default search action
Yasser Gadallah
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j25]Ahmed Fahim Mostafa, Mohamed Abdel-Kader, Yasser Gadallah:
A UAV-based coverage gap detection and resolution in cellular networks: A machine-learning approach. Comput. Commun. 215: 41-50 (2024) - [j24]Majid H. Khoshafa, Telex M. N. Nkouatchah, Yasser Gadallah, Mohamed Hossam Ahmed:
Securing LPWANs: A Reconfigurable Intelligent Surface (RIS)-Assisted UAV Approach. IEEE Wirel. Commun. Lett. 13(1): 158-162 (2024) - [j23]Majid H. Khoshafa, Yasser Gadallah, Telex Magloire Nkouatchah Ngatched, Mohamed Hossam Ahmed:
Aerial Reconfigurable Intelligent Surface-Assisted LPWANs for IoT: A Cross-Layer Analysis. IEEE Wirel. Commun. Lett. 13(10): 2912-2916 (2024) - [c39]Mohamed Abdel-Kader, Mohammed Karmoose, Mariam M. N. Aboelwafa, Yasser Gadallah, Hassan N. Kheirallah:
A Machine Learning-Based Uplink Resource Allocation Technique for Mixed Traffic in Non-Terrestrial Networks. BlackSeaCom 2024: 23-29 - [c38]Ghada Afifi, Yasser Gadallah:
Reliable UAV Navigation Using Cellular Networks: A Deep Reinforcement Learning Approach. BlackSeaCom 2024: 30-35 - [i2]Majid H. Khoshafa, Omar Maraqa, Jules Merlin Mouatcho Moualeu, Sylvester B. Aboagye, Telex Magloire Nkouatchah Ngatched, Mohamed Hossam Ahmed, Yasser Gadallah, Marco Di Renzo:
RIS-Assisted Physical Layer Security in Emerging RF and Optical Wireless Communication Systems: A Comprehensive Survey. CoRR abs/2403.10412 (2024) - [i1]Afsoon Alidadi Shamsabadi, Animesh Yadav, Yasser Gadallah, Halim Yanikomeroglu:
Exploring the 6G Potentials: Immersive, Hyper Reliable, and Low-Latency Communication. CoRR abs/2407.11051 (2024) - 2023
- [j22]Mohamed W. Nomeir, Yasser Gadallah, Karim G. Seddik:
Machine Learning-Based Uplink Scheduling Approaches for Mixed Traffic in Cellular Systems. IEEE Access 11: 10238-10253 (2023) - [j21]Ahmed Fahim Mostafa, Mohamed Abdel-Kader, Yasser Gadallah, Omar Elayat:
Machine Learning-Based Multi-UAV Deployment for Uplink Traffic Sizing and Offloading in Cellular Networks. IEEE Access 11: 71314-71325 (2023) - [j20]Ahmed Fahim, Yasser Gadallah:
An Optimized LTE-Based Technique for Drone Base Station Dynamic 3D Placement and Resource Allocation in Delay-Sensitive M2M Networks. IEEE Trans. Mob. Comput. 22(2): 732-743 (2023) - [j19]Ghada Alsuhli, Karim Banawan, Kareem M. Attiah, Ayman Elezabi, Karim G. Seddik, Ayman Gaber, Mohamed Mahmoud Zaki, Yasser Gadallah:
Mobility Load Management in Cellular Networks: A Deep Reinforcement Learning Approach. IEEE Trans. Mob. Comput. 22(3): 1581-1598 (2023) - 2022
- [j18]Ghada Afifi, Yasser Gadallah:
Cellular Network-Supported Machine Learning Techniques for Autonomous UAV Trajectory Planning. IEEE Access 10: 131996-132011 (2022) - [j17]Ghada Alsuhli, Ahmed Fahim, Yasser Gadallah:
A survey on the role of UAVs in the communication process: A technological perspective. Comput. Commun. 194: 86-123 (2022) - [c37]Ghada Afifi, Yasser Gadallah:
Unmanned Aerial Vehicles 3-D Autonomous Outdoor Localization: A Deep Learning Approach. WCNC 2022: 908-913 - 2021
- [j16]Ghada Afifi, Yasser Gadallah:
Autonomous 3-D UAV Localization Using Cellular Networks: Deep Supervised Learning Versus Reinforcement Learning Approaches. IEEE Access 9: 155234-155248 (2021) - [c36]Heba Kadry, Yasser Gadallah:
A Machine Learning-Based Routing Technique for Off-chain Transactions in Payment Channel Networks. SmartIoT 2021: 66-73 - [c35]Mohamed W. Nomeir, Yasser Gadallah, Karim G. Seddik:
Uplink Scheduling for Mixed Grant-Based eMBB and Grant-Free URLLC Traffic in 5G Networks. WiMob 2021: 187-192 - 2020
- [j15]Mohammed Y. Abdelsadek, Mohamed Hossam Ahmed, Yasser Gadallah:
Cross-layer resource allocation for critical MTC coexistent with human-type communications in LTE: a two-sided matching approach. IET Commun. 14(18): 3223-3230 (2020) - [j14]Mariam M. N. Aboelwafa, Karim G. Seddik, Mohamed H. Eldefrawy, Yasser Gadallah, Mikael Gidlund:
A Machine-Learning-Based Technique for False Data Injection Attacks Detection in Industrial IoT. IEEE Internet Things J. 7(9): 8462-8471 (2020) - [j13]Mohammed Y. Abdelsadek, Yasser Gadallah, Mohamed Hossam Ahmed:
A Critical MTC Resource Allocation Approach for LTE Networks With Finite Blocklength Codes. IEEE Trans. Veh. Technol. 69(5): 5598-5609 (2020) - [c34]Kareem Abdullah, Sara A. Attalla, Yasser Gadallah, Ayman Elezabi, Karim G. Seddik, Ayman Gaber, Dina Samak:
A Machine Learning-Based Technique for the Classification of Indoor/Outdoor Cellular Network Clients. CCNC 2020: 1-2 - [c33]Mariam M. N. Aboelwafa, Mohamed Mahmoud Zaki, Ayman Gaber, Karim G. Seddik, Yasser Gadallah, Ayman Elezabi:
Machine Learning-Based MIMO Enabling Techniques for Energy Optimization in Cellular Networks. CCNC 2020: 1-6 - [c32]Kareem M. Attiah, Karim Banawan, Ayman Gaber, Ayman Elezabi, Karim G. Seddik, Yasser Gadallah, Kareem Abdullah:
Load Balancing in Cellular Networks: A Reinforcement Learning Approach. CCNC 2020: 1-6 - [c31]Mohammed Y. Abdelsadek, Yasser Gadallah, Mohamed Hossam Ahmed:
Resource Allocation of URLLC and eMBB Mixed Traffic in 5G Networks: A Deep Learning Approach. GLOBECOM 2020: 1-6 - [c30]Mohammed Y. Abdelsadek, Mohamed Hossam Ahmed, Yasser Gadallah:
An LTE Matching-Based Scheduling Scheme for Critical-MTC with Shortened Transmission Time Intervals. VTC Fall 2020: 1-6 - [c29]Ahmed Fahim, Yasser Gadallah:
Optimized 3D Drone Placement and Resource Allocation for LTE-Based M2M Communications. VTC Spring 2020: 1-5
2010 – 2019
- 2019
- [j12]Mohammed Y. Abdelsadek, Yasser Gadallah, Mohamed Hossam Ahmed:
Matching-Based Resource Allocation for Critical MTC in Massive MIMO LTE Networks. IEEE Access 7: 127141-127153 (2019) - [j11]Mohammed Y. Abdelsadek, Yasser Gadallah, Mohamed Hossam Ahmed:
Optimal Cross-Layer Resource Allocation for Critical MTC Traffic in Mixed LTE Networks. IEEE Trans. Veh. Technol. 68(6): 5944-5956 (2019) - [c28]Sylvia Gendy, Yasser Gadallah:
LTE-Based Network Virtualization Schemes Adaptation for M2M Deployments. BlackSeaCom 2019: 1-3 - [c27]Zeinab El Sayed, Yasser Gadallah:
Drone Base Station Trajectory Planning for Optimal Resource Scheduling in LTE Sparse M2M Networks. BlackSeaCom 2019: 1-6 - [c26]Sylvia Gendy, Yasser Gadallah:
A Resource Trading Scheme in Slice-Based M2M Communications. VTC Fall 2019: 1-5 - [c25]Mostafa el-Tager, Yasser Gadallah:
SWSP: Socially-Weighted Shortest Path Routing for Practical Internet of Things Applications. WCNC 2019: 1-6 - 2018
- [c24]Dina S. Deif, Yasser Gadallah:
Reliable wireless sensor networks topology control for critical internet of things applications. WCNC 2018: 1-6 - 2017
- [j10]Ahmed Elhamy Mostafa, Yasser Gadallah:
A Statistical Priority-Based Scheduling Metric for M2M Communications in LTE Networks. IEEE Access 5: 8106-8117 (2017) - [j9]Dina S. Deif, Yasser Gadallah:
An Ant Colony Optimization Approach for the Deployment of Reliable Wireless Sensor Networks. IEEE Access 5: 10744-10756 (2017) - [j8]Dina S. Deif, Yasser Gadallah:
A comprehensive wireless sensor network reliability metric for critical Internet of Things applications. EURASIP J. Wirel. Commun. Netw. 2017: 145 (2017) - [j7]Yasser Gadallah, Mohamed Hossam Ahmed, Ehab Elalamy:
Dynamic LTE resource reservation for critical M2M deployments. Pervasive Mob. Comput. 40: 541-555 (2017) - [c23]Yasser Gadallah, Mostafa el-Tager, Yehia Ismail:
A practical social relationship-based system for cooperative internet of things operation. BlackSeaCom 2017: 1-5 - [c22]Mohammed Y. Abdelsadek, Yasser Gadallah, Mohamed Hossam Ahmed:
An LTE-based optimal resource allocation scheme for delay-sensitive M2M deployments coexistent with H2H users. INFOCOM Workshops 2017: 139-144 - [c21]Ahmed Elhamy Mostafa, Yasser Gadallah:
Uniqueness-Based Resource Allocation for M2M Communications in Narrowband IoT Networks. VTC Fall 2017: 1-5 - 2016
- [j6]Mehaseb Ahmed Mehaseb, Yasser Gadallah, Ahmed Elhamy, Hadia Elhennawy:
Classification of LTE Uplink Scheduling Techniques: An M2M Perspective. IEEE Commun. Surv. Tutorials 18(2): 1310-1335 (2016) - [c20]Mohamed Anis, Yasser Gadallah, Hadia Elhennawy:
Machine-to-machine communications over the Internet of Things: Private Wi-Fi access prospects. Wireless Days 2016: 1-3 - [c19]Dina S. Deif, Yasser Gadallah:
Reliability assessment of wireless sensor network deployments. Wireless Days 2016: 1-6 - [c18]Mostafa elTager, Yasser Gadallah:
Massive M2M deployments: LTE attachment prospects. Wireless Days 2016: 1-3 - 2015
- [c17]Mohamed Adel Serhani, Ezedin Barka, Yasser Gadallah:
A secure role-based service discovery technique for emergency intervention operations. FGCT 2015: 1-6 - [c16]Ahmed Elhamy, Yasser Gadallah:
BAT: A Balanced Alternating Technique for M2M Uplink Scheduling over LTE. VTC Spring 2015: 1-6 - [c15]Yasser Gadallah, Mostafa elTager, Ehab Elalamy:
A framework for cooperative intranet of Things wireless sensor network applications. WiMob 2015: 147-154 - 2014
- [j5]Dina S. Deif, Yasser Gadallah:
Classification of Wireless Sensor Networks Deployment Techniques. IEEE Commun. Surv. Tutorials 16(2): 834-855 (2014) - [c14]Dina S. Deif, Yasser Gadallah:
Wireless Sensor Network deployment using a variable-length genetic algorithm. WCNC 2014: 2450-2455 - [c13]Yasser Gadallah, Ehab Elalamy, Mostafa elTager:
An IP-based arrangement to connect wireless sensor networks to the Internet of Things. WCNC 2014: 2745-2750 - 2013
- [c12]Fatemeh Mansourkiaie, Mohamed Hossam Ahmed, Yasser Gadallah:
Minimizing the probability of collision in wireless sensor networks using cooperative diversity and optimal power allocation. IWCMC 2013: 120-124 - [c11]Yasser Gadallah, Mohamed Elmorsy, Mohamed N. Ibrahim, Hani F. Ragai:
ECTP: Enhanced Collection Tree Protocol for practical wireless sensor network applications. IWCMC 2013: 165-170 - [c10]Mehaseb Ahmed Mehaseb, Yasser Gadallah, Hadia M. El-Hennawy:
WSN Application Traffic Characterization for Integration within the Internet of Things. MSN 2013: 318-323 - 2012
- [j4]Issa M. Khalil, Yasser Gadallah, Mohammad Hayajneh, Abdallah Khreishah:
An Adaptive OFDMA-Based MAC Protocol for Underwater Acoustic Wireless Sensor Networks. Sensors 12(7): 8782-8805 (2012) - [j3]Mohammad Hayajneh, Yasser Gadallah:
DCLRRA: Distributed cross-layer routing and resource allocation techniques for OFDMA-based broadband wireless networks. Wirel. Commun. Mob. Comput. 12(11): 943-955 (2012) - 2011
- [c9]Yasser Gadallah, Mohamed Adel Serhani:
A WSN-driven service discovery technique for disaster recovery using mobile ad hoc networks. Wireless Days 2011: 1-5 - 2010
- [j2]Yasser Gadallah, Mohamed Adel Serhani, Nader Mohamed:
Middleware support for service discovery in special operations mobile ad hoc networks. J. Netw. Comput. Appl. 33(5): 611-619 (2010) - [c8]Mohamed Adel Serhani, Yasser Gadallah:
A Service Discovery Protocol for Emergency Response Operations Using Mobile Ad Hoc Networks. AICT 2010: 280-285 - [c7]Ezedin E. Barka, Yasser Gadallah:
A role-based protocol for secure multicast communications in mobile ad hoc networks. IWCMC 2010: 701-705 - [c6]Yasser Gadallah, Mariam Jaafari:
A Reliable Energy-Efficient 802.15.4-Based MAC Protocol for Wireless Sensor Networks. WCNC 2010: 1-6
2000 – 2009
- 2009
- [c5]Mohammad Hayajneh, Issa Khalil, Yasser Gadallah:
An OFDMA-based MAC protocol for under water acoustic wireless sensor networks. IWCMC 2009: 810-814 - 2008
- [c4]Mohammad Hayajneh, Yasser Gadallah:
Throughput Analysis of WiMAX Based Wireless Networks. WCNC 2008: 1997-2002 - 2006
- [j1]Yasser Gadallah, Thomas Kunz:
A protocol independent energy saving technique for mobile ad hoc networks. Int. J. High Perform. Comput. Netw. 4(1/2): 39-50 (2006) - [c3]Yasser Gadallah:
A Comparative Study of Routing Strategies for Wireless Sensor Networks: Are MANET Protocols Good Fit?. ADHOC-NOW 2006: 5-18 - [c2]Yasser Gadallah, Thomas Kunz:
An Evaluation Study of a Fair Energy-Efficient Technique for Mobile Ad Hoc Networks. WiMob 2006: 77-84 - 2004
- [c1]Yasser Gadallah, Thomas Kunz:
PIES: Protocol Independent Energy Saving Algorithm. ICPP Workshops 2004: 4-12
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint