蜜桃直播

Dr Ali Hilal Al-Bayatti

Job: Associate Professor in Cyber Security

Faculty: Computing, Engineering and Media

School/department: School of Computer Science and Informatics

Research group(s): Cyber Technology Institute (CTI) (Software Technology Research Laboratory (STRL))

Address: 蜜桃直播, The Gateway, Leicester, LE1 9BH, United Kingdom

T: +44 (0)116 207 8586

E: alihmohd@dmu.ac.uk

W:

 

Personal profile

Dr. Ali Al-Bayatti is a Senior Lecturer in Intelligent Transportation systems at Software Technology Research Laboratory, a research institute established within 蜜桃直播, Leicester, UK. , his research deals with vehicular (e.g. Vehicular Ad hoc Networks), Cyber Security (e.g. Security Management) and smart technologies (e.g. Context-aware Systems) that promote collective intelligence. Applications range from promoting comfort, to enabling safety in critical scenarios. The goal of his research is to improve the effectiveness, efficiency, mobility, security and safety of transportationsystems.

Dr. Ali Al-Bayatti is currently teaching Undergraduate module ‘CTEC3604 Multi-service Networks’ in Computer Science. He is currently the programme leader for MSc Cyber Technology, MSc Software Engineering, MSc Cyber Security and MSc Professional Practice in Digital Forensics and Security.

Publications and outputs


  • dc.title: Advancements in brain tumor identification: Integrating synthetic GANs with federated-CNNs in medical imaging analysis dc.contributor.author: Alalwan, Nasser; Alwadin, Ayed; Alzahrani, Ahmed Ibrahim; Al-Bayatti, Ali Hilal; Abozeid, Amr; El-Aziz, Rasha M. Abd dc.description.abstract: Brain tumors are a significant health concern worldwide, necessitating accurate and timely diagnosis for effective treatment planning and management. However, conventional methods for brain tumor identification through medical imaging analysis often face challenges related to accuracy, efficiency, and privacy concerns. Current approaches may struggle with limited datasets, privacy regulations hindering data sharing, and the need for specialized expertise in interpreting medical images. Accurately identifying brain tumors is pivotal in diagnosis, treatment planning, and patient prognosis. This research proposes a novel approach for advancing brain tumor identification by integrating Synthetic Generative Adversarial Networks with federated convolutional neural Networks in medical imaging analysis. Federated-CNNs are a type of neural network architecture designed for federated learning scenarios. In federated learning, model training occurs locally on data distributed across multiple devices or institutions without exchanging raw data. Federated CNNs allow collaborative model training across these distributed datasets by aggregating local model updates rather than exchanging raw data. This approach ensures that sensitive data remain localized within each participating institution, thus addressing privacy concerns in medical imaging analysis. Our methodology harnesses the power of GANs to generate synthetic brain MRI images, addressing data scarcity issues commonly encountered in medical imaging datasets. These synthetic images are then utilized in conjunction with Federated-CNNs, enabling cooperative model training between many healthcare institutions while maintaining the anonymity and privacy of data. Moreover, integrating Federated CNNs ensures that sensitive medical imaging data remain localized within participating institutions, addressing data privacy concerns and fostering collaboration among medical professionals. The research advances medical imaging analysis by introducing a novel methodology that leverages existing technologies to improve brain tumor identification accuracy. Specifically, the feature extraction phase using DenseNet121, implemented in MATLAB, achieves an outstanding accuracy of 99.82鈥% and outperforms Various existing methods, including Inception-V3, ResNet-18, and GoogleNet, demonstrating the efficacy of our approach in capturing discriminative features from medical imaging data. This high accuracy underscores the potential of our methodology to enhance diagnostic accuracy and clinical decision-making in neurology and oncology. The research offers a promising avenue for further exploration and innovation in medical imaging analysis, with significant implications for improving patient outcomes and advancing healthcare practices. dc.description: open access article

