Publications by authors named "Jehad Ali"

Cooperative spectrum sensing (CSS) involves multiple secondary users (SUs) reporting primary user (PU) channel sensing states to the fusion center (FC). However, the high overheads associated with multi-user CSS impose power limitations that limit its usefulness in unmanned aerial vehicle (UAV) networks. To address this challenge, we propose a virtual CSS, where a single UAV conducts CSS while following a circular flight trajectory in the air.

View Article and Find Full Text PDF

Cerebral microbleeds (CMBs) in the brain are the essential indicators of critical brain disorders such as dementia and ischemic stroke. Generally, CMBs are detected manually by experts, which is an exhaustive task with limited productivity. Since CMBs have complex morphological nature, manual detection is prone to errors.

View Article and Find Full Text PDF

In vehicular ad hoc networks (VANETs), helpful information dissemination establishes the foundation of communication. One of the significant difficulties in developing a successful dissemination system for VANETs is avoiding traffic fatalities. Another essential success metric is the transfer of reliable and secure warning messages through the shortest path, particularly on highways with high mobility.

View Article and Find Full Text PDF

The software-defined networking (SDN) standard decouples the data and control planes. SDN is used in the Internet of Things (IoT) due to its programmability, central view and deployment of innovative protocols, and is known as SD-IoT. However, in SD-IoT, controller selection has never been studied.

View Article and Find Full Text PDF

The Software-Defined Networking (SDN) paradigm has transferred network intelligence from network devices to a centralized controller. Controllers are distributed in a network to eliminate a single point of failure (SPOF) and improve reliability and balance load. In Software-Defined Internet of Things (SD-IoT), sensors exchange data with a controller on a regular basis.

View Article and Find Full Text PDF

Due to the value and importance of patient health records (PHR), security is the most critical feature of encryption over the Internet. Users that perform keyword searches to gain access to the PHR stored in the database are more susceptible to security risks. Although a blockchain-based healthcare system can guarantee security, present schemes have several flaws.

View Article and Find Full Text PDF

In this paper we introduce a real Pashtu handwritten numerals dataset (PHND) having 50,000 scanned images and make publicly available for research and scientific use. Although more than fifty million people in the world use this language for written and oral communication, no significant efforts are devoted to the Pashtu Optical Character Recognition (POCR). We present a new approach for Pahstu handwritten numerals recognition (PHNR) based on deep neural networks.

View Article and Find Full Text PDF

Internet of Things (IoT) is a promising technology that uses wireless sensor networks to enable data collection, monitoring, and transmission from the physical devices to the Internet. Due to its potential large scale usage, efficient routing and Medium Access Control (MAC) techniques are vital to meet various application requirements. Most of the IoT applications need low data rate and low powered wireless transmissions and IEEE 802.

View Article and Find Full Text PDF

The software-defined networking (SDN) paradigm has simplified the management of computer networks by decoupling data and control planes. Moreover, the separation of the data and control planes has transitioned network complexity from traditional devices to controllers; therefore, controllers have become indispensable entities in SDN. Controllers have multiple features and direct the network from a central point and respond to updates to topological changes.

View Article and Find Full Text PDF