no code implementations • 20 Jan 2024 • Marwan Dhuheir, Aiman Erbad, Ala Al-Fuqaha
Our simulation results prove that our introduced approach is better than the three state-of-the-art algorithms in providing coverage to strategic locations with fast convergence.
no code implementations • 8 Oct 2023 • Abdulrahman Soliman, Amr Mohamed, Elias Yaacoub, Nikhil V. Navkar, Aiman Erbad
Telemedicine applications have recently received substantial potential and interest, especially after the COVID-19 pandemic.
no code implementations • 21 Jul 2023 • Emna Baccour, Mhd Saria Allahham, Aiman Erbad, Amr Mohamed, Ahmed Refaey Hussein, Mounir Hamdi
In this context, we introduce a novel platform architecture to deploy a zero-touch PAI-as-a-Service (PAIaaS) in 6G networks supported by a blockchain-based smart system.
no code implementations • 21 Jul 2023 • Fazeela Mazhar Khan, Emna Baccour, Aiman Erbad, Mounir Hamdi
Hence, for dynamic systems, it is necessary to have a resilient DNN with an adaptive architecture that can downsize as per the available resources.
no code implementations • 25 May 2023 • Marwan Dhuheir, Aiman Erbad, Sinan Sabeeh
Our system model deals with real-time requests, aiming to find the optimal transmission power that guarantees higher reliability and low latency.
no code implementations • 9 Jan 2023 • Nora Abdelsalam, Saif Al-Kuwari, Aiman Erbad
Satellite communications emerged as a promising extension to terrestrial networks in future 6G network research due to their extensive coverage in remote areas and ability to support the increasing traffic rate and heterogeneous networks.
no code implementations • 21 Dec 2022 • Marwan Dhuheir, Emna Baccour, Aiman Erbad, Sinan Sabeeh Al-Obaidi, Mounir Hamdi
The deployment flexibility and maneuverability of Unmanned Aerial Vehicles (UAVs) increased their adoption in various applications, such as wildfire tracking, border monitoring, etc.
no code implementations • 27 Aug 2022 • Emna Baccour, Aiman Erbad, Amr Mohamed, Mounir Hamdi, Mohsen Guizani
In this paper, we present an approach that targets the security of collaborative deep inference via re-thinking the distribution strategy, without sacrificing the model performance.
no code implementations • 25 Sep 2021 • Mhd Saria Allahham, Sameh Sorour, Amr Mohamed, Aiman Erbad, Mohsen Guizani
Therefore, it is crucial to motivate edge devices to become learners and offer their computing resources, and either offer their private data or receive the needed data from the orchestrator and participate in the training process of a learning task.
no code implementations • 2 Sep 2021 • Mhd Saria Allahham, Sameh Sorour, Amr Mohamed, Aiman Erbad, Mohsen Guizani
The heterogeneity in edge devices' capabilities will require the joint optimization of the learners-orchestrator association and task allocation.
no code implementations • 23 Aug 2021 • Ilyes Mrad, Lutfi Samara, Alaa Awad Abdellatif, Abubakr Al-Abbasi, Ridha Hamila, Aiman Erbad
The usage of unmanned aerial vehicles (UAVs) in civil and military applications continues to increase due to the numerous advantages that they provide over conventional approaches.
no code implementations • 16 Aug 2021 • Abdullatif Albaseer, Mohamed Abdallah, Ala Al-Fuqaha, Aiman Erbad
Extensive experiments show that the proposed approach lowers the training time and accelerates the convergence rate by up to 50% while imbuing each client with a specialized model that is fit for its local data distribution.
no code implementations • 5 Aug 2021 • Alaa Awad Abdellatif, Naram Mhaisen, Zina Chkirbene, Amr Mohamed, Aiman Erbad, Mohsen Guizani
After that, we provide a deep literature review for the applications of RL in I-health systems.
