Sherif Tolba

Sherif Tolba
  • PhD
  • University of Connecticut

About

14
Publications
468
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
77
Citations
Current institution
University of Connecticut

Publications

Publications (14)
Conference Paper
Identifying the location of a target in an unbounded underwater environment is a challenging task. Limited and intermittent communication only adds to the difficulty of the process. Many target search algorithms use communication as an essential structural component to coordinate Autonomous Underwater Vehicles’ (AUV) motion and share sensory inform...
Conference Paper
Particle Swarm Optimization (PSO) can be used in swarm robotic search tasks to find extrema that represent targets. PSO assumes that particles can update their positions and velocities instantaneously in each iteration of the algorithm. For optimization purposes, this assumption is acceptable, however, it is not suitable when the algorithm is to be...
Conference Paper
Large scale missions in unpredictable and unstable underwater environments are beyond the capabilities of a single intelligent and complex robot. Relying on one robot is far from optimal as loss of the unit means failure of the whole mission. On the contrary, robotic swarms depend on large numbers of simple, cheap, and error-prone robots that exhib...
Conference Paper
A city-wide deployment of advanced sensing technology will, undoubtedly, transform the way we live and interact with the surroundings. A countless number of applications would be feasible if such deployment is available. Of immense importance is the protection of roads and other important infrastructure of a city. This is only one such applica...
Conference Paper
Underwater Sensor Networks (UWSN) have several applications in aquatic environments ranging from target tracking to environmental monitoring. Harsh nature of underwater environments and different conditions and properties of the medium compared to on-ground environment pose some challenges when it comes to the design of a robust system. One of thes...
Article
Modern ocean exploration and sensing approaches have been mainly based on Autonomous Underwater Vehicles (AUVs), Remotely Operated Vehicles (ROVs), and/or static Underwater Acoustic Sensor Networks (UASNs) deployments. Individual AUVs and ROVs represent a single point of failure in addition to being bulky and expensive as vehicles are usually full-...
Conference Paper
Underwater sensor networks (UWSN) have two major challenges: limited bandwidth and high propagation delay. In-network processing can improve the performance of UWSN data flow in the network, leading to better channel utilization. In order to do this, processing nodes have to be deployed to perform local processing, such as compression, mining, and...
Article
Underwater Sensor Networks are associated with a number of applications that require real-time delivery of large data. Examples include: still frame images or full-motion videos in seismic monitoring setups, oil pipe leak detection, and capturing sea activities. However, the transmission of large data relying only on acoustic communication is chall...
Conference Paper
High-speed rail (HSR) holds promise as an investment to modernize our country's transportation infrastructure and serve as a driver for our national economy. The five-hundred billion dollar price tag necessitates thorough analysis and planning upfront to ensure long-term success, including a well formulated vulnerability analysis to identify an opt...
Conference Paper
An important challenge for homeland security agencies is to properly understand the interaction between terrorists and the methods to protect and deter attacks on the transportation network. Examining the nature of these interactions can greatly assist the enhancement of existing technologies and guide the development of new ones. This interaction...
Article
In transportation networks, the vulnerable links will be those which play a critical role and are therefore the most likely to be attacked. High-volume edges with few alternative paths represent obvious system vulnerabilities. Conflict between a terrorist organization and a transportation management agency can be characterized as two opponents who...

Network

Cited By