Ahmed Refaey
YOU?
Author Swipe
View article: When Intelligence Overloads Infrastructure: A Forecast Model for AI-Driven Bottlenecks
When Intelligence Overloads Infrastructure: A Forecast Model for AI-Driven Bottlenecks Open
The exponential growth of AI agents and connected devices fundamentally transforms the structure and capacity demands of global digital infrastructure. This paper introduces a unified forecasting model that projects AI agent populations to…
View article: Efficient Resource Management for Secure and Low-Latency O-RAN Communication
Efficient Resource Management for Secure and Low-Latency O-RAN Communication Open
Open Radio Access Networks (O-RAN) are transforming telecommunications by shifting from centralized to distributed architectures, promoting flexibility, interoperability, and innovation through open interfaces and multi-vendor environments…
View article: Closing the Responsibility Gap in AI-based Network Management: An Intelligent Audit System Approach
Closing the Responsibility Gap in AI-based Network Management: An Intelligent Audit System Approach Open
Existing network paradigms have achieved lower downtime as well as a higher Quality of Experience (QoE) through the use of Artificial Intelligence (AI)-based network management tools. These AI management systems, allow for automatic respon…
View article: Distributed Traffic Control in Complex Dynamic Roadblocks: A Multi-Agent Deep RL Approach
Distributed Traffic Control in Complex Dynamic Roadblocks: A Multi-Agent Deep RL Approach Open
Autonomous Vehicles (AVs) represent a transformative advancement in the transportation industry. These vehicles have sophisticated sensors, advanced algorithms, and powerful computing systems that allow them to navigate and operate without…
View article: Raft Distributed System for Multi-access Edge Computing Sharing Resources
Raft Distributed System for Multi-access Edge Computing Sharing Resources Open
Researchers all over the world are employing a variety of analysis approaches in attempt to provide a safer and faster solution for sharing resources via a Multi-access Edge Computing system. Multi-access Edge Computing (MEC) is a job-shar…
View article: Decentralized Semantic Traffic Control in AVs Using RL and DQN for Dynamic Roadblocks
Decentralized Semantic Traffic Control in AVs Using RL and DQN for Dynamic Roadblocks Open
Autonomous Vehicles (AVs), furnished with sensors capable of capturing essential vehicle dynamics such as speed, acceleration, and precise location, possess the capacity to execute intelligent maneuvers, including lane changes, in anticipa…
View article: Towards Zero-Trust 6GC: A Software Defined Perimeter Approach with Dynamic Moving Target Defense Mechanism
Towards Zero-Trust 6GC: A Software Defined Perimeter Approach with Dynamic Moving Target Defense Mechanism Open
The upcoming Sixth Generation (6G) network is projected to grapple with a range of security concerns, encompassing access control, authentication, secure connections among 6G Core (6GC) entities, and trustworthiness. Classical Virtual Priv…
View article: Unified Pandemic Tracking System Based on Open Geospatial Consortium SensorThings API
Unified Pandemic Tracking System Based on Open Geospatial Consortium SensorThings API Open
With the current nations struggling to track the pandemic's trajectories. There has been a lack of transparency or real-live data streaming for pandemic cases and symptoms. This phenomenon has led to a rapid and uncontrolled spread of thes…
View article: Implicit Sensing in Traffic Optimization: Advanced Deep Reinforcement Learning Techniques
Implicit Sensing in Traffic Optimization: Advanced Deep Reinforcement Learning Techniques Open
A sudden roadblock on highways due to many reasons such as road maintenance, accidents, and car repair is a common situation we encounter almost daily. Autonomous Vehicles (AVs) equipped with sensors that can acquire vehicle dynamics such …
View article: Editorial: Artificial intelligence-based computer-aided diagnosis applications for brain disorders from medical imaging data, volume II
Editorial: Artificial intelligence-based computer-aided diagnosis applications for brain disorders from medical imaging data, volume II Open
EDITORIAL article Front. Neurosci., 12 July 2023Sec. Brain Imaging Methods Volume 17 - 2023 | https://doi.org/10.3389/fnins.2023.1241926
View article: Zero Touch Realization of Pervasive Artificial Intelligence as a Service in 6G Networks
Zero Touch Realization of Pervasive Artificial Intelligence as a Service in 6G Networks Open
The vision of the upcoming 6G technologies, characterized by ultra-dense\nnetwork, low latency, and fast data rate is to support Pervasive AI (PAI) using\nzero-touch solutions enabling self-X (e.g., self-configuration,\nself-monitoring, an…
View article: Editorial: Artificial intelligence based computer-aided diagnosis applications for brain disorders from medical imaging data
Editorial: Artificial intelligence based computer-aided diagnosis applications for brain disorders from medical imaging data Open
EDITORIAL article Front. Neurosci., 31 January 2023Sec. Brain Imaging Methods Volume 17 - 2023 | https://doi.org/10.3389/fnins.2023.998818
View article: 6G-Enabled Mobile Access Point Placement via Dynamic Federated Learning Strategies
6G-Enabled Mobile Access Point Placement via Dynamic Federated Learning Strategies Open
Advanced Indoor Positioning Systems (IPS) based on Received Signal Strength (RSS) fingerprints have been paramount in 6G network research and commercial exploitation due to their cost-effectiveness and simplicity. Despite their popularity,…
View article: Exploring the Intersection of Consortium Blockchain Technologies and Multi-Access Edge Computing: Chronicles of a Proof of Concept Demo
Exploring the Intersection of Consortium Blockchain Technologies and Multi-Access Edge Computing: Chronicles of a Proof of Concept Demo Open
The efficient administration of network resources in Multi-Access Edge Computing (MEC) is an active research topic these days. Task sharing, in particular, is one of the fundamental problems regarding MEC architectures although the existin…
View article: Analysis of thermal hydraulic behavior of KONVOI PWR during a design extension condition
