Skip to main content

Showing 1–14 of 14 results for author: Ebrahim, M

.
  1. arXiv:2405.12236  [pdf, other

    cs.AI cs.DC cs.LG cs.MA

    Fully Distributed Fog Load Balancing with Multi-Agent Reinforcement Learning

    Authors: Maad Ebrahim, Abdelhakim Hafid

    Abstract: Real-time Internet of Things (IoT) applications require real-time support to handle the ever-growing demand for computing resources to process IoT workloads. Fog Computing provides high availability of such resources in a distributed manner. However, these resources must be efficiently managed to distribute unpredictable traffic demands among heterogeneous Fog resources. This paper proposes a full… ▽ More

    Submitted 15 May, 2024; originally announced May 2024.

    Comments: Submitted to IEEE IoTJ with 13 pages, 11 figures, and 3 tables

  2. arXiv:2310.05187  [pdf, other

    cs.LG cs.DC

    Lifelong Learning for Fog Load Balancing: A Transfer Learning Approach

    Authors: Maad Ebrahim, Abdelhakim Senhaji Hafid, Mohamed Riduan Abid

    Abstract: Fog computing emerged as a promising paradigm to address the challenges of processing and managing data generated by the Internet of Things (IoT). Load balancing (LB) plays a crucial role in Fog computing environments to optimize the overall system performance. It requires efficient resource allocation to improve resource utilization, minimize latency, and enhance the quality of service for end-us… ▽ More

    Submitted 8 October, 2023; originally announced October 2023.

    Comments: 13 pages and 9 figures

  3. Privacy-Aware Load Balancing in Fog Networks: A Reinforcement Learning Approach

    Authors: Maad Ebrahim, Abdelhakim Hafid

    Abstract: In this paper, we propose a load balancing algorithm based on Reinforcement Learning (RL) to optimize the performance of Fog Computing for real-time IoT applications. The algorithm aims to minimize the waiting delay of IoT workloads in dynamic environments with unpredictable traffic demands, using intelligent workload distribution. Unlike previous studies, our solution does not require load and re… ▽ More

    Submitted 28 February, 2023; v1 submitted 23 January, 2023; originally announced January 2023.

    Comments: 10 pages, 10 figures, 1 table

  4. Resilience and Load Balancing in Fog Networks: A Multi-Criteria Decision Analysis Approach

    Authors: Maad Ebrahim, Abdelhakim Hafid

    Abstract: The advent of Cloud Computing enabled the proliferation of IoT applications for smart environments. However, the distance of these resources makes them unsuitable for delay-sensitive applications. Hence, Fog Computing has emerged to provide such capabilities in proximity to end devices through distributed resources. These limited resources can collaborate to serve distributed IoT application workf… ▽ More

    Submitted 24 October, 2022; originally announced October 2022.

    Comments: 20 pages, 22 figures, 4 tables

  5. arXiv:2203.08901  [pdf, other

    cs.CR cs.NI

    Blockchain as privacy and security solution for smart environments: A Survey

    Authors: Maad Ebrahim, Abdelhakim Hafid, Etienne Elie

    Abstract: Blockchain was always associated with Bitcoin, cryptocurrencies, and digital asset trading. However, its benefits are far beyond that. It supports technologies like the Internet-of-Things (IoT) to pave the way for futuristic smart environments, like smart homes, smart transportation, smart energy trading, smart industries, smart supply chains, and more. To enable these environments, IoT devices, m… ▽ More

    Submitted 16 March, 2022; originally announced March 2022.

    Comments: 22 pages, 10 figures, 2 tables

  6. Hybrid Chaotic Method for Medical Images Ciphering

    Authors: Seham Muawadh Ali Ebrahim

    Abstract: Healthcare is an essential application of e-services, where for diagnostic testing, medical imaging acquiring, processing, analysis, storage, and protection are used. Image ciphering during storage and transmission over the networks used has seen implemented using many types of ciphering algorithms for security purpose. Current cyphering algorithms are classified into two types: traditional classi… ▽ More

    Submitted 4 December, 2020; originally announced December 2020.

    Journal ref: International Journal of Network Security & Its Applications (IJNSA) Vol.12, No.6, November 2020

  7. arXiv:2009.13868  [pdf

    cs.CR

    Intrusion Detection Framework for SQL Injection

    Authors: Israr Ali, Syed Hasan Adil, Mansoor Ebrahim

    Abstract: In this era of internet, E-Business and e-commerce applications are using Databases as their integral part. These Databases irrespective of the technology used are vulnerable to SQL injection attacks. These Attacks are considered very dangerous as well as very easy to use for attackers and intruders. In this paper, we are proposing a new approach to detect intrusion from attackers by using SQL inj… ▽ More

    Submitted 29 September, 2020; originally announced September 2020.

    Comments: 7 pages, 5 Figures,ASIAN JOURNAL OF ENGINEERING, SCIENCES & TECHNOLOGY,VOL.6, ISSUE 2

  8. arXiv:2001.01833  [pdf

    eess.IV

    Line-based compressive sensing for low-power visual applications

    Authors: Mansoor Ebrahim, Syed Hasan Adil, Daniyal Nawaz, Kamran Raza

    Abstract: In this paper, a Line based Compressive Sensing (LCS) scheme is discussed and proposed for low power visual applications, in which image acquisition is performed in a line-by-line manner at the encoder side using same measurement operator. Such approach reduces the computational burden and makes the implementation process easier (at encoder) plus provides better and more efficient initial reconstr… ▽ More

    Submitted 30 December, 2019; originally announced January 2020.

