Ibrahim Elgendy - Academia.edu (original) (raw)
Papers by Ibrahim Elgendy
IEEE Transactions on Cloud Computing
Future Internet, 2021
Intelligence Edge Computing (IEC) is the key enabler of emerging 5G technologies networks and bey... more Intelligence Edge Computing (IEC) is the key enabler of emerging 5G technologies networks and beyond. IEC is considered to be a promising backbone of future services and wireless communication systems in 5G integration. In addition, IEC enables various use cases and applications, including autonomous vehicles, augmented and virtual reality, big data analytic, and other customer-oriented services. Moreover, it is one of the 5G technologies that most enhanced market drivers in different fields such as customer service, healthcare, education methods, IoT in agriculture and energy sustainability. However, 5G technological improvements face many challenges such as traffic volume, privacy, security, digitization capabilities, and required latency. Therefore, 6G is considered to be promising technology for the future. To this end, compared to other surveys, this paper provides a comprehensive survey and an inclusive overview of Intelligence Edge Computing (IEC) technologies in 6G focusing ...
Currently, 5G/IMT-2020 networks with their possibilities become more and more services of new are... more Currently, 5G/IMT-2020 networks with their possibilities become more and more services of new areas. These services are integrated into different human life activities. And in several cases, human life depends on Artificial Intelligence technologies, Autonomous Systems, and the Internet of Things (IoT), etc. Autonomous vehicles provide very strict requirements to the network in terms of ultra-low latency, high throughput, and wide coverage. To support these requirements, additional technologies must be employed. The current paper discusses the possibility of the use of airborne platforms aiming to support the terrestrial networks for autonomous vehicles realization as a part of delay-critical applications. Airborne platforms will help in the provisioning of safe road trips by delivering time-critical information to the vehicles globally, even in remote areas. In this paper, we discuss requirements and potential solutions for supporting the autonomous vehicle infrastructure, as a par...
Underwater Wireless Sensor Networks (UWSN) enables various oceanic applications which require eff... more Underwater Wireless Sensor Networks (UWSN) enables various oceanic applications which require effective packet transmission. In this case, sparse node distribution, dynamic network topology and inappropriate selection of relay nodes cause void holes. Addressing this problem, we present a Relay based Void Hole Prevention and Repair protocol (ReVOHPR) by multiple Autonomous Underwater Vehicles (AUV) for UWSN. ReVOHPR efficiently identifies and avoids void holes and trap relay nodes to avoid it. ReVOHPR adopts the following operations as Ocean Depth (levels) based Equal Cluster Formation, Dynamic Sleep Scheduling, Virtual Graph based Routing, and Relay Assisted Void Hole Repair. For energy efficient cluster forming, Entropy based Eligibility Ranking (E2R) is presented which elects stable cluster heads (CHs). Then, dynamic sleep scheduling is implemented Dynamic Kernel Kalman Filter (DK2F) algorithm in which Sleep and Active modes based on the nodes current status. Inter Cluster Routing...
In this paper, we describe our approach to classify disaster-related tweets into multilabel infor... more In this paper, we describe our approach to classify disaster-related tweets into multilabel information types (i.e, labels). We aim to filter first relevant tweets during disasters. Then, we assign tweets relevant information types. Information types can be SearchAndRescue, MovePeople and Volunteer. We employ a fine-tuned BERT model with 10 BERT layers. Further, we submitted our approach to the TREC-IS 2019 challenge, the evaluation results showed that our approach outperforms the F1-score of median score in identifying actionable information.
Wireless Communications and Mobile Computing, 2021
Ultrareliable and low-latency connection (URLLC) is one of the novel features in 5G networks and ... more Ultrareliable and low-latency connection (URLLC) is one of the novel features in 5G networks and subsequent generations, in which it targets to fulfill stringent requirements on data rates, reliability, and availability. Moreover, the multiconnectivity concept is introduced to meet these requirements, where multiple different technologies are connected simultaneously, and the data packet is duplicated and transmitted from multiple transmitters. To this end, in this paper, we present an analysis, model, and method to ensure the reliability of data delivery when organizing URLLC in 5G networks. In addition, a new approach based on the organization of multiple connections (multiconnectivity) and duplication of transmitted data is considered. Further, an analytical model is presented for assessing the probability of failure, taking into account the traffic intensity, the probability of failure of elements, and the number of used connections. Moreover, an efficient method is proposed for...
