Zeb, K., Saleem, K., Al Muhtadi, J. & Thuemmler, C. (2016). U-Prove Based Security Framework for Mobile Device Authentication in eHealth Networks. In 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom), 562-567. doi:10.1109/HealthCom.2016.7749518. ISBN 978-1-5090-3370-6
Cybersecurity in the health care domain is one of the most important and critical issues of this era. In fact, it was reported in 2014 that on the black market medical records...
Wadhaj, I., Kristof, I., Romdhani, I. & Al-Dubai, A. (2015). Performance evaluation of the RPL Protocol in fixed and mobile sinks low-power and lossy networks. In Proceedings of the 14th IEEE International Conference on Ubiquitous Computing and Communications (IUCC 2015), 1600-1605. doi:10.1109/CIT/IUCC/DASC/PICOM.2015.241. ISBN 978-1-5090-0153-8
Low-Power and Lossy-Network (LLN) are usually composed of static nodes, but the increase demand for mobility in mobile robotic and dynamic environment raises the question how ...
Qasem, M., Al-Dubai, A., Romdhani, I. & Yassien, M. B. (2015). A dynamic power tuning for the constrained application protocol of Internet of Things. In Society, I. C. & Society, I. C. (Eds.). 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, 1118-1122. doi:10.1109/CIT/IUCC/DASC/PICOM.2015.167. ISBN 9781509001545
Constrained application protocol (CoAP) has been designed for M2M and IoT applications. The resource directory (RD) in CoAP requires periodical updates by other nodes. However...
Scottish Funding Council
The development of interesting use cases for IPv6.
Associate Professor of audio Engineering
Senior Research Fellow
Al-Dubai, A. Y., Bani Khalaf, M., Gharibi, W. & Ouenniche, J. (2014). A new adaptive probabilistic broadcast protocol for vehicular networks. In 2015 IEEE 81st Vehicular Technology Conference (VTC Spring 2015) (4 Vols), 2875-2879. doi:10.1109/VTCSpring.2015.7145627. ISBN 9781479980888
In VANETs, there are many applications that use broadcast communication as a fundamental operational tool, in disseminating information of interest to other road users under t...
Chinenyeze, S., Liu, X. & Al-Dubai, A. (2014). An aspect oriented model for software energy efficiency in decentralised servers. In ict4s-14doi:10.2991/ict4s-14.2014.14. ISBN 978-94-62520-22-6
Green software is currently gaining interests with the increasing impact of IT in energy consumption. Green-ness in software however, can be achieved at various stages of the ...
Fang, D., Liu, X. & Romdhani, I. (2013). A Loosely-coupled Semantic Model for Efficient Cloud Service Search and Retrieval. In Zimmerman, W., Lee, Y. W. & Reich, C. (Eds.). Cloud Computing 2014: the Fifth International Conference on Cloud Computing, Grids and Virtualization, 6-11. ISBN 978-1-61208-338-4
As cloud services propagate along with the rapid development of cloud computing, issues raised in service selection and retrieval processes become increasingly critical. While...
Romdhani, I., Tawse, M. & Habibullah, S. (2010). Student project performance management system for effective final year and dissertation projects supervision. In London International Conference on Education LICE-2011
This paper presents the features of a new integrated and collaborative online supervision system for final year and dissertation projects. The system is currently under develo...
Qasem, M., Al-Dubai, A., Romdhani, I. & Yassein, M. B. (2014). ATP: adaptive tuning protocol for service discovery in Internet of Things. In ACM Digital Librarydoi:10.1145/2832987.2833058. ISBN 9781450334181
Energy is a precious resource in Internet of Things (IoT) especially with battery operated nodes, the overhead that consumes the battery power of the sensor nodes is a fundame...
Fan, L., Taylor, H. & Trinder, P. (2007). MAMBO: Membership-Aware Multicast with Bushiness Optimisation
Efficient application-level multicast (ALM) is an important research area supporting applications such as P2P file sharing, multi-player online games, and multimedia streaming...
Alsarhan, A., Itradat, A., Al-Dubai, A., Zomaya, A. & Min, G. (2017). Adaptive resource allocation and provisioning in Multi-Service Cloud Environments. IEEE Transactions on Parallel and Distributed Systems. doi:10.1109/TPDS.2017.2748578. ISSN 1045-9219
In the current cloud business environment, the cloud provider (CP) can provide a means for offering the required quality of service (QoS) for multiple classes of clients. We c...
Ballantyne, G., Baldock, K. C. R., Rendell, L. & Willmer, P. (2017). Pollinator importance networks illustrate the crucial value of bees in a highly speciose plant community. Scientific Reports. 7(1)doi:10.1038/s41598-017-08798-x. ISSN 2045-2322
Accurate predictions of pollination service delivery require a comprehensive understanding of the interactions between plants and flower visitors. To improve measurements of p...
Zhao, L., Al-Dubai, A., Li, X., Chen, G. & Min, G. (2016). A new efficient cross-layer relay node selection model for Wireless Community Mesh Networks. Computers and Electrical Engineering. 61, 361-372. doi:10.1016/j.compeleceng.2016.12.031. ISSN 0045-7906
Current networking technologies are not perfectly equipped to support Quality of Service (QoS), which is vital for real-time multimedia applications in Wireless Community Mesh...
Ballantyne, G., Baldock, K. C. R. & Willmer, P. G. (2015). Constructing more informative plant–pollinator networks: visitation and pollen deposition networks in a heathland plant community. Proceedings of the Royal Society B: Biological Sciences. 282(1814), 20151130. doi:10.1098/rspb.2015.1130. ISSN 0962-8452
Interaction networks are widely used as tools to understand plant–pollinator communities, and to examine potential threats to plant diversity and food security if the ecosyste...
Ambusaidi, M. A., Tan, Z., He, X., Nanda, P., Lu, L. F. & Jamdagni, A. (2013). Intrusion detection method based on nonlinear correlation measure. International Journal of Internet Protocol Technology. 8(2/3), 77. doi:10.1504/ijipt.2014.066377. ISSN 1743-8209
Cyber crimes and malicious network activities have posed serious threats to the entire internet and its users. This issue is becoming more critical, as network-based services,...
He, X., Chomsiri, T., Nanda, P. & Tan, Z. (2013). Improving cloud network security using the Tree-Rule firewall. Future Generation Computer Systems. 30, 116-126. doi:10.1016/j.future.2013.06.024. ISSN 0167-739X
This study proposes a new model of firewall called the ‘Tree-Rule Firewall’, which offers various benefits and is applicable for large networks such as ‘cloud’ networks. The r...
"The development of science and technology are increasingly affecting and changing the nature of processes in...