Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Omar Adil Mahdi is active.

Publication


Featured researches published by Omar Adil Mahdi.


Wireless Networks | 2017

Low communication cost (LCC) scheme for localizing mobile wireless sensor networks

Ammar M. A. Abu znaid; Mohd Yamani Idna Idris; Ainuddin Wahid Abdul Wahab; Liana K. Qabajeh; Omar Adil Mahdi

Abstract In recent years, the number of applications utilizing mobile wireless sensor networks (WSNs) has increased, with the intent of localization for the purposes of monitoring and obtaining data from hazardous areas. Location of the event is very critical in WSN, as sensing data is almost meaningless without the location information. In this paper, two Monte Carlo based localization schemes termed MCL and MSL* are studied. MCL obtains its location through anchor nodes whereas MSL* uses both anchor nodes and normal nodes. The use of normal nodes would increase accuracy and reduce dependency on anchor nodes, but increases communication costs. For this reason, we introduce a new approach called low communication cost schemes to reduce communication cost. Unlike MSL* which chooses all normal nodes found in the neighbor, the proposed scheme uses set theory to only select intersected nodes. To evaluate our method, we simulate in our proposed scheme the use of the same MSL* settings and simulators. From the simulation, we find out that our proposed scheme is able to reduce communication cost—the number of messages sent—by a minimum of 0.02 and a maximum of 0.30 with an average of 0.18, for varying node densities from 6 to 20, while nonetheless able to retain similar MSL* accuracy rates.


communications and mobile computing | 2016

A comparison study on node clustering techniques used in target tracking WSNs for efficient data aggregation

Omar Adil Mahdi; Ainuddin Wahid Abdul Wahab; Mohd Yamani Idna Idris; Ammar M. A. Abu znaid; Suleman Khan; Yusor Rafid Bahar Al-Mayouf; Nadra Guizani

Wireless sensor applications are susceptible to energy constraints. Most of the energy is consumed in communication between wireless nodes. Clustering and data aggregation are the two widely used strategies for reducing energy usage and increasing the lifetime of wireless sensor networks. In target tracking applications, large amount of redundant data is produced regularly. Hence, deployment of effective data aggregation schemes is vital to eliminate data redundancy. This work aims to conduct a comparative study of various research approaches that employ clustering techniques for efficiently aggregating data in target tracking applications as selection of an appropriate clustering algorithm may reflect positive results in the data aggregation process. In this paper, we have highlighted the gains of the existing schemes for node clustering-based data aggregation along with a detailed discussion on their advantages and issues that may degrade the performance. Also, the boundary issues in each type of clustering technique have been analyzed. Simulation results reveal that the efficacy and validity of these clustering-based data aggregation algorithms are limited to specific sensing situations only, while failing to exhibit adaptive behavior in various other environmental conditions. Copyright


Journal of Sensors | 2016

WDARS: A Weighted Data Aggregation Routing Strategy with Minimum Link Cost in Event-Driven WSNs

Omar Adil Mahdi; Ainuddin Wahid Abdul Wahab; Mohd Yamani Idna Idris; Ammar M. A. Abu znaid; Yusor Rafid Bahar Al-Mayouf; Suleman Khan

Realizing the full potential of wireless sensor networks (WSNs) highlights many design issues, particularly the trade-offs concerning multiple conflicting improvements such as maximizing the route overlapping for efficient data aggregation and minimizing the total link cost. While the issues of data aggregation routing protocols and link cost function in a WSNs have been comprehensively considered in the literature, a trade-off improvement between these two has not yet been addressed. In this paper, a comprehensive weight for trade-off between different objectives has been employed, the so-called weighted data aggregation routing strategy (WDARS) which aims to maximize the overlap routes for efficient data aggregation and link cost issues in cluster-based WSNs simultaneously. The proposed methodology is evaluated for energy consumption, network lifetime, throughput, and packet delivery ratio and compared with the InFRA and DRINA. These protocols are cluster-based routing protocols which only aim to maximize the overlap routes for efficient data aggregation. Analysis and simulation results revealed that the WDARS delivered a longer network lifetime with more proficient and reliable performance over other methods.