Wireless Communications and Mobile Computing, 2021
The paper proposes a solution to the problem of choosing the size of a cluster in an ultralow lat... more The paper proposes a solution to the problem of choosing the size of a cluster in an ultralow latency network. This work is aimed at designing a method for choosing the size of the digital cluster in an ultralow latency network taking into account the lengths of connecting lines. If the linear dimension calculation is based only on the latency requirements without specifics of building the communication line, it negatively affects timing characteristics. This paper shows the method taking into account the communication line features and basing on the fractal dimension estimation of the road network. The proposed method could be used in planning and designing networks with ultralow latencies. Finally, a numerical experiment was carried out, based on the data of electronic maps, which showed that the assessment of the fractal dimension of roads in the network’s service area makes it possible to increase the accuracy of the size of the formed cluster. Moreover, the proposed method can ...
Security and Communication Networks, 2021
Smart cities provide citizens with smart and advanced services to improve their quality of life. ... more Smart cities provide citizens with smart and advanced services to improve their quality of life. However, it has been observed that the collection, storage, processing, and analysis of heterogeneous data that are usually borne by citizens will bear certain difficulties. The development of the Internet of Things, cloud computing, social media, and other Industry 4.0 influencers pushed technology into a smart society’s framework, bringing potential vulnerabilities to sensor data, services, and smart city applications. These vulnerabilities lead to data security problems. We propose a decentralized data management system for smart and secure transportation that uses blockchain and the Internet of Things in a sustainable smart city environment to solve the data vulnerability problem. A smart transportation mobility system demands creating an interconnected transit system to ensure flexibility and efficiency. This article introduces prior knowledge and then provides a Hyperledger Fabric-...
IEEE Sensors Journal, 2021
With the wide application of Internet-of-Medical-Things (IoMTs) or sensor nodes which equipped wi... more With the wide application of Internet-of-Medical-Things (IoMTs) or sensor nodes which equipped with sensors. These networked sensors are used to gather enormous data from different smart healthcare applications, and this collected data process for making appropriate decisions. Edge computing is an efficient platform that provides computational resources to collect sensor data. In the meantime, intelligent and accurate resource management by Artificial Intelligence (AI) has become the center of attention, especially in healthcare systems. With the help of AI, IoMT based healthcare devices will remarkably enhance the computational speed and range. But the challenging issue in these energy-hungry, short battery life, and delay intolerant portable devices is inappropriate and inefficient classical trends of fair resource allotment. Thus, this paper proposes Computation Offloading using Reinforcement Learning (CORL) scheme to minimize latency and energy consumption. We first formulate the problem as a combined latency and energy cost minimization problem, satisfying the lack of limited battery capacity and service latency deadline constraints. Moreover, proposed algorithm search optimal available resources node to offload task towards the trade-off between energy and latency. The experimental results show the benefits of the proposed scheme in terms of saving energy, minimizing latency, and maximum utilization of node resources in edge-enabled sensor networks. We are using an iFogSim simulator to validate the proposed scheme under realistic assumptions.
Security and Communication Networks, 2021
Underwater wireless sensor networks (UWSNs) enable various oceanic applications which require eff... more Underwater wireless sensor networks (UWSNs) enable various oceanic applications which require effective packet transmission. In this case, sparse node distribution, imbalance in terms of overall energy consumption between the different sensor nodes, dynamic network topology, and inappropriate selection of relay nodes cause void holes. Addressing this problem, we present a relay-based void hole prevention and repair (ReVOHPR) protocol by multiple autonomous underwater vehicles (AUVs) for UWSN. ReVOHPR is a global solution that implements different phases of operations that act mutually in order to efficiently reduce and identify void holes and trap relay nodes to avoid it. ReVOHPR adopts the following operations as ocean depth (levels)-based equal cluster formation, dynamic sleep scheduling, virtual graph-based routing, and relay-assisted void hole repair. For energy-efficient cluster forming, entropy-based eligibility ranking (E2R) is presented, which elects stable cluster heads (CH...
