Research explorer tool

35 results

Wireless Body Area Network (WBAN): A Survey on Reliability, Fault Tolerance, and Technologies Coexistence

Journal Article
Salayma, M., Al-Dubai, A., Romdhani, I., & Nasser, Y. (2017)
Wireless Body Area Network (WBAN): A Survey on Reliability, Fault Tolerance, and Technologies Coexistence. ACM computing surveys, 50(1), 1-38. https://doi.org/10.1145/3041956
Wireless Body Area Network (WBAN) has been a key element in e-health to monitor bodies. This technology enables new applications under the umbrella of different domains, inclu...

Password Pattern and Vulnerability Analysis for Web and Mobile Applications

Journal Article
Li, S., Romdhani, I., & Buchanan, W. (2016)
Password Pattern and Vulnerability Analysis for Web and Mobile Applications. ZTE Communications, 14, 32-36. https://doi.org/10.3969/j.issn.1673-5188.2016.S0.006
Text⁃based passwords are heavily used to defense for many web and mobile applications. In this paper, we investigated the patterns and vulnerabilities for both web and mobile ...

Lightweighted and energy-aware MIKEY-Ticket for e-health applications in the context of internet of things

Journal Article
Abdmeziem, M. R., Tandjaoui, D., & Romdhani, I. (2018)
Lightweighted and energy-aware MIKEY-Ticket for e-health applications in the context of internet of things. International Journal of Sensor Networks, 26(4), 227. https://doi.org/10.1504/ijsnet.2018.090462
E-health applications have emerged as a promising approach to provide unobtrusive and customizable support to elderly and frail people based on their situation and circumstanc...

Level Crossing Rate of Ratio of Product of Two k-u Random Variables and Nakagami-m Random Variable

Conference Proceeding
Krstie, D., Romdhani, I., Yassein, M. M. B., Minić, S., Petković, G., & Milacic, P. (2015)
Level Crossing Rate of Ratio of Product of Two k-u Random Variables and Nakagami-m Random Variable. In 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, (1620-1625). https://doi.org/10.1109/cit/iucc/dasc/picom.2015.244
In this paper, ratio of product of two k-μ random variables and Nakagami-m random variable is analyzed. Statistical characteristics of ratio of product of two k-μ random varia...

Addressing the DAO Insider Attack in RPL’s Internet of Things Networks

Journal Article
Ghaleb, B., Al-Dubai, A., Ekonomou, E., Qasem, M., Romdhani, I., & Mackenzie, L. (2018)
Addressing the DAO Insider Attack in RPL’s Internet of Things Networks. IEEE Communications Letters, 23(1), 68-71. https://doi.org/10.1109/LCOMM.2018.2878151
In RPL routing protocol, the DAO (Destination Advertisement Object) control messages are announced by the child nodes to their parents to build downward routes. A malicious in...

Reliability and Energy Efficiency Enhancement for Emergency-Aware Wireless Body Area Networks (WBAN)

Journal Article
Salayma, M., Al-Dubai, A., Romdhani, I., & Nasser, Y. (2018)
Reliability and Energy Efficiency Enhancement for Emergency-Aware Wireless Body Area Networks (WBAN). IEEE Transactions on Green Communications and Networking, 1-1. https://doi.org/10.1109/tgcn.2018.2813060
Medium Access Control (MAC) protocols based on Time Division Multiple Access (TDMA) can improve the reliability and efficiency of WBAN. However, traditional static TDMA techni...

Cross-Layer Multipath Multichannel MAC protocol for MANETs

Conference Proceeding
Mirza, N., Taylor, H., Abdelshafy, M., King, P., Romdhani, I., & Alghamdi, A. (2018)
Cross-Layer Multipath Multichannel MAC protocol for MANETs. In Proceedings of the International Symposium on Networks, Computers and Communications (ISNCC)https://doi.org/10.1109/ISNCC.2018.8530886
Utilising multiple disjoint paths in multiple channels can improve network performance by enabling a node to reroute data along discovered paths seamlessly when link failure i...

Experimental investigation of link layer adaptation in IEEE 802.11n WLANs

Conference Proceeding
Al-Adhami, M., Al-Dubai, A. Y., & Romdhani, I. (2012)
Experimental investigation of link layer adaptation in IEEE 802.11n WLANs. In 11th IEEE International Wireless Telecommunications Symposium, 1-7. https://doi.org/10.1109/wts.2012.6266144
Due to its low cost wireless communication methodology and improvements in both its physical (PHY) and MAC (Link) layers, the IEEE 802.11n wireless LAN (WLAN) technology has b...

An agility-oriented and fuzziness-embedded semantic model for collaborative cloud service search, retrieval and recommendation

Journal Article
Fang, D., Liu, X., Romdhani, I., Jamshidi, P., & Pahl, C. (2016)
An agility-oriented and fuzziness-embedded semantic model for collaborative cloud service search, retrieval and recommendation. Future Generation Computer Systems, 56, 11-26. https://doi.org/10.1016/j.future.2015.09.025
Cloud computing enables a revolutionary paradigm of consuming ICT services. However, due to the inadequately described service information, users often feel confused while try...

An approach to unified cloud service access, manipulation and dynamic orchestration via semantic cloud service operation specification framework

Journal Article
Fang, D., Liu, X., Romdhani, I., & Pahl, C. (2015)
An approach to unified cloud service access, manipulation and dynamic orchestration via semantic cloud service operation specification framework. Journal of cloud computing advances, systems and applications, 4(1), https://doi.org/10.1186/s13677-015-0039-3
Cloud computing offers various computational resources via convenient on-demand service provision. Currently, heterogeneous services and cloud resources are usually utilized a...