  • dc.title: Security, Privacy, and Decentralized Trust Management in VANETs: A Review of Current Research and Future Directions dc.contributor.author: Kiraz, Mehmet Sabir; AlMarshoud, Mishri Saleh; Al-Bayatti, Ali Hilal dc.description.abstract: Vehicular Ad Hoc Networks (VANETs) are powerful platforms for vehicular data services and applications. The increasing number of vehicles has made the vehicular network diverse, dynamic, and large-scale, making it difficult to meet the 5G network鈥檚 demanding requirements. Decentralized systems are interesting and provide attractive services because they are publicly available (transparency), have an append-only ledger (robust integrity protection), remove single points of failure, and enable distributed key management and communication in a peer-to-peer network. Researchers dedicated substantial efforts to advancing vehicle communications, however conventional cryptographic mechanisms are insufficient which enabled us to look at decentralized technologies. Therefore, we revisit decentralized approaches with VANETs. Endpoint devices hold a wallet which may incorporate threshold key management methods like MPC wallets, HD Wallets, or multi-party threshold ECDSA/EdDSA/BLS. We also discuss trust management approaches and demonstrate how decentralization can improve integrity, security, privacy, and resilience to single points of failure. We also conduct a comprehensive review, comparing them with current requirements, and the latest authentication and secure communication architectures, which require the involvement of trusted but non-transparent authorities in certificate issuance/revocation. We highlight the limitations of these schemes from PKI deployment and recommend future research, particularly in the realm of quantum cryptography. dc.description: The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.

  • dc.title: Mitigating MEV attacks with a two-tiered architecture utilizing verifiable decryption dc.contributor.author: Kiraz, Mehmet Sabir; Alnajjar, Mustafa Ibrahim; Al-Bayatti, Ali Hilal; Kardas, Suleyman dc.description.abstract: A distributed ledger is a shared and synchronized database across multiple designated nodes, often referred to as miners, validators, or peers. These nodes record, distribute, and access data to ensure security and transparency. However, these nodes can be compromised and manipulated by selectively choosing which user transactions to include, exclude, or reorder, thereby gaining an unfair advantage. This is known as a miner/maximal extractable value (MEV) attack. Existing solutions can be classified into various categories, such as MEV auction platforms and time-based ordering properties, which rely on private transaction Mempools. In this paper, we first identify some architectural weaknesses inherent in the latest proposals that divide the block creation and execution roles into separate functions: block builders and block executors. The existing schemes mainly suffer from the verifiability of the decryption process, where a corrupted builder or executor can simply deny the inclusion of specific targeted transactions by exploiting the fact that all transactions are in plain format. To address this, we propose an enhanced version that incorporates a verifiable decryption process. On a very high level, within our proposal, whenever an Executor or a Builder performs a decryption, the decrypted values must be broadcasted. This enables any entity in the network to publicly verify whether the decryption was executed correctly, thus preventing malicious behavior by either party from going undetected. We also define a new adversary model for MEV and conduct a comprehensive security analysis of our protocol against all kinds of potential adversaries related to MEV. Finally, we present the performance analysis of the proposed solution. dc.description: open access article