Big Data, 2021
The Internet of Things (IoT) is permeating our daily lives through continuous environmental monit... more The Internet of Things (IoT) is permeating our daily lives through continuous environmental monitoring and data collection. The promise of low latency communication, enhanced security, and efficient bandwidth utilization lead to the shift from mobile cloud computing to mobile edge computing. In this study, we propose an advanced deep reinforcement resource allocation and security-aware data offloading model that considers the constrained computation and radio resources of industrial IoT devices to guarantee efficient sharing of resources between multiple users. This model is formulated as an optimization problem with the goal of decreasing energy consumption and computation delay. This type of problem is non-deterministic polynomial time-hard due to the curse-ofdimensionality challenge, thus, a deep learning optimization approach is presented to find an optimal solution. In addition, a 128-bit Advanced Encryption Standard-based cryptographic approach is proposed to satisfy the data security requirements. Experimental evaluation results show that the proposed model can reduce offloading overhead in terms of energy and time by up to 64.7% in comparison with the local execution approach. It also outperforms the full offloading scenario by up to 13.2%, where it can select some computation tasks to be offloaded while optimally rejecting others. Finally, it is adaptable and scalable for a large number of mobile devices.
The Journal of Supercomputing, 2021
In the Big Data Era, Entity Resolution (ER) faces many challenges such as high scalability, the c... more In the Big Data Era, Entity Resolution (ER) faces many challenges such as high scalability, the coexistence of complex similarity metrics, tautonymy and synonym, and the requirement of Data Quality Evaluation. Moreover, despite more than seventy years of development efforts, there is still a high demand for democratizing ER to reduce human participation in tuning parameters, data labeling, defining blocking functions, and feature engineering. This study aimed to explore a novel Stacked Dedupe Learning ER system with high accuracy and efficiency. The study evaluated sophisticated composition methods, such as Bidirectional Recurrent Neural Networks (BiRNNs) and Long Short-Term Memory (LSTM) hidden units, to renovate each tuple to word representation distribution in a sense to capture similarities amidst tuples. Also, pre-trained words embedding where they were not available, ways to learn and tune Word Representation Distribution customized for ER tasks under different scenarios were considered. More so, the Locality Sensitive Hashing (LSH) based blocking approach, which considered the entire attributes of a tuple and produced slighter blocks, compared with traditional methods with few attributes, were assessed. The algorithm was tested on multiple datasets namely benchmarks, and multi-lingual data. The experimental results showed that Stacked Dedupe Learning achieves high quality and good performance, and scales well compared to the existing solutions.
Wireless Networks, 2021
Computation offloading at mobile edge computing (MEC) servers can mitigate the resource limitatio... more Computation offloading at mobile edge computing (MEC) servers can mitigate the resource limitation and reduce the communication latency for mobile devices. Thereby, in this study, we proposed an offloading model for a multi-user MEC system with multi-task. In addition, a new caching concept is introduced for the computation tasks, where the application program and related code for the completed tasks are cached at the edge server. Furthermore, an efficient model of task offloading and caching integration is formulated as a nonlinear problem whose goal is to reduce the total overhead of time and energy. However, solving these types of problems is computationally prohibitive, especially for large-scale of mobile users. Thus, an equivalent form of reinforcement learning is created where the state spaces are defined based on all possible solutions and the actions are defined on the basis of movement between the different states. Afterwards, two effective Q-learning and Deep-Q-Network-based algorithms are proposed to derive the near-optimal solution for this problem. Finally, experimental evaluations verify that our proposed model can substantially minimize the mobile devices’ overhead by deploying computation offloading and task caching strategy reasonably.
IEEE Transactions on Network and Service Management, 2020
Mobile edge computing (MEC) is a new paradigm to alleviate resource limitations of mobile IoT net... more Mobile edge computing (MEC) is a new paradigm to alleviate resource limitations of mobile IoT networks through computation offloading with low latency. This article presents an efficient and secure multi-user multi-task computation offloading model with guaranteed performance in latency, energy, and security for mobile-edge computing. It does not only investigate offloading strategy but also considers resource allocation, compression and security issues. Firstly, to guarantee efficient utilization of the shared resource in multi-user scenarios, radio and computation resources are jointly addressed. In addition, JPEG and MPEG4 compression algorithms are used to reduce the transfer overhead. To fulfill security requirements, a security layer is introduced to protect the transmitted data from cyber-attacks. Furthermore, an integrated model of resource allocation, compression, and security is formulated as an integer nonlinear problem with the objective of minimizing the weighted sum of energy under a latency constraint. As this problem is considered as NP-hard, linearization and relaxation approaches are applied to transform the problem into a convex one. Finally, an efficient offloading algorithm is designed with detailed processes to make the computation offloading decision for computation tasks of mobile users. Simulation results show that our model not only saves about 46% of system overhead consumption in comparison with local execution but also scale well for large-scale IoT networks.