PLOS ONE | 2016

Efficient and stable routing algorithm based on user mobility and node density in urban vehicular network

Yusor Rafid Bahar Al-Mayouf; Mahamod Ismail; Nor Fadzilah Abdullah; Ainuddin Wahid Abdul Wahab; Omar Adil Mahdi; Suleman Khan; Kim-Kwang Raymond Choo

Vehicular ad hoc networks (VANETs) are considered an emerging technology in the industrial and educational fields. This technology is essential in the deployment of the intelligent transportation system, which is targeted to improve safety and efficiency of traffic. The implementation of VANETs can be effectively executed by transmitting data among vehicles with the use of multiple hops. However, the intrinsic characteristics of VANETs, such as its dynamic network topology and intermittent connectivity, limit data delivery. One particular challenge of this network is the possibility that the contributing node may only remain in the network for a limited time. Hence, to prevent data loss from that node, the information must reach the destination node via multi-hop routing techniques. An appropriate, efficient, and stable routing algorithm must be developed for various VANET applications to address the issues of dynamic topology and intermittent connectivity. Therefore, this paper proposes a novel routing algorithm called efficient and stable routing algorithm based on user mobility and node density (ESRA-MD). The proposed algorithm can adapt to significant changes that may occur in the urban vehicular environment. This algorithm works by selecting an optimal route on the basis of hop count and link duration for delivering data from source to destination, thereby satisfying various quality of service considerations. The validity of the proposed algorithm is investigated by its comparison with ARP-QD protocol, which works on the mechanism of optimal route finding in VANETs in urban environments. Simulation results reveal that the proposed ESRA-MD algorithm shows remarkable improvement in terms of delivery ratio, delivery delay, and communication overhead.


Journal of Sensors | 2017

Sequential Monte Carlo Localization Methods in Mobile Wireless Sensor Networks: A Review

Ammar M. A. Abu znaid; Mohd Yamani Idna Idris; Ainuddin Wahid Abdul Wahab; Liana K. Qabajeh; Omar Adil Mahdi

The advancement of digital technology has increased the deployment of wireless sensor networks (WSNs) in our daily life. However, locating sensor nodes is a challenging task in WSNs. Sensing data without an accurate location is worthless, especially in critical applications. The pioneering technique in range-free localization schemes is a sequential Monte Carlo (SMC) method, which utilizes network connectivity to estimate sensor location without additional hardware. This study presents a comprehensive survey of state-of-the-art SMC localization schemes. We present the schemes as a thematic taxonomy of localization operation in SMC. Moreover, the critical characteristics of each existing scheme are analyzed to identify its advantages and disadvantages. The similarities and differences of each scheme are investigated on the basis of significant parameters, namely, localization accuracy, computational cost, communication cost, and number of samples. We discuss the challenges and direction of the future research work for each parameter.


international conference on developments in esystems engineering | 2013

Ensure Security of Compressed Data Transmission

Ali Makki Sagheer; Muzhir Shaban Al-Ani; Omar Adil Mahdi

Data compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is preprocessed and transform of into some intermediate form which can be compressed with better efficiency and security. This solves some problems relevant to the common encryption methods which generally manipulate an entire data set, most encryption algorithms tend to make the transfer of information more costly in terms of time and sometimes bandwidth.


IEEE Access | 2016

Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis

Suleman Khan; Abdullah Gani; Ainuddin Wahid Abdul Wahab; Salman Iqbal; Ahmed Abdelaziz; Omar Adil Mahdi; Abdelmuttlib Ibrahim Abdallaahmed; Muhammad Shiraz; Yusor Rafid Bahar Al-Mayouf; Ziar Khan; Kwangman Ko; Muhammad Khurram Khan; Victor Chang

In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. To the best of our knowledge, no research to date has been conducted to assist network forensics investigators and cloud service providers in finding an optimal method for investigation of network vulnerabilities found in cloud networks. To this end and in this paper, the state-of-the-art C-NFMs are classified and analyzed based on the cloud network perspective using SWOT analysis. It implies that C-NFMs have a suitable impact on cloud network, which further requires for reformation to ensure its applicability in cloud networks.


