Browsing by Author "Al-Ali A."
Now showing items 1-15 of 15
-
3-D Stochastic Geometry-based Modeling and Performance Analysis of Efficient Security Enhancement scheme for IoT Systems
Chamkhia H.; Erbad A.; Al-Ali A.; Mohamed A.; Refaey A.; Guizani M.... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Internet of Things (IoT) systems are becoming core building blocks for different services and applications supporting every day’s life. The heterogeneous nature of IoT devices and the complex use scenarios make it ... -
A New Forensic Video Database for Source Smartphone Identification: Description and Analysis
Akbari, Y.; Al-Maadeed, Somaya; Almaadeed, N.; Najeeb, A.A.; Al-ali, A.; Khelifi, F.; Lawgaly, A.... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)In recent years, the field of digital imaging has made significant progress, so that today every smartphone has a built-in video camera that allows you to record high-quality video for free and without restrictions. On the ... -
A review on soccer player tracking techniques based on extracted features
Al-Ali A.; Almaadeed S. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)Playing games specially soccer is one of the most likable activities which performed by a large mass base in most countries. All the broadcasted videos of these games are taken as an extensive challenging by researchers ... -
Design, structural, C–H….H–C supramolecular interactions and computational investigations of Cd(N∩N″)X2 complexes based on an asymmetrical 1,2-diamine ligand: physicochemical and thermal analysis
Warad I.; Alkanad K.; Suleiman M.; Kumara K.; Al-Ali A.; Mohammed Y.H.E.; Lokanath N.K.; Zarrouk A.... more authors ... less authors ( Taylor and Francis Ltd. , 2019 , Article)Complexes [N∩N″CdX2] (X = Cl (1), I (2) and N∩N″ is N1,N1,N2-triethylethane-1,2-diamine) are reported. The desired complexes were prepared under identical synthetic conditions and characterized by ESI-MS, UV-vis, CHN-elemental ... -
Drone-SCNet: Scaled Cascade Network for Crowd Counting on Drone Images
Elharrouss O.; Almaadeed N.; Abualsaud K.; Al-Ali A.; Mohamed A.; Khattab T.; Al-Maadeed, Somaya... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Crowd management is an essential task to ensure the safety and smoothness of any event. Using novel technologies, including surveillance cameras, drones, and the communication techniques between security agents, the control ... -
DroneRF dataset: A dataset of drones for RF-based detection, classification and identification
Allahham M.S.; Al-Sa'd M.F.; Al-Ali A.; Mohamed A.; Khattab T.; Erbad A.... more authors ... less authors ( Elsevier Inc. , 2019 , Article)Modern technology has pushed us into the information age, making it easier to generate and record vast quantities of new data. Datasets can help in analyzing the situation to give a better understanding, and more importantly, ... -
DTW based Authentication for Wireless Medical Device Security
Rathore H.; Al-Ali A.; Mohamed A.; Du X.; Guizani M. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)Wireless medical devices play an important role in providing safety and privacy to patients suffering from major health issues. These light-weight devices can be worn inside or outside the patient's body and provide more ... -
Effect of Annotation on Multiple-Player-Tracking Algorithms
Al-Ali A.; Al-Maadeed S. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)For most people from all ages and genders, participation in sports becomes part of their life, especially participation in soccer matches, which are considered a symbol of healthy living and active attitudes of families. ... -
Fuzzy Elliptic Curve Cryptography for Authentication in Internet of Things
Abdaoui A.; Erbad A.; Al-Ali A.; Mohamed A.; Guizani M. ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)The security and privacy of the network in Internet of Things (IoT) systems are becoming more critical as we are still more dependent on smart systems. Considering that packets are exchanged between the end user and the ... -
Indoor positioning and wayfinding systems: a survey
Kunhoth J.; Karkar A.G.; Al-Maadeed, Somaya; Al-Ali A. ( Springer , 2020 , Article)Navigation systems help users access unfamiliar environments. Current technological advancements enable users to encapsulate these systems in handheld devices, which effectively increases the popularity of navigation systems ... -
On Physical Layer Security in Energy-Efficient Wireless Health Monitoring Applications
Eldiwany B.E.; Abdellatif A.A.; Mohamed A.; Al-Ali A.; Guizani M.; Du X.... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)In this paper, we investigate a multi-objective optimization framework for secure wireless health monitoring applications. In particular, we consider a legitimate link for the transmission of a vital EEG signal, threatened ... -
Performance Analysis of IoT Physical layer Security Using 3-D Stochastic Geometry
Chamkhia H.; Al-Ali A.; Mohamed A.; Guizani M.; Erbad A.; Refaey A.... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)The internet of things (IoT) is becoming part of the infrastructure supporting various services in every day's life. Due to the complex nature of IoT systems with heterogeneous devices, the needed security and privacy ... -
Performance Analysis of PLS key generation-based Secure NOMA-enabled IoT Networks in the presence of Untrusted Users
Chamkhia H.; Al-Ali A.; Mohamed A.; Guizani M.; Erbad A.; Refaey A.... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)In Internet of Things (IoT), a massive amount of sensitive data is generated and transmitted by IoT devices. Security risks represent a major concern in IoT, especially when using innovative techniques such as Non-Orthogonal ... -
RF-based drone detection and identification using deep learning approaches: An initiative towards a large open source drone database
Al-Sa'd M.F.; Al-Ali A.; Mohamed A.; Khattab T.; Erbad A. ( Elsevier B.V. , 2019 , Article)The omnipresence of unmanned aerial vehicles, or drones, among civilians can lead to technical, security, and public safety issues that need to be addressed, regulated and prevented. Security agencies are in continuous ... -
Towards Extended Bit Tracking for Scalable and Robust RFID Tag Identification Systems
Fahim A.; Elbatt T.; Mohamed A.; Al-Ali A. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Article)The surge in demand for Internet of Things (IoT) systems and applications has motivated a paradigm shift in the development of viable radio frequency identification technology (RFID)-based solutions for ubiquitous real-Time ...