  • dc.title: A New Framework for Enhancing VANETs through Layer 2 DLT Architectures with Multiparty Threshold Key Management and PETs dc.contributor.author: Kiraz, Mehmet Sabir; Al-Bayatti, Ali Hilal; Adarbah, Haitham; Kardas, Suleyman; Al-Bayatti, Hilal M. Y. dc.description.abstract: This work proposes a new architectural approach to enhance the security, privacy, and scalability of VANETs through threshold key management and Privacy Enhancing Technologies (PETs), such as homomorphic encryption and secure multiparty computation, integrated with Decentralized Ledger Technologies (DLTs). These advanced mechanisms are employed to eliminate centralization and protect the privacy of transferred and processed information in VANETs, thereby addressing privacy concerns. We begin by discussing the weaknesses of existing VANET architectures concerning trust, privacy, and scalability and then introduce a new architectural framework that shifts from centralized to decentralized approaches. This transition applies a decentralized ledger mechanism to ensure correctness, reliability, accuracy, and security against various known attacks. The use of Layer 2 DLTs in our framework enhances key management, trust distribution, and data privacy, offering cost and speed advantages over Layer 1 DLTs, thereby enabling secure vehicle-to-everything (V2X) communication. The proposed framework is superior to other frameworks as it improves decentralized trust management, adopts more efficient PETs, and leverages Layer 2 DLT for scalability. The integration of multiparty threshold key management and homomorphic encryption also enhances data confidentiality and integrity, thus securing against various existing cryptographic attacks. Finally, we discuss potential future developments to improve the security and reliability of VANETs in the next generation of networks, including 5G networks. dc.description: open access article

  • dc.title: Effect of roadway environment characteristics on pedestrian safety at signalised intersections in Amman dc.contributor.author: Shehadeh, Eman A.; Al-Bayatti, Ali Hilal; Bingol, Muhammed Ali dc.description.abstract: Pedestrian safety becoming a serious issue, especially in developing nations, wherein higher crash rates have been reported by the World Health Organization. Despite evidence suggesting higher pedestrian crash counts at signalised intersections in urban areas, there is a lack of in-depth analysis in most developing countries. Motivated by this need, this study aims to: 1) identify significant roadway environment characteristics and traffic volume factors influencing pedestrian 鈥 vehicle accidents at signalised intersections in Amman, Jordan, 2) elucidate relationships between pedestrian 鈥 vehicle accidents and these factors, and 3) discuss the limitations of pedestrian crash data and propose solutions for future research. We have analysed 166 accidents at 47 signalised intersections in Amman during the period of 2007鈥2019. The multilevel Generalised Linear Mixed Gamma regression model is the best fit for the data, indicating significant positive correlations between pedestrian crash frequencies and Annual Average Daily Traffic, pedestrian crossing volume, number of lanes, average lane width, and number of parking sides. Conversely, commercial land use and the presence of public transit facilities showed significant negative correlations with pedestrian crashes. This work presents a novel approach that will help developing countries to determine and explain pedestrian crash causes while considering various challenges in these contexts. dc.description: open access article

  • dc.title: Security, Privacy, and Decentralized Trust Management in VANETs: A Review of Current Research and Future Directions dc.contributor.author: AlMarshoud, Mishri Saleh; Al-Bayatti, Ali Hilal; Kiraz, Mehmet Sabir dc.description.abstract: Vehicular Ad Hoc Networks (VANETs) are powerful platforms for vehicular data services and applications. The increasing number of vehicles has made the vehicular network diverse, dynamic, and large-scale, making it difficult to meet the 5G network鈥檚 demanding requirements. Decentralized systems are interesting and provide attractive services because they are publicly available (transparency), have an append-only ledger (robust integrity protection), remove single points of failure, and enable distributed key management and communication in a peer-to-peer network. Researchers dedicated substantial efforts to advancing vehicle communications, however conventional cryptographic mechanisms are insufficient which enabled us to look at decentralized technologies. Therefore, we revisit decentralized approaches with VANETs. Endpoint devices hold a wallet which may incorporate threshold key management methods like MPC wallets, HD Wallets, or multi-party threshold ECDSA/EdDSA/BLS. We also discuss trust management approaches and demonstrate how decentralization can improve integrity, security, privacy, and resilience to single points of failure. We also conduct a comprehensive review, comparing them with current requirements, and the latest authentication and secure communication architectures, which require the involvement of trusted but non-transparent authorities in certificate issuance/revocation. We highlight the limitations of these schemes from PKI deployment and recommend future research, particularly in the realm of quantum cryptography. dc.description: The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.

