Muhannad Almutiry

ORCID: 0000-0002-3862-3129
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Geophysical Methods and Applications
  • Microwave Imaging and Scattering Analysis
  • Advanced SAR Imaging Techniques
  • Indoor and Outdoor Localization Technologies
  • UAV Applications and Optimization
  • Advanced Wireless Communication Technologies
  • Underwater Vehicles and Communication Systems
  • Advanced Adaptive Filtering Techniques
  • Speech and Audio Processing
  • Radar Systems and Signal Processing
  • Opportunistic and Delay-Tolerant Networks
  • Blind Source Separation Techniques
  • Energy Efficient Wireless Sensor Networks
  • IoT and Edge/Fog Computing
  • Satellite Communication Systems
  • Simulation Techniques and Applications
  • Distributed Control Multi-Agent Systems
  • Frequency Control in Power Systems
  • Radio Wave Propagation Studies
  • Telemedicine and Telehealth Implementation
  • Adversarial Robustness in Machine Learning
  • Robotics and Automated Systems
  • Non-Invasive Vital Sign Monitoring
  • Internet Traffic Analysis and Secure E-voting
  • Mobile Ad Hoc Networks

Northern Border University
2017-2024

South African National Biodiversity Institute
2021

University of Derby
2021

Graz University of Technology
2021

Dublin City University
2021

Juraj Dobrila University of Pula
2021

University of Washington
2021

Cardiff University
2021

University of Bari Aldo Moro
2021

University of Dayton
2015-2016

Cloud computing is perhaps the most enticing innovation in present figuring situation. It gives an expense-effective arrangement by diminishing enormous forthright expense for purchasing equipment foundations and processing power. Fog additional help to cloud infrastructure utilizing a portion of less register concentrated undertaking at edge devices, reducing end client's reaction time, such as Internet Things (IoT). However, IoT devices are resource-constrained, there many that...

10.1109/access.2022.3188635 article EN cc-by IEEE Access 2022-01-01

Estimating the location of a target in search-and-rescue operations is quite challenging when not responding. Therefore, this paper, we investigate passive localization problem using mobile unmanned aerial vehicles (UAVs), where multiple UAVs receive time-difference-of-arrival (TDOA) measurements from source UAV. Unlike traditional TDOA for static UAVs, becomes more considering mobility UAVs. propose novel model with We also measure performance limit inequality between its Cramer-Rao lower...

10.1016/j.icte.2022.04.011 article EN cc-by-nc-nd ICT Express 2022-05-12

The Industrial Internet of Things (IIoT) necessitates low-latency and ultra-reliable communication to support various applications. Besides, the data generated in IIoT must be geo-tagged take location-aware timely actions. Therefore, this paper proposes an accurate energy-efficient localization scheme for localizing devices IIoT. We introduce a novel anchor activation protocol non-cooperative devices. proposed method is sequential, distributed, error adaptive, that first performs distributed...

10.1016/j.icte.2023.01.004 article EN cc-by-nc-nd ICT Express 2023-01-14

Abstract Localisation of machines in harsh Industrial Internet Things (IIoT) environment is necessary for various applications. Therefore, a novel localisation algorithm proposed noisy range measurements IIoT networks. The position an unknown machine device the network estimated using relative distances between blind (BMs) and anchor (AMs). Moreover, more practical challenging scenario with erroneous AM considered, which brings additional uncertainty to final estimation. AMs selection BMs...

10.1049/cit2.12203 article EN cc-by CAAI Transactions on Intelligence Technology 2023-03-01

Unmanned aerial vehicle (UAV) communication can be used in overcrowded areas and either during or postdisaster situations as an evolving technology to provide ubiquitous connections for wireless devices due its flexibility, mobility, good condition of the line sight channels. In this paper, a single UAV is relay node connectivity because considerable distance between ground base station. Specifically, two path loss models have been utilized; cellular-to-UAV backhaul connection air-to-ground...

10.1155/2021/5589605 article EN cc-by Wireless Communications and Mobile Computing 2021-01-01

Recently, unmanned aerial vehicles (UAVs) have been used as flying base stations (BSs) to take advantage of line‐of‐sight (LOS) connectivity and efficiently enable fifth‐generation (5G) cellular network coverage data rates. On the other hand, nonorthogonal multiple access (NOMA) is a promising technique help achieve unprecedented requirements by simultaneously allowing users send over same resource block. In this paper, we study UAV‐enabled uplink NOMA network, where UAV collects from ground...

