七彩直播

Dr Ali Hilal Al-Bayatti

Job: Associate Professor in Cyber Security

Faculty: Computing, Engineering and Media

School/department: School of Computer Science and Informatics

Research group(s): Cyber Technology Institute (CTI) (Software Technology Research Laboratory (STRL))

Address: 七彩直播, The Gateway, Leicester, LE1 9BH, United Kingdom

T: +44 (0)116 207 8586

E: alihmohd@dmu.ac.uk

W:

 

Personal profile

Dr. Ali Al-Bayatti is a Senior Lecturer in Intelligent Transportation systems at Software Technology Research Laboratory, a research institute established within 七彩直播, Leicester, UK. , his research deals with vehicular (e.g. Vehicular Ad hoc Networks), Cyber Security (e.g. Security Management) and smart technologies (e.g. Context-aware Systems) that promote collective intelligence. Applications range from promoting comfort, to enabling safety in critical scenarios. The goal of his research is to improve the effectiveness, efficiency, mobility, security and safety of transportationsystems.

Dr. Ali Al-Bayatti is currently teaching Undergraduate module ‘CTEC3604 Multi-service Networks’ in Computer Science. He is currently the programme leader for MSc Cyber Technology, MSc Software Engineering, MSc Cyber Security and MSc Professional Practice in Digital Forensics and Security.

Publications and outputs


  • dc.title: Effect of roadway environment characteristics on pedestrian safety at signalised intersections in Amman dc.contributor.author: Shehadeh, Eman A.; Al-Bayatti, Ali Hilal; Bing枚l, Muhammed Ali dc.description.abstract: Pedestrian safety becoming a serious issue, especially in developing nations, wherein higher crash rates have been reported by the World Health Organization. Despite evidence suggesting higher pedestrian crash counts at signalised intersections in urban areas, there is a lack of in-depth analysis in most developing countries. Motivated by this need, this study aims to: 1) identify significant roadway environment characteristics and traffic volume factors influencing pedestrian 鈥 vehicle accidents at signalised intersections in Amman, Jordan, 2) elucidate relationships between pedestrian 鈥 vehicle accidents and these factors, and 3) discuss the limitations of pedestrian crash data and propose solutions for future research. We have analysed 166 accidents at 47 signalised intersections in Amman during the period of 2007鈥2019. The multilevel Generalised Linear Mixed Gamma regression model is the best fit for the data, indicating significant positive correlations between pedestrian crash frequencies and Annual Average Daily Traffic, pedestrian crossing volume, number of lanes, average lane width, and number of parking sides. Conversely, commercial land use and the presence of public transit facilities showed significant negative correlations with pedestrian crashes. This work presents a novel approach that will help developing countries to determine and explain pedestrian crash causes while considering various challenges in these contexts. dc.description: open access article

  • dc.title: Security, Privacy, and Decentralized Trust Management in VANETs: A Review of Current Research and Future Directions dc.contributor.author: AlMarshoud, Mishri Saleh; Al-Bayatti, Ali Hilal; Kiraz, Mehmet Sabir dc.description.abstract: Vehicular Ad Hoc Networks (VANETs) are powerful platforms for vehicular data services and applications. The increasing number of vehicles has made the vehicular network diverse, dynamic, and large-scale, making it difficult to meet the 5G network鈥檚 demanding requirements. Decentralized systems are interesting and provide attractive services because they are publicly available (transparency), have an append-only ledger (robust integrity protection), remove single points of failure, and enable distributed key management and communication in a peer-to-peer network. Researchers dedicated substantial efforts to advancing vehicle communications, however conventional cryptographic mechanisms are insufficient which enabled us to look at decentralized technologies. Therefore, we revisit decentralized approaches with VANETs. Endpoint devices hold a wallet which may incorporate threshold key management methods like MPC wallets, HD Wallets, or multi-party threshold ECDSA/EdDSA/BLS. We also discuss trust management approaches and demonstrate how decentralization can improve integrity, security, privacy, and resilience to single points of failure. We also conduct a comprehensive review, comparing them with current requirements, and the latest authentication and secure communication architectures, which require the involvement of trusted but non-transparent authorities in certificate issuance/revocation. We highlight the limitations of these schemes from PKI deployment and recommend future research, particularly in the realm of quantum cryptography. dc.description: The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.

  • dc.title: Location Privacy in VANETs: Provably Secure Anonymous Key Exchange Protocol Based on Self-Blindable Signatures dc.contributor.author: Kiraz, Mehmet Sabir; Al-Bayatti, Ali Hilal; AlMarshoud, Mishri Saleh dc.description.abstract: Security and privacy in vehicular ad hoc networks (VANETs) are challenging in terms of Intelligent Transportation Systems (ITS) features. The distribution and decentralisation of vehicles could threaten location privacy and confidentiality in the absence of trusted third parties (TTP)s or if they are otherwise compromised. If the same digital signatures (or the same certificates) are used for different communications, then adversaries could easily apply linking attacks. Unfortunately, most of the existing schemes for VANETs in the literature do not satisfy the required levels of security, location privacy, and efficiency simultaneously. This paper presents a new and efficient end-to-end anonymous key exchange protocol based on Yang et al. 's self-blindable signatures. In our protocol, vehicles first privately blind their own private certificates for each communication outside the mix-zone and then compute an anonymous shared key based on zero-knowledge proof of knowledge (PoK). The efficiency comes from the fact that once the signatures are verified, the ephemeral values in PoK are also used to compute a shared key through an authenticated Diffie-Hellman key exchange protocol. Therefore, the protocol does not require any further external information to generate a shared key. Our protocol also does not require an interference with the Roadside Units or Certificate Authorities, and hence can be securely run outside the mixed-zones. We demonstrate the security of our protocol in an ideal/real simulation paradigm. Hence, our protocol achieves secure authentication, forward unlinkability, and accountability. Furthermore, the performance analysis shows that our protocol is more efficient in terms of computational and communication overheads compared to existing schemes. dc.description: open access article

  • dc.title: Improved Chaff-Based CMIX for Solving Location Privacy Issues in VANETs dc.contributor.author: Kiraz, Mehmet Sabir; Al-Bayatti, Ali Hilal; Saleh AlMarshoud, Mishri dc.description.abstract: Safety application systems in Vehicular Ad-hoc Networks (VANETs) require the dissemination of contextual information about the scale of neighbouring vehicles; therefore, ensuring security and privacy is of utmost importance. Vulnerabilities in the messages and the system鈥檚 infrastructure introduce the potential for attacks that lessen safety and weaken passengers鈥 privacy. The purpose of short-lived anonymous identities, called 鈥減seudo-identities鈥, is to divide the trip into unlinkable short passages. Researchers have proposed changing pseudo-identities more frequently inside a pre-defined area, called a cryptographic mix-zone (CMIX) to ensure enhanced protection. According to ETSI ITS technical report recommendations, the researchers must consider the low-density scenarios to achieve unlinkability in CMIX. Recently, Christian et al. proposed a Chaff-based CMIX scheme that sends fake messages under the consideration of low-density conditions to enhance vehicles鈥 privacy and confuse attackers. To accomplish full unlinkability, in this paper, we first show the following security and privacy vulnerabilities in the Christian et al. scheme: Linkability attacks outside the CMIX may occur due to deterministic data sharing during the authentication phase (e.g., duplicate certificates for each communication). Adversaries may inject fake certificates, which breaks Cuckoo Filters鈥 (CFs) updates authenticity, and the injection may be deniable. CMIX symmetric key leakage outside the coverage may occur. We propose a VPKI-based protocol to mitigate these issues. First, we use a modified version of Wang et al.鈥檚 scheme to provide mutual authentication without revealing the real identity. To this end, the messages of a vehicle are signed with a different pseudo-identity 鈥渃ertificate鈥. Furthermore, the density is increased via the sending of fake messages in low traffic periods to provide unlinkability outside the mix-zone. Second, unlike Christian et al.鈥檚 scheme, we use the Adaptive Cuckoo Filter (ACF) instead of CF to overcome the false positives鈥 effect on the whole filter. Moreover, to prevent any alteration of the ACFs, only RUSs distribute the updates, and they sign the new fingerprints. Third, the mutual authentication prevents any leakage from the mix zones鈥 symmetric keys by generating a fresh one for each communication through a Diffie鈥揌ellman key exchange. dc.description: open access article

  • dc.title: Measuring the Realtime Capability of Parallel-Discrete-Event-Simulations dc.contributor.author: Obermaier, Christina; Riebl, Raphael; Al-Bayatti, Ali Hilal; Khan, Sarmadullah; Facchi, Christian dc.description.abstract: Speeding up Discrete Event Simulations (DESs) is a broad research field. Promising Parallel Discrete Event Simulation (PDES) approaches with optimistic and conservative synchronisation schemes have emerged throughout the years. However, in the area of real-time simulation, PDESs are rarely considered. This is caused by the complex problem of fitting parallel executed DES models to a real-time clock. Hence, this paper gives an extensive review of existing conservative and optimistic synchronisation schemes for PDESs. It introduces a metric to compare their real-time capabilities to determine whether they can be used for soft or firm real-time simulation. Examples are given on how to apply this metric to evaluate PDESs using synthetic and real-world examples. The results of the investigation reveal that no final answer can be given if PDESs can be used for soft or firm real-time simulation as they are. However, boundary conditions were defined, which allow a use-case specific evaluation of the real-time capabilities of a certain parallel executed DES. Using this in-depth knowledge and can lead to predictability of the real-time behaviour of a simulation run. dc.description: open access article

  • dc.title: From Conventional to State-of-the-Art IoT Access Control Models dc.contributor.author: Al-Bayatti, Ali Hilal; Malik, Ahmad Kamran; Khan, Sarmadullah; Emmanuel, N.; Zafar, S.; Khattack, H.A.; Raza, B.; Alassafi, M.O.; Alfakheeh, A.S.; Alqarni, M.A. dc.description.abstract: The advent in Online Social Networks (OSN) and Internet of Things (IoT) has created a new world of collaboration and communication between people and devices. The domain of internet of things uses billions of devices (ranging from tiny sensors to macro scale devices) that continuously produce and exchange huge amounts of data with people and applications. Similarly, more than a billion people are connected through social networking sites to collaborate and share their knowledge. The applications of IoT such as smart health, smart city, social networking, video surveillance and vehicular communication are quickly evolving people鈥檚 daily lives. These applications provide accurate, information-rich and personalized services to the users. However, providing personalized information comes at the cost of accessing private information of users such as their location, social relationship details, health information and daily activities. When the information is accessible online, there is always a chance that it can be used maliciously by unauthorized entities. Therefore, an effective access control mechanism must be employed to ensure the security and privacy of entities using OSN and IoT services. Access control refers to a process which can restrict user鈥檚 access to data and resources. It enforces access rules to grant authorized users an access to resources and prevent others. This survey examines the increasing literature on access control for traditional models in general, and for OSN and IoT in specific. Challenges and problems related to access control mechanisms are explored to facilitate the adoption of access control solutions in OSN and IoT scenarios. The survey provides a review of the requirements for access control enforcement, discusses several security issues in access control, and elaborates underlying principles and limitations of famous access control models. We evaluate the feasibility of current access control models for OSN and IoT and provide the future development direction of access control for the same dc.description: open access article

  • dc.title: A Machine-Learning-Based Approach to Predict the Health Impacts of Commuting in Large Cities: Case Study of London dc.contributor.author: Raj Theeng Tamang, M.; Sharif, M.S.; Al-Bayatti, Ali Hilal; Alfakeeh, A.S.; Omar Alsayed, A. dc.description.abstract: The daily commute represents a source of chronic stress that is positively correlated with physiological consequences, including increased blood pressure, heart rate, fatigue, and other negative mental and physical health effects. The purpose of this research is to investigate and predict the physiological effects of commuting in Greater London on the human body based on machine-learning approaches. For each participant, the data were collected for five consecutive working days, before and after the commute, using non-invasive wearable biosensor technology. Multimodal behaviour, analysis and synthesis are the subjects of major efforts in computing field to realise the successful human鈥揾uman and human鈥揳gent interactions, especially for developing future intuitive technologies. Current analysis approaches still focus on individuals, while we are considering methodologies addressing groups as a whole. This research paper employs a pool of machine-learning approaches to predict and analyse the effect of commuting objectively. Comprehensive experimentation has been carried out to choose the best algorithmic structure that suit the problem in question. The results from this study suggest that whether the commuting period was short or long, all objective bio-signals (heat rate and blood pressure) were higher post-commute than pre-commute. In addition, the results match both the subjective evaluation obtained from the Positive and Negative Affect Schedule and the proposed objective evaluation of this study in relation to the correlation between the effect of commuting on bio-signals. Our findings provide further support for shorter commutes and using the healthier or active modes of transportation. dc.description: open access article