  • dc.title: Location Privacy in VANETs: Provably Secure Anonymous Key Exchange Protocol Based on Self-Blindable Signatures dc.contributor.author: Kiraz, Mehmet Sabir; Al-Bayatti, Ali Hilal; AlMarshoud, Mishri Saleh dc.description.abstract: Security and privacy in vehicular ad hoc networks (VANETs) are challenging in terms of Intelligent Transportation Systems (ITS) features. The distribution and decentralisation of vehicles could threaten location privacy and confidentiality in the absence of trusted third parties (TTP)s or if they are otherwise compromised. If the same digital signatures (or the same certificates) are used for different communications, then adversaries could easily apply linking attacks. Unfortunately, most of the existing schemes for VANETs in the literature do not satisfy the required levels of security, location privacy, and efficiency simultaneously. This paper presents a new and efficient end-to-end anonymous key exchange protocol based on Yang et al. 's self-blindable signatures. In our protocol, vehicles first privately blind their own private certificates for each communication outside the mix-zone and then compute an anonymous shared key based on zero-knowledge proof of knowledge (PoK). The efficiency comes from the fact that once the signatures are verified, the ephemeral values in PoK are also used to compute a shared key through an authenticated Diffie-Hellman key exchange protocol. Therefore, the protocol does not require any further external information to generate a shared key. Our protocol also does not require an interference with the Roadside Units or Certificate Authorities, and hence can be securely run outside the mixed-zones. We demonstrate the security of our protocol in an ideal/real simulation paradigm. Hence, our protocol achieves secure authentication, forward unlinkability, and accountability. Furthermore, the performance analysis shows that our protocol is more efficient in terms of computational and communication overheads compared to existing schemes. dc.description: open access article

  • dc.title: Improved Chaff-Based CMIX for Solving Location Privacy Issues in VANETs dc.contributor.author: Kiraz, Mehmet Sabir; Al-Bayatti, Ali Hilal; Saleh AlMarshoud, Mishri dc.description.abstract: Safety application systems in Vehicular Ad-hoc Networks (VANETs) require the dissemination of contextual information about the scale of neighbouring vehicles; therefore, ensuring security and privacy is of utmost importance. Vulnerabilities in the messages and the system鈥檚 infrastructure introduce the potential for attacks that lessen safety and weaken passengers鈥 privacy. The purpose of short-lived anonymous identities, called 鈥減seudo-identities鈥, is to divide the trip into unlinkable short passages. Researchers have proposed changing pseudo-identities more frequently inside a pre-defined area, called a cryptographic mix-zone (CMIX) to ensure enhanced protection. According to ETSI ITS technical report recommendations, the researchers must consider the low-density scenarios to achieve unlinkability in CMIX. Recently, Christian et al. proposed a Chaff-based CMIX scheme that sends fake messages under the consideration of low-density conditions to enhance vehicles鈥 privacy and confuse attackers. To accomplish full unlinkability, in this paper, we first show the following security and privacy vulnerabilities in the Christian et al. scheme: Linkability attacks outside the CMIX may occur due to deterministic data sharing during the authentication phase (e.g., duplicate certificates for each communication). Adversaries may inject fake certificates, which breaks Cuckoo Filters鈥 (CFs) updates authenticity, and the injection may be deniable. CMIX symmetric key leakage outside the coverage may occur. We propose a VPKI-based protocol to mitigate these issues. First, we use a modified version of Wang et al.鈥檚 scheme to provide mutual authentication without revealing the real identity. To this end, the messages of a vehicle are signed with a different pseudo-identity 鈥渃ertificate鈥. Furthermore, the density is increased via the sending of fake messages in low traffic periods to provide unlinkability outside the mix-zone. Second, unlike Christian et al.鈥檚 scheme, we use the Adaptive Cuckoo Filter (ACF) instead of CF to overcome the false positives鈥 effect on the whole filter. Moreover, to prevent any alteration of the ACFs, only RUSs distribute the updates, and they sign the new fingerprints. Third, the mutual authentication prevents any leakage from the mix zones鈥 symmetric keys by generating a fresh one for each communication through a Diffie鈥揌ellman key exchange. dc.description: open access article

