scispace - formally typeset
Search or ask a question
Author

Ghaida A. Al-Suhail

Other affiliations: Yahoo!
Bio: Ghaida A. Al-Suhail is an academic researcher from University of Basrah. The author has contributed to research in topics: Video quality & Network packet. The author has an hindex of 6, co-authored 36 publications receiving 126 citations. Previous affiliations of Ghaida A. Al-Suhail include Yahoo!.

Papers
More filters
Journal ArticleDOI
TL;DR: A new cascade-coupled chaotic synchronization model based on the first-order nonlinear time-delayed chaotic system using the simple Lur’e system to provide more robust secure system.
Abstract: Recently, the time delay has considerable attention in the existence of chaos in the nonlinear dynamical systems. In this paper, we therefore develop a new cascade-coupled chaotic synchronization model based on the first-order nonlinear time-delayed chaotic system using the simple Lur’e system to provide more robust secure system. Adaptive observer-based master systems are designed to synchronize with the given chaotic slave systems at the receiver where the dynamical model is subjected to certain time delay values at the slave systems. Two cases of being system parameters match and mismatch are considered. The adaptive observer laws are carefully designed to confirm the convergence of error dynamics. Numerical simulations reveal the effectiveness of the time delay on the recovered message security using the chaotic masking technique. As a result, the information message is able to be recovered correctly with sufficient precision over the noiseless and noisy channels and under predefined time-delay values compared to the existing systems.

41 citations

Journal ArticleDOI
TL;DR: It is found that an effective and robust chaotic radar (CRADAR) model can be obtained when the signal-to-noise ratio (SNR) highly degrades to 0 dB, but with clear peak in correlation performance for detecting the target.

17 citations

Journal ArticleDOI
TL;DR: A short survey is pursued on some common simulators that can be applicable in VANETs, and results obtained can draw a good and helpful guideline in developing VANet performance through its routing protocols.
Abstract: In recent years, the number of vehicles has been increasing enormously, this growth has led to an increase in the possibility of accidents. To overcome this situation and to make the driving experience enjoyable, and more comfortable, a special technology based on the Mobile Ad-hoc wireless network infrastructure (MANET) has appeared on the surface. Such technology is called Vehicular Ad-hoc Networks (VANETs). It allows vehicles to communicate with each other or communicate via infrastructure to exchange different kinds of information and warning messages. Scientists and programmers have developed VANET simulation programming to enable the examination and evaluation of various media access, routing, and crisis alerting protocols. In this paper, a short survey is pursued on some common simulators that can be applicable in VANETs. Because such platforms can save a lot of money and time, as well as make the simulation process more realistic; OMNeT++ and SUMO are both used together to investigate the VANET environment using a road traffic simulation. The simulation results obtained can draw a good and helpful guideline in developing VANET performance through its routing protocols.

17 citations

Journal ArticleDOI
TL;DR: The results show that a server can significantly adapt to the bandwidth and FEC codes to maximize the video quality of service (QoS) in terms of temporal scaling when a maximum network throughput for each client is reached.
Abstract: In this article, we present a simple cross-layer model that leads to the optimal throughput of multiple users for multicasting MPEG-4 video over a heterogeneous network. For heterogeneous wired-to-wireless network, at the last wireless hop there are bit errors associated with the link-layer packets that are arising in the wireless channel, in addition of overflow packet dropping over wired links. We employ a heuristic TCP function to optimize the cross-layer model of data link and physical (radio-link) layer. An adaptive Forward-Error-Correction (FEC) scheme is applied at the byte-level as well as at the packet-level. The corresponding optimal video quality can be evaluated at each client end. The results show that a server can significantly adapt to the bandwidth and FEC codes to maximize the video quality of service (QoS) in terms of temporal scaling when a maximum network throughput for each client is reached. [Article copies are available for purchase from InfoSci-on-Demand.com]

11 citations

Proceedings ArticleDOI
01 Dec 2006
TL;DR: Investigation of TCP-friendly video streaming over wireless channel using forward-error-correction (FEC) finds that the VFR-TCP model increases tolerance to packet loss due to channel bit errors and achieves a good quality.
Abstract: The paper investigates TCP-Friendly video streaming over wireless channel using Forward-error-Correction (FEC). A FEC scheme is used as an intra-protection control based on Hamming code. Coded BPSK scheme is applied over AWGN wireless channel to be robust against frequent packet loss. For this purpose, we propose Variable Frame Rate based on TCP-Friendly Rate Control (VFR-TCP) model. The model estimates the predicted frame rate for MPEG video streaming. Quality of service (QoS) is also accounted for the predicted quantizer scale Q if the network throughput is assumed to be equal the available bandwidth. Simulation results show that the VFR-TCP model increases tolerance to packet loss due to channel bit errors and achieves a good quality.

