Abdulla Al‐Ali

ORCID: 0000-0002-3527-2554
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Wireless Body Area Networks
  • User Authentication and Security Systems
  • Cognitive Radio Networks and Spectrum Sensing
  • UAV Applications and Optimization
  • IoT and Edge/Fog Computing
  • Network Security and Intrusion Detection
  • Smart Grid Security and Resilience
  • Advanced Authentication Protocols Security
  • Advanced Malware Detection Techniques
  • Wireless Networks and Protocols
  • Blockchain Technology Applications and Security
  • Advanced MIMO Systems Optimization
  • Cryptography and Data Security
  • Chaos-based Image/Signal Encryption
  • Power Line Communications and Noise
  • Wireless Communication Networks Research
  • Molecular Communication and Nanonetworks
  • Video Surveillance and Tracking Methods
  • Advanced Steganography and Watermarking Techniques
  • Advanced Neural Network Applications
  • Electricity Theft Detection Techniques
  • IoT-based Smart Home Systems
  • Wireless Communication Security Techniques
  • Robotics and Sensor-Based Localization
  • Anomaly Detection Techniques and Applications

Qatar University
2016-2025

Technology Innovation Institute
2020-2024

Zarqa University
2024

Abu Dhabi National Oil (United Arab Emirates)
2018

Northeastern University
2013-2014

The Internet of Things (IoT) integrates billions smart devices that can communicate with one another minimal human intervention. IoT is the fastest developing fields in history computing, an estimated 50 billion by end 2020. However, crosscutting nature systems and multidisciplinary components involved deployment such have introduced new security challenges. Implementing measures, as encryption, authentication, access control, network application for their inherent vulnerabilities...

10.1109/comst.2020.2988293 article EN IEEE Communications Surveys & Tutorials 2020-01-01

The rapid evolutions in micro-computing, mini-hardware manufacturing, and machine to (M2M) communications have enabled novel Internet of Things (IoT) solutions reshape many networking applications. Healthcare systems are among these applications that been revolutionized with IoT, introducing an IoT branch known as the Medical (IoMT) systems. IoMT allow remote monitoring patients chronic diseases. Thus, it can provide timely patients' diagnostic save their life case emergencies. However,...

10.1109/jiot.2020.3045653 article EN publisher-specific-oa IEEE Internet of Things Journal 2020-12-17

Unmanned aerial vehicles (UAVs) have recently rapidly grown to facilitate a wide range of innovative applications that can fundamentally change the way cyber-physical systems (CPSs) are designed. CPSs modern generation with synergic cooperation between computational and physical potentials interact humans through several new mechanisms. The main advantages using UAVs in CPS application is their exceptional features, including mobility, dynamism, effortless deployment, adaptive altitude,...

10.1109/comst.2019.2924143 article EN IEEE Communications Surveys & Tutorials 2019-01-01

Abstract Navigation systems help users access unfamiliar environments. Current technological advancements enable to encapsulate these in handheld devices, which effectively increases the popularity of navigation and number users. In indoor environments, lack Global Positioning System (GPS) signals line sight with orbiting satellites makes more challenging compared outdoor Radio frequency (RF) signals, computer vision, sensor-based solutions are suitable for tracking This article provides a...

10.1186/s13673-020-00222-0 article EN cc-by Human-centric Computing and Information Sciences 2020-05-02

Modern technology has pushed us into the information age, making it easier to generate and record vast quantities of new data. Datasets can help in analyzing situation give a better understanding, more importantly, decision making. Consequently, datasets, uses which they be put, have become increasingly valuable commodities. This article describes DroneRF dataset: radio frequency (RF) based dataset drones functioning different modes, including off, on connected, hovering, flying, video...

10.1016/j.dib.2019.104313 article EN cc-by Data in Brief 2019-08-26

In recent years, unmanned aerial vehicles (UAVs) have become increasingly accessible to the public due their high availability with affordable prices while being equipped better technology. However, this raises a great concern from both cyber and physical security perspectives since UAVs can be utilized for malicious activities in order exploit vulnerabilities by spying on private properties, critical areas or carry dangerous objects such as explosives which makes them threat society. Drone...

10.1109/iwcmc.2019.8766732 article EN 2019-06-01

This study examined engineering students' initial readiness to transition emergency online learning in response COVID-19 Qatar. A theoretical framework is proposed for understanding the factors influencing change. Sequential explanatory mixed-method research was conducted, with 140 participants completing an survey, of which 68 also contributed written reflections and 8 participated semi-structured interviews. Exploratory factor analysis displayed a four-factor structure, including...

10.29333/ejmste/8474 article EN Eurasia Journal of Mathematics Science and Technology Education 2020-08-22

Drones are becoming increasingly popular not only for recreational purposes but in day-to-day applications engineering, medicine, logistics, security and others. In addition to their useful applications, an alarming concern regard the physical infrastructure security, safety privacy has arisen due potential of use malicious activities. To address this problem, we propose a novel solution that automates drone detection identification processes using drone’s acoustic features with different...

