Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (3)

Search Parameters:
Authors = Abdallah Khreishah

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
27 pages, 816 KiB  
Article
Power-Efficient Wireless Coverage Using Minimum Number of UAVs
by Ahmad Sawalmeh, Noor Shamsiah Othman, Guanxiong Liu, Abdallah Khreishah, Ali Alenezi and Abdulaziz Alanazi
Sensors 2022, 22(1), 223; https://doi.org/10.3390/s22010223 - 29 Dec 2021
Cited by 21 | Viewed by 2885
Abstract
Unmanned aerial vehicles (UAVs) can be deployed as backup aerial base stations due to cellular outage either during or post natural disaster. In this paper, an approach involving multi-UAV three-dimensional (3D) deployment with power-efficient planning was proposed with the objective of minimizing the [...] Read more.
Unmanned aerial vehicles (UAVs) can be deployed as backup aerial base stations due to cellular outage either during or post natural disaster. In this paper, an approach involving multi-UAV three-dimensional (3D) deployment with power-efficient planning was proposed with the objective of minimizing the number of UAVs used to provide wireless coverage to all outdoor and indoor users that minimizes the required UAV transmit power and satisfies users’ required data rate. More specifically, the proposed algorithm iteratively invoked a clustering algorithm and an efficient UAV 3D placement algorithm, which aimed for maximum wireless coverage using the minimum number of UAVs while minimizing the required UAV transmit power. Two scenarios where users are uniformly and non-uniformly distributed were considered. The proposed algorithm that employed a Particle Swarm Optimization (PSO)-based clustering algorithm resulted in a lower number of UAVs needed to serve all users compared with that when a K-means clustering algorithm was employed. Furthermore, the proposed algorithm that iteratively invoked a PSO-based clustering algorithm and PSO-based efficient UAV 3D placement algorithms reduced the execution time by a factor of ≈1/17 and ≈1/79, respectively, compared to that when the Genetic Algorithm (GA)-based and Artificial Bees Colony (ABC)-based efficient UAV 3D placement algorithms were employed. For the uniform distribution scenario, it was observed that the proposed algorithm required six UAVs to ensure 100% user coverage, whilst the benchmarker algorithm that utilized Circle Packing Theory (CPT) required five UAVs but at the expense of 67% of coverage density. Full article
Show Figures

Figure 1

35 pages, 478 KiB  
Article
Cloud Computing Security: A Survey
by Issa M. Khalil, Abdallah Khreishah and Muhammad Azeem
Computers 2014, 3(1), 1-35; https://doi.org/10.3390/computers3010001 - 3 Feb 2014
Cited by 221 | Viewed by 46050
Abstract
Cloud computing is an emerging technology paradigm that migrates current technological and computing concepts into utility-like solutions similar to electricity and water systems. Clouds bring out a wide range of benefits including configurable computing resources, economic savings, and service flexibility. However, security and [...] Read more.
Cloud computing is an emerging technology paradigm that migrates current technological and computing concepts into utility-like solutions similar to electricity and water systems. Clouds bring out a wide range of benefits including configurable computing resources, economic savings, and service flexibility. However, security and privacy concerns are shown to be the primary obstacles to a wide adoption of clouds. The new concepts that clouds introduce, such as multi-tenancy, resource sharing and outsourcing, create new challenges to the security community. Addressing these challenges requires, in addition to the ability to cultivate and tune the security measures developed for traditional computing systems, proposing new security policies, models, and protocols to address the unique cloud security challenges. In this work, we provide a comprehensive study of cloud computing security and privacy concerns. We identify cloud vulnerabilities, classify known security threats and attacks, and present the state-of-the-art practices to control the vulnerabilities, neutralize the threats, and calibrate the attacks. Additionally, we investigate and identify the limitations of the current solutions and provide insights of the future security perspectives. Finally, we provide a cloud security framework in which we present the various lines of defense and identify the dependency levels among them. We identify 28 cloud security threats which we classify into five categories. We also present nine general cloud attacks along with various attack incidents, and provide effectiveness analysis of the proposed countermeasures. Full article
Show Figures

Figure 1

24 pages, 270 KiB  
Article
An Adaptive OFDMA-Based MAC Protocol for Underwater Acoustic Wireless Sensor Networks
by Issa M. Khalil, Yasser Gadallah, Mohammad Hayajneh and Abdallah Khreishah
Sensors 2012, 12(7), 8782-8805; https://doi.org/10.3390/s120708782 - 27 Jun 2012
Cited by 40 | Viewed by 8729
Abstract
Underwater acoustic wireless sensor networks (UAWSNs) have many applications across various civilian and military domains. However, they suffer from the limited available bandwidth of acoustic signals and harsh underwater conditions. In this work, we present an Orthogonal Frequency Division Multiple Access (OFDMA)-based Media [...] Read more.
Underwater acoustic wireless sensor networks (UAWSNs) have many applications across various civilian and military domains. However, they suffer from the limited available bandwidth of acoustic signals and harsh underwater conditions. In this work, we present an Orthogonal Frequency Division Multiple Access (OFDMA)-based Media Access Control (MAC) protocol that is configurable to suit the operating requirements of the underwater sensor network. The protocol has three modes of operation, namely random, equal opportunity and energy-conscious modes of operation. Our MAC design approach exploits the multi-path characteristics of a fading acoustic channel to convert it into parallel independent acoustic sub-channels that undergo flat fading. Communication between node pairs within the network is done using subsets of these sub-channels, depending on the configurations of the active mode of operation. Thus, the available limited bandwidth gets fully utilized while completely avoiding interference. We derive the mathematical model for optimal power loading and subcarrier selection, which is used as basis for all modes of operation of the protocol. We also conduct many simulation experiments to evaluate and compare our protocol with other Code Division Multiple Access (CDMA)-based MAC protocols. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Back to TopTop