  • dc.title: A Fuzzy-Logic Approach to Dynamic Bayesian Severity Level Classification of Driver Distraction Using Image Recognition dc.contributor.author: Fasanmade, Adebamigbe; He, Ying; Al-Bayatti, Ali Hilal; Morden, J.N.; Aliyu, Suleiman; Alfakeeh, A.S.; Alsayed, A.O. dc.description.abstract: Detecting and classifying driver distractions is crucial in the prevention of road accidents. These distractions impact both driver behavior and vehicle dynamics. Knowing the degree of driver distraction can aid in accident prevention techniques, including transitioning of control to a level 4 semi- autonomous vehicle, when a high distraction severity level is reached. Thus, enhancement of Advanced Driving Assistance Systems (ADAS) is a critical component in the safety of vehicle drivers and other road users. In this paper, a new methodology is introduced, using an expert knowledge rule system to predict the severity of distraction in a contiguous set of video frames using the Naturalistic Driving American University of Cairo (AUC) Distraction Dataset. A multi-class distraction system comprises the face orientation, drivers鈥 activities, hands and previous driver distraction, a severity classification model is developed as a discrete dynamic Bayesian (DDB). Furthermore, a Mamdani-based fuzzy system was implemented to detect multi- class of distractions into a severity level of safe, careless or dangerous driving. Thus, if a high level of severity is reached the semi-autonomous vehicle will take control. The result further shows that some instances of driver鈥檚 distraction may quickly transition from a careless to dangerous driving in a multi-class distraction context. dc.description: open access article

  • dc.title: A Multi-User, Single-Authentication Protocol for Smart Grid Architectures dc.contributor.author: Khan, Sarmadullah; Alfakeeh, Ahmed; Al-Bayatti, Ali Hilal dc.description.abstract: In a smart grid system, the utility server collects data from various smart grid devices. These data play an important role in the energy distribution and balancing between the energy providers and energy consumers. However, these data are prone to tampering attacks by an attacker, while traversing from the smart grid devices to the utility servers, which may result in energy disruption or imbalance. Thus, an authentication is mandatory to efficiently authenticate the devices and the utility servers and avoid tampering attacks. To this end, a group authentication algorithm is proposed for preserving demand鈥搑esponse security in a smart grid. The proposed mechanism also provides a fine-grained access control feature where the utility server can only access a limited number of smart grid devices. The initial authentication between the utility server and smart grid device in a group involves a single public key operation, while the subsequent authentications with the same device or other devices in the same group do not need a public key operation. This reduces the overall computation and communication overheads and takes less time to successfully establish a secret session key, which is used to exchange sensitive information over an unsecured wireless channel. The resilience of the proposed algorithm is tested against various attacks using formal and informal security analysis. dc.description: open access article

  • dc.title: An Accurate Ensemble Classifier for Medical Volume Analysis: Phantom and Clinical PET Study dc.contributor.author: Sharif, Mhd Saeed; Abbod, M.; Al-Bayatti, Ali Hilal; Amira, Abbes; Alfakeeh, Ahmed; Sanghera, B. dc.description.abstract: The predominant application of positron emission tomography (PET) in the field of oncology and radiotherapy and the significance of medical imaging research have led to an urgent need for effective approaches to PET volume analysis and the development of accurate and robust volume analysis techniques to support oncologists in their clinical practice, including diagnosis, arrangement of appropriate radiotherapy treatment, and evaluation of patients鈥 response to therapy. This paper proposes an efficient optimized ensemble classifier to tackle the problem of analysis of squamous cell carcinoma in patient PET volumes. This optimized classifier is based on an artificial neural network (ANN), fuzzy C-means (FCM), an adaptive neuro-fuzzy inference system (ANFIS), K-means, and a self-organizing map (SOM). Four ensemble classifier machines are proposed in this study. The first three are built using a voting approach, an averaging technique, and weighted averaging, respectively. The fourth, novel ensemble classifier machine is based on the combination of a modified particle swarm optimization (PSO) approach and weighted averaging. Experimental National Electrical Manufacturers Association and International Electrotechnical Commission (NEMA IEC) body phantom and clinical PET studies of participants with laryngeal squamous cell carcinoma are used for the evaluation of the proposed approach. Superior results were achieved using the new optimized ensemble classifier when compared with the results from the investigated classifiers and the non-optimized ensemble classifiers. The proposed approach identified the region of interest class (tumor) with an average accuracy of 98.11% in clinical datasets of patients with laryngeal tumors. This system supports the expertise of clinicians in PET tumor analysis. dc.description: The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link. open access journal

Key research outputs

 

Research interests/expertise

  • Intelligent transpiration
  • Vehicular Ad hoc Networks
  • Mobile Computing
  • Wireless Computing
  • Context-aware Systems
  • Pervasive Computing
  • Computer/Mobile Security.