  • dc.title: Measuring the Realtime Capability of Parallel-Discrete-Event-Simulations dc.contributor.author: Obermaier, Christina; Riebl, Raphael; Al-Bayatti, Ali Hilal; Khan, Sarmadullah; Facchi, Christian dc.description.abstract: Speeding up Discrete Event Simulations (DESs) is a broad research field. Promising Parallel Discrete Event Simulation (PDES) approaches with optimistic and conservative synchronisation schemes have emerged throughout the years. However, in the area of real-time simulation, PDESs are rarely considered. This is caused by the complex problem of fitting parallel executed DES models to a real-time clock. Hence, this paper gives an extensive review of existing conservative and optimistic synchronisation schemes for PDESs. It introduces a metric to compare their real-time capabilities to determine whether they can be used for soft or firm real-time simulation. Examples are given on how to apply this metric to evaluate PDESs using synthetic and real-world examples. The results of the investigation reveal that no final answer can be given if PDESs can be used for soft or firm real-time simulation as they are. However, boundary conditions were defined, which allow a use-case specific evaluation of the real-time capabilities of a certain parallel executed DES. Using this in-depth knowledge and can lead to predictability of the real-time behaviour of a simulation run. dc.description: open access article

  • dc.title: From Conventional to State-of-the-Art IoT Access Control Models dc.contributor.author: Al-Bayatti, Ali Hilal; Malik, Ahmad Kamran; Khan, Sarmadullah; Emmanuel, N.; Zafar, S.; Khattack, H.A.; Raza, B.; Alassafi, M.O.; Alfakheeh, A.S.; Alqarni, M.A. dc.description.abstract: The advent in Online Social Networks (OSN) and Internet of Things (IoT) has created a new world of collaboration and communication between people and devices. The domain of internet of things uses billions of devices (ranging from tiny sensors to macro scale devices) that continuously produce and exchange huge amounts of data with people and applications. Similarly, more than a billion people are connected through social networking sites to collaborate and share their knowledge. The applications of IoT such as smart health, smart city, social networking, video surveillance and vehicular communication are quickly evolving people鈥檚 daily lives. These applications provide accurate, information-rich and personalized services to the users. However, providing personalized information comes at the cost of accessing private information of users such as their location, social relationship details, health information and daily activities. When the information is accessible online, there is always a chance that it can be used maliciously by unauthorized entities. Therefore, an effective access control mechanism must be employed to ensure the security and privacy of entities using OSN and IoT services. Access control refers to a process which can restrict user鈥檚 access to data and resources. It enforces access rules to grant authorized users an access to resources and prevent others. This survey examines the increasing literature on access control for traditional models in general, and for OSN and IoT in specific. Challenges and problems related to access control mechanisms are explored to facilitate the adoption of access control solutions in OSN and IoT scenarios. The survey provides a review of the requirements for access control enforcement, discusses several security issues in access control, and elaborates underlying principles and limitations of famous access control models. We evaluate the feasibility of current access control models for OSN and IoT and provide the future development direction of access control for the same dc.description: open access article

Key research outputs

 

Research interests/expertise

  • Intelligent transpiration
  • Vehicular Ad hoc Networks
  • Mobile Computing
  • Wireless Computing
  • Context-aware Systems
  • Pervasive Computing
  • Computer/Mobile Security.

Areas of teaching

CTEC3604 Multi-service Networks (30 credit).

Qualifications

B.Sc. in Computer Engineering and Information Technology at the University of Technology, Iraq.

Ph.D. in Computer Science at 蜜桃直播, UK.  

蜜桃直播 taught

Programme leader for MSc Cyber Technology, MSc Software Engineering, MSc Cyber Security and MSc Professional Practice in Digital Forensics and Security.

