Prof. Nidal Nasser

Professor of Software Engineering

Bio

Add
Dr. Nidal Nasser Bio
Dr. Nidal Nasser, SMIEEE, received his B.Sc. and M.Sc. degrees with Honors in Computer Engineering from Kuwait University, State of Kuwait, in 1996 and 1999, respectively. He completed his Ph.D. in the School of Computing at Queen’s University, Kingston, Ontario, Canada, in 2004. He is currently a Professor of Software Engineering in the College of Engineering at Alfaisal University, Saudi Arabia. He worked in the School of Computer Science at University of Guelph, Guelph, Ontario, Canada. Dr. Nasser was the founder and Director of the Wireless Networking and Mobile Computing Research Lab @ Guelph. He is currently the founder and Director of the Telecommunications Computing Research Lab @ Alfaisal University. He has authored 180 journal publications, refereed conference publications and book chapters in the area of wireless communication networks and systems (Google Scholar profile: http://scholar.google.com/citations?hl=en&user=6mZsWFQAAAAJ). He has also given keynote speeches and tutorials in major international conferences. Dr. Nasser is currently serving as an associate editor of IEEE Wireless Communications Magazine, Wiley’s International Journal on Communication Systems, and IEEE CommSoft E-letter. He has been a member of the technical program and organizing committees of several international IEEE conferences and workshops. Dr. Nasser is a member of several IEEE technical committees. He received Fund for Scholarly and Professional Development Award in 2004 from Queen’s University. He received the Computing Faculty Appreciation Award from the University of Guelph-Humber. He received the Best Research Paper Award at the ACS/IEEE International Conference on Computer Systems and Applications (AICCSA’08), at the International Wireless Communications and Mobile Computing Conference (IWCMC’09), at the International Wireless Communications and Mobile Computing Conference (IWCMC’11), at the International Conference on Computing, Management and Telecommunications (ComManTel’13), and at the IEEE International Conference on Communications (ICC’14). In 2017 he received two awards from IBM: (1) IBM Mobile Application Developer Explorer Award, and (2) IBM Big Data Developer Mastery Award. He received the IBM Data Scientist - Instructor Award for Educators in 2018. He also received the IBM Blockchain Developer Mastery Award in 2019.

CV

Publications

Add

Centralized SON function for operator optimal strategies in heterogeneous networks

Journal Article ,
Centralized SON function for operator optimal strategies in heterogeneous networks. (2017). Centralized SON function for operator optimal strategies in heterogeneous networks. Computer Networks 128, 14-27, 2017.

Measuring the validity of sensing coverage in the presence of anchor misplacement

Journal Article ,
Measuring the validity of sensing coverage in the presence of anchor misplacement. (2017). Measuring the validity of sensing coverage in the presence of anchor misplacement. 2017 Ieee International Conference On Communications (Icc), 1-6, 2017.

Rabbi Elisha ben Abuyah at the Mind's Limit: Between Theodicy and Fate

Journal Article ,
Rabbi Elisha ben Abuyah at the Mind's Limit: Between Theodicy and Fate. (2016). Rabbi Elisha ben Abuyah at the Mind's Limit: Between Theodicy and Fate. Rabbi Elisha Ben Abuyah At The Mind's Limit: Between Theodicy And Fate.

Performance analysis for the QoS support in LTE and WiFi

Journal Article ,
Performance analysis for the QoS support in LTE and WiFi. (2016). Performance analysis for the QoS support in LTE and WiFi. 2016 Ieee Wireless Communications And Networking Conference, 1-7, 2016.

Empowering networking research and experimentation through Software-Defined Networking

Journal Article ,
Empowering networking research and experimentation through Software-Defined Networking. (2016). Empowering networking research and experimentation through Software-Defined Networking. Journal Of Network And Computer Applications 70, 140-155, 2016.

A novel coalitional structure generation algorithm for interference mitigation in small cell networks

Journal Article ,
A novel coalitional structure generation algorithm for interference mitigation in small cell networks. (2016). A novel coalitional structure generation algorithm for interference mitigation in small cell networks. 2016 Ieee Global Communications Conference (Globecom), 1-4, 2016.

Performance analysis of decode and forward relaying over Generalized-K channels at arbitrary SNR for wireless sensor networks

Journal Article ,
Performance analysis of decode and forward relaying over Generalized-K channels at arbitrary SNR for wireless sensor networks. (2016). Performance analysis of decode and forward relaying over Generalized-K channels at arbitrary SNR for wireless sensor networks. 2016 International Wireless Communications And Mobile Computing Conference …, 2016.