Areas of teaching

CTEC3604 Multi-service Networks (30 credit).

Qualifications

B.Sc. in Computer Engineering and Information Technology at the University of Technology, Iraq.

Ph.D. in Computer Science at 七彩直播, UK.  

七彩直播 taught

Programme leader for MSc Cyber Technology, MSc Software Engineering, MSc Cyber Security and MSc Professional Practice in Digital Forensics and Security.

Current research students

Successful PhD Completion 


Dr. Khalid Alodadi “Solving Non-Line of Sight using Context-aware Systems in Vehicle Ad Hoc Networks” 七彩直播 (2016). 

Dr. Ahmed Alghamdi “Features interaction: detection and resolution in Smart Homes Systems” 七彩直播 (2016).

Dr. Tareq Binjammaz “GPS Integrity Monitoring for an Intelligent Transport System“ 七彩直播 (2015). 

Dr. Abdullah Aldawsari “Context-aware Driving Behaviour Detection System in Vehicle Ad Hoc Networks“ 七彩直播 (2015).

Dr. Yasser Almajed “Privacy Management in Data Warehousing” 七彩直播 (2015). Dr. Fahad Alqahtani “E-commerce Customer Anonymity and Fair Exchange Protocol for Digital Contents” 七彩直播 (2015). 

Dr. Abdulmalik Alhammad “Intelligent Parking Systems in Vehicle Ad Hoc Networks” 七彩直播 (2015).

Dr. Hani Alquhayz “Security Management System for 4G Heterogenous Networks“ 七彩直播 (2015).

Dr. Mussab Aswad “Crash Detection Model Using Dynamic Bayesian Networks” 七彩直播 (2014). 

Dr. Mafawez Alharbi “Context-aware PLE Architecture”, 七彩直播 (2014). 

Dr. Laila Alhimale “Fall Detection Algorithm for Video Images”, 七彩直播 (2013).

Dr. Saif Al-Sultan “Context Aware Driving Behaviour Model for VANET”, 七彩直播 (2013). 

Dr. Awatef Rahuma “Semantically Enhanced Image Tagging System”, 七彩直播 (2013).

Dr. Moath Al-Doori “Directional Routing Technique in Vehicle Ad hoc Networks, 七彩直播 (2011). 

Dr. Muhammed Khan “A Co-Evolutionary Framework to Reducing the Gap between and Information Technology (2011).


Current PhD Students (Main Supervisor) 

Mr. Dennis Bohmlander "Innovative Crash-sensing Architectures - A new approach in contactless vehicle crash detection" 七彩直播. 

Mr. Raphael Riebl "Perfomance Testing methodology for Vehicle Ad hoc Networks" 七彩直播.

Mr. Sadir Fadhil "Context-aware overtaking assistant system. 七彩直播.

Mr. Nawaf Alqabandi “Context-aware Intrusion Detection system using Artificial intelligence in VANET” 七彩直播.

 

Successful MSc Completion 

Mr. Shadman Salah (2014). 

Mr. Ahmed Malik (2013) “Factors effecting Delivering Insulin for diabetic patients using Bayesian Networks”

Mr. Anjanna Silva (2013) “Car Polling System”

Mr. Anas Alsharif (2012) “Automated Taxi Dispatch System (Taxi Business) 七彩直播.

Mr. Mahran Alsubee (2012) “Intelligent Car Parking System - A case of City of Medina, Saudi Arabia” 七彩直播.

Mr. Salman Alenezi (2012) “The Lines Between Augmented Reality and Virtual Reality” 七彩直播. 

Mr. Uqonna Ekwueme (2011)“Intelligent Car Parking Schemes” 七彩直播.

Mrs. Nada Al-Fakih (2011) “Cloud Based Personal Health Record” 七彩直播.

