Zobrazeno 1 - 10
of 31
pro vyhledávání: '"Hassan Al-Mahdi"'
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 34, Iss 10, Pp 10304-10318 (2022)
Energy saving is a major requirement in the design of routing algorithms to maximize the throughput and lifetime of wireless sensor networks. To address this requirement, this work proposes a routing algorithm based on a novel Reposition Particle Swa
Externí odkaz:
https://doaj.org/article/94af4eff2e794fdca5f411b2b936b901
Publikováno v:
Journal of Cloud Computing: Advances, Systems and Applications, Vol 11, Iss 1, Pp 1-17 (2022)
Abstract Much research has focused on task offloading in fog-enabled IoT networks. However, there is an important offloading issue that has hardly been addressed—the impact of different virtualization modes on task response (TR) time. In the presen
Externí odkaz:
https://doaj.org/article/2940ab7013294260b6424e0e22d8a9d3
Publikováno v:
Journal of Ambient Intelligence and Humanized Computing.
The security of transmitting information from one point to another through different media is an important issue in the modern digital society. Researchers have consistently developed and proposed modern data transfer systems in order to transfer dat
Autor:
Hassan Al-Mahdi, Mohamed Elshrkawey
Publikováno v:
INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL. 16
Securing the aggregated data of the wireless sensor networks (WSNs) is a vital issue to minimize energy consumption and face potential attacks. This paper presents a novel end to end encryption scheme defined as Aggregating Secure Data -Separate MAC
Publikováno v:
International Journal of Engineering and Technology. 10:699-706
Publikováno v:
Far East Journal of Electronics and Communications. 17:1265-1283
Publikováno v:
IEEE Wireless Communications Letters. 6:358-361
Cognitive radio users (i.e., secondary users) experience a lot of performance degradation due to the continuous appearance of primary users in the cognitive radio networks. To minimize the effect of this phenomenon, we propose a buffering and switchi
Publikováno v:
International Journal of Advanced Computer Science and Applications. 10
Security of sensitive information at the time of transmission over public channels is one of the critical issues in digital society. The DNA-based cryptography technique is a new paradigm in the cryptography field that is used to protect data during
Publikováno v:
International Journal on Advanced Science, Engineering and Information Technology. 10:1169
Due to the rapid growth of computer networks, critical highly confidential information shared across these networks. Accordingly, securing such information from unauthorized intruders has become a vital issue in the field of information technology. I