Ibrahim Abualhaol

Ibrahim Abualhaol
Carleton University · Department of Systems and Computer Engineering

Ph.D., P.Eng. SMIEEE

About

72
Publications
30,346
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
575
Citations
Citations since 2017
27 Research Items
463 Citations
2017201820192020202120222023020406080100120
2017201820192020202120222023020406080100120
2017201820192020202120222023020406080100120
2017201820192020202120222023020406080100120
Introduction
Principal Data Scientist @ Huawei Technologies and Adjunct Research Professor @ Carleton University in Ottawa, Canada. Holds a B.Sc, an M.Sc, and a Ph.D. in Electrical and Computer Engineering. Holds an M.Eng in Technology Innovation Management. A senior member of IEEE and a Professional Engineer (P.Eng.) in Ontario, Canada. My interests include machine learning and real-time big-data analytics and its applications in the Internet-of-Things, Cybersecurity, and Wireless Communications.
Additional affiliations
January 2017 - June 2022
Carleton University
Position
  • Adjunct Research Professor
October 2015 - December 2016
VENUS Cybersecurity Corporation
Position
  • Research Scientest
Description
  • Working on processes to align collective intelligence with artificial intelligence to improve cyber-security. Hands-on experience in big data analysis and visualization using KNIME and Python.
September 2009 - January 2014
Electrical Engineering
Position
  • Professor (Assistant)
Description
  • ● Introduction to Professional Engineering (ENGR 110), ● Probability and Statistics (MATH 215) ● Wireless Communications (CMME 400) ● Communication Networks (CMME 320) ● Modulation and Coding Techniques (CMME 404) ● Digital Communications I (CMME 302)

Publications

Publications (72)
Preprint
Full-text available
The design and optimization of wireless networks have mostly been based on strong mathematical and theoretical modeling. Nonetheless, as novel applications emerge in the era of 5G and beyond, unprecedented levels of complexity will be encountered in the design and optimization of the network. As a result, the use of Artificial Intelligence (AI) is...
Preprint
Full-text available
As the smartphone market leader, Android has been a prominent target for malware attacks. The number of malicious applications (apps) identified for it has increased continually over the past decade, creating an immense challenge for all parties involved. For market holders and researchers, in particular, the large number of samples has made manual...
Preprint
Full-text available
In recent years, the increase in non-Windows malware threats had turned the focus of the cybersecurity community. Research works on hunting Windows PE-based malwares are maturing, whereas the developments on Linux malware threat hunting are relatively scarce. With the advent of the Internet of Things (IoT) era, smart devices that are getting integr...
Preprint
Full-text available
Current communication networks use design methodologies that prevent the realization of maximum network efficiency. In the first place, while users' perception of satisfactory service diverges widely, current networks are designed to be a "universal fit," where they are generally over-engineered to deliver services appealing to all types of users....
Article
Full-text available
As the smartphone market leader, Android has been a prominent target for malware attacks. The number of malicious applications (apps) identified for it has increased continually over the past decade, creating an immense challenge for all parties involved. For market holders and researchers, in particular, the large number of samples has made manual...
Article
Full-text available
Phishing is a Social Engineering attack technique that is commonly used to obtain usersensitive information such as login credentials, credit and debit card information, and so on. A phishing website has the same name and appearance as an official website. Also known as a fake website, which is designed to trick a person into stealing their identit...
Article
Full-text available
The advances in efficient computation and data processing technologies have ushered in an entirely new era in which network connectivity applications are being revolutionized by Artificial Intelligence (AI). One of the emerging AI applications in wireless networks is network personalization. Personalized wireless networks are designed to track user...
Article
Full-text available
In recent years, the increase in non-Windows malware threats had turned the focus of the cybersecurity community. Research works on hunting Windows PE-based malwares are maturing, whereas the developments on Linux malware threat hunting are relatively scarce. With the advent of the Internet of Things (IoT) era, smart devices that are getting integr...
Article
Full-text available
The increasing demand for wireless connectivity and the emergence of the notion of the Internet of Everything require new communication paradigms that will ultimately enable a plethora of new applications and new disruptive technologies. In this context, the present contribution investigates the use of the recently introduced intelligent reflecting...
