Mounir Hamdi
YOU?
Author Swipe
View article: RL-Driven Security-Aware Resource Allocation for UAV-Assisted O-RAN in SAR Operations
RL-Driven Security-Aware Resource Allocation for UAV-Assisted O-RAN in SAR Operations Open
The integration of Unmanned Aerial Vehicles (UAVs) into Open Radio Access Networks (O-RAN) enhances communication in disaster management and Search and Rescue (SAR) operations by ensuring connectivity when infrastructure fails. However, SA…
View article: Efficient Resource Management for Secure and Low-Latency O-RAN Communication
Efficient Resource Management for Secure and Low-Latency O-RAN Communication Open
Open Radio Access Networks (O-RAN) are transforming telecommunications by shifting from centralized to distributed architectures, promoting flexibility, interoperability, and innovation through open interfaces and multi-vendor environments…
View article: Correction to: Comparative analysis of metaheuristic load balancing algorithms for efficient load balancing in cloud computing
Correction to: Comparative analysis of metaheuristic load balancing algorithms for efficient load balancing in cloud computing Open
Following publication of the original article [1], we have been notified that one of the authors’ names was published incorrectly. It is now as follows: Deemamohammed Alsekait. It should be as follows: Deema Mohammed Alsekait. The original…
View article: Corrections to “The Recent Technologies to Curb the Second-Wave of COVID-19 Pandemic”
Corrections to “The Recent Technologies to Curb the Second-Wave of COVID-19 Pandemic” Open
Presents corrections to the paper, (Corrections to “The Recent Technologies to Curb the Second-Wave of COVID-19 Pandemic”).
View article: RIS Assisted Anti-Jamming in Next-Generation Wireless Communication Networks: A Survey of Threats, Solutions, and Research Challenges
RIS Assisted Anti-Jamming in Next-Generation Wireless Communication Networks: A Survey of Threats, Solutions, and Research Challenges Open
Rapid growth in wireless data traffic and the increasing demand for secure, low-latency communication have driven research toward next-generation (6G) technology, which aims to provide ubiquitous, secure wireless connectivity. Reconfigurab…
View article: INTEGRASI PAYMENT GATEWAY DENGAN SISTEM IMIGRASI DI INDONESIA: TANTANGAN HUKUM DAN IMPLIKASI REGULASI DI ERA DIGITAL
INTEGRASI PAYMENT GATEWAY DENGAN SISTEM IMIGRASI DI INDONESIA: TANTANGAN HUKUM DAN IMPLIKASI REGULASI DI ERA DIGITAL Open
The development of digital technology has brought significant changes to various aspects of life, including payment systems and immigration. Payment gateway, as a critical innovation in the digital financial sector, enables fast and cross-…
View article: Correction: Muniyappan et al. Stability and Numerical Solutions of Second Wave Mathematical Modeling on COVID-19 and Omicron Outbreak Strategy of Pandemic: Analytical and Error Analysis of Approximate Series Solutions by Using HPM. Mathematics 2022, 10, 343
Correction: Muniyappan et al. Stability and Numerical Solutions of Second Wave Mathematical Modeling on COVID-19 and Omicron Outbreak Strategy of Pandemic: Analytical and Error Analysis of Approximate Series Solutions by Using HPM. Mathematics 2022, 10, 343 Open
In the original publication [...]
View article: A Blockchain-Based Reliable Federated Meta-Learning for Metaverse: A Dual Game Framework
A Blockchain-Based Reliable Federated Meta-Learning for Metaverse: A Dual Game Framework Open
The metaverse, envisioned as the next digital frontier for avatar-based\nvirtual interaction, involves high-performance models. In this dynamic\nenvironment, users' tasks frequently shift, requiring fast model\npersonalization despite limi…
View article: Enhancing Healthcare Systems With Deep Reinforcement Learning: Insights Into D2D Communications and Remote Monitoring
Enhancing Healthcare Systems With Deep Reinforcement Learning: Insights Into D2D Communications and Remote Monitoring Open
The traditional healthcare system is increasingly challenged by its dependence on inperson consultations and manual monitoring, struggling with issues of scalability, the immediacy of care, and efficient resource allocation. As the global …
View article: RL-Based Adaptive UAV Swarm Formation and Clustering for Secure 6G Wireless Communications in Dynamic Dense Environments
RL-Based Adaptive UAV Swarm Formation and Clustering for Secure 6G Wireless Communications in Dynamic Dense Environments Open
The wireless communication landscape in beyond 5G and 6G systems, particularly in dense smart city environments, presents significant interference challenges. UAV-mounted Reconfigurable Intelligent Surfaces (RIS) offer a promising solution…
View article: Reinforcement Learning for Resilient Aerial-IRS Assisted Wireless Communications Networks in the Presence of Multiple Jammers
Reinforcement Learning for Resilient Aerial-IRS Assisted Wireless Communications Networks in the Presence of Multiple Jammers Open
The evolving landscape of beyond 5G and 6G wireless communication systems in smart urban environments faces numerous interference-related challenges posed by legitimate and illicit devices. In this context, Intelligent Reflecting Surfaces …
View article: Middle East and North African Health Informatics Association (MENAHIA): Technological initiatives for ‘One Health’
Middle East and North African Health Informatics Association (MENAHIA): Technological initiatives for ‘One Health’ Open
MENAHIA (Middle East and North African Health Informatics Association) is the International Medical Informatics Association chapter dedicated to the Middle East and North Africa region. This region is rapidly growing in terms of the use of…
View article: Adaptive ResNet Architecture for Distributed Inference in Resource-Constrained IoT Systems
