default search action
Ahmed Aziz
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j22]Walid Osamy, Ahmed M. Khedr, Ahmed A. Elsawy, P. V. Pravija Raj, Ahmed Aziz:
SEACDSC: secure and energy-aware clustering based on discrete sand cat swarm optimization for IoT-enabled WSN applications. Wirel. Networks 30(4): 2781-2800 (2024) - 2023
- [j21]Ahmed Salim, Ahmed M. Khedr, Bader Alwasel, Walid Osamy, Ahmed Aziz:
SOMACA: A New Swarm Optimization-Based and Mobility-Aware Clustering Approach for the Internet of Vehicles. IEEE Access 11: 46487-46503 (2023) - [j20]Samia Allaoua Chelloug, Reem Alkanhel, Mohammed Saleh Ali Muthanna, Ahmed Aziz, Ammar Muthanna:
MULTINET: A Multi-Agent DRL and EfficientNet Assisted Framework for 3D Plant Leaf Disease Identification and Severity Quantification. IEEE Access 11: 86770-86789 (2023) - [j19]Samia Allaoua Chelloug, Reem Alkanhel, Ahmed Aziz, Mohammed Saleh Ali Muthanna, Ammar Muthanna:
Secured Reliable Communication Through Authentication and Optimal Relay Selection in Blockchain Enabled Cellular IoT Networks. IEEE Access 11: 122368-122386 (2023) - 2022
- [j18]Ahmed Aziz, Walid Osamy, Ahmed M. Khedr, Ahmed Salim:
Iterative selection and correction based adaptive greedy algorithm for compressive sensing reconstruction. J. King Saud Univ. Comput. Inf. Sci. 34(3): 892-900 (2022) - [j17]Ahmed Salim, Walid Osamy, Ahmed Aziz, Ahmed M. Khedr:
SEEDGT: Secure and energy efficient data gathering technique for IoT applications based WSNs. J. Netw. Comput. Appl. 202: 103353 (2022) - [j16]Ilana Toledano, Syed Sheheryar Bukhari, Ahmed Aziz, Ergin Dinc, Tobias Schaich, Daniel Molnar, Anas Al Rawi, Eloy de Lera Acedo, Michael J. Crisp, Richard V. Penty:
Experimental Demonstration of Multigigabit Data Communication Using Surface Waves on Twisted-Pair Cables. IEEE Trans. Commun. 70(9): 5788-5798 (2022) - [j15]Savio Sciancalepore, Pietro Tedeschi, Ahmed Aziz, Roberto Di Pietro:
Auth-AIS: Secure, Flexible, and Backward-Compatible Authentication of Vessels AIS Broadcasts. IEEE Trans. Dependable Secur. Comput. 19(4): 2709-2726 (2022) - [j14]Ahmed Aziz, Walid Osamy, Oruba Alfawaz, Ahmed M. Khedr:
EDCCS: effective deterministic clustering scheme based compressive sensing to enhance IoT based WSNs. Wirel. Networks 28(6): 2375-2391 (2022) - 2021
- [j13]Ahmed M. Khedr, Ahmed Aziz, Walid Osamy:
Successors of PEGASIS protocol: A comprehensive survey. Comput. Sci. Rev. 39: 100368 (2021) - [j12]Ahmed Aziz, Walid Osamy, Ahmed M. Khedr, Ahmed Salim:
Chain-routing scheme with compressive sensing-based data acquisition for Internet of Things-based wireless sensor networks. IET Networks 10(2): 43-58 (2021) - [j11]Ahmed Aziz, Karan Singh, Walid Osamy, Ahmed M. Khder, Le Minh Tuan, Le Hoang Son, Hoang Viet Long, Dilshodjon Rakhmonov:
Compressive sensing based routing and data reconstruction scheme for IoT based WSNs. J. Intell. Fuzzy Syst. 41(1): 19-35 (2021) - [j10]Walid Osamy, Ahmed Aziz, Ahmed M. Khedr:
Deterministic clustering based compressive sensing scheme for fog-supported heterogeneous wireless sensor networks. PeerJ Comput. Sci. 7: e463 (2021) - [j9]Ahmed Aziz, Walid Osamy, Ahmed M. Khedr:
Iterative Selection and Correction Based Adaptive Greedy Algorithm for Compressive Sensing Reconstruction. Wirel. Pers. Commun. 116(4): 3277-3289 (2021) - 2020
- [j8]Ahmed Aziz, Walid Osamy, Ahmed M. Khedr, Ahmed El-Sawy, Karan Singh:
Grey Wolf based compressive sensing scheme for data gathering in IoT based heterogeneous WSNs. Wirel. Networks 26(5): 3395-3418 (2020) - [j7]Ahmed Aziz, Karan Singh, Walid Osamy, Ahmed M. Khedr:
An Efficient Compressive Sensing Routing Scheme for Internet of Things Based Wireless Sensor Networks. Wirel. Pers. Commun. 114(3): 1905-1925 (2020) - 2019
- [j6]Ahmed Aziz, Karan Singh, Walid Osamy, Ahmed M. Khedr:
Optimising compressive sensing matrix using Chicken Swarm Optimisation algorithm. IET Wirel. Sens. Syst. 9(5): 306-312 (2019) - [j5]Ahmed Aziz, Karan Singh, Walid Osamy, Ahmed M. Khedr:
Effective algorithm for optimizing compressive sensing in IoT and periodic monitoring applications. J. Netw. Comput. Appl. 126: 12-28 (2019) - [j4]Ahmed Aziz, Karan Singh, Ahmed El-Sawy, Walid Osamy, Ahmed M. Khedr:
GWRA: grey wolf based reconstruction algorithm for compressive sensing signals. PeerJ Comput. Sci. 5: e217 (2019) - [j3]Ahmed Aziz, Karan Singh:
Lightweight Security Scheme for Internet of Things. Wirel. Pers. Commun. 104(2): 577-593 (2019) - 2018
- [j2]Walid Osamy, Ahmed M. Khedr, Ahmed Aziz, Ahmed El-Sawy:
Cluster-Tree Routing Based Entropy Scheme for Data Gathering in Wireless Sensor Networks. IEEE Access 6: 77372-77387 (2018) - [j1]Karishma Singh, Karan Singh, Le Hoang Son, Ahmed Aziz:
Congestion control in wireless sensor networks by hybrid multi-objective optimization algorithm. Comput. Networks 138: 90-107 (2018)
Conference and Workshop Papers
- 2023
- [c19]Abdelkader Laouid, Mostefa Kara, Mohammed Al-Khalidi, Khaled Chait, Mohammad Hammoudeh, Ahmed Aziz:
A Binary Matrix-Based Data Representation for Data Compression in Blockchain. BCCA 2023: 307-314 - [c18]Tahreer Safa'a Mansour, Ahmed Aziz:
A New Design of the Passively Multi-Mode Fiber MZ Interferometer for Compressing Pulse Application. ICFNDS 2023: 720-729 - [c17]Ali Alamery, Mohanad Abd Shehab, Omar Abdulkareem Mahmood, Yousif I. Hammadi, Ahmed Aziz, Mohammed Saleh Ali Muthanna:
Internet of Things Protocols (IoTp) Literature Review. ICFNDS 2023: 730-734 - [c16]Aws Zuhair Sameen, Mohammed Hasan Alwan, Mayssam Saad Kadhum, Yousif I. Hammadi, Mokhalad Abdulameer Kadhim Alsaeedi, Ahmed Aziz, Mohammed Saleh Ali Muthanna:
Enhanced SNR Based Admission Control Algorithm for Vehicular Ad-Hoc Network. ICFNDS 2023: 735-741 - [c15]Ali Noori Kareem, A. Omar Adil Deheyab, Aws Zuhair Sameen, Mohammed Hasan Alwan, Yousif I. Hammadi, Mayssam Saad Kadhum, Ahmed Aziz, Muthana Ali Salem Ali:
An Overview of Information Hiding Techniques Challenges and Applications. ICFNDS 2023: 742-746 - [c14]Yousif I. Hammadi, Mokhalad Abdulameer Kadhim Alsaeedi, Omar Abdulkareem Mahmood, Aws Zuhair Sameen, Mohammed Saleh Ali Muthanna, Ahmed Aziz, Ammar Muthanna:
Various Modulation Types Classification on the Air by Convolutional Neural Network. ICFNDS 2023: 779-786 - [c13]Ahmed Mahmood Khudhur, Mohammed Hasan Alwan, Qayssar Al Omairi, Omar Abdulkareem Mahmood, Yousif I. Hammadi, Mohammed Saleh Ali Muthanna, Ahmed Aziz, Ammar Muthanna:
Convolutional Neural Network Based Deep Neural Network Model for Electrocardiogram Records Classification. ICFNDS 2023: 787-794 - [c12]Konstantin Kuznetsov, Ekaterina Kuzmina, Tatiana Lapteva, Artem Volkov, Ammar Muthanna, Ahmed Aziz:
Service Migration Algorithm for Distributed Edge Computing in 5G/6G Networks. NEW2AN/ruSMART (1) 2023: 320-337 - [c11]Daniil Svechnikov, Roman Dunaytsev, Ammar Muthanna, Ahmed Aziz:
Holographic Images Delivery Model Toward 6G Telepresence Services. NEW2AN/ruSMART (1) 2023: 338-345 - [c10]Ahmed M. Khedr, Ahmed Aziz, Walid Osamy:
Diverse Localization Techniques in Wireless Sensor Networks: A Review. NEW2AN/ruSMART (2) 2023: 363-382 - 2022
- [c9]Walid Osamy, Ahmed Aziz, Ahmed A. Elsway, Ahmed Salim, Ahmed M. Khedr:
Energy Aware Disjoint Dominating Sets Algorithm for Heterogeneous Wireless Sensor Networks. SSD 2022: 875-880 - [c8]Murooj Amer Taha, Wijdan Mahood Khudhair, Ahmed Mahmood Khudhur, Omar Abdulkareem Mahmood, Yousif I. Hammadi, Riyam Shihab Ahmed Al-husseinawi, Ahmed Aziz:
Emerging Threat of Deep Fake: How to identify and Prevent IT. ICFNDS 2022: 645-651 - [c7]Abd A. Hussein, Kilan M. Hussein, Dhafer T. Shihab, Omar Abdulkareem Mahmood, Ahmed Aziz, Maha Ibrahim:
Energy Harvesting in CWSNs via Optimal Transmission Ranges with Guarantee Delivered for Network's Data. ICFNDS 2022: 695-700 - [c6]Walid Osamy, Ahmed M. Khedr, Ahmed Salim, Ahmed Aziz:
TEDCTSSA: Trust Enabled Data Collection Technique Based Sparrow Search Algorithm for WSN-Based Applications. NEW2AN 2022: 117-132 - [c5]Reham R. Mostafa, Ahmed M. Khedr, Ahmed Aziz:
ISTOA: An Improved Sooty Tern Optimization Algorithm for Multilevel Threshold Image Segmentation. NEW2AN 2022: 133-148 - [c4]Ahmed Aziz, Ahmed M. Khedr, Ahmed Salim, Walid Osamy:
A Data Security Technique Combining Asymmetric Cryptography and Compressive Sensing for IoT Enabled Wireless Sensor Networks. NEW2AN 2022: 252-268 - [c3]Ahmed Aziz, Maha Ibrahim:
Energy Efficient and Secure Scheme Based Compressive Sensing Method for Internet of Vehicles. NEW2AN 2022: 269-289 - 2021
- [c2]Kongratbay Avezimbetovich Sharipov, Nodir Hosiyatovich Jumaev, Mansur Pulatovich Eshov, Ahmed Aziz, Dilshodjon Alidjonovich Rakhmonov:
Compressive Sparse Binary Signals Reconstruction Algorithm Using Simulated Annealing. ICFNDS 2021: 485-490 - 2020
- [c1]Ahmed Aziz, Pietro Tedeschi, Savio Sciancalepore, Roberto Di Pietro:
SecureAIS - Securing Pairwise Vessels Communications. CNS 2020: 1-9
Editorship
- 2024
- [e3]Yevgeni Koucheryavy, Ahmed Aziz:
Internet of Things, Smart Spaces, and Next Generation Networks and Systems - 23rd International Conference, NEW2AN 2023, and 16th Conference, ruSMART 2023, Dubai, United Arab Emirates, December 21-22, 2023, Proceedings, Part I. Lecture Notes in Computer Science 14542, Springer 2024, ISBN 978-3-031-60993-0 [contents] - [e2]Yevgeni Koucheryavy, Ahmed Aziz:
Internet of Things, Smart Spaces, and Next Generation Networks and Systems - 23rd International Conference, NEW2AN 2023, and 16th Conference, ruSMART 2023, Dubai, United Arab Emirates, December 21-22, 2023, Proceedings, Part II. Lecture Notes in Computer Science 14543, Springer 2024, ISBN 978-3-031-60996-1 [contents] - 2023
- [e1]Yevgeni Koucheryavy, Ahmed Aziz:
Internet of Things, Smart Spaces, and Next Generation Networks and Systems - 22nd International Conference, NEW2AN 2022, Tashkent, Uzbekistan, December 15-16, 2022, Proceedings. Lecture Notes in Computer Science 13772, Springer 2023, ISBN 978-3-031-30257-2 [contents]
Coauthor Index
aka: Ahmed M. Khedr
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 21:36 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint