- UAV Applications and Optimization
- Vehicular Ad Hoc Networks (VANETs)
- Opportunistic and Delay-Tolerant Networks
- IoT and Edge/Fog Computing
- Mobile Ad Hoc Networks
- Advanced Wireless Communication Technologies
- Satellite Communication Systems
- Advanced Authentication Protocols Security
- Privacy-Preserving Technologies in Data
- Network Security and Intrusion Detection
- Distributed Control Multi-Agent Systems
- Security in Wireless Sensor Networks
- Chaos-based Image/Signal Encryption
- Cloud Computing and Resource Management
- Chaos control and synchronization
- IoT Networks and Protocols
- Green IT and Sustainability
- Cellular Automata and Applications
- Wireless Body Area Networks
- Fractal and DNA sequence analysis
- Age of Information Optimization
- Innovation in Digital Healthcare Systems
- Context-Aware Activity Recognition Systems
- Smart Grid Energy Management
- Augmented Reality Applications
University of Laghouat
2012-2024
Université des Sciences et de la Technologie d'Oran Mohamed Boudiaf
2022
Université de Haute-Alsace
2022
Weatherford College
2022
To keep the services and applications of intelligent transportation system stable active, vehicular ad hoc networks (VANETs) are considered as an essential building block to maintain manage its features. A wide deployment VANETs is possible only after addressing numerous research challenges. One most complicated issues consists designing a routing strategy, taking into consideration several serious constraints, especially in network such VANET. The severity these would be increased...
Summary Much progress can be expected in the domain of unmanned aerial vehicle (UAV) communication by next decade. The cooperation between multiple UAVs air exchanging data among themselves naturally form a flying ad hoc network (FANET). Such networks key support to accomplish several kinds missions while providing required assistance terrestrial networks. However, they are confronted with many challenges and difficulties, which due high mobility UAVs, frequent packet losses, weak links all...
By leveraging the conventional Vehicular Ad-hoc Networks (VANETs), Internet of Vehicles (IoV) paradigm has attracted attention different research and development bodies. However, IoV deployment is still at stake as many security privacy issues are looming; location tracking using overheard safety messages a good example such issues. In context privacy, schemes have been deployed to mitigate adversary’s exploiting abilities. The most appealing those silent period feature, since they provide...
Summary When it comes to keeping the data routing robust and effective in vehicular ad hoc networks (VANETs), stable durable connectivity constitutes keystone ensure successful point‐to‐point communication. Since VANETs can comprise all kinds of mobile vehicles moving changing direction frequently, this may result frequent link failures network partitions. Moreover, when are deployed a city environment, another problem arises, that is, existing obstructions (eg, buildings, trees, hoppers)...
Abstract With the ever‐expanding rise of network demands and user expectations, fifth generation (5G) cellular networks was envisioned to support a plethora use cases conflicting demands. Next providing traditional connectivity like its previous generations, 5G also promises be heterogeneous connecting humans, vehicles, unmanned aerial vehicles (UAVs), smart devices, more. These challenging expectations proved overwhelming for infrastructures handle. Network slicing has emerged as promising...
Routing data in Vehicular Ad hoc Networks is still a challenging topic. The unpredictable mobility of nodes renders routing packets over optimal paths not always possible. Therefore, there need to enhance the service. Bus Rapid Transit systems, consisting buses characterized by regular pattern, can be good candidate for building backbone tackle problem uncontrolled and select appropriate delivery. For this purpose, we propose new scheme called Bus-based Technique (BRT) which exploits...
Vehicular ad hoc networks (VANETs) are characterized by frequent routing path failures due to the high mobility caused sudden changes of direction vehicles. The paths between two different vehicles should be established with this challenge in mind. Stability and connectedness a mandatory condition ensure robust reliable data delivery. idea behind work is exploit new reactive technique provide regulated well-connected paths. Unmanned Aerial Vehicles (UAVs) or what referred as drones can both...