Quality of service interworking over heterogeneous networks in 5G

Journal Article ,
Quality of service interworking over heterogeneous networks in 5G. (2016). Quality of service interworking over heterogeneous networks in 5G. 2016 Ieee International Conference On Communications (Icc), 1-6, 2016.

The impact of anchor misplacement on sensing coverage

Journal Article ,
The impact of anchor misplacement on sensing coverage. (2016). The impact of anchor misplacement on sensing coverage. 2016 Ieee Wireless Communications And Networking Conference, 1-7, 2016.

Performance evaluation for LTE applications with buffer awareness consideration

Journal Article ,
Performance evaluation for LTE applications with buffer awareness consideration. (2016). Performance evaluation for LTE applications with buffer awareness consideration. 2016 Ieee Wireless Communications And Networking Conference, 1-7, 2016.

An identification and prevention of theft-of-service attack on cloud computing

Journal Article ,
An identification and prevention of theft-of-service attack on cloud computing. (2016). An identification and prevention of theft-of-service attack on cloud computing. 2016 International Conference On Selected Topics In Mobile & Wireless …, 2016.

Optimization of power and migration cost in virtualized data centers

Journal Article ,
Optimization of power and migration cost in virtualized data centers. (2016). Optimization of power and migration cost in virtualized data centers. 2016 Ieee Wireless Communications And Networking Conference, 1-5, 2016.

An adaptive auto-tuning scheme based mobility in 4G and beyond networks

Journal Article ,
An adaptive auto-tuning scheme based mobility in 4G and beyond networks. (2015). An adaptive auto-tuning scheme based mobility in 4G and beyond networks. 2015 International Conference On Electrical And Information Technologies …, 2015.

The role of heat shock proteins 70 (HSP70) family in infection and in immunity.

Journal Article ,
The role of heat shock proteins 70 (HSP70) family in infection and in immunity. (2015). The role of heat shock proteins 70 (HSP70) family in infection and in immunity. In: Heat Shock Proteins. Alexzander A.a. Asea And Bente K. Pedersen, Editors. Springer Dordrecht, Heidelberg, London, New York.

A novel cross-layer adaptation and QoS optimization in LTE-A and beyond networks

Journal Article ,
A novel cross-layer adaptation and QoS optimization in LTE-A and beyond networks. (2015). A novel cross-layer adaptation and QoS optimization in LTE-A and beyond networks. 2015 Ieee Wireless Communications And Networking Conference (Wcnc), 1018-1023, 2015.

Message from the ComManTel 2015 Chairs

Journal Article ,
Message from the ComManTel 2015 Chairs. (2015). Message from the ComManTel 2015 Chairs. Proceeding Of 2015 International Conference On Computing, Management And …, 2015.

Optimized bandwidth allocation in broadband wireless access networks

Journal Article ,
Optimized bandwidth allocation in broadband wireless access networks. (2015). Optimized bandwidth allocation in broadband wireless access networks. Wireless Communications And Mobile Computing 15 (17), 2111-2124, 2015, 15, 2111–2124.

Utilizing CAN-Bus and smartphones to enforce safe and responsible driving

Journal Article ,
Utilizing CAN-Bus and smartphones to enforce safe and responsible driving. (2015). Utilizing CAN-Bus and smartphones to enforce safe and responsible driving. 2015 Ieee Symposium On Computers And Communication (Iscc), 111-115, 2015.

Identifying bounds on sensing coverage holes in IoT deployments

Journal Article ,
Identifying bounds on sensing coverage holes in IoT deployments. (2015). Identifying bounds on sensing coverage holes in IoT deployments. 2015 Ieee Global Communications Conference (Globecom), 1-6, 2015.

Case series of extra pulmonary tuberculosis presenting as facial swelling

Journal Article ,
Case series of extra pulmonary tuberculosis presenting as facial swelling. (2015). Case series of extra pulmonary tuberculosis presenting as facial swelling. British Dental Journal 218 (9), 519-522, 2015.

Range-free localization approach for M2M communication system using mobile anchor nodes

Journal Article ,
Range-free localization approach for M2M communication system using mobile anchor nodes. (2015). Range-free localization approach for M2M communication system using mobile anchor nodes. Journal Of Network And Computer Applications 47, 137-146, 2015.

SLA-based optimization of energy efficiency for green cloud computing

Journal Article ,
SLA-based optimization of energy efficiency for green cloud computing. (2015). SLA-based optimization of energy efficiency for green cloud computing. 2015 Ieee Global Communications Conference (Globecom), 1-6, 2015.

