency-Domain Equalization (SC-FDE) in cooperative systems with multiple relays and amplify-and-forward relaying employing fuzzy comprehensive evaluation-based algorithm. We address the problem of optimal resource allocation for SC-FDE minimum mean square...
Multiple Input Multiple Output (MIMO) Orthogonal Frequency Division Multiplexing (OFDM), MIMO-OFDM, is considered as a spectrally efficient approach to achieve high throughput communications. This paper investigates the performance of MIMO-OFDM system using the proposed NLMS adaptive equalizer and the developed Singular Value Decomposition (SVD) te...
In wireless communications, multi-channel transmission is utilized to obtain high capacity and better throughput efficiency. Multiple-Input Multiple-Output (MIMO) Orthogonal Frequency Division Multiplexing (OFDM) is considered as spectrally efficient system to achieve high throughput communications. This paper investigates the performance enhanceme...
In this paper, we investigate a novel Random-based Fair-Allocation Fuzzy Comprehensive Evaluation- based Strategy with Relay Clustering (RFRC) for dual-hop Single- Carrier Frequency-Domain Equalization (SC-FDE) in cooperative systems with multiple relays and amplify-and- forward (AF) relaying. We address the problem of fair resource allocation for...
In wireless communications, multi-channel transmission is utilized to obtain high capacity and better throughput efficiency. Multiple-Input Multiple-Output (MIMO) Orthogonal Frequency Division Multiplexing (OFDM) is considered as a spectrally efficient approach to achieve high throughput communications. This paper investigates the performance of th...
In this paper, we study the lifetime of a dualhop multi-relay wireless sensor network (WSN) OFDM-based system using an adaptive random relay selection strategy. In this strategy, the relays cooperate according to contribution factors associated with each relay. An analytical study of the system lifetime is presented along with simulation results. T...
Sub-optimal Zero-Padding Orthogonal Frequency Division Multiplexing (ZP-OFDM) receivers have been developed in the literature to trade-off performance with complexity. In this paper, we propose a novel cooperative low-complexity minimum mean square error (LC MMSE)-ZP-OFDM receiver that is able to bring complexity reduction in the receiver design, w...
Microwave propagation in a nonuniform, collisional, and magnetized plasma slab with different magnetic field configurations is investigated using the magneto-ionic Appleton- Hartree theory.For the zero B-field case, a narrow stealth band is obtained, while for parallel and perpendicular propagation with respect to the B-field, results show a wider...
In this paper, we investigate the performance of single-carrier frequency-domain equalization (SC-FDE) for distributed space-time block coded (DSTBC) systems with Non-Regenerative (or amplify-and-forward) relaying over frequency-selective Rician fading channels. Our performance analysis demonstrates that SC-FDE for DSTB is able to achieve a maximum...
In this paper, the symbol error rate (SER) performance of a relay-based amplify-and-forward (AF) system is analyzed over fading channels . The relay power-gain is optimized with the objective of maximizing the received signal-to-noise-ratio (SNR) at the destination, given that the fading statistics of the links are known at the relay node. The Gaus...
The outage probability in a network of cooperative unmanned airborne vehicles (UAVs) over generalized fading channels is studied analytically using finite mixture with expectation maximization technique. A relay-based topology with one ground control unit (GCU) is considered, where the cooperative UAVs can communicate with the GCU directly or throu...
In this paper, we consider the analysis of a cooperative relay-based amplify-and-forward system in terms of average and outage capacity over fading channels. We first optimize the relay gain with the objective of maximizing the received signal-to-noise-ratio (SNR) at the destination, given that the fading statistics of the links in the cooperative...
In this paper, we consider the analysis of a cooperative relay-based amplify-and-forward system in terms of average and outage capacity over fading channels. We first optimize the relay gain with the objective of maximizing the received signal-to-noise-ratio (SNR) at the destination, given that the fading statistics of the links in the cooperative...
Stimulated Brillouin Backscattering (SBBS) of a large amplitude, extraordinary electromagnetic wave travelling across an ambient dc-magnetic field in a strongly coupled plasma is investigated. Using a magnetohydrodynamic model, a system of coupled equations that describes the problem is derived and then solved for a strongly coupled regime. The SBB...
Cooperative communications among group of teleoperated unmanned ground vehicles (UGVs) allows to exploit spatial diversity in wireless fading channels by relaying signals between each other. Due to the high speed of the UGVs, the nature of the channel environments and the possible co-channel interference, the effect of multipath propagation and the...
The performance analysis of multi-carrier relay-based Unmanned Airborne Vehicles (UAVs) network is studied analytically over fading channels. A relay-based topology with one ground control unit (GCU) is assumed, where the cooperative UAVs can communicate with the GCU directly or through relay. The outage probability of the system is defined as the...