Browsing by Author "Al-Ali A."
Now showing items 1-5 of 5
-
A new chaos-based image-encryption and compression algorithm
Al-Maadeed,Somaya; Al-Ali A.; Abdalla T. ( Hindawi Publishing Corporation , 2012 , Article)We propose a new and efficient method to develop secure image-encryption techniques. The new algorithm combines two techniques: encryption and compression. In this technique, a wavelet transform was used to decompose the ... -
A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security
Al-Garadi M.A.; Mohamed A.; Al-Ali A.K.; Du X.; Ali I.; Guizani M.... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)The Internet of Things (IoT) integrates billions of smart devices that can communicate with one another with minimal human intervention. IoT is one of the fastest developing fields in the history of computing, with an ... -
Distributed CNN Inference on Resource-Constrained UAVs for Surveillance Systems: Design and Optimization
Jouhari M.; Al-Ali A.K.; Baccour E.; Mohamed A.; Erbad A.; Guizani M.; Hamdi M.... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)Unmanned aerial vehicles (UAVs) have attracted great interest in the last few years owing to their ability to cover large areas and access difficult and hazardous target zones, which is not the case of traditional systems ... -
Light-weight encryption of wireless communication for implantable medical devices using henon chaotic system
Belkhouja T.; Mohamed A.; Al-Ali A.K.; Du X.; Guizani M. ( Institute of Electrical and Electronics Engineers Inc. , 2017 , Conference Paper)Implantable Medical Devices (IMDs) are a growing industry regarding personal health care and monitoring. In addition, they provide patients with efficient treatments. In general, these devices use wireless communication ... -
Performance Evaluation of Hyperledger Fabric
Shalaby S.; Abdellatif A.A.; Al-Ali A.; Mohamed A.; Erbad A.; Guizani M.... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)Blockchain is a distributed secure ledger that eliminates the need for centralized authority to store data. The centralized approach has several limitations as it is a Single-Point-of-Failure and a third-party might be ...