10.1155/2021/2722887 article EN cc-by Wireless Communications and Mobile Computing 2021-01-01

Path loss is a significant component of wireless communication channel design and analysis reflects the reduction in transmitted signal's power density. Due to differences propagation conditions, aerial channels' features differ from those terrestrial channels; therefore, unmanned vehicle path models are often different conventional models. A mathematical model proposed this paper estimate Ground-to-Air between device low-altitude platform using frequency bands millimeter wave. The suggested...

10.48550/arxiv.2101.12024 preprint EN cc-by arXiv (Cornell University) 2021-01-01

Multistatic SAR/ISAR can be described and generalized using the principles of radar (or radio frequency) tomography. In tomography, distributed transmitters receivers sense a region interest suitable waveforms. Using linear scattering (Born approximation), (linear) relation exists between measured returns shape targets, an image formed by inverting such relation. Due to limited illumination observation points, each point target will exhibit spatially-varying spread function (psf). A dominant...

10.1109/sps.2015.7168284 article EN 2015-06-01

The development of the Unmanned Aerial Vehicle (UAV) and communication systems contributed to availability more applications using UAVs in military civilians purposes. Anti-personnel landmines deployed by militia groups conflict zones are a life threat for need cautious handling while removing. UAV Tomographic Synthetic Aperture Radar (TSAR) can reconstruct three-dimension images investigation domain prescreen nonmetallic landmines. A landmine cannot be detected conventional ground...

10.48084/etasr.3611 article EN Engineering Technology & Applied Science Research 2020-08-16

Radar Tomography is the process of 3D reconstruction a measurement domain using multistatic distribution transmitters and receivers. Geometric diversity these elements increases information contained in measurements. The determining permittivity conductivity profile domain, therefore shape target, from scattered field measurements an inverse problem. This solved principles linear scattering (Born approximation), which lead to relationship between measured returns target shape. One limitation...

10.1109/naecon.2015.7443065 article EN 2015-06-01

We proposed an improved solution to two problems. The first problem is caused by the sidelobe of dominant scatterer masking a weak scatterer. suppress modeling its electromagnetic effects as secondary source or “extra dependent transmitter” in measurement domain. suppression domain reveals presence based on exploitation multipath effects. second linearizing mathematical forward model Improving quantity prediction, including scattering (neglected under Born approximation), allows us solve...

10.1155/2017/5847872 article EN cc-by International Journal of Antennas and Propagation 2017-01-01

Three-dimensional radar tomography exploits geometric and spatial diversity to reconstruct three-dimensional images. As the bandwidth is independent from resolution of tomographic imagery, we are proposing a novel method increase with more detected features at less computational cost. In this method, detect plurality frequencies target generate low-resolution image for each frequency first-order Born approximation, maintaining linearity inverse problem. Additionally, high-frequency will be...

10.1109/jsen.2019.2946491 article EN IEEE Sensors Journal 2019-10-09

In this paper, we constructed a 3D ISAR image to better understand electromagnetic scattering by an electrically large PEC cylinder. Imaging in context is simply the reconstruction of spatial distribution conductivity imaged target, σ(x, y, z). According geometric theory diffraction (GTD), if wavelength at operating frequency small relative target size, then scattered field consists contributions from number isolated centers. imaging algorithms rely upon assumption that area under...

10.1109/naecon.2015.7443064 article EN 2015-06-01

In the mining industry, smart surveying and exploration operations for minerals are essential during missions. Usually, these missions performed in remote areas that do not have a wireless communications infrastructure. This paper proposes to use unmanned aerial vehicle (UAV) as relay communication node between team ground control station (GCs). UAV can act provide mobile, flexible, reliable links environments complex topologies. this work, pathloss models millimeter‐wave technology...

10.1155/2022/6795101 article EN cc-by Complexity 2022-01-01

This paper presents a comprehensive study of Multiple-Input Multiple-Output (MIMO) Tomographic Synthetic Aperture Radar (TSAR) and its application in the automotive industry for enhancing active safety features. We explore utilization MIMO TSAR capturing 4D environmental data (range, distance, speed, material properties), essential object detection, recognition, high-resolution imaging. The cornerstone our approach lies exploiting geometric diversity inherent radar By deploying transmitters...

10.1109/icns60906.2024.10550557 article EN 2019 Integrated Communications, Navigation and Surveillance Conference (ICNS) 2024-04-23

In order to enhance the Hybrid STAP algorithm presented by Adve, a novel method supplement knowledge base through use of circular SAR imaging and registration with Land Use Cover other data is herein. The proposed will performance embedded non-homogeneity detector present in STAP.

10.1109/naecon.2016.7856830 article EN 2016-07-01

This study presents a novel computational radio frequency identification (RFID) system designed specifically for assisting blind individuals, utilising software-defined (SDR) with coherent detection. The employs battery-less ultra-high-frequency (UHF) tag arrays in Gen2 RFID systems, enhancing the transmission of sensed information beyond standard bits. Our method uses an SDR reader to efficiently manage multiple tags preambles implemented on single transceiver card. results highlight...

10.3390/s24113645 article EN cc-by Sensors 2024-06-04

Due to rapid advancement in algorithms, high performance computing, digital electronics, and RF (radio frequency) hardware, the design of modern radar now incorporates both spectral spatial diversity .Driving state-of-the-art is shared-spectrum waveforms for co-design radar, communication navigation systems, as well thin spectrum multiband signals. Spatially diverse multi-static including Tomography [1], MIMO (multiple-input multiple-output) DAR (distributed aperture radar) [2] are already...

10.1109/radar.2015.7131278 article EN 2015-05-01

This paper proposes a novel efficient multistage algorithm to extract source speech signals from noisy convolutive mixture. The proposed approach comprises of two stages named Blind Source Separation (BSS) and De-noising. A hybrid prior model separates the reverberant mixture in BSS stage. Moreover, we low high-energy components by generalized multivariate Gaussian super-Gaussian models, respectively. We use Minimum Mean Square Error (MMSE) reduce noise signal de-noising Furthermore, models...

10.20944/preprints202105.0543.v1 preprint EN 2021-05-24

This paper proposes a novel efficient multistage algorithm to extract source speech signals from noisy convolutive mixture. The proposed approach comprises two stages named Blind Source Separation (BSS) and de-noising. A hybrid prior model separates the reverberant mixture in BSS stage. Moreover, we low- high-energy components by generalized multivariate Gaussian super-Gaussian models, respectively. We use Minimum Mean Square Error (MMSE) reduce noise signal de-noising Furthermore, models...

10.3390/app11135968 article EN cc-by Applied Sciences 2021-06-27

Purpose This paper aims to focus on the design of a decentralized observation and control method for class large-scale systems characterized by nonlinear interconnected functions that are assumed be uncertain but quadratically bounded. Design/methodology/approach Sufficient conditions, under which designed scheme can achieve asymptotic stabilization augmented system, developed within Lyapunov theory in framework linear matrix inequalities (LMIs). Findings The derived LMIs formulated form an...

10.1108/compel-10-2019-0427 article EN COMPEL The International Journal for Computation and Mathematics in Electrical and Electronic Engineering 2020-05-18

The Multi-disciplinary domain of robotics has become instrumental in advancements many fi elds such as medical, military and industrial automation.They are used to ensure reliability, stability precision.Particularly, they preferred be an environment where uncertainties disturbances occur.Measuring or estimating a performance metric response time throughput under severe circumstances is crucial since designers want know the behavior robots their reaction when constrained condition...

10.12913/22998624/142655 article EN cc-by Advances in Science and Technology – Research Journal 2021-11-01

Trojan backdoor is a poisoning attack against Neural Network (NN) classifiers in which adversaries try to exploit the (highly desirable) model reuse property implant Trojans into parameters for breaches through poisoned training process. Most of proposed defenses attacks assume white-box setup, defender either has access inner state NN or can run back-propagation it. Moreover, most exiting works that propose and black-box methods defend focus on image data. Due difference data structure,...

10.1109/snams53716.2021.9732112 article EN 2021-12-06

This paper propose a fast, matched-filtered based imaging algorithm to detect below ground object To image objects, set of distributed transmitters and receivers are placed above the ground, or slightly buried. These radiate waveforms into subsurface. The resulting wavefront impinges upon underground scattering electromagnetic energy in all directions. Receivers collects reflected signal, retrieve phasor scattered signals, transmit this information systems for post-processing. After applying...

10.1109/naecon.2015.7443066 article EN 2015-06-01
Coming Soon ...