Zeb, K., Saleem, K., Al Muhtadi, J. & Thuemmler, C. (2016). U-Prove Based Security Framework for Mobile Device Authentication in eHealth Networks. In 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom), 562-567. doi:10.1109/HealthCom.2016.7749518. ISBN 978-1-5090-3370-6
Cybersecurity in the health care domain is one of the most important and critical issues of this era. In fact, it was reported in 2014 that on the black market medical records...
Qasem, M., Al-Dubai, A., Romdhani, I., & Yassien, M. B. (2015). A Dynamic Power Tuning for the Constrained Application Protocol of Internet of Things. In I. C. Society, & I. C. Society (Eds.), 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, 1118-1122. doi:10.1109/cit/iucc/dasc/picom.2015.167
Constrained application protocol (CoAP) has been designed for M2M and IoT applications. The resource directory (RD) in CoAP requires periodical updates by other nodes. However...
Wadhaj, I., Kristof, I., Romdhani, I., & Al-Dubai, A. (2015). Performance Evaluation of the RPL Protocol in Fixed and Mobile Sink Low-Power and Lossy-Networks. In Proceedings of the 14th IEEE International Conference on Ubiquitous Computing and Communications (IUCC 2015), 1600-1605. doi:10.1109/cit/iucc/dasc/picom.2015.241
Low-Power and Lossy-Network (LLN) are usually composed of static nodes, but the increase demand for mobility in mobile robotic and dynamic environment raises the question how ...
Scottish Funding Council
The development of interesting use cases for IPv6.
Associate Professor of audio Engineering
Zero Hour Lecturer
Senior Research Fellow
Krstie, D., Romdhani, I., Yassein, M. M. B., Minić, S., Petković, G., & Milacic, P. (2015). Level Crossing Rate of Ratio of Product of Two k-u Random Variables and Nakagami-m Random Variable. In 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, 1620-1625. doi:10.1109/cit/iucc/dasc/picom.2015.244
In this paper, ratio of product of two k-μ random variables and Nakagami-m random variable is analyzed. Statistical characteristics of ratio of product of two k-μ random varia...
Qasem, M., Al-Dubai, A., Imed, R., & Yassien, M. B. (2015). ATP: Adaptive Tuning Protocol for Service Discovery in Internet of Things. In ICEMIS '15 Proceedings of the The International Conference on Engineering & MIS 2015doi:10.1145/2832987.2833058
Energy is a precious resource in Internet of Things (IoT) especially with battery operated nodes, the overhead that consumes the battery power of the sensor nodes is a fundame...
Fang, D., Liu, X., & Romdhani, I. (2015). A Loosely-coupled Semantic Model for Efficient Cloud Service Search and Retrieval. In W. Zimmerman, Y. W. Lee, & C. Reich (Eds.), Cloud Computing 2014: the Fifth International Conference on Cloud Computing, Grids and Virtualization, 6-11
As cloud services propagate along with the rapid development of cloud computing, issues raised in service selection and retrieval processes become increasingly critical. While...
Al-Dubai, A. Y., Bani Khalaf, M., Gharibi, W. & Ouenniche, J. (2014). A new adaptive probabilistic broadcast protocol for vehicular networks. In 2015 IEEE 81st Vehicular Technology Conference (VTC Spring 2015) (4 Vols), 2875-2879. doi:10.1109/VTCSpring.2015.7145627. ISBN 9781479980888
In VANETs, there are many applications that use broadcast communication as a fundamental operational tool, in disseminating information of interest to other road users under t...
Chinenyeze, S., Liu, X. & Al-Dubai, A. (2014). An aspect oriented model for software energy efficiency in decentralised servers. In ict4s-14doi:10.2991/ict4s-14.2014.14. ISBN 978-94-62520-22-6
Green software is currently gaining interests with the increasing impact of IT in energy consumption. Green-ness in software however, can be achieved at various stages of the ...
Zhao, L., Al-Dubai, A., & Liu, X. (2007). A new multicast algorithm for wireless mesh networks. In 9th Annual Postgraduate Symposium, The Convergence of Telecommunications, Networking and Broadcasting
Wireless mesh networks, also known as “community wireless networks”, have been attracting much attention due to its promising technology. It is becoming a major
avenue for the...
Romdhani, I., Tawse, M. & Habibullah, S. (2010). Student project performance management system for effective final year and dissertation projects supervision. In London International Conference on Education LICE-2011
This paper presents the features of a new integrated and collaborative online supervision system for final year and dissertation projects. The system is currently under develo...
Fan, L., Taylor, H. & Trinder, P. (2007). MAMBO: Membership-Aware Multicast with Bushiness Optimisation
Efficient application-level multicast (ALM) is an important research area supporting applications such as P2P file sharing, multi-player online games, and multimedia streaming...
Tweneboah-Koduah, S., & Buchanan, W. J. (2018). Security Risk Assessment of Critical Infrastructure Systems: A Comparative Study. Computer Journal, doi:10.1093/comjnl/bxy002. ISSN 0010-4620
Recent cyberattacks on critical infrastructure systems coupled with the technology-induced complexity of the system of systems have necessitated a review of existing methods o...
Lo, O., Buchanan, W. J., Griffiths, P., & Macfarlane, R. (2017). Distance Measurement Methods for Improved Insider Threat Detection. Security and Communication Networks, 2018, (1-18). doi:10.1155/2018/5906368. ISSN 1939-0114
Insider threats are a considerable problem within cyber security and it is often difficult to detect these threats using signature detection. Increasing machine learning can p...
Al-Dubai, A. Y., Zomaya, A. Y., Alsarhan, A., Itradat, A., Al-Dubai, A., Zomaya, A., & Min, G. (2017). Adaptive Resource Allocation and Provisioning in Multi-Service Cloud Environments. IEEE Transactions on Parallel and Distributed Systems, 29(1), (31-42). doi:10.1109/tpds.2017.2748578. ISSN 1045-9219
In the current cloud business environment, the cloud provider (CP) can provide a means for offering the required quality of service (QoS) for multiple classes of clients. We c...
Ballantyne, G., Baldock, K. C. R., Rendell, L., & Willmer, P. (2017). Pollinator importance networks illustrate the crucial value of bees in a highly speciose plant community. Scientific Reports, 7(1), doi:10.1038/s41598-017-08798-x. ISSN 2045-2322
Accurate predictions of pollination service delivery require a comprehensive understanding of the interactions between plants and flower visitors. To improve measurements of p...
"The development of science and technology are increasingly affecting and changing the nature of processes in...