The 4th International Conference on Future Networks and Distributed Systems (ICFNDS), 2020
Edge computing is the key to building 5G Networks and Future 2030 Networks. Edge computing extend... more Edge computing is the key to building 5G Networks and Future 2030 Networks. Edge computing extends the cloud computing paradigm by placing resources close to the network edges to cope with the upcoming growth of connected devices. Future applications: health monitoring and predictive services within the framework of the Smart City, Internet of things (IoT), vehicular ad hoc network, autonomous vehicles present a new set of strict requirements, such as low latency. In this paper, we develop a set of methods for managing and orchestrating new intelligent services in a new network and computing infrastructure. In addition, we consider a new prototype using an orchestration system for managing the autonomous vehicles’ resources in comparison with the existing approaches to the design of high-load networks. This orchestration platform is based on independent Docker containers that running the orchestration system. The main goal of our proposed system is to build an efficient network architecture with a minimum delay to process the information based on neural networks. Finally, simulation results proved that the proposed system can significantly not only reduce the overall network load but also increase the quality of the transmitted stream across the network in comparison with traditional network architectures.
IEEE Access, 2020
The promise of low latency connectivity and efficient bandwidth utilization has driven the recent... more The promise of low latency connectivity and efficient bandwidth utilization has driven the recent shift from vehicular cloud computing (VCC) towards vehicular edge computing (VEC). This paper presents an advanced deep learning-based computational offloading algorithm for multilevel vehicular edge-cloud computing networks. To conserve energy and guarantee the efficient utilization of shared resources among multiple vehicles, an integration model of computational offloading, and resource allocation is formulated as a binary optimization problem to minimize the total cost of the entire system in terms of time and energy. However, this problem is considered NP-hard and it is computationally prohibitive to solve this type of problem, particularly for large-scale vehicles, due to the curse-of-dimensionality problem. Therefore, an equivalent reinforcement learning form is generated and we propose a distributed deep learning algorithm to find the near-optimal computational offloading decisions in which a set of deep neural networks are used in parallel. Finally, simulation results show that the proposed algorithm can exhibit fast convergence and significantly reduce the overall consumption of an entire system compared to the benchmark solutions. INDEX TERMS Computation offloading, vehicular edge-cloud computing, autonomous vehicles, 5G, resource allocation, deep reinforcement learning.
The Internet of Things (IoT) is permeating our daily lives where it can provide data collection t... more The Internet of Things (IoT) is permeating our daily lives where it can provide data collection tools and important measurement to inform our decisions. In addition, they are continually generating massive amounts of data and exchanging essential messages over networks for further analysis. The promise of low communication latency, security enhancement and the efficient utilization of bandwidth leads to the new shift change from Mobile Cloud Computing (MCC) towards Mobile Edge Computing (MEC). In this study, we propose an advanced deep reinforcement resource allocation and securityaware data offloading model that considers the computation and radio resources of industrial IoT devices to guarantee that shared resources between multiple users are utilized in an efficient way. This model is formulated as an optimization problem with the goal of decreasing the consumption of energy and computation delay. This type of problem is NP-hard, due to the curseof-dimensionality challenge, thus,...
Applied Sciences, 2020
Wireless networks connect various devices through radio waves in which the network connection may... more Wireless networks connect various devices through radio waves in which the network connection may have different structures. Moreover, the network structure is determined based on the placement areas of the network elements, which can be affected by the building and their locations. However, the numerical characteristic which describe the features of the real environment and allow them to be related to the properties of the model are still a challenge that has not been well addressed. To this end, in this paper, we analyze the modeling problems related to the structure of user placement in the access network. Our proposed solution is based on a description of the user environment structure in which cities in the form of buildings and constructions are considered as a typical environment. We propose a new model for addressing the wireless network structure in an efficient manner in which the features of the environment are considered, which are numerically expressed in the form of th...
Applied Sciences, 2020
Virtual reality (VR) is considered to be one of the main use cases of the fifth-generation cellul... more Virtual reality (VR) is considered to be one of the main use cases of the fifth-generation cellular system (5G). In addition, it has been categorized as one of the ultra-low latency applications in which VR applications require an end-to-end latency of 5 ms. However, the limited battery capacity and computing resources of mobile devices restrict the execution of VR applications on these devices. As a result, mobile edge-cloud computing is considered as a new paradigm to mitigate resource limitations of these devices through computation offloading process with low latency. To this end, this paper introduces an efficient multi-player with multi-task computation offloading model with guaranteed performance in network latency and energy consumption for VR applications based on mobile edge-cloud computing. In addition, this model has been formulated as an integer optimization problem whose objective is to minimize the sum cost of the entire system in terms of network latency and energy c...
