27 results

Trickle-Plus: Elastic Trickle algorithm for Low-power networks and Internet of Things

Conference Proceeding
Ghaleb, B., Al-Dubai, A., Ekonomou, E., Paechter, B., & Qasem, M. (2016)
Trickle-Plus: Elastic Trickle algorithm for Low-power networks and Internet of Things. In Wireless Communications and Networking Conference (WCNC), 2016 IEEE (1-6). https://doi.org/10.1109/WCNC.2016.7564654
Constrained Low-power and Lossy networks (LLNs) represent the building block for the ever-growing Internet of Things (IoT) that deploy the Routing Protocol for Low Power and L...

A new distributed MIKEY mode to secure e-health applications.

Conference Proceeding
Abdmeziem, M. R., Tandjaoui, D., & Romdhani, I. (2016)
A new distributed MIKEY mode to secure e-health applications. In V. Chang, V. Méndez Muñoz, R. Walters, G. Wills, & M. Ramachandran (Eds.), Proceedings of the International Conference on Internet of Things and Big Data, (88-95). https://doi.org/10.5220/0005945300880095
Securing e-health applications in the context of Internet of Things (IoT) is challenging. Indeed, resources scarcity in such environment hinders the implementation of existing...

E-Trickle: Enhanced Trickle Algorithm for Low-Power and Lossy Networks

Conference Proceeding
Ghaleb, B., Al-Dubai, A., & Ekonomou, E. (2015)
E-Trickle: Enhanced Trickle Algorithm for Low-Power and Lossy Networks. In 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM)https://doi.org/10.1109/cit/iucc/dasc/picom.2015.168
Routing Protocol for Low Power and Lossy networks (RPL) is the de-facto standard for routing in resource-constrained low-power and lossy networks (LLNs) which represent the bu...

Level Crossing Rate of Ratio of Product of Two k-u Random Variables and Nakagami-m Random Variable

Conference Proceeding
Krstie, D., Romdhani, I., Yassein, M. M. B., Minić, S., Petković, G., & Milacic, P. (2015)
Level Crossing Rate of Ratio of Product of Two k-u Random Variables and Nakagami-m Random Variable. In 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing, (1620-1625). https://doi.org/10.1109/cit/iucc/dasc/picom.2015.244
In this paper, ratio of product of two k-μ random variables and Nakagami-m random variable is analyzed. Statistical characteristics of ratio of product of two k-μ random varia...

Towards Designing an Email Classification System Using Multi-view Based Semi-supervised Learning

Conference Proceeding
Li, W., Meng, W., Tan, Z., & Xiang, Y. (2014)
Towards Designing an Email Classification System Using Multi-view Based Semi-supervised Learning. In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications,, (174-181). https://doi.org/10.1109/trustcom.2014.26
The goal of email classification is to classify user emails into spam and legitimate ones. Many supervised learning algorithms have been invented in this domain to accomplish ...

A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment

Conference Proceeding
Jan, M. A., Nanda, P., He, X., Tan, Z., & Liu, R. P. (2014)
A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment. In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, (205-211). https://doi.org/10.1109/trustcom.2014.31
The Internet of Things is a vision that broadens the scope of the internet by incorporating physical objects to identify themselves to the participating entities. This innovat...

New Velocity-Aware Probabilistic route discovery schemes for Mobile Ad hoc Networks.

Conference Proceeding
Bani Khalaf, M., Al-Dubai, A. & Abed, M. (2012)
New Velocity-Aware Probabilistic route discovery schemes for Mobile Ad hoc Networks. In IEEE 20th Int. Conference on Software, Telecommunications and Computer Networks-(SoftCOM 2012), 1-6. ISBN 978-1-4673-2710-7
In this paper, we investigate efficient strategies for supporting velocity aware probabilistic route discovery in Mobile Ad hoc Networks (MANETs). MANETs usually use broadcast...

A new efficient distributed route discovery for wireless mobile ad hoc networks.

Conference Proceeding
Bani Khalaf, M., Al-Dubai, A., & Buchanan, W. J. (2012)
A new efficient distributed route discovery for wireless mobile ad hoc networks. In Wireless Telecommunications Symposium (WTS), 2012, (1-6). https://doi.org/10.1109/WTS.2012.6266129
High performance group communication, such as broadcast, requires matching efficient broadcast algorithms to effective route discovery approach. Broadcast communication in MAN...

Experimental investigation of link layer adaptation in IEEE 802.11n WLANs

Conference Proceeding
Al-Adhami, M., Al-Dubai, A. Y., & Romdhani, I. (2012)
Experimental investigation of link layer adaptation in IEEE 802.11n WLANs. In 11th IEEE International Wireless Telecommunications Symposium, 1-7. https://doi.org/10.1109/wts.2012.6266144
Due to its low cost wireless communication methodology and improvements in both its physical (PHY) and MAC (Link) layers, the IEEE 802.11n wireless LAN (WLAN) technology has b...

Performance of the distributed CPA protocol and architecture on traditional networks.

Conference Proceeding
Chalmers, K. (2011)
Performance of the distributed CPA protocol and architecture on traditional networks. In P. Welch, A. T. Sampson, J. B. Pedersen, J. Kerridge, J. F. Broenink, & J. Barnes (Eds.), Communicating Process Architectures 2011, (227-242). https://doi.org/10.3233/978-1-60750-774-1-227
Performance of communication mechanisms is very important in distributed systems frameworks, especially when the aim is to provide a particular type of behavior across a netwo...