Browsing Information Intelligence by Author "Mohamed A."
Now showing items 1-5 of 5
-
Distributed interference management using Q-Learning in cognitive femtocell networks: New USRP-based implementation
Elsayed M.H.M.; Mohamed A. ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)Femtocell networks have become a promising solution in supporting high data rates for 5G systems, where cell densification is performed using the small femtocells. However, femtocell networks have many challenges. One of ... -
Optimizing Energy-Distortion Trade-off for Vital Signs Delivery in Mobile Health Applications
Almarridi A.; Kharbach S.; Yaacoub E.; Mohamed A. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)Healthcare is considered a top priority worldwide, considering the swift increase in the number of chronic patients who require continuous monitoring. This motivates the researchers to develop scalable remote health ... -
Proportionally fair approach for tor's circuits scheduling
Basyoni L.; Erbad A.; Mohamed A.; Refaey A.; Guizani M. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)The number of users adopting Tor to protect their online privacy is increasing rapidly. With a limited number of volunteered relays in the network, the number of clients' connections sharing the same relays is increasing ... -
QuicTor: Enhancing Tor for Real-Time Communication Using QUIC Transport Protocol
Basyoni L.; Erbad A.; Alsabah M.; Fetais N.; Mohamed A.; Guizani M.... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)In the past decades, the internet has emerged as the fastest way to access information. However, this revolutionary information age comes with its own set of challenges. The privacy of Internet users is at increasing risk ... -
Traffic Analysis Attacks on Tor: A Survey
Basyoni L.; Fetais N.; Erbad A.; Mohamed A.; Guizani M. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)The Tor anonymity network is one of the most popular and widely used tools to protect the privacy of online users. Tor provides defenses against multiple adversarial activities aiming to identify or trace the users. Traffic ...