Current research students

Successful PhD Completion 


Dr. Khalid Alodadi “Solving Non-Line of Sight using Context-aware Systems in Vehicle Ad Hoc Networks” 蜜桃直播 (2016). 

Dr. Ahmed Alghamdi “Features interaction: detection and resolution in Smart Homes Systems” 蜜桃直播 (2016).

Dr. Tareq Binjammaz “GPS Integrity Monitoring for an Intelligent Transport System“ 蜜桃直播 (2015). 

Dr. Abdullah Aldawsari “Context-aware Driving Behaviour Detection System in Vehicle Ad Hoc Networks“ 蜜桃直播 (2015).

Dr. Yasser Almajed “Privacy Management in Data Warehousing” 蜜桃直播 (2015). Dr. Fahad Alqahtani “E-commerce Customer Anonymity and Fair Exchange Protocol for Digital Contents” 蜜桃直播 (2015). 

Dr. Abdulmalik Alhammad “Intelligent Parking Systems in Vehicle Ad Hoc Networks” 蜜桃直播 (2015).

Dr. Hani Alquhayz “Security Management System for 4G Heterogenous Networks“ 蜜桃直播 (2015).

Dr. Mussab Aswad “Crash Detection Model Using Dynamic Bayesian Networks” 蜜桃直播 (2014). 

Dr. Mafawez Alharbi “Context-aware PLE Architecture”, 蜜桃直播 (2014). 

Dr. Laila Alhimale “Fall Detection Algorithm for Video Images”, 蜜桃直播 (2013).

Dr. Saif Al-Sultan “Context Aware Driving Behaviour Model for VANET”, 蜜桃直播 (2013). 

Dr. Awatef Rahuma “Semantically Enhanced Image Tagging System”, 蜜桃直播 (2013).

Dr. Moath Al-Doori “Directional Routing Technique in Vehicle Ad hoc Networks, 蜜桃直播 (2011). 

Dr. Muhammed Khan “A Co-Evolutionary Framework to Reducing the Gap between and Information Technology (2011).


Current PhD Students (Main Supervisor) 

Mr. Dennis Bohmlander "Innovative Crash-sensing Architectures - A new approach in contactless vehicle crash detection" 蜜桃直播. 

Mr. Raphael Riebl "Perfomance Testing methodology for Vehicle Ad hoc Networks" 蜜桃直播.

Mr. Sadir Fadhil "Context-aware overtaking assistant system. 蜜桃直播.

Mr. Nawaf Alqabandi “Context-aware Intrusion Detection system using Artificial intelligence in VANET” 蜜桃直播.

 

Successful MSc Completion 

Mr. Shadman Salah (2014). 

Mr. Ahmed Malik (2013) “Factors effecting Delivering Insulin for diabetic patients using Bayesian Networks”

Mr. Anjanna Silva (2013) “Car Polling System”

Mr. Anas Alsharif (2012) “Automated Taxi Dispatch System (Taxi Business) 蜜桃直播.

Mr. Mahran Alsubee (2012) “Intelligent Car Parking System - A case of City of Medina, Saudi Arabia” 蜜桃直播.

Mr. Salman Alenezi (2012) “The Lines Between Augmented Reality and Virtual Reality” 蜜桃直播. 

Mr. Uqonna Ekwueme (2011)“Intelligent Car Parking Schemes” 蜜桃直播.

Mrs. Nada Al-Fakih (2011) “Cloud Based Personal Health Record” 蜜桃直播.

Mrs. Entisar Alshirf (2011) “Selection of Computer Programming Languages for Developing Distributed Systems. 蜜桃直播.

Mrs. Ohud Almutairi (2011) “Designing an Effective Intersection Collision Warning System: An Investigation into Important Criteria” 蜜桃直播. 

Mrs. Ruqayah Aljameel (2011) “The Application’s Usability Evaluation of Web-based Geographic Information System for Pst Office Webs” 蜜桃直播. 

