Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

    Ahmad abdullah

    Abstract: Presently, mobile handheld device has successfully replaced traditional telephone to become the most popular wireless communication tools. Mobile Short Message Service (SMS) and Multimedia Message Service (MMS) fulfill almost... more
    Abstract: Presently, mobile handheld device has successfully replaced traditional telephone to become the most popular wireless communication tools. Mobile Short Message Service (SMS) and Multimedia Message Service (MMS) fulfill almost all the user requirements as ...
    Research Interests:
    Human life style change substantially when the cellular technology goes commercial. Short Messaging Service (SMS) and Multimedia Message Service (MMS) play important roles in our daily life. The recent report carried out by Mobile Data... more
    Human life style change substantially when the cellular technology goes commercial. Short Messaging Service (SMS) and Multimedia Message Service (MMS) play important roles in our daily life. The recent report carried out by Mobile Data Association (MDA) [1] shows that the yearly growth of SMS and MMS achieves 30 percent from year 2007 to 2008. Conventional SMS/MMS does not provide any protection on the text message sent. It causes the security threats such as privacy and message integrity. Mobile users seek for the solution to allow them to exchange confidential information in a safe environment. This leads to the implementation of M-PKI, which is an application that secures the mobile messaging service by using public key infrastructure (PKI). This new approach allows the end-user to send private and classified message via SMS. Besides, M-PKI offers message classification. This feature is specially designed to meet various user requirements on the level of security and performance....
    Research Interests:
    The 3rd Generation (3G) wireless mobile internet networks are ready to live up to its performance in computer networking and mobile devices, which have limitation on access voice quality and only up to 2M bit/sec for data rates. The 4th... more
    The 3rd Generation (3G) wireless mobile internet networks are ready to live up to its performance in computer networking and mobile devices, which have limitation on access voice quality and only up to 2M bit/sec for data rates. The 4th Generation (4G) wireless mobile internet networks combine current existing 3G cellular networks (i.e., IPv6, OFDM, CDMA2000, WCDMA and TD_SCDMA) and Wi-Fi (i.e., Wireless LAN) networks with fixed internet to support wireless mobile internet as the same quality of service as fixed internet, which is an evolution not only to move beyond the limitations and problems of 3G, but also to enhance the quality of services, to increase the bandwidth and to reduce the cost of the resource. IPv6 is a basic protocol for running on both 4G and 5G, which works on single bandwidth of 4G. The 5th wireless mobile internet network is a completed wireless communication with almost no limitation. In this paper, we propose Mix-Bandwidth data path for 5G real wireless world.
    Research Interests:
    In Mobile Cloud Computing (MCC), Virtual Machine (VM) migration based process offloading is a dominant approach to enhance Smart Mobile Devices (SMDs). A challenging aspect of VM deployment is the additional computing resources usage in... more
    In Mobile Cloud Computing (MCC), Virtual Machine (VM) migration based process offloading is a dominant approach to enhance Smart Mobile Devices (SMDs). A challenging aspect of VM deployment is the additional computing resources usage in the deployment and management of VM which obliges computing resources for VM creation and configuration. The management of VM comprises computing resources exploitation in the monitoring of VM in entire lifecycle and physical resources management for VM on SMDs. Therefore, VM migration based application offloading requires additional computing resource. Consequently computing resources demand and execution time of the application increases respectively. In this paper, we empirically review the impact of VM deployment and management on the execution time of application in diverse scenarios. We investigate VM deployment and management for application processing in simulation environment by employing CloudSim: a simulation toolkit that provides an exten...
    Delivering Rich User eXperience (RUX) with the current explosion of smartphone as real ubiquitous computing device requires adaptive application architecture. Rich Mobile Application (RMA) is likely the candidate architecture for future... more
    Delivering Rich User eXperience (RUX) with the current explosion of smartphone as real ubiquitous computing device requires adaptive application architecture. Rich Mobile Application (RMA) is likely the candidate architecture for future mobile applications to deliver rich, immersive experience to the smartphone users. Research and development in domain of RMA has started and results are appearing in literature which advocates its future trend and encourages review of RMAs. This article aims to present overview of RMA and states clear distinction between Rich Internet Applications (RIAs) - that are desktop-like Web applications - and RMAs to facilitate and accelerate development of smartphone-centric application development tools and technologies. RMAs are defined, their comprehensive overview is presented, and current trends are described. Our study shows that despite of literal similarity of RMA and RIA, they have dissimilar inward architectures. Implicitly, understanding the disti...