Mrs. Entisar Alshirf (2011) “Selection of Computer Programming Languages for Developing Distributed Systems. 七彩直播.

Mrs. Ohud Almutairi (2011) “Designing an Effective Intersection Collision Warning System: An Investigation into Important Criteria” 七彩直播. 

Mrs. Ruqayah Aljameel (2011) “The Application’s Usability Evaluation of Web-based Geographic Information System for Pst Office Webs” 七彩直播. 

Mr. Khalid Shaban (2011) “Evaluating Mobile Application Performance and Power Consumption Trough Model-Driven Engineering Methodology” 七彩直播.

Mrs. Laila Elgamel (2011) “ Selection of Programming Languages for Developing Distributed Systems” 七彩直播.

Mr. Ahmed Alghamdi (2010) “Feasibility of Separating Control/Data in 802.11 Family” 七彩直播. 

Mr. Mafawez Alharbi (2010) “Mobile Lecture” 七彩直播. 

Mr. Abdulkariem Alqarni (2010) “Global Intelligent Parking Schemes” 七彩直播. 

Mr. Abdullah Algashami (2010) “Good Practice for Effective E-assessment” 七彩直播. 

Mr. Sharaf Alzhrani (2010) “Intelligent Application for Car Hiring (Mileage Tracking Application)” 七彩直播.

Mr. Anas Alsharif (2010) “Automated Taxi Dispatch System” 七彩直播. 

Mrs. Asma Alothaim (2010) “Location Finder and Weather Forecast Application” 七彩直播. 

Mr. Fauwaz Alshammari “Risk Management in Software Development Projects” 七彩直播.

Mr. Ali Almiman “Security Survey in VoIP” 七彩直播. Mr. Thamir Alghamdi “Comparison of Two Parking Management Systems” 七彩直播.

Professional esteem indicators

Journal Article Reviewing
Networking [IET] 2016. Vehicular Communications [Elsevier] 2014, 2015, 2016. Sensors [MDPI] 2016. Frontiers of Information Technology & Electronic Engineering [Springer] 2014, 2015. The Journal of Engineering [IET] 2014, 2015; Journal of Advances in Engineering Software [Elsevier]; Journal of Network & Computer Applications 2013 [Elsevier]; Computer & Electrical Engineering Journal (CEE) 2011, 2012 [Elsevier]; International Journal of Ad Hoc Ubiquitous Computing (IJAHUC) 2010

Program Committee Member / Other Conference & Workshop Reviewing
IEEE 83rd Vehicular Technology Conference: VTC2016-Spring 15–18 May 2016, Nanjing, ChinaIEEE Vehicular Technology Conference: VTC2015-Spring 11–14 May 2015, Glasgow, ScotlandInternational Conference on Computer, Communications, and Control Technology (I4CT) 2014Springer based Applied Electromagnetic International Conference (APPEIC) 2014Renewable Energy and Green Technology International Conference (REEGETECH) 2014International Symposium on Technology Management and Emerging Technologies (ISTMET) 2014International Conference on Communication and Computer Engineering, focusing on Industrial and Manufacturing Theory and Applications of Electronics, Communications, Computing, and Information Technology (ICOCOE) 2014IEEE Symposium on Computer Application & Industrial Electronics (ISCAIE) 2013IEEE International RF and Microwave Conference (RFM) 2013IEEE Symposium on Industrial Electronics and Applications (ISIEA) 2013IEEE Conference on Wireless Sensors (ICWiSE) 2013IEEE Symposium on Computer & Informatics (ISCI) 2013IEEE Asia-Pacific Conference on Applied Electromagnetic (APACE ) 2012IEEE Symposium on Wireless Technology & Applications (ISWTA) 2012, 2013IEEE Symposium on Industrial Electronic & Applications (ISIEA ) 2012ICNS Networking and Services 2008, 2009, 2010, 2011, 2012, 2013, 2014International Symposium on Innovation in Information & Communication Technology (ISIICT) 2011, 2012, 2013, 2014International Conference on Computer Science & Information Technology (ICCSIT) 2011, 2012, 2013, 2014 International Symposium on Wireless Pervasive Computing (ISWPC) 2010 Member of the Steering committee of the International Online Workshop on writing a research paper (IOW-WRP) 2011AIRCC Worldwide Conferences

Ali_Corridor