- Wireless Communication Networks Research
- Mobile Ad Hoc Networks
- IPv6, Mobility, Handover, Networks, Security
- Opportunistic and Delay-Tolerant Networks
- Energy Efficient Wireless Sensor Networks
- Software-Defined Networks and 5G
- Cloud Computing and Resource Management
- Vehicular Ad Hoc Networks (VANETs)
- Advanced MIMO Systems Optimization
- Mobile Agent-Based Network Management
- Wireless Networks and Protocols
- Advanced Wireless Network Optimization
- Distributed and Parallel Computing Systems
- Network Security and Intrusion Detection
- IoT and Edge/Fog Computing
- Advanced Malware Detection Techniques
- Cooperative Communication and Network Coding
- Advanced Optical Network Technologies
- Service-Oriented Architecture and Web Services
- Caching and Content Delivery
- Electric Power System Optimization
- Multi-Agent Systems and Negotiation
- Cryptography and Data Security
- Indoor and Outdoor Localization Technologies
- Distributed systems and fault tolerance
Polytechnique Montréal
2015-2024
Toronto Metropolitan University
2020
Université de Montréal
2018
Centro Internacional de Mejoramiento de Maíz Y Trigo
2013-2017
Austral University of Chile
2012-2017
École Normale Supérieure - PSL
2006-2014
École Polytechnique
2003-2014
Concordia University
2010
Universidad de Los Andes
1999
Vehicular Ad-hoc NETworks (VANET) can efficiently detect traffic congestion, but detection is not enough because congestion be further classified as recurrent and non-recurrent (NRC). In particular, NRC in an urban network mainly caused by incidents, workzones, special events adverse weather. We propose a framework for the real-time distributed classification of into its components on heterogeneous road using VANET. present models built understanding spatial temporal causality measures...
Distributed denial of service attacks are cyber-attacks that target the availability servers. As a result, legitimate users no longer have access to service. This can negative impact on an organization, such as lack reputation and economic losses. Therefore, it is important design defense mechanisms against these attacks. There systems for detecting distributed in literature, which still various shortcomings. Some detect presence attack traffic without identifying packets or flows. Others...
Mobile devices are becoming an essential part of many users' lives. Users exchange sometimes very sensitive data with remote servers. This raises a security problem in terms the confidentiality and integrity these data, privacy. Mutual authentication protocols allow user server to confirm each other's legitimacy share session key encrypt subsequent communications. Several have been proposed achieve this goal. However, certain weaknesses, such as impersonation, lack anonymity, use additional...
Third-generation mobile systems provide access to a wide range of services and enable users communicate regardless their geographical location roaming characteristics. Due the growing number users, global connectivity, small size cells, one most critical issues regarding these networks is management. In recent years, several strategies have been proposed improve performance management procedure in 3G networks. this paper, we present user pattern learning strategy (UPL) using neural reduce...
Assigning cells to switches in cellular mobile networks is an NP-hard problem which, for real size networks, could not be solved using exact methods. In this context, heuristic approaches like memetic algorithms can used. This paper proposes a algorithm (MA) solve problem. The implementation of has been subject extensive tests. results obtained confirm the efficiency and effectiveness MA provide good solutions moderate- large-sized comparison with tabu search Merchant Sengupta's heuristics....
The deregulated electricity industry is characterized by structural change and strategic behaviors of market participants. There a need novel model for medium long term planning that could include games theoretical assumptions as well other more complex assumptions. This paper proposes new agent-based designed to support decentralized activities in supply industry, with certain level flexibility. In this model, the expansion method developed around multiagent simulation system where...
The main concern of the next generation mobile networks is integration heterogeneous wireless technologies around an IP backbone. However this invokes many challenges such as mobility management and handoff decision making. Various approaches have been proposed to deal with handover problem, yet initiation network destination selection remain critical issues which are widely based on traditional RSS measurements. In paper, we propose a new fuzzy making approach that considers variety context...
We developed a distributed data mining system to elaborate on decision concerning the cause of urban traffic congestion via emerging connected vehicle (CV) technology. observe this complex phenomena through interactions between vehicles exchanging messages communication. Results are based real-time simulation generated scenarios extended from real-world travel and activity patterns cologne scenario. evaluate voting procedure that provides deeper insights using cooperation vehicles, belief...
The task of finding and maintaining routes in a Wireless Sensor Networks is nontrivial since energy restrictions sudden changes node status (e.g. failure) cause frequent unpredictable topological changes. This work introduces novel location routing protocol that uses smart antennas to estimate nodes positions into the network deliver information basing decisions on neighbor’s connection relative position, named LBRA. main purpose LBRA eliminate control overhead as much possible. To achieve...
In cloud computing, a fundamental management problem with the Infrastructure as Service (IaaS) model lies in efficient embedding of computational and networking resources onto distributed virtualized infrastructures owned by independent providers (CPs). such context, this issue usually referred to Virtual Network Embedding (VNE) problem, adds more complexity since entire process requires two mayor phases operation: multicloud virtual network requests (VNRs) splitting, followed intracloud VNR...
Selecting the most stable partner on a vehicular ad hoc network (VANET) is challenging task due to its unique mobility, driver behavior, and networking requirements. Although new selection protocols are introduced for mobile networks general there lack of protocol that suitable VANET. This paper discusses requirements such presents handoff tailored VANET We leverage use partner-assisted by introducing vehicle link expiration time (VLET) metric designed maximize intervehicular connections....
We propose a Short-term Traffic flow Prediction (STP) framework so that transportation authorities take early actions to control and prevent congestion.We anticipate at future time frames on target road segment based historical data innovative features such as real feeds trajectory provided by Connected Vehicles (CV) technology.To cope with the fact existing approaches do not adapt variation in traffic, we show how this novel approach allows advanced modelling integrating into forecasting of...