Mitigating anchor misplacement errors in wireless sensor networks

Journal Article ,
Mitigating anchor misplacement errors in wireless sensor networks. (2015). Mitigating anchor misplacement errors in wireless sensor networks. 2015 International Wireless Communications And Mobile Computing Conference …, 2015.

The role of hierarchical entropy analysis in the detection and time-scale determination of covert timing channels

Journal Article ,
The role of hierarchical entropy analysis in the detection and time-scale determination of covert timing channels. (2015). The role of hierarchical entropy analysis in the detection and time-scale determination of covert timing channels. 2015 International Wireless Communications And Mobile Computing Conference …, 2015.

A novel resource allocation scheme for LTE network in the presence of mobility

Journal Article ,
A novel resource allocation scheme for LTE network in the presence of mobility. (2014). A novel resource allocation scheme for LTE network in the presence of mobility. Journal Of Network And Computer Applications 46, 352-361, 2014.

A fault-tolerant energy-efficient clustering protocol of a wireless sensor network

Journal Article ,
A fault-tolerant energy-efficient clustering protocol of a wireless sensor network. (2014). A fault-tolerant energy-efficient clustering protocol of a wireless sensor network. Wireless Communications And Mobile Computing, 14, 175–185.

Wireless sensor network-based air quality monitoring system

Journal Article ,
Wireless sensor network-based air quality monitoring system. (2014). Wireless sensor network-based air quality monitoring system. 2014 International Conference On Computing, Networking And Communications …, 2014.

Fault tolerant, energy efficient and secure clustering scheme for mobile machine-to-machine communications

Journal Article ,
Fault tolerant, energy efficient and secure clustering scheme for mobile machine-to-machine communications. (2014). Fault tolerant, energy efficient and secure clustering scheme for mobile machine-to-machine communications. Transactions On Emerging Telecommunications Technologies.

Fault tolerant, energy efficient and secure clustering scheme for mobile machine‐to‐machine communications

Journal Article ,
Fault tolerant, energy efficient and secure clustering scheme for mobile machine‐to‐machine communications. (2014). Fault tolerant, energy efficient and secure clustering scheme for mobile machine‐to‐machine communications. Transactions On Emerging Telecommunications Technologies 25 (10), 1028-1044, 2014.

Mitigating cross-network interference in cognitive spectrum sharing with opportunistic relaying

Journal Article ,
Mitigating cross-network interference in cognitive spectrum sharing with opportunistic relaying. (2014). Mitigating cross-network interference in cognitive spectrum sharing with opportunistic relaying. 2014 Ieee International Conference On Communications (Icc), 1561-1566, 2014.

An integrated framework for wireless sensor network management

Journal Article ,
An integrated framework for wireless sensor network management. (2014). An integrated framework for wireless sensor network management. Wireless Communications And Mobile Computing 14 (12), 1143-1159, 2014.

International workshop on distributed mobile systems & services (DMSS 2014)

Journal Article ,
International workshop on distributed mobile systems & services (DMSS 2014). (2014). International workshop on distributed mobile systems & services (DMSS 2014). Proceedings-International Symposium On Computers And Communications, 6912642, 2014.

Message from the ComManTel 2014 Chairs

Journal Article ,
Message from the ComManTel 2014 Chairs. (2014). Message from the ComManTel 2014 Chairs. 2014 International Conference On Computing, Management And …, 2014.

A fault‐tolerant energy‐efficient clustering protocol of a wireless sensor network

Journal Article ,
A fault‐tolerant energy‐efficient clustering protocol of a wireless sensor network. (2014). A fault‐tolerant energy‐efficient clustering protocol of a wireless sensor network. Wireless Communications And Mobile Computing 14 (2), 175-185, 2014.

Packet delivery significance and metrics improvements in protocols for 3-D routing in Wireless Sensor Networks

Journal Article ,
Packet delivery significance and metrics improvements in protocols for 3-D routing in Wireless Sensor Networks. (2014). Packet delivery significance and metrics improvements in protocols for 3-D routing in Wireless Sensor Networks. 2014 International Wireless Communications And Mobile Computing Conference …, 2014.

Multiple Base station and Packet Priority-based clustering scheme in Internet of Things

Journal Article ,
Multiple Base station and Packet Priority-based clustering scheme in Internet of Things. (2014). Multiple Base station and Packet Priority-based clustering scheme in Internet of Things. 2014 International Conference On Computing, Management And …, 2014.