Preprint
Full-text available
The advances in efficient computation and data processing technologies have ushered in an entirely new era in which network connectivity applications are being revolutionized by Artificial Intelligence (AI). One of the emerging AI applications in wireless networks is network personalization. Personalized wireless networks are designed to track user...
Article
Full-text available
The design and optimization of wireless networks have mostly been based on strong mathematical and theoretical modeling. Nonetheless, as novel applications emerge in the era of 5G and beyond, unprecedented levels of complexity will be encountered in the design and optimization of the network. As a result, the use of Artificial Intelligence (AI) is...
Conference Paper
Full-text available
A new framework¹ mixing evolutionary approach, discrete-event simulation and deep neural networks is proposed to achieve multi-asset collection/image acquisition scheduling in a surveillance context. It combines an extended graph-based hybrid genetic algorithm (GA) used for satellite image acquisition scheduling, with a predictive simulation-based...
Preprint
Full-text available
It is envisioned that wireless networks of the future will support personalized, fine-grained services and decisions by predicting user satisfaction in real-time using machine learning and big data analytics. Data-driven personalization will empower wireless networks to further optimize resources while maintaining user expectations of networks. In...
Preprint
Full-text available
Current wireless networks are over-provisioned in order to maintain an average acceptable user experience for most users on the network. Over-provisioned networks suffer from several issues, however, including network inefficiency and the inability to maintain a certain user satisfaction level for all users. Data-driven wireless network personaliza...
Chapter
Full-text available
A smart city can be defined as a city that uses technology to automate and improve its services, making citizens' lives better. Smart cities solutions include traffic control systems, street lighting, smart grid, public transportation information systems, traffic cameras and surveillance, city management systems, seismic activity sensors, and many...
Conference Paper
Full-text available
In this paper, we introduce three maritime Port Congestion Indicators (PCIs) mined using Automatic Identification System (AIS) static and dynamic messages. The proposed indicators are spatial complexity, spatial density, and time criticality. To calculate the PCIs, we proposed three Big AIS Data mining algorithms to find the geohash area for certai...
Article
Full-text available
Liner shipping is vulnerable to many disruptive factors such as port congestion or harsh weather, which could result to delay in arriving at the ports. It could result in both financial and reputation losses. The vessel schedule recovery problem (VSRP) is concerned with different possible actions to reduce the effect of disruption. In this work, we...
Conference Paper
Full-text available
The Automatic Identification System (AIS) is a vessel tracking system that automatically provides updates on a vessel's movement and other relevant voyage data to vessel traffic management centres and operators. Aside from assisting in real-time tracking and monitoring marine traffic, this system is used in the analysis of historical navigation pat...
Conference Paper
Full-text available
For single-input multiple-output (SIMO) systems, Maximum Ratio Combining (MRC), employed at the receiver, achieves the best performance compared to other combining schemes in the literature, such as Selection Combining (SC) and Equal Gain Combining (EGC). However, for cooperative relay-based systems, MRC has limited performance due to the lack of r...
Conference Paper
Full-text available
Abstract—For single-input multiple-output (SIMO) systems, Maximum Ratio Combining (MRC), employed at the receiver, achieves the best performance compared to other combining schemes in the literature, such as Selection Combining (SC) and Equal Gain Combining (EGC). However, for cooperative relay-based systems, MRC has limited performance due to the...
Article
Full-text available
For single-input multiple-output (SIMO) systems, Maximum Ratio Combining (MRC), employed at the receiver, achieves the best performance compared to other combining schemes in the literature, such as Selection Combining (SC) and Equal Gain Combining (EGC). However, for cooperative relay-based systems, MRC has limited performance due to the lack of r...
Conference Paper
Full-text available
This paper describes the design and initial evaluation of a leader-driven open collaboration platform for exploring new domains. The goal of this platform is to enable the collaboration of subject matter experts across knowledge boundaries. Traditionally, new domains are explored from within a single specialist or a focused group perspective. Howev...
Article
Full-text available
Developers of cybersecurity software often include and rely upon open source software packages in their commercial software products. Before open source code is absorbed into a proprietary product, developers must check the package license to see if the project is permissively licensed, thereby allowing for commercial-friendly inheritance and redis...