1 code implementation • 14 Jul 2021 • Alaa Awad Abdellatif, Naram Mhaisen, Amr Mohamed, Aiman Erbad, Mohsen Guizani, Zaher Dawy, Wassim Nasreddine
Federated learning (FL) is a distributed learning methodology that allows multiple nodes to cooperatively train a deep learning model, without the need to share their local data.
no code implementations • 13 Jul 2021 • Marwan Dhuheir, Abdullatif Albaseer, Emna Baccour, Aiman Erbad, Mohamed Abdallah, Mounir Hamdi
Recognizing the patient's emotions using deep learning techniques has attracted significant attention recently due to technological advancements.
no code implementations • 9 Jul 2021 • Marwan Dhuheir, Emna Baccour, Aiman Erbad, Sinan Sabeeh, Mounir Hamdi
We formulate the model as an optimization problem that minimizes the latency between acquiring images and making the final decisions.
no code implementations • 20 Jun 2021 • Abdullatif Albaseer, Mohamed Abdallah, Ala Al-Fuqaha, Aiman Erbad
Specifically, we consider a problem that aims to find the optimal user's resources, including the fine-grained selection of relevant training samples, bandwidth, transmission power, beamforming weights, and processing speed with the goal of minimizing the total energy consumption given a deadline constraint on the communication rounds of FEEL.
no code implementations • 4 Jun 2021 • Emna Baccour, Fatima Haouari, Aiman Erbad, Amr Mohamed, Kashif Bilal, Mohsen Guizani, Mounir Hamdi
Crowdsourced live video streaming (livecast) services such as Facebook Live, YouNow, Douyu and Twitch are gaining more momentum recently.
no code implementations • 23 May 2021 • Mohammed Jouhari, Abdulla Al-Ali, Emna Baccour, Amr Mohamed, Aiman Erbad, Mohsen Guizani, Mounir Hamdi
Unmanned Aerial Vehicles (UAVs) have attracted great interest in the last few years owing to their ability to cover large areas and access difficult and hazardous target zones, which is not the case of traditional systems relying on direct observations obtained from fixed cameras and sensors.
no code implementations • 4 May 2021 • Emna Baccour, Naram Mhaisen, Alaa Awad Abdellatif, Aiman Erbad, Amr Mohamed, Mounir Hamdi, Mohsen Guizani
The confluence of pervasive computing and artificial intelligence, Pervasive AI, expanded the role of ubiquitous IoT systems from mainly data collection to executing distributed computations with a promising alternative to centralized learning, presenting various challenges.
no code implementations • 30 Mar 2021 • Abdullatif Albaseer, Mohamed Abdallah, Ala Al-Fuqaha, Aiman Erbad
Then, the problem is formulated as joint energy minimization and resource allocation optimization problem to obtain the optimal local computation time and the optimal transmission time that minimize the total energy consumption considering the worker's energy budget, available bandwidth, channel states, beamforming, and local CPU speed.
no code implementations • 10 Dec 2020 • Naram Mhaisen, Alaa Awad, Amr Mohamed, Aiman Erbad, Mohsen Guizani
Distributed learning algorithms aim to leverage distributed and diverse data stored at users' devices to learn a global phenomena by performing training amongst participating devices and periodically aggregating their local models' parameters into a global model.
no code implementations • 27 Jun 2020 • Alaa Awad Abdellatif, Lutfi Samara, Amr Mohamed, Mohsen Guizani, Aiman Erbad, Abdulla Al-Ali
Rapid evolution of wireless medical devices and network technologies has fostered the growth of remote monitoring systems.
no code implementations • 10 Feb 2020 • Deval Bhamare, Maede Zolanvari, Aiman Erbad, Raj Jain, Khaled Khan, Nader Meskin
In this work, we have a close look at the shift of the ICS from stand-alone systems to cloud-based environments.
Cryptography and Security Networking and Internet Architecture Systems and Control Systems and Control
no code implementations • 20 Jun 2019 • Fatima Haouari, Emna Baccour, Aiman Erbad, Amr Mohamed, Mohsen Guizani
This can be achieved by advocating a geo-distributed cloud infrastructure to allocate the multimedia resources as close as possible to viewers, in order to minimize the access delay and video stalls.
no code implementations • 23 Oct 2018 • Deval Bhamare, Tara Salman, Mohammed Samaka, Aiman Erbad, Raj Jain
As a result of this, researchers prefer to generate datasets for training and testing purpose in the simulated or closed experimental environments which may lack comprehensiveness.
1 code implementation • 23 Jan 2018 • Husam Al Jawaheri, Mashael Al Sabah, Yazan Boshmaf, Aiman Erbad
We investigate the feasibility of deanonymizing users of Tor hidden services who rely on Bitcoin as a payment method by exploiting public information leaked from online social networks, the Blockchain, and onion websites.
Cryptography and Security