Skip to main content

Showing 1–19 of 19 results for author: Zeadally, S

.
  1. arXiv:2405.03863  [pdf, other

    eess.SY cs.NI

    Resource Optimization in UAV-assisted IoT Networks: The Role of Generative AI

    Authors: Sana Sharif, Sherali Zeadally, Waleed Ejaz

    Abstract: We investigate how generative Artificial Intelligence (AI) can be used to optimize resources in Unmanned Aerial Vehicle (UAV)-assisted Internet of Things (IoT) networks. In particular, generative AI models for real-time decision-making have been used in public safety scenarios. This work describes how generative AI models can improve resource management within UAV-assisted networks. Furthermore, t… ▽ More

    Submitted 6 May, 2024; originally announced May 2024.

    Comments: Accepted - IEEE Internet of Things Magazine

  2. arXiv:2311.12944  [pdf, other

    cs.NI cs.AI cs.LG cs.NE

    SkyCharge: Deploying Unmanned Aerial Vehicles for Dynamic Load Optimization in Solar Small Cell 5G Networks

    Authors: Daksh Dave, Vinay Chamola, Sandeep Joshi, Sherali Zeadally

    Abstract: The power requirements posed by the fifth-generation and beyond cellular networks are an important constraint in network deployment and require energy-efficient solutions. In this work, we propose a novel user load transfer approach using airborne base stations (BS) mounted on drones for reliable and secure power redistribution across the micro-grid network comprising green small cell BSs. Dependi… ▽ More

    Submitted 9 February, 2024; v1 submitted 21 November, 2023; originally announced November 2023.

  3. arXiv:2310.17260  [pdf, other

    cs.CY

    Socially Beneficial Metaverse: Framework, Technologies, Applications, and Challenges

    Authors: Xiaolong Xu, Xuanhong Zhou, Muhammad Bilal, Sherali Zeadally, Jon Crowcroft, Lianyong Qi, Shengjun Xue

    Abstract: In recent years, the maturation of emerging technologies such as Virtual Reality, Digital twins, and Blockchain has accelerated the realization of the metaverse. As a virtual world independent of the real world, the metaverse will provide users with a variety of virtual activities that bring great convenience to society. In addition, the metaverse can facilitate digital twins, which offers transfo… ▽ More

    Submitted 26 October, 2023; originally announced October 2023.

    Comments: 28 pages, 6 figures, 3 tables

    MSC Class: 68U01; 68M11; 68U35 ACM Class: A.1; K.4

  4. arXiv:2308.06272  [pdf, other

    cs.HC cs.AI

    Beyond Reality: The Pivotal Role of Generative AI in the Metaverse

    Authors: Vinay Chamola, Gaurang Bansal, Tridib Kumar Das, Vikas Hassija, Naga Siva Sai Reddy, Jiacheng Wang, Sherali Zeadally, Amir Hussain, F. Richard Yu, Mohsen Guizani, Dusit Niyato

    Abstract: Imagine step** into a virtual world that's as rich, dynamic, and interactive as our physical one. This is the promise of the Metaverse, and it's being brought to life by the transformative power of Generative Artificial Intelligence (AI). This paper offers a comprehensive exploration of how generative AI technologies are sha** the Metaverse, transforming it into a dynamic, immersive, and inter… ▽ More

    Submitted 28 July, 2023; originally announced August 2023.

    Comments: 8 pages, 4 figures

  5. arXiv:2303.11543  [pdf, other

    eess.SP

    DeepMA: End-to-end Deep Multiple Access for Wireless Image Transmission in Semantic Communication

    Authors: Wenyu Zhang, Kaiyuan Bai, Sherali Zeadally, Haijun Zhang, Hua Shao, Hui Ma, Victor C. M. Leung

    Abstract: Semantic communication is a new paradigm that exploits deep learning models to enable end-to-end communications processes, and recent studies have shown that it can achieve better noise resiliency compared with traditional communication schemes in a low signal-to-noise (SNR) regime. To achieve multiple access in semantic communication, we propose a deep learning-based multiple access (DeepMA) meth… ▽ More

    Submitted 27 June, 2023; v1 submitted 20 March, 2023; originally announced March 2023.

  6. arXiv:2210.02172  [pdf, other

    eess.SP

    Intelligent and Secure Radio Environments for 6G Vehicular Aided HetNets: Key Opportunities and Challenges

    Authors: Wali Ullah Khan, Muhammad Awais Javed, Sherali Zeadally, Eva Lagunas, Symeon Chatzinotas

    Abstract: Reconfigurable meta-surfaces are emerging as a novel and revolutionizing technology to enable intelligent wireless environments. Due to the low cost, improved efficiency, and passive nature of reflecting elements, it is becoming possible to program and control the wireless environment. Since wireless physical layer technologies can generally adapt to the wireless environment, their combination wit… ▽ More

    Submitted 5 October, 2022; originally announced October 2022.

