Ahmad Mostafa

Learn More
In this paper, we introduce a novel reliable and low-collision packet-forwarding scheme for vehicular ad hoc networks, based on a probabilistic rebroadcasting. Our proposed scheme, called Collision-Aware REliable FORwarding (CAREFOR), works in a distributed fashion where each vehicle receiving a packet, rebroadcasts it based on a predefined probability.(More)
In this paper we investigate the time delay propagation rates in a Vehicular Ad-Hoc Network, where vehicular connectivity is supported by both Vehicle-to-Vehicle (V2V) and Vehicleto-Infrastructure (V2I) protocols. In our vision, seamless connectivity issues in a VANET with nearby network infrastructure, can be fixed by an opportunistic choice of a vehicular(More)
This paper presents a new probabilistic-based re-broadcast scheme, providing a reliable and low-collision packet forwarding in a vehicular ad hoc network. In the proposed technique called Collision-Aware REliable FORwarding, each vehicle rebroadcasts a received information on the basis of physical parameters associated with a vehicular environment, i.e.,(More)
Outsourcing data backup to third-party cloud storage services is always a cost effective choice and doesn't require much technical knowledge from users. However, security concerns arise in terms of ensuring the privacy and integrity of the outsourced data. Many frameworks have been introduced to address these concerns by adopting huge number of(More)
OBJECTIVE Hepatitis C virus (HCV) infection is one of the most important health problems in Egypt. Thrombocytopenia is a common finding in subjects with chronic hepatitis. The precise etiology of this thrombocytopenia is still obscure. There is increasing interest in the potential role of thrombopoietin (TPO) as a cause of this thrombocytopenia. The aim of(More)
Outsourcing data storage and IT workloads to a third-party cloud provider introduces some security risks and time performance degradation. Moreover, controlling access to this data becomes very difficult when the volume of the data and number of users is very high. Various access control techniques have been proposed to address this issue. However, those(More)