Zobrazeno 1 - 10
of 15
pro vyhledávání: '"Mostafa H. Dahshan"'
Autor:
Radwa A. Roshdy, Mostafa H. Dahshan, Salman A. AlQahtani, Ahmed Emam, Hossam M. Kasem, Mohammed A. Salem
Publikováno v:
IEEE Access, Vol 11, Pp 34529-34543 (2023)
It is crucial to have a dependable and precise channel model in order to study the properties of millimeter wave (mmWave) propagation. The Quasi-deterministic (QD) channel model is employed in this viewpoint, which describes the propagation of mm-Wav
Externí odkaz:
https://doaj.org/article/03466c61412e452fb19bb0521f90c8e7
Autor:
Mostafa H. Dahshan
Publikováno v:
Telecommunication Systems. 66:181-196
This paper presents a robust data authentication scheme for protecting data integrity and availability in unattended wireless sensor networks. Such networks are vulnerable to several types of attacks. In particular, attackers can compromise a subset
Autor:
Mostafa H. Dahshan
Publikováno v:
Arabian Journal for Science and Engineering. 39:7003-7011
This paper presents a new algorithm for approximating the solution of the maximum independent set (MIS) problem. The proposed algorithm takes a novel approach of treating the MIS problem as a least-cost path problem, using an adapted version of Bellm
Autor:
Mostafa H. Dahshan
Publikováno v:
Arabian Journal for Science and Engineering. 38:2043-2054
This paper presents a new method for finding two link-disjoint paths in WDM networks under wavelength continuity and lowest cost constraints. Such a problem is considered to be an NP-complete problem, which is only solvable using Integer Linear Progr
Autor:
Reham A. Al-Dayil, Mostafa H. Dahshan
Publikováno v:
2016 7th International Conference on Information and Communication Systems (ICICS).
With the rapidly growing development of cellular networks and powerful smartphones, botnets have invaded the mobile domain. Social media, like Twitter, Facebook, and YouTube have created a new communication channel for attackers. Recently, bot master
Autor:
Mostafa H. Dahshan, Pramode K. Verma
Publikováno v:
Computer Communications. 30:3841-3850
This paper presents a new refined assured forwarding (RAF) framework for improving the performance of DiffServ architecture where heterogeneous traffic flows share the same aggregate class. The new framework requires minimal modification to existing
Autor:
Muhammad Hussain, Hatim Aboalsamh, Mostafa H. Dahshan, Abdelfettah Belghith, Wadood Abdul, Sanaa Ghouzali, Qazi Emad-ul-Haq
Publikováno v:
KSII Transactions on Internet and Information Systems. 9
The IPv4 addressing scheme, which was proposed by IETF in 1981, provides 4.3 billion unique 32-bit IP addresses but has been fully exhausted in Feb, 2011. This exhaustion of unique IP addresses poses significant challenges to the addition of new devi
Publikováno v:
2015 IEEE International Conference on Engineering and Technology (ICETECH).
A botnet is group of compromised computers that are controlled by a botmaster, who uses them to perform illegal activities. Centralized and P2P (Peer-to-Peer) botnets are the most commonly used botnet types. Honeypots have been used in many systems a
Autor:
Mostafa H. Dahshan
Publikováno v:
2010 2nd International Conference on Computer Technology and Development.
This paper presents a new exact algorithm for finding two node-disjoint paths of minimum total weight in optical switched networks with wavelength-continuity constraint. Unlike previous heuristic algorithms developed for this purpose, our algorithm i
Publikováno v:
2008 3DTV Conference: The True Vision - Capture, Transmission and Display of 3D Video.
Digital light processing (DLP) uses a digital micromirror device (DMD) to control light, effectively acting as an array of optical switching elements. DMDs have been widely used as high-speed spatial light modulators for projection applications. This