IEEE Transactions on Cloud Computing
Future Internet, 2021
Intelligence Edge Computing (IEC) is the key enabler of emerging 5G technologies networks and bey... more Intelligence Edge Computing (IEC) is the key enabler of emerging 5G technologies networks and beyond. IEC is considered to be a promising backbone of future services and wireless communication systems in 5G integration. In addition, IEC enables various use cases and applications, including autonomous vehicles, augmented and virtual reality, big data analytic, and other customer-oriented services. Moreover, it is one of the 5G technologies that most enhanced market drivers in different fields such as customer service, healthcare, education methods, IoT in agriculture and energy sustainability. However, 5G technological improvements face many challenges such as traffic volume, privacy, security, digitization capabilities, and required latency. Therefore, 6G is considered to be promising technology for the future. To this end, compared to other surveys, this paper provides a comprehensive survey and an inclusive overview of Intelligence Edge Computing (IEC) technologies in 6G focusing ...
Currently, 5G/IMT-2020 networks with their possibilities become more and more services of new are... more Currently, 5G/IMT-2020 networks with their possibilities become more and more services of new areas. These services are integrated into different human life activities. And in several cases, human life depends on Artificial Intelligence technologies, Autonomous Systems, and the Internet of Things (IoT), etc. Autonomous vehicles provide very strict requirements to the network in terms of ultra-low latency, high throughput, and wide coverage. To support these requirements, additional technologies must be employed. The current paper discusses the possibility of the use of airborne platforms aiming to support the terrestrial networks for autonomous vehicles realization as a part of delay-critical applications. Airborne platforms will help in the provisioning of safe road trips by delivering time-critical information to the vehicles globally, even in remote areas. In this paper, we discuss requirements and potential solutions for supporting the autonomous vehicle infrastructure, as a par...
Underwater Wireless Sensor Networks (UWSN) enables various oceanic applications which require eff... more Underwater Wireless Sensor Networks (UWSN) enables various oceanic applications which require effective packet transmission. In this case, sparse node distribution, dynamic network topology and inappropriate selection of relay nodes cause void holes. Addressing this problem, we present a Relay based Void Hole Prevention and Repair protocol (ReVOHPR) by multiple Autonomous Underwater Vehicles (AUV) for UWSN. ReVOHPR efficiently identifies and avoids void holes and trap relay nodes to avoid it. ReVOHPR adopts the following operations as Ocean Depth (levels) based Equal Cluster Formation, Dynamic Sleep Scheduling, Virtual Graph based Routing, and Relay Assisted Void Hole Repair. For energy efficient cluster forming, Entropy based Eligibility Ranking (E2R) is presented which elects stable cluster heads (CHs). Then, dynamic sleep scheduling is implemented Dynamic Kernel Kalman Filter (DK2F) algorithm in which Sleep and Active modes based on the nodes current status. Inter Cluster Routing...
In this paper, we describe our approach to classify disaster-related tweets into multilabel infor... more In this paper, we describe our approach to classify disaster-related tweets into multilabel information types (i.e, labels). We aim to filter first relevant tweets during disasters. Then, we assign tweets relevant information types. Information types can be SearchAndRescue, MovePeople and Volunteer. We employ a fine-tuned BERT model with 10 BERT layers. Further, we submitted our approach to the TREC-IS 2019 challenge, the evaluation results showed that our approach outperforms the F1-score of median score in identifying actionable information.
Wireless Communications and Mobile Computing, 2021
Ultrareliable and low-latency connection (URLLC) is one of the novel features in 5G networks and ... more Ultrareliable and low-latency connection (URLLC) is one of the novel features in 5G networks and subsequent generations, in which it targets to fulfill stringent requirements on data rates, reliability, and availability. Moreover, the multiconnectivity concept is introduced to meet these requirements, where multiple different technologies are connected simultaneously, and the data packet is duplicated and transmitted from multiple transmitters. To this end, in this paper, we present an analysis, model, and method to ensure the reliability of data delivery when organizing URLLC in 5G networks. In addition, a new approach based on the organization of multiple connections (multiconnectivity) and duplication of transmitted data is considered. Further, an analytical model is presented for assessing the probability of failure, taking into account the traffic intensity, the probability of failure of elements, and the number of used connections. Moreover, an efficient method is proposed for...