    Comments: 12,4

  7. arXiv:2203.03717  [pdf, other

    cs.CY

    An Analysis of Energy Consumption and Carbon Footprints of Cryptocurrencies and Possible Solutions

    Authors: Varun Kohli, Sombuddha Chakravarty, Vinay Chamola, Kuldip Singh Sangwan, Sherali Zeadally

    Abstract: There is an urgent need to control global warming caused by humans to achieve a sustainable future. $CO_2$ levels are rising steadily and while countries worldwide are actively moving toward the sustainability goals proposed during the Paris Agreement in 2015, we are still a long way to go from achieving a sustainable mode of global operation. The increased popularity of cryptocurrencies since the… ▽ More

    Submitted 20 February, 2022; originally announced March 2022.

  8. arXiv:2105.14607  [pdf

    cs.DC cs.AI cs.NI

    Power and Performance Efficient SDN-Enabled Fog Architecture

    Authors: Adnan Akhunzada, Sherali Zeadally, Saif ul Islam

    Abstract: Software Defined Networks (SDNs) have dramatically simplified network management. However, enabling pure SDNs to respond in real-time while handling massive amounts of data still remains a challenging task. In contrast, fog computing has strong potential to serve large surges of data in real-time. SDN control plane enables innovation, and greatly simplifies network operations and management thereb… ▽ More

    Submitted 30 May, 2021; originally announced May 2021.

    Comments: 7 pages

  9. Survey on Congestion Detection and Control in Connected Vehicles

    Authors: Anirudh Paranjothi, Mohammad S. Khan, Sherali Zeadally

    Abstract: The dynamic nature of vehicular ad hoc network (VANET) induced by frequent topology changes and node mobility, imposes critical challenges for vehicular communications. Aggravated by the high volume of information dissemination among vehicles over limited bandwidth, the topological dynamics of VANET causes congestion in the communication channel, which is the primary cause of problems such as mess… ▽ More

    Submitted 29 July, 2020; originally announced July 2020.

  10. arXiv:2007.07096  [pdf

    cs.CY

    Multi-Utility Market: Framework for a Blockchain Exchange Platform for Sustainable Development

    Authors: Jacques Bou Abdo, Sherali Zeadally

    Abstract: Water and other resources are becoming scarcer every day, and develo** countries are the neediest for an immediate intervention. Water, as a national need, is considered to be one of the main causes for conflicts in the 21st century. Peer-to-peer trading is one of the most convenient, scalable and sustainable solutions but faces organization challenges such as: the absence of suitable business m… ▽ More

    Submitted 14 July, 2020; originally announced July 2020.

  11. arXiv:2007.04093  [pdf, other

    eess.SP cs.LG

    Machine learning and data analytics for the IoT

    Authors: Erwin Adi, Adnan Anwar, Zubair Baig, Sherali Zeadally

    Abstract: The Internet of Things (IoT) applications have grown in exorbitant numbers, generating a large amount of data required for intelligent data processing. However, the varying IoT infrastructures (i.e., cloud, edge, fog) and the limitations of the IoT application layer protocols in transmitting/receiving messages become the barriers in creating intelligent IoT applications. These barriers prevent cur… ▽ More

    Submitted 30 June, 2020; originally announced July 2020.

  12. arXiv:2007.01052  [pdf, ps, other

    eess.SP cs.IT

    Efficient Mining Cluster Selection for Blockchain-based Cellular V2X Communications

    Authors: Furqan Jameel, Muhammad Awais Javed, Sherali Zeadally, Riku Jantti

    Abstract: Cellular vehicle-to-everything (V2X) communication is expected to herald the age of autonomous vehicles in the coming years. With the integration of blockchain in such networks, information of all granularity levels, from complete blocks to individual transactions, would be accessible to vehicles at any time. Specifically, the blockchain technology is expected to improve the security, immutability… ▽ More

    Submitted 29 June, 2020; originally announced July 2020.

    Comments: Blockchain, Cellular V2X Communications, Latency, Mining, Vehicular Networks

  13. arXiv:1907.12525  [pdf, other

    cs.CR

    A Survey on Physical Unclonable Function (PUF)-based Security Solutions for Internet of Things

    Authors: Alireza Shamsoshoara, Ashwija Korenda, Fatemeh Afghah, Sherali Zeadally

    Abstract: The vast areas of applications for IoTs in future smart cities, smart transportation systems, and so on represent a thriving surface for several security attacks with economic, environmental and societal impacts. This survey paper presents a review of the security challenges of emerging IoT networks and discusses some of the attacks and their countermeasures based on different domains in IoT netwo… ▽ More

    Submitted 12 October, 2020; v1 submitted 29 July, 2019; originally announced July 2019.