Mr. Khalid Shaban (2011) “Evaluating Mobile Application Performance and Power Consumption Trough Model-Driven Engineering Methodology” 蜜桃直播.

Mrs. Laila Elgamel (2011) “ Selection of Programming Languages for Developing Distributed Systems” 蜜桃直播.

Mr. Ahmed Alghamdi (2010) “Feasibility of Separating Control/Data in 802.11 Family” 蜜桃直播. 

Mr. Mafawez Alharbi (2010) “Mobile Lecture” 蜜桃直播. 

Mr. Abdulkariem Alqarni (2010) “Global Intelligent Parking Schemes” 蜜桃直播. 

Mr. Abdullah Algashami (2010) “Good Practice for Effective E-assessment” 蜜桃直播. 

Mr. Sharaf Alzhrani (2010) “Intelligent Application for Car Hiring (Mileage Tracking Application)” 蜜桃直播.

Mr. Anas Alsharif (2010) “Automated Taxi Dispatch System” 蜜桃直播. 

Mrs. Asma Alothaim (2010) “Location Finder and Weather Forecast Application” 蜜桃直播. 

Mr. Fauwaz Alshammari “Risk Management in Software Development Projects” 蜜桃直播.

Mr. Ali Almiman “Security Survey in VoIP” 蜜桃直播. Mr. Thamir Alghamdi “Comparison of Two Parking Management Systems” 蜜桃直播.

Professional esteem indicators

Journal Article Reviewing
Networking [IET] 2016. Vehicular Communications [Elsevier] 2014, 2015, 2016. Sensors [MDPI] 2016. Frontiers of Information Technology & Electronic Engineering [Springer] 2014, 2015. The Journal of Engineering [IET] 2014, 2015; Journal of Advances in Engineering Software [Elsevier]; Journal of Network & Computer Applications 2013 [Elsevier]; Computer & Electrical Engineering Journal (CEE) 2011, 2012 [Elsevier]; International Journal of Ad Hoc Ubiquitous Computing (IJAHUC) 2010

Program Committee Member / Other Conference & Workshop Reviewing
IEEE 83rd Vehicular Technology Conference: VTC2016-Spring 15–18 May 2016, Nanjing, ChinaIEEE Vehicular Technology Conference: VTC2015-Spring 11–14 May 2015, Glasgow, ScotlandInternational Conference on Computer, Communications, and Control Technology (I4CT) 2014Springer based Applied Electromagnetic International Conference (APPEIC) 2014Renewable Energy and Green Technology International Conference (REEGETECH) 2014International Symposium on Technology Management and Emerging Technologies (ISTMET) 2014International Conference on Communication and Computer Engineering, focusing on Industrial and Manufacturing Theory and Applications of Electronics, Communications, Computing, and Information Technology (ICOCOE) 2014IEEE Symposium on Computer Application & Industrial Electronics (ISCAIE) 2013IEEE International RF and Microwave Conference (RFM) 2013IEEE Symposium on Industrial Electronics and Applications (ISIEA) 2013IEEE Conference on Wireless Sensors (ICWiSE) 2013IEEE Symposium on Computer & Informatics (ISCI) 2013IEEE Asia-Pacific Conference on Applied Electromagnetic (APACE ) 2012IEEE Symposium on Wireless Technology & Applications (ISWTA) 2012, 2013IEEE Symposium on Industrial Electronic & Applications (ISIEA ) 2012ICNS Networking and Services 2008, 2009, 2010, 2011, 2012, 2013, 2014International Symposium on Innovation in Information & Communication Technology (ISIICT) 2011, 2012, 2013, 2014International Conference on Computer Science & Information Technology (ICCSIT) 2011, 2012, 2013, 2014 International Symposium on Wireless Pervasive Computing (ISWPC) 2010 Member of the Steering committee of the International Online Workshop on writing a research paper (IOW-WRP) 2011AIRCC Worldwide Conferences

Ali_Corridor