Research explorer tool

5 results

Inspired counter based broadcasting in dynamic source routing protocol.

Presentation / Conference
Yassein, M. B., & Al-Dubai, A. (2015, October)
Inspired counter based broadcasting in dynamic source routing protocol. Paper presented at 14th IEEE International Conference on Ubiquitous Computing and Communications (IUCC-2015), Liverpool, UUK
The broadcast storm problem is one of the most challenging issues in Mobile ad Hoc Networks (MANETs). However, it is still a challenging problem despite the great deal of rela...

Performance evaluation of RPL objective functions.

Presentation / Conference
Altwassi, H., Qasem, M., Yassein, M. B., & Al-Dubai, A. (2015, October)
Performance evaluation of RPL objective functions. Paper presented at International Workshop on Internet of Things and Smart Spaces (IoT-Smart-2015): Applications, Challenges and Future Trends in conjunction with the 14th IEEE International Conference on Ubiquitous Computing and Communications (IUCC 2015), Liverpool, UK
IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) is a standard for Wireless Sensors Networks. RPL uses two different ‘objective functions’ (OFs), namely Minimum Ra...

A load-balancing cluster based protocol for Wireless Sensor Networks.

Presentation / Conference
Eshaftri, M., Al-Dubai, A., Romdhani, I., & Yassien, M. B. (2015, September)
A load-balancing cluster based protocol for Wireless Sensor Networks. Paper presented at 4th International Conference on Wireless Sensor Networks (WSN'15), Lodz, Poland

Reliable Hierarchical Cluster Routing Protocol for Wireless Sensor Networks.

Presentation / Conference
Eshaftri, M., Essa, A., Qasem, M., Romdhani, I., & Al-Dubai, A. (2014, June)
Reliable Hierarchical Cluster Routing Protocol for Wireless Sensor Networks. Paper presented at International Conference on Networking, Distributed Systems and Applications : INDS 2014
Wireless sensor networks (WSNs) have recently become an integral part of a wide range of systems such as surveillance, target tracking, security and health management sy...

The VoIP intrusion detection through a LVQ-based neural network.

Presentation / Conference
Zheng, L., & Peng, T. (2009, November)
The VoIP intrusion detection through a LVQ-based neural network. Paper presented at The 4th International Conference for Internet Technology and Secured Transactions, London, UK
Being a fast-growing Internet application, Voice over Internet Protocol shares the network resources with the regular Internet traffic. However it is susceptible to the existi...