Research explorer tool

11 results

Date


School

Download Available

196 results

Tradeoffs between latency, complexity and load balancing with multicast algorithms

Journal Article
Al-Dubai, A., Ould-Khaoua, M., & Mackenzie, L. (2010)
Tradeoffs between latency, complexity and load balancing with multicast algorithms. IEEE Transactions on Computers, 59, 159-173. https://doi.org/10.1109/TC.2009.104
The increasing number of collective communication-based services with a mass interest and the parallel increasing demand for service quality are paving the way toward end-to-e...

Novel QoS-Aware Gateway Centralized Multi-hop Routing for Wireless Mesh Networks

Conference Proceeding
Zhao, L., Al-Dubai, A. Y., & Romdhani, I. (2010)
Novel QoS-Aware Gateway Centralized Multi-hop Routing for Wireless Mesh Networks. In 2010 IEEE 10th International Conference on Computer and Information Technology (CIT),, (336-342). https://doi.org/10.1109/cit.2010.500
Wireless Mesh Networking (WMN) emerges as a new technology to reshape the broadband industry towards a more efficient and cost effective connectivity. The WMN has been the ide...

New efficient velocity-aware probabilistic route discovery schemes for high mobility Ad hoc networks

Journal Article
Bani Khalaf, M., Al-Dubai, A. Y., & Min, G. (2015)
New efficient velocity-aware probabilistic route discovery schemes for high mobility Ad hoc networks. Journal of Computer and System Sciences, 81(1), 97-109. doi:10.1016/j.jcss.2014.06.014
Most existing route discovery schemes in MANETs are based on probabilistic models by which MANETs usually deploy broadcast mechanisms to discover routes between nodes. This is...

Password Pattern and Vulnerability Analysis for Web and Mobile Applications

Journal Article
Li, S., Romdhani, I., & Buchanan, W. (2016)
Password Pattern and Vulnerability Analysis for Web and Mobile Applications. ZTE Communications, 14, 32-36. https://doi.org/10.3969/j.issn.1673-5188.2016.S0.006
Text⁃based passwords are heavily used to defense for many web and mobile applications. In this paper, we investigated the patterns and vulnerabilities for both web and mobile ...

Performance Evaluation of the RPL Protocol in Fixed and Mobile Sink Low-Power and Lossy-Networks

Conference Proceeding
Wadhaj, I., Kristof, I., Romdhani, I., & Al-Dubai, A. (2015)
Performance Evaluation of the RPL Protocol in Fixed and Mobile Sink Low-Power and Lossy-Networks. In Proceedings of the 14th IEEE International Conference on Ubiquitous Computing and Communications (IUCC 2015), (1600-1605). https://doi.org/10.1109/cit/iucc/dasc/picom.2015.241
Low-Power and Lossy-Network (LLN) are usually composed of static nodes, but the increase demand for mobility in mobile robotic and dynamic environment raises the question how ...

Performance modelling and optimazation of integrated wireless LANs and multi-hop Mesh networks

Journal Article
Min, G., Wu, Y., Li, K., & Al-Dubai, A. (2009)
Performance modelling and optimazation of integrated wireless LANs and multi-hop Mesh networks. International Journal of Communication Systems, 23, 1111-1126. https://doi.org/10.1002/dac.1074
The increasing demand for the coverage of high-speed wireless local area networks (WLANs) is driving the installation of a very large number of access points (APs). Wireless m...

Lightweighted and energy-aware MIKEY-Ticket for e-health applications in the context of internet of things

Journal Article
Abdmeziem, M. R., Tandjaoui, D., & Romdhani, I. (2018)
Lightweighted and energy-aware MIKEY-Ticket for e-health applications in the context of internet of things. International Journal of Sensor Networks, 26(4), 227. https://doi.org/10.1504/ijsnet.2018.090462
E-health applications have emerged as a promising approach to provide unobtrusive and customizable support to elderly and frail people based on their situation and circumstanc...

Level Crossing Rate of Ratio of Product of Two k-u Random Variables and Nakagami-m Random Variable

Conference Proceeding
Krstie, D., Romdhani, I., Yassein, M. M. B., Minić, S., Petković, G., & Milacic, P. (2015)
Level Crossing Rate of Ratio of Product of Two k-u Random Variables and Nakagami-m Random Variable. In 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, (1620-1625). https://doi.org/10.1109/cit/iucc/dasc/picom.2015.244
In this paper, ratio of product of two k-μ random variables and Nakagami-m random variable is analyzed. Statistical characteristics of ratio of product of two k-μ random varia...

Reliable Hierarchical Cluster Routing Protocol for Wireless Sensor Networks.

Presentation / Conference
Eshaftri, M., Essa, A., Qasem, M., Romdhani, I., & Al-Dubai, A. (2014, June)
Reliable Hierarchical Cluster Routing Protocol for Wireless Sensor Networks. Paper presented at International Conference on Networking, Distributed Systems and Applications : INDS 2014
Wireless sensor networks (WSNs) have recently become an integral part of a wide range of systems such as surveillance, target tracking, security and health management sy...

A Lightweight and Efficient Digital Image Encryption Using Hybrid Chaotic Systems for Wireless Network Applications

Journal Article
Almalkawi, I. T., Halloush, . R., Alsarhan, A., Al-Dubai, A., & Al-karaki, J. N. (2019)
A Lightweight and Efficient Digital Image Encryption Using Hybrid Chaotic Systems for Wireless Network Applications. Journal of Information Security and Applications, 49, https://doi.org/10.1016/j.jisa.2019.102384
Due to limited processing capabilities and other constraints of most wireless networks, many existing security algorithms do not consider the network efficiency. This is becau...
6 results

Building new research partnerships with the Qatari Institutions

2012 - 2012
This short research visit aims at building research collaborative links with the Texas A & M University at Qatar and the University of Qatar
Funder: Carnegie Trust for the Universities of Scotland | Value: £1,700

IPv6 Business Case Demonstrators for Farrpoint

2013 - 2013
The development of interesting use cases for IPv6.
Funder: Scottish Funding Council | Value: £5,000

International Conference Grant

2009 - 2009
International Travel
Funder: Royal Society of Edinburgh | Value: £1,000

Reliable Internet of Things based monitoring & Surveillance in Oil & Gas Fields (RsIoT)

2015 - 2017
Wireless sensor networks (WSNs) and Internet of things are among the top potential new technologies that dramatically alter the world and the way we live and work. Indeed, in recent decades, the need ...
Value: £66,635

Trisent: Innovation Voucher for Personal Context Data Project

2018 - 2018
This is a small project to initiate an engagement following an unsuccessful application for a larger Data Lab project. Trisent’s core technology is called the Personal Context Management System (PCM...
Funder: Scottish Funding Council | Value: £5,000

Next Generation Trust Architecture

2018 - 2020
This work will provide proof-of-concept infrastructures and which will be used to create an ecosystem for strong use cases, and thus attract new funding for the building of new health and social care ...
Funder: Digital Health Institute | Value: £149,959