10.3390/s21154953 article EN Sensors 2021-07-21

Mobile devices have become an essential element in our day-to-day lives. The chances of mobile attacks are rapidly increasing with the growing use devices. Exploiting vulnerabilities from as well stealing personal information, principal targets attackers. Researchers also developing various techniques for detecting and analyzing malware to overcome these issues. As new gets introduced frequently by developers, it is very challenging come up comprehensive algorithms detect this malware. There...

10.1016/j.compeleceng.2024.109233 article EN cc-by Computers & Electrical Engineering 2024-04-11

The Internet of Things (IoT) integrates billions smart devices that can communicate with one another minimal human intervention. It is the fastest developing fields in history computing, an estimated 50 billion by end 2020. On hand, IoT play a crucial role enhancing several real-life applications improve life quality. other crosscutting nature systems and multidisciplinary components involved deployment such introduced new security challenges. Implementing measures, as encryption,...

10.48550/arxiv.1807.11023 preprint EN other-oa arXiv (Cornell University) 2018-01-01

Blockchain is a distributed secure ledger that eliminates the need for centralized authority to store data. The approach has several limitations as it Single-Point-of-Failure and third-party might be needed. Blockchain, on other hand, provides decentralized, trustless framework third party enhances fault tolerance. In this paper, we investigate potentials of customizing behavior network based applications' requirements. particular, conduct experiments evaluate performance Hyperledger Fabric...

10.1109/iciot48696.2020.9089614 article EN 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT) 2020-02-01

Deep brain stimulators (DBSs), a widely used and comprehensively acknowledged restorative methodology, are type of implantable medical device which uses electrical stimulation to treat neurological disorders. These devices diseases such as Parkinson, movement disorder, epilepsy, psychiatric Security in plays vital role since it can directly affect the mental, emotional, physical state human bodies. In worst-case situations, even lead patient's death. An adversary devices, for instance,...

10.1109/access.2019.2899558 article EN cc-by-nc-nd IEEE Access 2019-01-01

Background: While improved student engagement has been highlighted as an essential goal and a major outcome of Problem Project-Based learning (PBL), little empirical evidence provided regarding types forms engagement. Material method: The study explored in PBL settings, drawing on data observations group interviews with 23 project teams (116 students) four different undergraduate civil engineering courses at Qatar University. Results: identified patterns setting. Participants reported...

10.29333/ejmste/8291 article EN Eurasia Journal of Mathematics Science and Technology Education 2020-05-20

10.1016/j.ijcip.2020.100406 article EN International Journal of Critical Infrastructure Protection 2021-01-28

Unmanned Aerial Vehicles (UAVs) have attracted great interest in the last few years owing to their ability cover large areas and access difficult hazardous target zones, which is not case of traditional systems relying on direct observations obtained from fixed cameras sensors. Furthermore, thanks advancements computer vision machine learning, UAVs are being adopted for a broad range solutions applications. However, Deep Neural Networks (DNNs) progressing toward deeper complex models that...

10.1109/jiot.2021.3079164 article EN IEEE Internet of Things Journal 2021-05-11

Smart health presents an ever-expanding attack surface due to the continuous adoption of a broad variety Internet Medical Things (IoMT) devices and applications. IoMT is common approach smart city solutions that deliver long-term benefits critical infrastructures, such as healthcare. Many in cities use Bluetooth technology for short-range communication its flexibility, low resource consumption, flexibility. As healthcare applications rely on distributed control optimization, artificial...

10.3390/s22218280 article EN cc-by Sensors 2022-10-28

STEM (science, technology, engineering, and math) has taken center stage as a priority policy agenda for Qatar’s leadership. At present, stands fundamental catalyst sustainable economic, environmental, human, social development goals, is outlined in the Qatar National Vision 2030. The aim of this exploratory study was to investigate determinants students’ interest pursuing Science, Technology, Engineering, Mathematics (STEM) studies eventual careers Qatar. This used survey involving...

10.3390/su15097504 article EN Sustainability 2023-05-04

10.1016/j.aej.2025.03.065 article EN Alexandria Engineering Journal 2025-03-28

Recent advances in mobile technology have created a shift towards using battery-driven devices remote monitoring settings and smart homes. Clinicians are carrying out diagnostic screening procedures based on the electrocardiogram (ECG) signals collected remotely for outpatients who need continuous monitoring. High-speed transmission analysis of large recorded ECG essential, especially with increased use battery-powered devices. Exploring low-power alternative compression methodologies that...

10.3390/diagnostics8010010 article EN cc-by Diagnostics 2018-01-16
Coming Soon ...