Wireless Communications and Mobile Computing, 2021
The paper proposes a solution to the problem of choosing the size of a cluster in an ultralow lat... more The paper proposes a solution to the problem of choosing the size of a cluster in an ultralow latency network. This work is aimed at designing a method for choosing the size of the digital cluster in an ultralow latency network taking into account the lengths of connecting lines. If the linear dimension calculation is based only on the latency requirements without specifics of building the communication line, it negatively affects timing characteristics. This paper shows the method taking into account the communication line features and basing on the fractal dimension estimation of the road network. The proposed method could be used in planning and designing networks with ultralow latencies. Finally, a numerical experiment was carried out, based on the data of electronic maps, which showed that the assessment of the fractal dimension of roads in the network’s service area makes it possible to increase the accuracy of the size of the formed cluster. Moreover, the proposed method can ...
Security and Communication Networks, 2021
Smart cities provide citizens with smart and advanced services to improve their quality of life. ... more Smart cities provide citizens with smart and advanced services to improve their quality of life. However, it has been observed that the collection, storage, processing, and analysis of heterogeneous data that are usually borne by citizens will bear certain difficulties. The development of the Internet of Things, cloud computing, social media, and other Industry 4.0 influencers pushed technology into a smart society’s framework, bringing potential vulnerabilities to sensor data, services, and smart city applications. These vulnerabilities lead to data security problems. We propose a decentralized data management system for smart and secure transportation that uses blockchain and the Internet of Things in a sustainable smart city environment to solve the data vulnerability problem. A smart transportation mobility system demands creating an interconnected transit system to ensure flexibility and efficiency. This article introduces prior knowledge and then provides a Hyperledger Fabric-...
IEEE Sensors Journal, 2021
With the wide application of Internet-of-Medical-Things (IoMTs) or sensor nodes which equipped wi... more With the wide application of Internet-of-Medical-Things (IoMTs) or sensor nodes which equipped with sensors. These networked sensors are used to gather enormous data from different smart healthcare applications, and this collected data process for making appropriate decisions. Edge computing is an efficient platform that provides computational resources to collect sensor data. In the meantime, intelligent and accurate resource management by Artificial Intelligence (AI) has become the center of attention, especially in healthcare systems. With the help of AI, IoMT based healthcare devices will remarkably enhance the computational speed and range. But the challenging issue in these energy-hungry, short battery life, and delay intolerant portable devices is inappropriate and inefficient classical trends of fair resource allotment. Thus, this paper proposes Computation Offloading using Reinforcement Learning (CORL) scheme to minimize latency and energy consumption. We first formulate the problem as a combined latency and energy cost minimization problem, satisfying the lack of limited battery capacity and service latency deadline constraints. Moreover, proposed algorithm search optimal available resources node to offload task towards the trade-off between energy and latency. The experimental results show the benefits of the proposed scheme in terms of saving energy, minimizing latency, and maximum utilization of node resources in edge-enabled sensor networks. We are using an iFogSim simulator to validate the proposed scheme under realistic assumptions.
Security and Communication Networks, 2021
Underwater wireless sensor networks (UWSNs) enable various oceanic applications which require eff... more Underwater wireless sensor networks (UWSNs) enable various oceanic applications which require effective packet transmission. In this case, sparse node distribution, imbalance in terms of overall energy consumption between the different sensor nodes, dynamic network topology, and inappropriate selection of relay nodes cause void holes. Addressing this problem, we present a relay-based void hole prevention and repair (ReVOHPR) protocol by multiple autonomous underwater vehicles (AUVs) for UWSN. ReVOHPR is a global solution that implements different phases of operations that act mutually in order to efficiently reduce and identify void holes and trap relay nodes to avoid it. ReVOHPR adopts the following operations as ocean depth (levels)-based equal cluster formation, dynamic sleep scheduling, virtual graph-based routing, and relay-assisted void hole repair. For energy-efficient cluster forming, entropy-based eligibility ranking (E2R) is presented, which elects stable cluster heads (CH...
Big Data, 2021
The Internet of Things (IoT) is permeating our daily lives through continuous environmental monit... more The Internet of Things (IoT) is permeating our daily lives through continuous environmental monitoring and data collection. The promise of low latency communication, enhanced security, and efficient bandwidth utilization lead to the shift from mobile cloud computing to mobile edge computing. In this study, we propose an advanced deep reinforcement resource allocation and security-aware data offloading model that considers the constrained computation and radio resources of industrial IoT devices to guarantee efficient sharing of resources between multiple users. This model is formulated as an optimization problem with the goal of decreasing energy consumption and computation delay. This type of problem is non-deterministic polynomial time-hard due to the curse-ofdimensionality challenge, thus, a deep learning optimization approach is presented to find an optimal solution. In addition, a 128-bit Advanced Encryption Standard-based cryptographic approach is proposed to satisfy the data security requirements. Experimental evaluation results show that the proposed model can reduce offloading overhead in terms of energy and time by up to 64.7% in comparison with the local execution approach. It also outperforms the full offloading scenario by up to 13.2%, where it can select some computation tasks to be offloaded while optimally rejecting others. Finally, it is adaptable and scalable for a large number of mobile devices.
The Journal of Supercomputing, 2021
In the Big Data Era, Entity Resolution (ER) faces many challenges such as high scalability, the c... more In the Big Data Era, Entity Resolution (ER) faces many challenges such as high scalability, the coexistence of complex similarity metrics, tautonymy and synonym, and the requirement of Data Quality Evaluation. Moreover, despite more than seventy years of development efforts, there is still a high demand for democratizing ER to reduce human participation in tuning parameters, data labeling, defining blocking functions, and feature engineering. This study aimed to explore a novel Stacked Dedupe Learning ER system with high accuracy and efficiency. The study evaluated sophisticated composition methods, such as Bidirectional Recurrent Neural Networks (BiRNNs) and Long Short-Term Memory (LSTM) hidden units, to renovate each tuple to word representation distribution in a sense to capture similarities amidst tuples. Also, pre-trained words embedding where they were not available, ways to learn and tune Word Representation Distribution customized for ER tasks under different scenarios were considered. More so, the Locality Sensitive Hashing (LSH) based blocking approach, which considered the entire attributes of a tuple and produced slighter blocks, compared with traditional methods with few attributes, were assessed. The algorithm was tested on multiple datasets namely benchmarks, and multi-lingual data. The experimental results showed that Stacked Dedupe Learning achieves high quality and good performance, and scales well compared to the existing solutions.
Wireless Networks, 2021
Computation offloading at mobile edge computing (MEC) servers can mitigate the resource limitatio... more Computation offloading at mobile edge computing (MEC) servers can mitigate the resource limitation and reduce the communication latency for mobile devices. Thereby, in this study, we proposed an offloading model for a multi-user MEC system with multi-task. In addition, a new caching concept is introduced for the computation tasks, where the application program and related code for the completed tasks are cached at the edge server. Furthermore, an efficient model of task offloading and caching integration is formulated as a nonlinear problem whose goal is to reduce the total overhead of time and energy. However, solving these types of problems is computationally prohibitive, especially for large-scale of mobile users. Thus, an equivalent form of reinforcement learning is created where the state spaces are defined based on all possible solutions and the actions are defined on the basis of movement between the different states. Afterwards, two effective Q-learning and Deep-Q-Network-based algorithms are proposed to derive the near-optimal solution for this problem. Finally, experimental evaluations verify that our proposed model can substantially minimize the mobile devices’ overhead by deploying computation offloading and task caching strategy reasonably.
IEEE Transactions on Network and Service Management, 2020
Mobile edge computing (MEC) is a new paradigm to alleviate resource limitations of mobile IoT net... more Mobile edge computing (MEC) is a new paradigm to alleviate resource limitations of mobile IoT networks through computation offloading with low latency. This article presents an efficient and secure multi-user multi-task computation offloading model with guaranteed performance in latency, energy, and security for mobile-edge computing. It does not only investigate offloading strategy but also considers resource allocation, compression and security issues. Firstly, to guarantee efficient utilization of the shared resource in multi-user scenarios, radio and computation resources are jointly addressed. In addition, JPEG and MPEG4 compression algorithms are used to reduce the transfer overhead. To fulfill security requirements, a security layer is introduced to protect the transmitted data from cyber-attacks. Furthermore, an integrated model of resource allocation, compression, and security is formulated as an integer nonlinear problem with the objective of minimizing the weighted sum of energy under a latency constraint. As this problem is considered as NP-hard, linearization and relaxation approaches are applied to transform the problem into a convex one. Finally, an efficient offloading algorithm is designed with detailed processes to make the computation offloading decision for computation tasks of mobile users. Simulation results show that our model not only saves about 46% of system overhead consumption in comparison with local execution but also scale well for large-scale IoT networks.
The 4th International Conference on Future Networks and Distributed Systems (ICFNDS), 2020
Edge computing is the key to building 5G Networks and Future 2030 Networks. Edge computing extend... more Edge computing is the key to building 5G Networks and Future 2030 Networks. Edge computing extends the cloud computing paradigm by placing resources close to the network edges to cope with the upcoming growth of connected devices. Future applications: health monitoring and predictive services within the framework of the Smart City, Internet of things (IoT), vehicular ad hoc network, autonomous vehicles present a new set of strict requirements, such as low latency. In this paper, we develop a set of methods for managing and orchestrating new intelligent services in a new network and computing infrastructure. In addition, we consider a new prototype using an orchestration system for managing the autonomous vehicles’ resources in comparison with the existing approaches to the design of high-load networks. This orchestration platform is based on independent Docker containers that running the orchestration system. The main goal of our proposed system is to build an efficient network architecture with a minimum delay to process the information based on neural networks. Finally, simulation results proved that the proposed system can significantly not only reduce the overall network load but also increase the quality of the transmitted stream across the network in comparison with traditional network architectures.
IEEE Access, 2020
The promise of low latency connectivity and efficient bandwidth utilization has driven the recent... more The promise of low latency connectivity and efficient bandwidth utilization has driven the recent shift from vehicular cloud computing (VCC) towards vehicular edge computing (VEC). This paper presents an advanced deep learning-based computational offloading algorithm for multilevel vehicular edge-cloud computing networks. To conserve energy and guarantee the efficient utilization of shared resources among multiple vehicles, an integration model of computational offloading, and resource allocation is formulated as a binary optimization problem to minimize the total cost of the entire system in terms of time and energy. However, this problem is considered NP-hard and it is computationally prohibitive to solve this type of problem, particularly for large-scale vehicles, due to the curse-of-dimensionality problem. Therefore, an equivalent reinforcement learning form is generated and we propose a distributed deep learning algorithm to find the near-optimal computational offloading decisions in which a set of deep neural networks are used in parallel. Finally, simulation results show that the proposed algorithm can exhibit fast convergence and significantly reduce the overall consumption of an entire system compared to the benchmark solutions. INDEX TERMS Computation offloading, vehicular edge-cloud computing, autonomous vehicles, 5G, resource allocation, deep reinforcement learning.
The Internet of Things (IoT) is permeating our daily lives where it can provide data collection t... more The Internet of Things (IoT) is permeating our daily lives where it can provide data collection tools and important measurement to inform our decisions. In addition, they are continually generating massive amounts of data and exchanging essential messages over networks for further analysis. The promise of low communication latency, security enhancement and the efficient utilization of bandwidth leads to the new shift change from Mobile Cloud Computing (MCC) towards Mobile Edge Computing (MEC). In this study, we propose an advanced deep reinforcement resource allocation and securityaware data offloading model that considers the computation and radio resources of industrial IoT devices to guarantee that shared resources between multiple users are utilized in an efficient way. This model is formulated as an optimization problem with the goal of decreasing the consumption of energy and computation delay. This type of problem is NP-hard, due to the curseof-dimensionality challenge, thus,...
Applied Sciences, 2020
Wireless networks connect various devices through radio waves in which the network connection may... more Wireless networks connect various devices through radio waves in which the network connection may have different structures. Moreover, the network structure is determined based on the placement areas of the network elements, which can be affected by the building and their locations. However, the numerical characteristic which describe the features of the real environment and allow them to be related to the properties of the model are still a challenge that has not been well addressed. To this end, in this paper, we analyze the modeling problems related to the structure of user placement in the access network. Our proposed solution is based on a description of the user environment structure in which cities in the form of buildings and constructions are considered as a typical environment. We propose a new model for addressing the wireless network structure in an efficient manner in which the features of the environment are considered, which are numerically expressed in the form of th...
Applied Sciences, 2020
Virtual reality (VR) is considered to be one of the main use cases of the fifth-generation cellul... more Virtual reality (VR) is considered to be one of the main use cases of the fifth-generation cellular system (5G). In addition, it has been categorized as one of the ultra-low latency applications in which VR applications require an end-to-end latency of 5 ms. However, the limited battery capacity and computing resources of mobile devices restrict the execution of VR applications on these devices. As a result, mobile edge-cloud computing is considered as a new paradigm to mitigate resource limitations of these devices through computation offloading process with low latency. To this end, this paper introduces an efficient multi-player with multi-task computation offloading model with guaranteed performance in network latency and energy consumption for VR applications based on mobile edge-cloud computing. In addition, this model has been formulated as an integer optimization problem whose objective is to minimize the sum cost of the entire system in terms of network latency and energy c...