    The 5th generation is envisaged to be a complete network for wireless mobile internet, which has the capability to offer services for accommodating the application potential requirements without suffering the quality. The ultimate goal of... more
    The 5th generation is envisaged to be a complete network for wireless mobile internet, which has the capability to offer services for accommodating the application potential requirements without suffering the quality. The ultimate goal of 5G is to design a real wireless world, that is free from obstacles of the earlier generations. This requires an integration of networks. In this paper, we propose the design of Multi-Bandwidth Data Path by integrating the current and future networks for new network architecture of 5G real wireless world. We also present our proposed architecture and results of the simulation.
    Virtualization is generally adopted in server and desktop environments to provide for fault tolerance, resource management, and energy efficiency. Virtualization enables parallel execution of multiple operating systems (OSs) while sharing... more
    Virtualization is generally adopted in server and desktop environments to provide for fault tolerance, resource management, and energy efficiency. Virtualization enables parallel execution of multiple operating systems (OSs) while sharing the hardware resources. Virtualization was previously not deemed as feasible technology for mobile and embedded devices due to their limited processing and memory resource. However, the enterprises are advocating Bring Your Own Device (BYOD) applications that enable co-existence of heterogeneous OSs on a single mobile device. Moreover, embedded device require virtualization for logical isolation of secure and general purpose OSs on single device. In this paper we investigate the processor architectures in the mobile and embedded space while examining their formal virtualizabilty. We also compare the virtualization solutions enabling coexistence of multiple OSs in Multicore Processor System-on-Chip (MPSoC) mobile and embedded systems. We advocate th...
    ABSTRACT The availability of accurate solar radiation data is essential for designing as well as simulating the solar energy systems. In this study, by employing the long term daily measured solar data, a neural network auto-regressive... more
    ABSTRACT The availability of accurate solar radiation data is essential for designing as well as simulating the solar energy systems. In this study, by employing the long term daily measured solar data, a neural network auto-regressive model with exogenous inputs (NN-ARX) is applied to predict daily horizontal global solar radiation using day of the year as the sole input. The prime aim is to provide a convenient and precise way for rapid daily global solar radiation prediction, for the stations and their immediate surroundings with such an observation, without utilizing any meteorological-based inputs. To fulfill this, seven Iranian cities with different geographical locations and solar radiation characteristics are considered as case studies. The performance of NN-ARX is compared against the adaptive neuro-fuzzy inference system (ANFIS). The achieved results prove that day of the year-based prediction of daily global solar radiation by both NN-ARX and ANFIS models would be highly feasible owing to the accurate predictions attained. Nevertheless, the statistical analysis indicates the superiority of NN-ARX over ANFIS. In fact, the NN-ARX model represents high potential to follow the measured data favorably for all cities. For the considered cities, the attained statistical indicators of mean absolute bias error, root mean square error and coefficient of determination for the NN-ARX models are in the ranges of 0.44‒0.61 kWh/m2, 0.50‒0.71 kWh/m2 and 0.78‒0.91, respectively.
    ABSTRACT The emergence of Software Defined Networks (SDNs) promises to dramatically simplify network management and enable innovation through network programmability. Despite all the hype surrounded by the SDNs, exploiting its full... more
    ABSTRACT The emergence of Software Defined Networks (SDNs) promises to dramatically simplify network management and enable innovation through network programmability. Despite all the hype surrounded by the SDNs, exploiting its full potential is demanding. Security is still being the key concern and is an equally striking challenge that reduces the growth of SDNs. Moreover, the deployment of novel entities and the introduction of several architectural components of SDNs pose new security threats and vulnerabilities. Besides, the landscape of digital threats and cyber-attacks is evolving tremendously while considering SDNs as a potential target to have even more devastating effects than using simple networks. Security is not considered as part of the initial SDN design; therefore, it must be raised on the agenda. The paper discusses the state-of-the-art security solutions proposed to secure SDNs. We classify the security solutions in the literature by presenting a thematic taxonomy based on SDN layers/interfaces, security measures, simulation environments, and security objectives. Moreover, the paper points out the possible attacks and threat vectors targeting different layers/interfaces of the SDNs. The potential requirements and their key enablers for securing SDNs are also identified and presented. Besides, the paper gives great guidance for secure and dependable SDNs. Finally, we discuss open issues and challenges of SDN security that may deem appropriate to be tackled by researchers and professionals in the future.