Conference Paper
Full-text available
Diversity combining is a form of spatial diversity which is of primary importance in wireless communications. Maximum Ratio Combining (MRC) is known as the best combining scheme because it effectively uses the Channel State Information (CSI) at the receiver in the combining process. However, in cooperative relay-based systems employing relay detect...
Conference Paper
Full-text available
The error probability is one of the important metrics used to measure the performance of cooperative relay-based systems. Conventionally, the error probability analysis assumes no information about the condition of the Source-Relay link. In this paper, we show that this assumption could result in over or under estimation of the error probability an...
Chapter
Vehicular Ad-Hoc Networks (VANETs) are a critical component of the Intelligent Transportation Systems (ITS), which involve the applications of advanced information processing, communications, sensing, and controlling technologies in an integrated manner to improve the functionality and the safety of transportation systems, providing drivers with ti...
Conference Paper
Full-text available
Device-to-Device (D2D) communications has been proposed to cellular networks in order to optimize spectrum efficiency and resources utilization. In D2D-assisted networks, the traditional cellular communication techniques are not applicable but rather need to be redesigned to fulfill new requirements. Therefore, new communication techniques are prop...
Chapter
Full-text available
Vehicular Ad-Hoc Networks (VANETs) are a critical component of the Intelligent Transportation Systems (ITS), which involve the applications of advanced information processing, communications, sensing, and controlling technologies in an integrated manner to improve the functionality and the safety of transportation systems, providing drivers with ti...
Conference Paper
Full-text available
Research on non-coherent detection for cooperative communications is at an early stage and many fundamental problems are still open. We will be working on an important open problems in broadband cooperative wireless communications. A novel non-coherent detection scheme for a multi-relay cooperative orthogonal frequency division multiplexing (OFDM)...
Conference Paper
Full-text available
In this paper, we investigate a non-coherent detection recursive scheme for a multi-relay cooperative orthogonal frequency division multiplexing (C-OFDM) wireless system. We consider a distributed space-time block code (STBC) system over time-varying fading channels, in which source-relay, relay-destination, and source-destination links experience...
Conference Paper
Full-text available
In this paper, a novel approximation for the Gaussian Q-function in the form of Q(√x) is presented. The proposed approximation is compared with other known closed-form approximations of the Q-function in terms of accuracy and applicability. This approximation can be effciently used to simplify intractable problems which do not have explicit solutio...
Conference Paper
Full-text available
This paper presents simple and accurate approximation of the normalized incomplete upper and lower gamma functions that frequently appear in Nakagami-m fading channels. Based on the proposed approximation and in conjunction with the approximation of the Q-function proposed by Chiani, Dardari, and Simon [1], simple and accurate generalized closed-fo...
Conference Paper
Full-text available
Cooperative communication techniques are used in vehicular ad hoc networks (VANETs) to enhance system performance through distributed spatial diversity. In this paper, the average error rate performance of a VANET Cooperative Selection-Combining Receiver (CO-SCR) is analyzed over generalized statistically measured fading channels. Source-Destinatio...
Conference Paper
Full-text available
Based on the approximated expression of the Q-function by Chiani, Dardari, and Simon, a simple and accurate generalized closed-form expression for the bit error rate (BER) over Nakagami-m fading channel is derived. The expression is given as a product of the well-known gamma function and a finite sum of functions of the Nakagami-m fading parameter....
Conference Paper
Full-text available
In this paper, we investigate a novel random selection strategy for dual-hop Single-Carrier Frequency-Domain Equalization (SC-FDE) in cooperative systems with multiple relays and amplify-and-forward relaying employing fuzzy comprehensive evaluation-based algorithm. We address the problem of optimal resource allocation for SC-FDE minimum mean square...
Conference Paper
Full-text available
Multiple Input Multiple Output (MIMO) Orthogonal Frequency Division Multiplexing (OFDM), MIMO-OFDM, is considered as a spectrally efficient approach to achieve high throughput communications. This paper investigates the performance of MIMO-OFDM system using the proposed NLMS adaptive equalizer and the developed Singular Value Decomposition (SVD) te...
Article
Full-text available
In wireless communications, multi-channel transmission is utilized to obtain high capacity and better throughput efficiency. Multiple-Input Multiple-Output (MIMO) Orthogonal Frequency Division Multiplexing (OFDM) is considered as spectrally efficient system to achieve high throughput communications. This paper investigates the performance enhanceme...