Adaptive ResNet Architecture for Distributed Inference in Resource-Constrained IoT Systems Open
As deep neural networks continue to expand and become more complex, most edge devices are unable to handle their extensive processing requirements. Therefore, the concept of distributed inference is essential to distribute the neural netwo…
View article: Intrusion detection system using distributed multilevel discriminator in <scp>GAN</scp> for <scp>IoT</scp> system
Intrusion detection system using distributed multilevel discriminator in <span>GAN</span> for <span>IoT</span> system Open
The artificial intelligence‐based Internet of vehicles (IoV) systems are highly susceptible to cyber‐attacks. To reap the benefits from IoV applications, the network must be protected against numerous security threats. Attacks that have be…
View article: Optimal Resource Management for Hierarchical Federated Learning Over HetNets With Wireless Energy Transfer
Optimal Resource Management for Hierarchical Federated Learning Over HetNets With Wireless Energy Transfer Open
Remote monitoring systems analyze the environment dynamics in different smart industrial applications, such as occupational health and safety, and environmental monitoring. Specifically, in industrial Internet of Things (IoT) systems, the …
View article: Zero Touch Realization of Pervasive Artificial Intelligence as a Service in 6G Networks
Zero Touch Realization of Pervasive Artificial Intelligence as a Service in 6G Networks Open
The vision of the upcoming 6G technologies, characterized by ultra-dense networks, low latency, and fast data rate, is to support pervasive artificial intelligence (PAI) using zero touch solutions enabling self-X (e.g., self-configuration,…
View article: Extremely boosted neural network for more accurate multi-stage Cyber attack prediction in cloud computing environment
Extremely boosted neural network for more accurate multi-stage Cyber attack prediction in cloud computing environment Open
There is an increase in cyberattacks directed at the network behind firewalls. An all-inclusive approach is proposed in this assessment to deal with the problem of identifying new, complicated threats and the appropriate countermeasures. I…
View article: Deep Reinforcement Learning for Trajectory Path Planning and Distributed Inference in Resource-Constrained UAV Swarms
Deep Reinforcement Learning for Trajectory Path Planning and Distributed Inference in Resource-Constrained UAV Swarms Open
The deployment flexibility and maneuverability of Unmanned Aerial Vehicles\n(UAVs) increased their adoption in various applications, such as wildfire\ntracking, border monitoring, etc. In many critical applications, UAVs capture\nimages an…
View article: A Survey on Mobile Edge Computing for Video Streaming: Opportunities and Challenges
A Survey on Mobile Edge Computing for Video Streaming: Opportunities and Challenges Open
5G communication brings substantial improvements in the quality of service provided to various applications by achieving higher throughput and lower latency. However, interactive multimedia applications (e.g., ultra high definition video c…
View article: Social Network User Profiling With Multilayer Semantic Modeling Using Ego Network
Social Network User Profiling With Multilayer Semantic Modeling Using Ego Network Open
Social and information networks undermine the real relationship between the individuals (ego) and the friends (alters) they are connected with on social media. The structure of individual network is highlighted by the ego network. Egocentr…
View article: Autonomous Transaction Model for E-Commerce Management Using Blockchain Technology
Autonomous Transaction Model for E-Commerce Management Using Blockchain Technology Open
A blockchain is an advanced technology that can power over a decentralized network. The authors bring it up to design the autonomous transaction system for e-commerce applications; because of the dramatic increase in IoT devices, communica…
View article: Social Network Analysis for Precise Friend Suggestion for Twitter by Associating Multiple Networks Using ML
Social Network Analysis for Precise Friend Suggestion for Twitter by Associating Multiple Networks Using ML Open
The main aim in this paper is to create a friend suggestion algorithm that can be used to recommend new friends to a user on Twitter when their existing friends and other details are given. The information gathered to make these prediction…
View article: Meta-Heuristic Algorithm-Tuned Neural Network for Breast Cancer Diagnosis Using Ultrasound Images
Meta-Heuristic Algorithm-Tuned Neural Network for Breast Cancer Diagnosis Using Ultrasound Images Open
Breast cancer is the most menacing cancer among all types of cancer in women around the globe. Early diagnosis is the only way to increase the treatment options which then decreases the death rate and increases the chance of survival in pa…
View article: Middle East and North African Health Informatics Association (MENAHIA)
Middle East and North African Health Informatics Association (MENAHIA) Open
The region of the Middle East and North Africa (MENA) is diverse and retains a superior growth potential. It benefits from a privileged geographical location with big markets, a young and growing educated population, and competitive advant…
View article: Hybrid Model for Detection of Cervical Cancer Using Causal Analysis and Machine Learning Techniques
Hybrid Model for Detection of Cervical Cancer Using Causal Analysis and Machine Learning Techniques Open
Cervical cancer has become the third most common form of cancer in the in-universe, after the widespread breast cancer. Human papillomavirus risk of infection is linked to the majority of cancer cases. Preventive care, the most expensive w…