    Comments: 78 pages, 11 figures, 6 tables

  14. arXiv:1906.04219  [pdf

    cs.NI

    GSTR: Secure Multi-hop Message Dissemination in Connected Vehicles using Social Trust Model

    Authors: Anirudh Paranjothi, Mohammad S. Khan, Sherali Zeadally, A**kya Pawar, David Hicks

    Abstract: The emergence of connected vehicles paradigm has made secure communication a key concern amongst the connected vehicles. Communication between the vehicles and Road Side Units (RSUs) is critical to disseminate message among the vehicles. We focus on secure message transmission in connected vehicles using multi_hop social networks environment to deliver the message with varying trustworthiness. We… ▽ More

    Submitted 10 June, 2019; originally announced June 2019.

  15. arXiv:1801.09961  [pdf

    cs.IR cs.SI

    Modeling Influence with Semantics in Social Networks: a Survey

    Authors: Gerasimos Razis, Ioannis Anagnostopoulos, Sherali Zeadally

    Abstract: The discovery of influential entities in all kinds of networks (e.g. social, digital, or computer) has always been an important field of study. In recent years, Online Social Networks (OSNs) have been established as a basic means of communication and often influencers and opinion makers promote politics, events, brands or products through viral content. In this work, we present a systematic review… ▽ More

    Submitted 4 October, 2018; v1 submitted 30 January, 2018; originally announced January 2018.

    Comments: 61 pages, 3 figures, 4 tables

  16. arXiv:1712.09916  [pdf, other

    cs.CR cs.NI

    A ReRAM Physically Unclonable Function (ReRAM PUF)-based Approach to Enhance Authentication Security in Software Defined Wireless Networks

    Authors: Fatemeh Afghah, Bertrand Cambou, Masih Abedini, Sherali Zeadally

    Abstract: The exponentially increasing number of ubiquitous wireless devices connected to the Internet in Internet of Things (IoT) networks highlights the need for a new paradigm of data flow management in such large-scale networks under software defined wireless networking (SDWN). The limited power and computation capability available at IoT devices as well as the centralized management and decision-making… ▽ More

    Submitted 21 December, 2017; originally announced December 2017.

    Comments: 16 pages, 10 figures, submitted to Springer International Journal of Wireless Information Networks

  17. arXiv:1712.02245  [pdf, other

    cs.SI

    Viral content propagation in Online Social Networks

    Authors: Giannis Haralabopoulos, Ioannis Anagnostopoulos, Sherali Zeadally

    Abstract: Information flows are the result of a constant exchange in Online Social Networks (OSNs). OSN users create and share varying types of information in real-time throughout a day. Virality is introduced as a term to describe information that reaches a wide audience within a small time-frame. As a case, we measure propagation of information submitted in Reddit, identify different patterns and present… ▽ More

    Submitted 15 January, 2018; v1 submitted 5 December, 2017; originally announced December 2017.

    Comments: 12 pages, 2 figures. arXiv admin note: substantial text overlap with arXiv:1403.1486

  18. arXiv:cs/0411039  [pdf

    cs.NI

    Using Wireless Sensor Networks to Narrow the Gap between Low-Level Information and Context-Awareness

    Authors: Ioan Raicu, Owen Richter, Loren Schwiebert, Sherali Zeadally

    Abstract: Wireless sensor networks are finally becoming a reality. In this paper, we present a scalable architecture for using wireless sensor networks in combination with wireless Ethernet networks to provide a complete end-to-end solution to narrow the gap between the low-level information and context awareness. We developed and implemented a complete proximity detector in order to give a wearable compu… ▽ More

    Submitted 12 November, 2004; originally announced November 2004.

    Comments: Published at ISCA 17th International Conference on Computers and Their Applications, CATA 2002, April 2002, San Francisco, California, USA. 6 pages

    ACM Class: C.2.1

  19. arXiv:nucl-ex/0401032  [pdf

    nucl-ex

    STAR-Scheduler: A Batch Job Scheduler for Distributed I/O Intensive Applications

    Authors: V. Mandapaka, C. Pruneau, J. Lauret, S. Zeadally

    Abstract: We present the implementation of a batch job scheduler designed for single-point management of distributed tasks on a multi-node compute farm. The scheduler uses the notion of a meta-job to launch large computing tasks simultaneously on many nodes from a single user command. Job scheduling on specific computing nodes is predicated on the availability of user specified data files co-located with… ▽ More

    Submitted 25 January, 2004; originally announced January 2004.

    Comments: 10 pages, 2 figures, MS Computer Science Paper