Conference Paper
Full-text available
In this paper, we investigate a novel Random-based Fair-Allocation Fuzzy Comprehensive Evaluation- based Strategy with Relay Clustering (RFRC) for dual-hop Single- Carrier Frequency-Domain Equalization (SC-FDE) in cooperative systems with multiple relays and amplify-and- forward (AF) relaying. We address the problem of fair resource allocation for...
Conference Paper
Full-text available
In wireless communications, multi-channel transmission is utilized to obtain high capacity and better throughput efficiency. Multiple-Input Multiple-Output (MIMO) Orthogonal Frequency Division Multiplexing (OFDM) is considered as a spectrally efficient approach to achieve high throughput communications. This paper investigates the performance of th...
Conference Paper
Full-text available
In this paper, we study the lifetime of a dualhop multi-relay wireless sensor network (WSN) OFDM-based system using an adaptive random relay selection strategy. In this strategy, the relays cooperate according to contribution factors associated with each relay. An analytical study of the system lifetime is presented along with simulation results. T...
Conference Paper
Full-text available
Sub-optimal Zero-Padding Orthogonal Frequency Division Multiplexing (ZP-OFDM) receivers have been developed in the literature to trade-off performance with complexity. In this paper, we propose a novel cooperative low-complexity minimum mean square error (LC MMSE)-ZP-OFDM receiver that is able to bring complexity reduction in the receiver design, w...
Article
Full-text available
Microwave propagation in a nonuniform, collisional, and magnetized plasma slab with different magnetic field configurations is investigated using the magneto-ionic Appleton- Hartree theory.For the zero B-field case, a narrow stealth band is obtained, while for parallel and perpendicular propagation with respect to the B-field, results show a wider...
Article
Full-text available
In this paper, we investigate the performance of single-carrier frequency-domain equalization (SC-FDE) for distributed space-time block coded (DSTBC) systems with Non-Regenerative (or amplify-and-forward) relaying over frequency-selective Rician fading channels. Our performance analysis demonstrates that SC-FDE for DSTB is able to achieve a maximum...
Conference Paper
Full-text available
In this paper, the symbol error rate (SER) performance of a relay-based amplify-and-forward (AF) system is analyzed over fading channels . The relay power-gain is optimized with the objective of maximizing the received signal-to-noise-ratio (SNR) at the destination, given that the fading statistics of the links are known at the relay node. The Gaus...
Article
Full-text available
The outage probability in a network of cooperative unmanned airborne vehicles (UAVs) over generalized fading channels is studied analytically using finite mixture with expectation maximization technique. A relay-based topology with one ground control unit (GCU) is considered, where the cooperative UAVs can communicate with the GCU directly or throu...
Article
Full-text available
In this paper, we consider the analysis of a cooperative relay-based amplify-and-forward system in terms of average and outage capacity over fading channels. We first optimize the relay gain with the objective of maximizing the received signal-to-noise-ratio (SNR) at the destination, given that the fading statistics of the links in the cooperative...
Article
Full-text available
In this paper, we consider the analysis of a cooperative relay-based amplify-and-forward system in terms of average and outage capacity over fading channels. We first optimize the relay gain with the objective of maximizing the received signal-to-noise-ratio (SNR) at the destination, given that the fading statistics of the links in the cooperative...
Article
Full-text available
Stimulated Brillouin Backscattering (SBBS) of a large amplitude, extraordinary electromagnetic wave travelling across an ambient dc-magnetic field in a strongly coupled plasma is investigated. Using a magnetohydrodynamic model, a system of coupled equations that describes the problem is derived and then solved for a strongly coupled regime. The SBB...
Chapter
Cooperative communications among group of teleoperated unmanned ground vehicles (UGVs) allows to exploit spatial diversity in wireless fading channels by relaying signals between each other. Due to the high speed of the UGVs, the nature of the channel environments and the possible co-channel interference, the effect of multipath propagation and the...
Article
Full-text available
The performance analysis of multi-carrier relay-based Unmanned Airborne Vehicles (UAVs) network is studied analytically over fading channels. A relay-based topology with one ground control unit (GCU) is assumed, where the cooperative UAVs can communicate with the GCU directly or through relay. The outage probability of the system is defined as the...