Understanding the behavior of honey bees is essential for maintaining a healthy bee colony. Hive monitoring systems are crucial this purpose. In last few years, computer vision and deep learning have become widely used in such systems. This paper uses approach detecting tracking bees. Firstly, detection, we employed YOLO model using data set 1000 ground truth images. Secondly, tracking, StrongSORT approach. Results show that detector performs well both classes (with or without pollen). The...
Removing malicious nodes from any network is vital to its correct operation and enhances largely security. This can be typically achieved by revoking or deactivating their credentials whenever a threshold of votes against them reached. The problem based revocation schemes that colluding set surpassing the revoke in networks at will. Lowering value, would make coalition attacks protocol easier. Whereas increasing value difficult. In this paper, we propose new scheme for mobile ad hoc which...
Abstract Secure routing protocols that are based only on cryptographic techniques cannot guarantee security against all attacks. Among solutions have been proposed to enhance the in vehicular networks distributed revocation protocols, which provide vehicles with ability quickly detect and avoid malicious However, most of vulnerable colluding attacks conducted by nodes, a situation results denial service. In this work, we propose new robust protocol for ad hoc networks, called Distributed...
This paper presents a dynamic transmission power adjustment technique to enhance energy efficiency and extend the operational lifespan of mobile devices in fog computing environments. By monitoring locations surrounding access points their own locations, adapt prior task offloading. The employs four levels: 3.6mW (default) for beyond 265m, 2.7mW distances between 210m 1.8mW 150m 210m, 0.9m W less than or equal 150m. Two key metrics are evaluated: consumed (in Joules) remaining over time....
Due to the always increasing number of cellular networking users, 5G promised support numerous users and their expectations. envisioned be a heterogeneous network, aimed serve multitude with different, conflicting demands priorities. These range from humans mobile devices, Unmanned Aerial Vehicles (UAVs), Internet Things (IoT) vehicles, more. The network promises major enhancements over previous generations is already being deployed on large scale. Network slicing emerged as one main...
Abstract Owing to their flexibility, fast deployment, increasing affordability, and numerous application opportunities, unmanned aerial vehicles (UAVs) became an undisputed target of studies research discover exploit the immense opportunities they provide. Moreover, network slicing is a critical enabler for 5G beyond. Network slices guarantee certain user expectations such as data rate latency thresh‐holds. There no doubt that crowd‐sourced incentive driven solutions are on rise....
Fog Computing has revolutionized edge computing by bringing computation and storage capabilities closer to the network edge. However, energy constraints faced mobile devices in fog environments pose significant challenges. Quick draining of is particularly troublesome, impacting their usability longevity. To address this issue, paper proposes an innovative approach adjust transmission power dense fog-enabled environments. By offering four levels, we aim prolong battery lifespan while...
Abstract The fusion of satellite technologies with the Internet Things (IoT) has propelled evolution mobile computing, ushering in novel communication paradigms and data management strategies. Within this landscape, efficient computationally intensive tasks satellite-enabled mist computing environments emerges as a critical challenge. These tasks, spanning from optimizing to facilitating blockchain-based IoT processes, necessitate substantial computational resources timely execution. To...
This paper addresses the challenge of efficiently offloading heavy computing tasks from ground mobile devices to satellite-based mist environment. With ground-based edge and cloud servers often being inaccessible, exploitation satellite becomes imperative. Existing algorithms have shown limitations in adapting unique characteristics tasks. Thus, we propose a task algorithm that prioritizes proximity. approach not only reduces energy consumption during telecommunications but also ensures are...
Novel cellular networks aim to connect different device types such as vehicles, drones, Internet of Things (IoT), and more. Network slicing emerged a key enabler support diverse scenarios users with varying requirements. However, limited dynamic coverage adaptability hinder efficient for user demands in network slicing. As result, this paper proposes novel hybrid drone-based architecture future 6G networks. We introduce specialized drones tailored massive Machine-Type Communications (mMTC),...