Journal of Advanced Transportation | 2018

Accident Management System Based on Vehicular Network for an Intelligent Transportation System in Urban Environments

Yusor Rafid Bahar Al-Mayouf; Omar Adil Mahdi; Namar A. Taha; Nor Fadzilah Abdullah; Suleman Khan; Muhammad Alam

As cities across the world grow and the mobility of populations increases, there has also been a corresponding increase in the number of vehicles on roads. The result of this has been a proliferation of challenges for authorities with regard to road traffic management. A consequence of this has been congestion of traffic, more accidents, and pollution. Accidents are a still major cause of death, despite the development of sophisticated systems for traffic management and other technologies linked with vehicles. Hence, it is necessary that a common system for accident management is developed. For instance, traffic congestion in most urban areas can be alleviated by the real-time planning of routes. However, the designing of an efficient route planning algorithm to attain a globally optimal vehicle control is still a challenge that needs to be solved, especially when the unique preferences of drivers are considered. The aim of this paper is to establish an accident management system that makes use of vehicular ad hoc networks coupled with systems that employ cellular technology in public transport. This system ensures the possibility of real-time communication among vehicles, ambulances, hospitals, roadside units, and central servers. In addition, the accident management system is able to lessen the amount of time required to alert an ambulance that it is required at an accident scene by using a multihop optimal forwarding algorithm. Moreover, an optimal route planning algorithm (ORPA) is proposed in this system to improve the aggregate spatial use of a road network, at the same time bringing down the travel cost of operating a vehicle. This can reduce the incidence of vehicles being stuck on congested roads. Simulations are performed to evaluate ORPA, and the results are compared with existing algorithms. The evaluation results provided evidence that ORPA outperformed others in terms of average ambulance speed and travelling time. Finally, our system makes it easier for ambulance to quickly make their way through traffic congestion so that the chance of saving lives is increased.


Fourth International Conference on Wireless and Optical Communications | 2016

ESAM: Endocrine inspired Sensor Activation Mechanism for multi-target tracking in WSNs

Omar Adil Mahdi; Ainuddin Wahid Abdul Wahab; Mohd Yamani Idna Idris; Ammar M. A. Abu znaid; Suleman Khan; Yusor Rafid Bahar Al-Mayouf

Target tracking is a significant application of wireless sensor networks (WSNs) in which deployment of self-organizing and energy efficient algorithms is required. The tracking accuracy increases as more sensor nodes are activated around the target but more energy is consumed. Thus, in this study, we focus on limiting the number of sensors by forming an ad-hoc network that operates autonomously. This will reduce the energy consumption and prolong the sensor network lifetime. In this paper, we propose a fully distributed algorithm, an Endocrine inspired Sensor Activation Mechanism for multi target-tracking (ESAM) which reflecting the properties of real life sensor activation system based on the information circulating principle in the endocrine system of the human body. Sensor nodes in our network are secreting different hormones according to certain rules. The hormone level enables the nodes to regulate an efficient sleep and wake up cycle of nodes to reduce the energy consumption. It is evident from the simulation results that the proposed ESAM in autonomous sensor network exhibits a stable performance without the need of commands from a central controller. Moreover, the proposed ESAM generates more efficient and persistent results as compared to other algorithms for tracking an invading object.


Eurasip Journal on Wireless Communications and Networking | 2016

Evaluation of efficient vehicular ad hoc networks based on a maximum distance routing algorithm

Yusor Rafid Bahar Al-Mayouf; Nor Fadzilah Abdullah; Mahamod Ismail; Salih M. Al-Qaraawi; Omar Adil Mahdi; Suleman Khan

Collaboration


Dive into the Omar Adil Mahdi's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ainuddin Wahid Abdul Wahab

Information Technology University

View shared research outputs
Top Co-Authors

Avatar

Nor Fadzilah Abdullah

National University of Malaysia

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Mahamod Ismail

National University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

Mohd Yamani Idna Idris

Information Technology University

View shared research outputs
Top Co-Authors

Avatar

Marini Othman

Universiti Tenaga Nasional

View shared research outputs
Top Co-Authors

Avatar

Nor'ashikin Ali

Universiti Tenaga Nasional

View shared research outputs
Top Co-Authors

Avatar

Liana K. Qabajeh

Information Technology University

View shared research outputs
Researchain Logo
Decentralizing Knowledge