    ABSTRACT Virtualization efficiently manages the ever-increasing demand for storage, computing, and networking resources in large-scale Cloud Data Centers. Virtualization attains multifarious resource management objectives including... more
    ABSTRACT Virtualization efficiently manages the ever-increasing demand for storage, computing, and networking resources in large-scale Cloud Data Centers. Virtualization attains multifarious resource management objectives including proactive server maintenance, load balancing, pervasive service availability, power management, and fault tolerance by virtual machine (VM) migration. VM migration is a resource-intensive operation as it constantly requires adequate CPU cycles, memory capacity, system cache, and network bandwidth. Consequently, it adversely affects the performance of running applications and cannot be entirely overlooked in contemporary data centers, particularly when user SLA and critical business goals are to be met. The unavailability of a comprehensive survey on VM migration schemes that covers various VM migration aspects such as migration patterns, sequence, application performance, bandwidth optimization, and migration granularity has motivated this review of existing schemes. This paper reviews state-of-the-art live and non-live VM migration schemes. Through an extensive literature review, a detailed thematic taxonomy is proposed for the categorization of VM migration schemes. Critical aspects and related features of current VM migration schemes are inspected through detailed qualitative investigation. We extract significant parameters from existing literature to discuss the commonalities and variances among VM migration schemes. Finally, open research issues and challenges with VM migration that require further consideration to develop optimal VM migration schemes in Cloud Data Centers are briefly addressed.
    ABSTRACT Modern Cloud Data Centers exploit virtualization for efficient resource management to reduce cloud computational cost and energy budget. Virtualization empowered by virtual machine (VM) migration meets the ever increasing demands... more
    ABSTRACT Modern Cloud Data Centers exploit virtualization for efficient resource management to reduce cloud computational cost and energy budget. Virtualization empowered by virtual machine (VM) migration meets the ever increasing demands of dynamic workload by relocating VMs within Cloud Data Centers. VM migration helps successfully achieve various resource management objectives such as load balancing, power management, fault tolerance, and system maintenance. However, being resource-intensive, the VM migration process rigorously affects application performance unless attended by smart optimization methods. Furthermore, a Cloud Data Centre exploits server consolidation and DVFS methods to optimize energy consumption. This paper reviews state-of-the-art bandwidth optimization schemes, server consolidation frameworks, DVFS-enabled power optimization, and storage optimization methods over WAN links. Through a meticulous literature review of state-of-the-art live VM migration schemes, thematic taxonomies are proposed to categorize the reported literature. The critical aspects of virtual machine migration schemes are investigated through a comprehensive analysis of the existing schemes. The commonalties and differences among existing VM migration schemes are highlighted through a set of parameters derived from the literature. Finally, open research issues and trends in the VM migration domain that necessitate further consideration to develop optimal VM migration schemes are highlighted. &
    ABSTRACT Dissection of the power output in a row of working turbines and the reliance on wind course in respect to the column heading is examined. The point is to portray the extent of the wake impacts and give a sign of the indication of... more
    ABSTRACT Dissection of the power output in a row of working turbines and the reliance on wind course in respect to the column heading is examined. The point is to portray the extent of the wake impacts and give a sign of the indication of wind bearing. The target is to delineate whether the uniting of wakes inside extensive wind homesteads can be depicted by basic direct models or whether the consideration of the two-route collaboration between the wind turbines and the limit layer is a fundamental essential for precise models of wakes to be utilized within future wind farm plan. Soft computing methodologies may be utilized as substitute for analytical approach since they provides some benefits such as no need to information of internal system parameters, compact solution for multi-variable problems. This investigation dealt with application of adaptive neuro-fuzzy inference system (ANFIS) for predicting the wake power and wind speed deficit. The best prediction was observed for free wind speed of 8 m/s according to the coefficient of determination (R2) and Pearson coefficient (r). The R2 and r were computed as 0.9893 and 0.994638 for wake wind speed deficit and 0.9967 and 0.998371 for power deficit ratio ANFIS prediction.
