With the huge proliferation of mobile Internet of Things (IoT) devices such as connected vehicles... more With the huge proliferation of mobile Internet of Things (IoT) devices such as connected vehicles, drones, and healthcare wearables, IoT networks are promising mobile connectivity capacity far beyond the conventional computing platforms. The success of this service provisioning is highly dependent on the flexibility offered by such enabling technologies to support IoT mobility using different devices and protocol stacks. Many of the connected mobile IoT devices are autonomous, and resource constrained, which poses additional challenges for mobile IoT communication. Therefore, given the unique mobility requirements of IoT devices and applications, many challenges are still to be addressed. This paper presents a global mobility management solution for IoT networks that can handle both micro and macro mobility scenarios. The solution exploits a path-based forwarding fabric together with mechanisms from Information-Centric Networking. The solution is equally suitable for legacy session-...
Decision Map Algebra (DMA) is a generic and context independent algebra, especially devoted to sp... more Decision Map Algebra (DMA) is a generic and context independent algebra, especially devoted to spatial multicriteria modelling. The algebra defines a set of operations which formalises spatial multicriteria modelling and analysis. The main concept in DMA is decision map, which is a planar subdivision of the study area represented as a set of non-overlapping polygonal spatial units that are assigned, using a multicriteria classification model, into an ordered set of classes. Different methods can be used in the multicriteria classification step. In this paper, the multicriteria classification step relies on the Dominance-based Rough Set Approach (DRSA), which is a preference learning method that extends the classical rough set theory to multicriteria classification. The paper first introduces a preference learning based approach to decision map construction. Then it proposes a formal specification of DMA. Finally, it briefly presents an object oriented implementation of DMA.
Geographical Information Systems (GIS) are very useful system in capturing, storing, manipulating... more Geographical Information Systems (GIS) are very useful system in capturing, storing, manipulating, analysing, managing, and presenting spatial data. GIS systems can be used for solving problem and making decision in various applications. Data mining is the automated process of discovering patterns in data. This thesis outlines the issues and challenges of GIS data to advance the use of data mining techniques in the context of GIS applications. This thesis focuses mainly on two domains of applications: first is the digital vector map copyright protection and second is the digital vector map partitioning. Further more, this thesis presents an efficient approach for identifying the resilient locations for embedding the watermark; improving the robustness of the watermarking approach against defined set of attacks; investigating the impact of clustering approaches on the application of vector map protection; defining an effective metric for measuring the topological distortion in the wa...
2015 IEEE 27th International Conference on Tools with Artificial Intelligence (ICTAI), 2015
Geographic Information System (GIS) vector maps have become more widely available, prompting a ne... more Geographic Information System (GIS) vector maps have become more widely available, prompting a need to prevent their unauthorized use. This is commonly done through the use of a digital watermark, with many approaches applying techniques from image map watermarking, without exploiting the particular properties of vector map data. In previous work we showed that using k-medoids clustering and the bounding box property of vector maps in the embedding process leads to increased robustness against simplification (removing vertices from vector data) and interpolation (adding new vertices to the data) attacks, which may distort the watermark and prevent the identification of the map owner. In this paper we show that the advantages of using the bounding box property are maintained even with a different clustering approach (k-means), and argue that they would hold regardless of the method used for identifying the watermark embedding locations in the map.
Dramatic advancements in Geographic Information Systems (GIS) and computer technologies resulted ... more Dramatic advancements in Geographic Information Systems (GIS) and computer technologies resulted in a wide availability of rich-knowledge GIS digital vector maps that are easily accessible and downloadable through the world wide web. This led to the need of copyright protection systems to protect the rights of the producers of these maps. Unlike the research on copyright protection for raster/image data types, the research for vector map data is less documented. This article surveys and classifies the GIS vector map copyright protection research papers published between 2000 and 2014, towards a thorough understanding of the-state-of-the-art, addressing significant limitations of previous review articles, and outlining effective recommendations for future research directions.
Dramatic advancements in Geographic Information Systems (GIS) and computer technologies resulted ... more Dramatic advancements in Geographic Information Systems (GIS) and computer technologies resulted in a wide availability of rich-knowledge GIS digital vector maps that are easily accessible and downloadable through the world wide web. This led to the need of copyright protection systems to protect the rights of the producers of these maps. Unlike the research on copyright protection for raster/image data types, the research for vector map data is less documented. This article surveys and classifies the GIS vector map copyright protection research papers published between 2000 and 2014, towards a thorough understanding of the-state-of-the-art, addressing significant limitations of previous review articles, and outlining effective recommendations for future research directions.
Intellectual property protection of digital data has been important task due to the rabid growth ... more Intellectual property protection of digital data has been important task due to the rabid growth of multimedia data distribution and the wide availability of the information via global networks. In this paper, a robust and secure blind image watermarking scheme is proposed. It presents a method which can add the watermark to the significant coefficients in lifting wavelet transform (LWT)
Intellectual property protection of digital data has been important task due to the rabid growth ... more Intellectual property protection of digital data has been important task due to the rabid growth of multimedia data distribution and the wide availability of the information via global networks. In this paper, a robust and secure blind image watermarking scheme is proposed. It presents a method which can add the watermark to the significant coefficients in lifting wavelet transform (LWT)
With the huge proliferation of mobile Internet of Things (IoT) devices such as connected vehicles... more With the huge proliferation of mobile Internet of Things (IoT) devices such as connected vehicles, drones, and healthcare wearables, IoT networks are promising mobile connectivity capacity far beyond the conventional computing platforms. The success of this service provisioning is highly dependent on the flexibility offered by such enabling technologies to support IoT mobility using different devices and protocol stacks. Many of the connected mobile IoT devices are autonomous, and resource constrained, which poses additional challenges for mobile IoT communication. Therefore, given the unique mobility requirements of IoT devices and applications, many challenges are still to be addressed. This paper presents a global mobility management solution for IoT networks that can handle both micro and macro mobility scenarios. The solution exploits a path-based forwarding fabric together with mechanisms from Information-Centric Networking. The solution is equally suitable for legacy session-...
Decision Map Algebra (DMA) is a generic and context independent algebra, especially devoted to sp... more Decision Map Algebra (DMA) is a generic and context independent algebra, especially devoted to spatial multicriteria modelling. The algebra defines a set of operations which formalises spatial multicriteria modelling and analysis. The main concept in DMA is decision map, which is a planar subdivision of the study area represented as a set of non-overlapping polygonal spatial units that are assigned, using a multicriteria classification model, into an ordered set of classes. Different methods can be used in the multicriteria classification step. In this paper, the multicriteria classification step relies on the Dominance-based Rough Set Approach (DRSA), which is a preference learning method that extends the classical rough set theory to multicriteria classification. The paper first introduces a preference learning based approach to decision map construction. Then it proposes a formal specification of DMA. Finally, it briefly presents an object oriented implementation of DMA.
Geographical Information Systems (GIS) are very useful system in capturing, storing, manipulating... more Geographical Information Systems (GIS) are very useful system in capturing, storing, manipulating, analysing, managing, and presenting spatial data. GIS systems can be used for solving problem and making decision in various applications. Data mining is the automated process of discovering patterns in data. This thesis outlines the issues and challenges of GIS data to advance the use of data mining techniques in the context of GIS applications. This thesis focuses mainly on two domains of applications: first is the digital vector map copyright protection and second is the digital vector map partitioning. Further more, this thesis presents an efficient approach for identifying the resilient locations for embedding the watermark; improving the robustness of the watermarking approach against defined set of attacks; investigating the impact of clustering approaches on the application of vector map protection; defining an effective metric for measuring the topological distortion in the wa...
2015 IEEE 27th International Conference on Tools with Artificial Intelligence (ICTAI), 2015
Geographic Information System (GIS) vector maps have become more widely available, prompting a ne... more Geographic Information System (GIS) vector maps have become more widely available, prompting a need to prevent their unauthorized use. This is commonly done through the use of a digital watermark, with many approaches applying techniques from image map watermarking, without exploiting the particular properties of vector map data. In previous work we showed that using k-medoids clustering and the bounding box property of vector maps in the embedding process leads to increased robustness against simplification (removing vertices from vector data) and interpolation (adding new vertices to the data) attacks, which may distort the watermark and prevent the identification of the map owner. In this paper we show that the advantages of using the bounding box property are maintained even with a different clustering approach (k-means), and argue that they would hold regardless of the method used for identifying the watermark embedding locations in the map.
Dramatic advancements in Geographic Information Systems (GIS) and computer technologies resulted ... more Dramatic advancements in Geographic Information Systems (GIS) and computer technologies resulted in a wide availability of rich-knowledge GIS digital vector maps that are easily accessible and downloadable through the world wide web. This led to the need of copyright protection systems to protect the rights of the producers of these maps. Unlike the research on copyright protection for raster/image data types, the research for vector map data is less documented. This article surveys and classifies the GIS vector map copyright protection research papers published between 2000 and 2014, towards a thorough understanding of the-state-of-the-art, addressing significant limitations of previous review articles, and outlining effective recommendations for future research directions.
Dramatic advancements in Geographic Information Systems (GIS) and computer technologies resulted ... more Dramatic advancements in Geographic Information Systems (GIS) and computer technologies resulted in a wide availability of rich-knowledge GIS digital vector maps that are easily accessible and downloadable through the world wide web. This led to the need of copyright protection systems to protect the rights of the producers of these maps. Unlike the research on copyright protection for raster/image data types, the research for vector map data is less documented. This article surveys and classifies the GIS vector map copyright protection research papers published between 2000 and 2014, towards a thorough understanding of the-state-of-the-art, addressing significant limitations of previous review articles, and outlining effective recommendations for future research directions.
Intellectual property protection of digital data has been important task due to the rabid growth ... more Intellectual property protection of digital data has been important task due to the rabid growth of multimedia data distribution and the wide availability of the information via global networks. In this paper, a robust and secure blind image watermarking scheme is proposed. It presents a method which can add the watermark to the significant coefficients in lifting wavelet transform (LWT)
Intellectual property protection of digital data has been important task due to the rabid growth ... more Intellectual property protection of digital data has been important task due to the rabid growth of multimedia data distribution and the wide availability of the information via global networks. In this paper, a robust and secure blind image watermarking scheme is proposed. It presents a method which can add the watermark to the significant coefficients in lifting wavelet transform (LWT)
Uploads
Papers by Ahmed Abubahia