Analysis of thermal hydraulic behavior of KONVOI PWR during a design extension condition Open
In nuclear power plants the design extension conditions are more complex and severe than those postulated as design basis accidents, therefore, they must be taken into account in the safety analyses. In this study, many hypothetical invest…
View article: B5G: Predictive Container Auto-Scaling for Cellular Evolved Packet Core
B5G: Predictive Container Auto-Scaling for Cellular Evolved Packet Core Open
In order to maintain a satisfactory performance in the midst of rapid growth of mobile traffic, the mobile network infrastructure needs to be scaled. Thus there has been significant interest in scalability of mobile core networks and a var…
View article: Communication and Networking Track Committee
Communication and Networking Track Committee Open
View article: Proportionally Fair approach for Tor’s Circuits Scheduling
Proportionally Fair approach for Tor’s Circuits Scheduling Open
The number of users adopting Tor to protect their online privacy is increasing rapidly. With a limited number of volunteered relays in the network, the number of clients' connections sharing the same relays is increasing to the extent that…
View article: A Blockchain Framework for Secure Task Sharing in Multi-Access Edge Computing
A Blockchain Framework for Secure Task Sharing in Multi-Access Edge Computing Open
In the context of Multi-access Edge Computing (MEC), the task sharing mechanism among edge servers is an activity of vital importance for speeding up the computing process and thereby improve user experience. The distributed resources in t…
View article: Tracking Pandemics: A MEC-Enabled IoT Ecosystem with Learning Capability
Tracking Pandemics: A MEC-Enabled IoT Ecosystem with Learning Capability Open
The COVID-19 pandemic has resulted in unprecedented challenges to global society and the healthcare system in particular. The main objective of this article is to introduce an end-to-end Internet of Things (IoT) ecosystem for healthcare th…
View article: Five-Layers SDP-Based Hierarchical Security Paradigm for Multi-access Edge Computing
Five-Layers SDP-Based Hierarchical Security Paradigm for Multi-access Edge Computing Open
The rise in embedded and IoT device usage comes with an increase in LTE usage as well. About 70\% of an estimated 18 billion IoT devices will be using cellular LTE networks for efficient connections. This introduces several challenges such…
View article: Five-Layers SDP-Based Hierarchical Security Paradigm for Multi-access\n Edge Computing
Five-Layers SDP-Based Hierarchical Security Paradigm for Multi-access\n Edge Computing Open
The rise in embedded and IoT device usage comes with an increase in LTE usage\nas well. About 70\\% of an estimated 18 billion IoT devices will be using\ncellular LTE networks for efficient connections. This introduces several\nchallenges …
View article: A Blockchain Framework for Secure Task Sharing in Multi-access Edge\n Computing
A Blockchain Framework for Secure Task Sharing in Multi-access Edge\n Computing Open
In the context of Multi-access Edge Computing (MEC), the task sharing\nmechanism among edge servers is an activity of vital importance for speeding up\nthe computing process and thereby improve user experience. The distributed\nresources i…
View article: ssHealth: Toward Secure, Blockchain-Enabled Healthcare Systems
ssHealth: Toward Secure, Blockchain-Enabled Healthcare Systems Open
The future of healthcare systems is being shaped by incorporating emerged\ntechnological innovations to drive new models for patient care. By acquiring,\nintegrating, analyzing, and exchanging medical data at different system levels,\nnew …
View article: A Sidechain-Based Decentralized Authentication Scheme via Optimized Two-Way Peg Protocol for Smart Community
A Sidechain-Based Decentralized Authentication Scheme via Optimized Two-Way Peg Protocol for Smart Community Open
In this work, we propose a novel sidechain structure via an optimized two-way peg protocol for device authentication in the smart community in order to overcome the limitations of existing approaches. The proposed scheme uses private side …
View article: Guest Editorial Special Issue on CCECE 2019
Guest Editorial Special Issue on CCECE 2019 Open
Welcome to a Special Issue of the IEEE Canadian Journal of Electrical and Computer Engineering, which presents some of the top articles (in extended form) from the Canadian Conference of Electrical and Computer Engineering (CCECE 2019) hel…
View article: A Blockchain Policy and Charging Control Framework for Roaming in Cellular Networks
A Blockchain Policy and Charging Control Framework for Roaming in Cellular Networks Open
As a technology foundation of cryptocurrencies, blockchain enables decentralized peer-to-peer trading through consensus mechanisms without the involvement of a third party. Blockchain has been regarded as an auspicious technology for futur…
View article: On IoT applications: a proposed SDP framework for MQTT
On IoT applications: a proposed SDP framework for MQTT Open
In this work, the software‐defined perimeter (SDP) is considered for the Message Queuing Telemetry Transport (MQTT) protocol framework in the Internet of Things (IoT) applications. In fact, the SDP provides an additional layer of security …
View article: A Blockchain Policy and Charging Control Framework for Roaming in\n Cellular Networks
A Blockchain Policy and Charging Control Framework for Roaming in\n Cellular Networks Open
As a technology foundation of cryptocurrencies, blockchain enables\ndecentralized peer-to-peer trading through consensus mechanisms without the\ninvolvement of a third party. Blockchain has been regarded as an auspicious\ntechnology for fu…
View article: On the Security of SDN: A Completed Secure and Scalable Framework Using the Software-Defined Perimeter
On the Security of SDN: A Completed Secure and Scalable Framework Using the Software-Defined Perimeter Open
The widespread adoption and evolution of Software Defined Networking (SDN) have enabled the service providers to successfully simplify network management. Along with the traffic explosion, there is decreasing CAPEX and OPEX as well as an i…