Dynamic multilevel priority packet scheduling scheme for wireless sensor network

Journal Article ,
Dynamic multilevel priority packet scheduling scheme for wireless sensor network. (2013). Dynamic multilevel priority packet scheduling scheme for wireless sensor network. Ieee Transactions On Wireless Communications 12 (4), 1448-1459, 2013, 12, 1448–1459.

Performance analysis of decode and forward cooperative relaying over the generalized-K channel

Journal Article ,
Performance analysis of decode and forward cooperative relaying over the generalized-K channel. (2013). Performance analysis of decode and forward cooperative relaying over the generalized-K channel. Scientific Research Publishing, 2013.

Distributed medium access control with conditionally altruistic users

Journal Article ,
Distributed medium access control with conditionally altruistic users. (2013). Distributed medium access control with conditionally altruistic users. Eurasip Journal On Wireless Communications And Networking, 2013, 1–12.

Admission control strategies and QoS evaluation based on mobility in LTE

Journal Article ,
Admission control strategies and QoS evaluation based on mobility in LTE. (2013). Admission control strategies and QoS evaluation based on mobility in LTE. 2013 Ieee Global Communications Conference (Globecom), 4883-4888, 2013.

Sensor-based M2M Agriculture Monitoring Systems for Developing Countries: State and Challenges.

Journal Article ,
Sensor-based M2M Agriculture Monitoring Systems for Developing Countries: State and Challenges. (2013). Sensor-based M2M Agriculture Monitoring Systems for Developing Countries: State and Challenges. Netw. Protoc. Algorithms 5 (3), 68-86, 2013.

Heuristic based dynamic spectrum assignment in cognitive radio network

Journal Article ,
Heuristic based dynamic spectrum assignment in cognitive radio network. (2013). Heuristic based dynamic spectrum assignment in cognitive radio network. 2013 International Conference On Computing, Management And …, 2013.

Zone-based routing protocol with mobility consideration for wireless sensor networks

Journal Article ,
Zone-based routing protocol with mobility consideration for wireless sensor networks. (2013). Zone-based routing protocol with mobility consideration for wireless sensor networks. Telecommunication Systems 52 (4), 2541-2560, 2013, 1–20.

Mobility-centric energy efficient and fault tolerant clustering protocol of wireless sensor network

Journal Article ,
Mobility-centric energy efficient and fault tolerant clustering protocol of wireless sensor network. (2013). Mobility-centric energy efficient and fault tolerant clustering protocol of wireless sensor network. 2013 Ieee International Conference On Communications (Icc), 1479-1484, 2013.

Efficient routing for wireless mesh networks using a backup path

Journal Article ,
Efficient routing for wireless mesh networks using a backup path. (2013). Efficient routing for wireless mesh networks using a backup path. International Journal Of Communication Systems 26 (12), 1520-1542, 2013.

Message from the ComManTel 2013 chairs

Journal Article ,
Message from the ComManTel 2013 chairs. (2013). Message from the ComManTel 2013 chairs. 2013 International Conference On Computing, Management And …, 2013.

Zone-based routing protocol with mobility consideration for wireless sensor networks

Journal Article ,
Zone-based routing protocol with mobility consideration for wireless sensor networks. (2013). Zone-based routing protocol with mobility consideration for wireless sensor networks. Telecommunication Systems, 52, 2541–2560.

Performance Analysis of Decode and Forward Cooperative Relaying over the Generalized-K Channel.

Journal Article ,
Performance Analysis of Decode and Forward Cooperative Relaying over the Generalized-K Channel. (2013). Performance Analysis of Decode and Forward Cooperative Relaying over the Generalized-K Channel. Wireless Engineering & Technology, 4.

LOCALIZATION IN LARGE-SCALE WIRELESS SENSOR NETWORKS

Journal Article ,
LOCALIZATION IN LARGE-SCALE WIRELESS SENSOR NETWORKS. (2013). LOCALIZATION IN LARGE-SCALE WIRELESS SENSOR NETWORKS.

An energy efficient, fault tolerant and secure clustering scheme for M2M communication networks

Journal Article ,
An energy efficient, fault tolerant and secure clustering scheme for M2M communication networks. (2013). An energy efficient, fault tolerant and secure clustering scheme for M2M communication networks. 2013 Ieee Globecom Workshops (Gc Wkshps), 677-682, 2013.

Calendar

Add
No Event Found

Announcements

Add
No Announcement Found

Classes

Add