Ahmad Mostafa

Learn More
In this paper, we introduce a novel reliable and low-collision packet-forwarding scheme for vehicular ad hoc networks, based on a probabilistic rebroadcasting. Our proposed scheme, called Collision-Aware REliable FORwarding (CAREFOR), works in a distributed fashion where each vehicle receiving a packet, rebroadcasts it based on a predefined probability.(More)
In this paper we investigate the time delay propagation rates in a Vehicular Ad-Hoc Network, where vehicular connectivity is supported by both Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) protocols. In our vision, seamless connectivity issues in a VANET with nearby network infrastructure, can be fixed by an opportunistic choice of a(More)
This paper presents a new probabilistic-based re-broadcast scheme, providing a reliable and low-collision packet forwarding in a vehicular ad hoc network. In the proposed technique called Collision-Aware REliable FORwarding, each vehicle rebroadcasts a received information on the basis of physical parameters associated with a vehicular environment, i.e.,(More)
Outsourcing data backup to third-party cloud storage services is always a cost effective choice and doesn't require much technical knowledge from users. However, security concerns arise in terms of ensuring the privacy and integrity of the outsourced data. Many frameworks have been introduced to address these concerns by adopting huge number of(More)
Connectivity in vehicular networks is continuously changing due to high mobility of vehicles, causing rapid changes in the network topology. This has a direct negative impact on the throughput and packet transmission delay. Many algorithms and approaches have been proposed to address this problem. However, most of them are not practical due to their(More)
Outsourcing data storage and IT workloads to a third-party cloud provider introduces some security risks and time performance degradation. Moreover, controlling access to this data becomes very difficult when the volume of the data and number of users is very high. Various access control techniques have been proposed to address this issue. However, those(More)
In this demo, a new application for the wireless sensor networks (WSN) is presented. This is the first time WSN is used to in the music field, where the music is being manipulated and changed according to the movement of the dancer. Twenty-three tmote sensors have been deployed on a dancing stage, and two sensors were attached to the arms of each dancer.(More)