    Research Interests:
    ABSTRACT Delivering Rich User eXperience (RUX) with the current explosion of smartphone as real ubiquitous computing device requires adaptive application architecture. Rich Mobile Application (RMA) is likely the candidate architecture for... more
    ABSTRACT Delivering Rich User eXperience (RUX) with the current explosion of smartphone as real ubiquitous computing device requires adaptive application architecture. Rich Mobile Application (RMA) is likely the candidate architecture for future mobile applications to deliver rich, immersive experience to the smartphone users. Research and development in domain of RMA has started and results are appearing in literature which advocates its future trend and encourages review of RMAs. This article aims to present overview of RMA and states clear distinction between Rich Internet Applications (RIAs) - that are desktop-like Web applications - and RMAs to facilitate and accelerate development of smartphone-centric application development tools and technologies. RMAs are defined, their comprehensive overview is presented, and current trends are described. Our study shows that despite of literal similarity of RMA and RIA, they have dissimilar inward architectures. Implicitly, understanding the distinctions between richness delivery in PCs and smartphones as well as knowledge of inward similarity and difference between RIAs and RMAs contribute toward development of enhanced smartphone's applications to deliver RUX to mobile clients.
    Research Interests:
    Lens system design is an important factor in image quality. The main aspect of the lens system design methodology is the optimization procedure. Since optimization is a complex, nonlinear task, soft computing optimization algorithms can... more
    Lens system design is an important factor in image quality. The main aspect of the lens system design methodology is the optimization procedure. Since optimization is a complex, nonlinear task, soft computing optimization algorithms can be used. There are many tools that can be employed to measure optical performance, but the spot diagram is the most useful. The spot diagram gives an indication of the image of a point object. In this paper, the spot size radius is considered an optimization criterion. Intelligent soft computing scheme support vector machines (SVMs) coupled with the firefly algorithm (FFA) are implemented. The performance of the proposed estimators is confirmed with the simulation results. The result of the proposed SVM-FFA model has been compared with support vector regression (SVR), artificial neural networks, and generic programming methods. The results show that the SVM-FFA model performs more accurately than the other methodologies. Therefore, SVM-FFA can be used as an efficient soft computing technique in the optimization of lens system designs.
    ABSTRACT Lens system design is an important factor in image quality. The main aspect of the lens system design methodology is the optimization procedure. Since optimization is a complex, non-linear task, soft computing optimization... more
    ABSTRACT Lens system design is an important factor in image quality. The main aspect of the lens system design methodology is the optimization procedure. Since optimization is a complex, non-linear task, soft computing optimization algorithms can be used. There are many tools that can be employed to measure optical performance, but the spot diagram is the most useful. The spot diagram gives an indication of the image of a point object. In this paper, the spot size radius is considered an optimization criterion. Intelligent soft computing scheme Support Vector Regression (SVR) is implemented. In this study, the polynomial and radial basis functions (RBF) are applied as the SVR kernel function to estimate the optimal lens system parameters. The performance of the proposed estimators is confirmed with the simulation results. The SVR results are then compared with other soft computing techniques. According to the results, a greater improvement in estimation accuracy can be achieved through the SVR with polynomial basis function compared to other soft computing methodologies. The SVR coefficient of determination with the polynomial function was 0.9975 and with the radial basis function the was 0.964. The new optimization methods benefit from the soft computing capabilities of global optimization and multi-objective optimization rather than choosing a starting point by trial and error and combining multiple criteria into a single criterion in conventional lens design techniques.
    ABSTRACT Multi-sensor data fusion can be considered as a strong nonlinear system. A precise analytical solution is therefore a challenging one to obtain, thus making it is hard to dissect with routine diagnostic systems. Since... more
    ABSTRACT Multi-sensor data fusion can be considered as a strong nonlinear system. A precise analytical solution is therefore a challenging one to obtain, thus making it is hard to dissect with routine diagnostic systems. Since tried-and-true logical systems are extremely difficult to undertake, soft computing methodologies are deemed having potential for such applications. This paper presents the Support Vector Regression (SVR) methodology for sensor fusion to improve tracking ability. Radial basis function (RBF) and polynomial function are used as SVR kernel functions. The system combines Kalman filtering and soft computing principle, i.e. SVR, to structure an effective information combination method for the target framework. A radar-infrared system is proposed to adapt contextual changes and to lessen the dubious unsettling influence of information estimation from multi-sensory data. The experimental results show that an improvement in predictive accuracy and generalization capability can be achieved using the SVR with RBF kernel compared with the SVR with polynomial kernel approach.
    ehicular ad hoc networks (VANETs) form an evolving field of wireless technology that focuses on a wide range of useful applications from safety-related applications to infotainment services. Radio propagation models (RPMs) in VANETs... more
    ehicular ad hoc networks (VANETs) form an evolving field of wireless technology that focuses on a wide range of useful applications from safety-related applications to infotainment services. Radio propagation models (RPMs) in VANETs require a high level of realistic detail due to mobility, the nature of the network, technology limitations and urgency of information dissemination. Hence, developing realistic RPMs in VANETs is a challenging task. Nonetheless, a number of traditional models are considered realistic; however, the absence of a required level of detail is a critical aspect of currently employed RPMs. For instance, modeling obstacles in VANETs is a challenging research perspective. Two types of radio obstacles exist in an urban transportation environment: moving obstacles and static obstacles, both of which block radio signals in vehicleto-infrastructure and vehicle-to-vehicle communication. In this paper, a thematic taxonomy of existing RPMs is proposed and the major challenges involved in modeling realistic radio propagation for VANETs, especially in urban environments, are presented. Existing RPMs are classified and compared using the proposed taxonomy. These RPMs are grouped according to obstacle modeling pattern and are analyzed using important parameters, such as received signal strength, packet delivery ratio, delivery latency and average path length. Issues and challenges with existing RPMs are put forward and recommendations that may be helpful for developing realistic RPMs are made.
    Energy use management Farm management Environmental impacts Artificial intelligent Imperialist competitive algorithm
    ABSTRACT The main purpose of this paper is to determine what joints are most strained in the proposed underactuated finger by adaptive neuro-fuzzy methodology. For this, kinetostatic analysis of the finger structure is established with... more
    ABSTRACT The main purpose of this paper is to determine what joints are most strained in the proposed underactuated finger by adaptive neuro-fuzzy methodology. For this, kinetostatic analysis of the finger structure is established with added torsional springs in every single joint. Since the finger’s grasping forces depend on torsional spring stiffness in the joints, it is preferable to determine which joints have the most influence on grasping forces. Hence, the finger joints experiencing the most strain during the grasping process should be determined. It is desirable to select and analyze a subset of joints that are truly relevant or the most influential to finger grasping forces in order to build a finger model with optimal grasping features. This procedure is called variable selection. In this study, variable selection is modeled using the adaptive neuro-fuzzy inference system (ANFIS). Variable selection using the ANFIS network is performed to determine how the springs implemented in the finger joints affect the output grasping forces. This intelligent algorithm is applied using the Matlab environment and the performance is analyzed. The simulation results presented in this paper show the effectiveness of the developed method.
    "Gripping and holding objects are key tasks for robotic manipulators. The development of universal fingers able to pick up unfamiliar objects of widely varying shapes and surfaces is a very challenging task. Passively... more
    "Gripping and holding objects are key tasks for robotic manipulators. The development of universal fingers able to pick up unfamiliar objects of widely varying shapes and surfaces is a very challenging task. Passively compliant underactuated mechanisms are one way to obtain the finger which could accommodate to any irregular and sensitive grasping object. The aim of the underactuation is to use the power of one actuator to drive the open and close motion of the finger. The underactuation can morph shapes of the finger to accommodate to different objects. As a result, the underactuated fingers require less complex control algorithms. The fully compliant mechanism has multiple degrees of freedom and can be considered as an underactuated mechanism. This paper presents a new design of the adaptive underactuated compliant finger designed by topology optimization. The main points of this paper are in explanation of kinetostatic analysis of the proposed finger structure using approximate rigid-body model with added concentrated compliance in every single joint of the finger. The results can be used as estimation for gripping force or finger displacement. "
    The wind speed has a huge impact on the wind turbine output energy and safety. Because of this, many control algorithms use a measure of the wind speed to increase performance. Unfortunately, no precise measurement of the effective wind... more
    The wind speed has a huge impact on the wind turbine output energy and safety. Because of this, many control algorithms use a measure of the wind speed to increase performance. Unfortunately, no precise measurement of the effective wind speed is online available from direct measurements, which means that it must be estimated in order to make such control methods applicable in practice. In this paper, a novel algorithm for wind speed estimation in wind-power generation systems is proposed, which is based on adaptive neuro-fuzzy inference system (ANFIS). The inputs of the ANFIS wind speed estimator are chosen as the wind turbine power coefficient, rotational speed and blade pitch angle. During the offline training, a specified model, which relates the inputs to the output, is obtained. Then, the wind speed is determined online from the instantaneous inputs. Neural network in ANFIS adjusts parameters of membership function in the fuzzy logic of the fuzzy inference system (FIS). This intelligent estimator is implemented using Matlab/Simulink and the performances are investigated. The simulation results presented in this paper show the effectiveness of the developed method.
    ABSTRACT This paper presents an analysis on performance of logarithmic degree structured P2P (peer-to-peer) overlay networks. P2P network consist of highly transient peers, where peers join and leave the network randomly also known as... more
    ABSTRACT This paper presents an analysis on performance of logarithmic degree structured P2P (peer-to-peer) overlay networks. P2P network consist of highly transient peers, where peers join and leave the network randomly also known as dynamic environment. It is, therefore difficult to measure the performance of the parameters in real environment. The design of structured overlay networks is fragmented and due to various designs few simulations have been conducted to compare the protocols in dynamic environment. The outcome of the analysis helps the decision in choosing and designing better structured overlay protocol for P2P network. In order to evaluate the routing performance, this work simulates logarithmic-hop overlays - Chord, Pastry and Kademlia. The result shows that among Chord, Pastry and Kademlia protocols, performance of Kademlia is better than Chord and Pastry with 94.2-99% routing efficiency. Hence, Kademlia architecture is better choice to implement structured P2P network.
    ABSTRACT Mobile cloud computing (MCC) enables the development of computational intensive mobile applications by leveraging the application processing services of computational clouds. Contemporary distributed application processing... more
    ABSTRACT Mobile cloud computing (MCC) enables the development of computational intensive mobile applications by leveraging the application processing services of computational clouds. Contemporary distributed application processing frameworks use runtime partitioning of elastic applications in which additional computing resources are occurred in runtime application profiling and partitioning. A number of recent studies have highlighted the different aspects of MCC. Current studies, however, have overlooked into the mechanism of application partitioning for MCC. We consider application partitioning to be an independent aspect of dynamic computational offloading and therefore we review the current status of application partitioning algorithms (APAs) to identify the issues and challenges. To the best of our knowledge, this paper is the first to propose a thematic taxonomy for APAs in MCC. The APAs are reviewed comprehensively to qualitatively analyze the implications and critical aspects. Furthermore, the APAs are analyzed based on partitioning granularity, partitioning objective, partitioning model, programming language support, presence of a profiler, allocation decision, analysis technique, and annotation. This paper also highlights the issues and challenges in partitioning of elastic application to assist in selecting appropriate research domains and exploring lightweight techniques of distributed application processing in MCC.
    ABSTRACT Cognitive Radio Networks have changed the communication paradigm by opportunistically using available spectrum. In such networks, Secondary User vacates the channel when it detects the Primary User. The frequent channel switching... more
    ABSTRACT Cognitive Radio Networks have changed the communication paradigm by opportunistically using available spectrum. In such networks, Secondary User vacates the channel when it detects the Primary User. The frequent channel switching degrades the throughput of Cognitive Radio Networks. Current schemes suggest only the selection of Primary Channel if there is not any licensed user available. We propose the fuzzy-based system to estimate gain of candidate channels so that the most advantageous channel can be selected. We also incorporate the Signal-to-Interference-plus-Noise Ratio with Primary User Interference to take handoff decision. We claim that Quality-aware channel selection along with primary user susceptibility is important to improve the throughput of Cognitive Radio Networks. Particularly, in multi-radio, multi-channel cognitive radio networks, the throughput can be increased by not only parallel transmissions but also by selecting the channels with higher channel gain.

    And 28 more