10 citations


Cited by
More filters
Book ChapterDOI
27 Jan 2005
TL;DR: This chapter will focus on evaluating the pairwise error probability with and without CSI, and how the results of these evaluations can be used via the transfer bound approach to evaluate average BEP of coded modulation transmitted over the fading channel.
Abstract: In studying the performance of coded communications over memoryless channels (with or without fading), the results are given as upper bounds on the average bit error probability (BEP). In principle, there are three different approaches to arriving at these bounds, all of which employ obtaining the so-called pairwise error probability , or the probability of choosing one symbol sequence over another for a given pair of possible transmitted symbol sequences, followed by a weighted summation over all pairwise events. In this chapter, we will focus on the results obtained from the third approach since these provide the tightest upper bounds on the true performance. The first emphasis will be placed on evaluating the pairwise error probability with and without CSI, following which we shall discuss how the results of these evaluations can be used via the transfer bound approach to evaluate average BEP of coded modulation transmitted over the fading channel.

648 citations

01 Jan 2014
TL;DR: This article surveys the new trend of channel response in localization and investigates a large body of recent works and classify them overall into three categories according to how to use CSI, highlighting the differences between CSI and RSSI.
Abstract: The spatial features of emitted wireless signals are the basis of location distinction and determination for wireless indoor localization. Available in mainstream wireless signal measurements, the Received Signal Strength Indicator (RSSI) has been adopted in vast indoor localization systems. However, it suffers from dramatic performance degradation in complex situations due to multipath fading and temporal dynamics. Break-through techniques resort to finer-grained wireless channel measurement than RSSI. Different from RSSI, the PHY layer power feature, channel response, is able to discriminate multipath characteristics, and thus holds the potential for the convergence of accurate and pervasive indoor localization. Channel State Information (CSI, reflecting channel response in 802.11 a/g/n) has attracted many research efforts and some pioneer works have demonstrated submeter or even centimeter-level accuracy. In this article, we survey this new trend of channel response in localization. The differences between CSI and RSSI are highlighted with respect to network layering, time resolution, frequency resolution, stability, and accessibility. Furthermore, we investigate a large body of recent works and classify them overall into three categories according to how to use CSI. For each category, we emphasize the basic principles and address future directions of research in this new and largely open area.

612 citations

Book
01 Jan 1985
TL;DR: All information and recommendations in this technical manual have been supplied to the best of their knowledge, as accurately as possible and updated to reflect the most recent technological developments.
Abstract: All information and recommendations in this technical manual have been supplied to the best of our knowledge, as accurately as possible and updated to reflect the most recent technological developments. We cannot accept any responsibility for recommendations based solely on this document.

346 citations

Journal ArticleDOI
TL;DR: IEAIE can only serve as a counterexample for illustrating common pitfalls in designing secure communication method for image data, and each security metric is questionable, which undermines the security credibility of IEAIE.
Abstract: Recently, a chaotic image encryption algorithm based on information entropy (IEAIE) was proposed. This paper scrutinizes the security properties of the algorithm and evaluates the validity of the used quantifiable security metrics. When the round number is only one, the equivalent secret key of every basic operation of IEAIE can be recovered with a differential attack separately. Some common insecurity problems in the field of chaotic image encryption are found in IEAIE, e.g., the short orbits of the digital chaotic system and the invalid sensitivity mechanism built on information entropy of the plain image. Even worse, each security metric is questionable, which undermines the security credibility of IEAIE. Hence, IEAIE can only serve as a counterexample for illustrating common pitfalls in designing secure communication method for image data.

190 citations