    Comments: 5 pages,3 Figures

    Journal ref: Electronics World, Vol. 124, Issue 1983, pp 26-30

  9. arXiv:1906.02082  [pdf

    quant-ph physics.optics

    Two-photon Quantum Interference and Entanglement at 2 μm

    Authors: Shashi Prabhakar, Taylor Shields, Adetunmise Dada, Mehdi Ebrahim, Gregor G. Taylor, Dmitry Morozov, Kleanthis Erotokritou, Shigehito Miki, Masahiro Yabuno, Hirotaka Terai, Corin Gawith, Michael Kues, Lucia Caspani, Robert H. Hadfield, Matteo Clerici

    Abstract: Quantum-enhanced optical systems operating within the 2- to 2.5-$μ$m spectral region have the potential to revolutionize emerging applications in communications, sensing, and metrology. However, to date, sources of entangled photons have been realized mainly in the near-infrared 700- to 1550-nm spectral window. Here, using custom-designed lithium niobate crystals for spontaneous parametric down-co… ▽ More

    Submitted 30 March, 2020; v1 submitted 5 June, 2019; originally announced June 2019.

    Journal ref: Science Advances 6, eaay5195 (2020)

  10. arXiv:1509.00981  [pdf

    cs.CR

    Security Analysis of Secure Force Algorithm for Wireless Sensor Networks

    Authors: Shujaat Khan, Muhammad Sohail Ibrahim, Kafeel Ahmed Khan, Mansoor Ebrahim

    Abstract: In Wireless Sensor Networks, the sensor nodes are battery powered small devices designed for long battery life. These devices also lack in terms of processing capability and memory. In order to provide high confidentiality to these resource constrained network nodes, a suitable security algorithm is needed to be deployed that can establish a balance between security level and processing overhead.… ▽ More

    Submitted 8 September, 2015; v1 submitted 3 September, 2015; originally announced September 2015.

    Comments: in Asian Journal of Engineering Science and Technology 2015

  11. arXiv:1405.0400  [pdf

    cs.NI

    Peer-to-Peer Network Simulators: an Analytical Review

    Authors: Mansoor Ebrahim, Shujaat Khan, Syed Sheraz Ul Hasan Mohani

    Abstract: Simulators are the most dominant and eminent tool for analyzing and investigating different type of networks. The simulations can be executed with less cost as compared to large scale experiment as less computational resources are required and if the simulation model is carefully designed then it can be more practical than any well brought-up mathematical model. Generally P2P research is based on… ▽ More

    Submitted 2 May, 2014; originally announced May 2014.

    Comments: Asian Journal of Engineering, Sciences & Technology 2.1 (2012)

  12. arXiv:1405.0398  [pdf

    cs.CR

    Symmetric Algorithm Survey: A Comparative Analysis

    Authors: Mansoor Ebrahim, Shujaat Khan, Umer Bin Khalid

    Abstract: Information Security has become an important issue in modern world as the popularity and infiltration of internet commerce and communication technologies has emerged, making them a prospective medium to the security threats. To surmount these security threats modern data communications uses cryptography an effective, efficient and essential component for secure transmission of information by imple… ▽ More

    Submitted 2 May, 2014; originally announced May 2014.

    Journal ref: International Journal of Computer Applications 61.20 (2013)

  13. arXiv:1404.5123   

    cs.CR

    Security Risk Analysis in Peer 2 Peer System; An Approach towards Surmounting Security Challenges

    Authors: Mansoor Ebrahim, Shujaat Khan, UmerBin Khalid

    Abstract: P2P networking has become a promising technology and has achieved popularity as a mechanism for users to share files without the need for centralized servers. The rapid growth of P2P networks beginning with Kaza, Lime wire, Napsters, E-donkey, Gnutella etc makes them an attractive target to the creators of viruses and other security threats. This paper describes the major security issues on P2P ne… ▽ More

    Submitted 1 January, 2018; v1 submitted 21 April, 2014; originally announced April 2014.

    Comments: I think this work is not a quality work and has no significance

    Journal ref: Asian Journal of Engineering Science and Technology AJEST 2 (2) 2.2 (2012)

  14. arXiv:1309.5223  [pdf

    cs.CL

    JRC EuroVoc Indexer JEX - A freely available multi-label categorisation tool

    Authors: Ralf Steinberger, Mohamed Ebrahim, Marco Turchi

    Abstract: EuroVoc (2012) is a highly multilingual thesaurus consisting of over 6,700 hierarchically organised subject domains used by European Institutions and many authorities in Member States of the European Union (EU) for the classification and retrieval of official documents. JEX is JRC-developed multi-label classification software that learns from manually labelled data to automatically assign EuroVoc… ▽ More

    Submitted 20 September, 2013; originally announced September 2013.

    ACM Class: H.3.1; H.3.6

    Journal ref: Proceedings of the 8th international conference on Language Resources and Evaluation (LREC'2012), pp. 798-805, Istanbul, 21-27 May 2012