An Inter-channel and Intra-channel Dynamic Wavelength/Bandwidth Allocation Algorithm for Integrated Hybrid PON with Wireless Technologies for Next Generation Broadband Access Networks
Moradpoor, N., Parr, G., Mcclean, S., & Scotney, B. (2013)
An Inter-channel and Intra-channel Dynamic Wavelength/Bandwidth Allocation Algorithm for Integrated Hybrid PON with Wireless Technologies for Next Generation Broadband Access Networks. In AFIN 2013, 9-14
Optical and wireless technology integration schemes merge the high-speed and high-capacity of the optical networks with the low-cost, wide-coverage and mobility features of wi...
10Gbit/s mode-multiplexed QPSK transmission using MDM-to-MFDM based single coherent receiver for intra- and inter data center networking
Asif, R., & Haithem, M. (2017)
10Gbit/s mode-multiplexed QPSK transmission using MDM-to-MFDM based single coherent receiver for intra- and inter data center networking. Optics Communications, 391, 106-110. https://doi.org/10.1016/j.optcom.2017.01.022
Generalized few-mode-fiber (FMF) transmission uses N coherent receivers for mode detection, where N scales with the number of fiber modes. Multiple coherent receivers increase...
A new dynamic counter-based broadcasting scheme for mobile ad hoc networks.
Yassein, M. B., Nimer, S. F., & Al-Dubai, A. (2011)
A new dynamic counter-based broadcasting scheme for mobile ad hoc networks. Simulation Modelling Practice and Theory, 19, 553-563. https://doi.org/10.1016/j.simpat.2010.08.011
Broadcasting is an essential operation in Mobile Ad hoc Networks (MANETs) to transmit a message (data packet) from the sender to the rest of the network nodes. Although floodi...
Coopetitive architecture to support a dynamic and scalable NFC based mobile services architecture.
Akram, R. N., Markantonakis, K., & Mayes, K. (2012)
Coopetitive architecture to support a dynamic and scalable NFC based mobile services architecture. In K. P. Chow, & L. Hui (Eds.), Information and Communications Security: 14th International Conference, ICICS 2012, Proceedings, 214-227. https://doi.org/10.1007/978-3-642-34129-8_19
Near Field Communication (NFC) has reinvigorated the multi-application smart card initiative. The NFC trials are relying on an extension of Issuer Centric Smart Card Model (IC...
Battery Aware Beacon Enabled IEEE802.15.4: An Adaptive and Cross-Layer Approach
Salayma, M., Al-Dubai, A., Romdhani, I., & Yassein, M. B. (2015)
Battery Aware Beacon Enabled IEEE802.15.4: An Adaptive and Cross-Layer Approach. In M. Ganzha, L. Maciaszek, & M. Paprzycki (Eds.), Proceedings of the 2015 Federated Conference on Computer Science and Information Systems, (1267-1272). https://doi.org/10.15439/2015F118
In Wireless Sensor Networks (WSNs), energy conservation is one of the main concerns challenging the cutting-edge standards and protocols. Most existing studies focus on the de...
Mobile IP conditional binding update.
Romdhani, I., & Al-Dubai, A. (2007)
Mobile IP conditional binding update. In 1st IEEE Workshop on Autonomic Communication and Network Management ACNM-2007, 10th IFIP/IEEE Symposium on Integrated Management, 64-70
Mobile IP protocols use a correspondent registration procedure between a Mobile Node (MN) and its Correspondent Nodes (CNs) to maintain a valid and up-to-date binding associat...
Migration of mobile agents in ad-hoc wireless networks.
Migas, N., Buchanan, W. J., & McArtney, K. (2004)
Migration of mobile agents in ad-hoc wireless networks. In Proceeding of the 11th IEEE International Conference and Workshop on the Engineering of Computer-based systems, 530-535. https://doi.org/10.1109/ECBS.2004.1316743
This paper focuses on the design and development of a novel architecture called MARIAN, which utilises static agents, mobile agents, and also a hybrid approach, in order to pe...
Many-to-Many embedded multicast addressing and access control method.
Romdhani, I. (2011)
Many-to-Many embedded multicast addressing and access control method
A new addressing scheme for multicast IP with an extended scope field to include access rights. A new addressing scheme for multicast communications is disclosed. A new extend...
Protecting mobile agents from external replay attacks
Garrigues, C., Migas, N., Buchanan, W., Robles, S., & Borrell, J. (2009)
Protecting mobile agents from external replay attacks. Journal of Systems and Software, 82(2), 197-206. https://doi.org/10.1016/j.jss.2008.05.018
This paper presents a protocol for the protection of mobile agents against external replay attacks. This kind of attacks are performed by malicious platforms when dispatching ...
The VoIP intrusion detection through a LVQ-based neural network.
Presentation / Conference
Zheng, L., & Peng, T. (2009, November)
The VoIP intrusion detection through a LVQ-based neural network. Paper presented at The 4th International Conference for Internet Technology and Secured Transactions, London, UK
Being a fast-growing Internet application, Voice over Internet Protocol shares the network resources with the regular Internet traffic. However it is susceptible to the existi...