Search Results - "Almalkawi, Islam T"

  • Showing 1 - 10 results of 10
Refine Results
  1. 1

    Wireless Multimedia Sensor Networks: current trends and future directions by Almalkawi, Islam T, Zapata, Manel Guerrero, Al-Karaki, Jamal N, Morillo-Pozo, Julian

    Published in Sensors (Basel, Switzerland) (01-07-2010)
    “…Wireless Multimedia Sensor Networks (WMSNs) have emerged and shifted the focus from the typical scalar wireless sensor networks to networks with multimedia…”
    Get full text
    Journal Article
  2. 2

    A secure cluster-based multipath routing protocol for WMSNs by Almalkawi, Islam T, Zapata, Manel Guerrero, Al-Karaki, Jamal N

    Published in Sensors (Basel, Switzerland) (01-04-2011)
    “…The new characteristics of Wireless Multimedia Sensor Network (WMSN) and its design issues brought by handling different traffic classes of multimedia content…”
    Get full text
    Journal Article
  3. 3

    A Cross-Layer-Based Clustered Multipath Routing with QoS-Aware Scheduling for Wireless Multimedia Sensor Networks by Almalkawi, Islam T., Guerrero Zapata, Manel, al-Karaki, Jamal N.

    “…Wireless multimedia sensor networks (WMSNs) can handle different traffic classes of multimedia content (video, audio streams, and still images) as well as…”
    Get full text
    Journal Article
  4. 4

    Machine Learning-Driven Optimization for Intrusion Detection in Smart Vehicular Networks by Alsarhan, Ayoub, Al-Ghuwairi, Abdel-Rahman, Almalkawi, Islam T., Alauthman, Mohammad, Al-Dubai, Ahmed

    Published in Wireless personal communications (01-04-2021)
    “…An essential element in the smart city vision is providing safe and secure journeys via intelligent vehicles and smart roads. Vehicular ad hoc networks…”
    Get full text
    Journal Article
  5. 5

    An Efficient Location Privacy Scheme for Wireless Multimedia Sensor Networks by Almalkawi, Islam T., Raed, Jafar, Alghaeb, Nawaf, Zapata, Manel Guerrero

    “…Most of the security algorithms proposed for the sensor networks such as secure routing, data encryption and authentication, and intrusion detection target…”
    Get full text
    Conference Proceeding
  6. 6

    IoT-Based Surveillance Camera Distribution Using Triangle Geometry by Almalkawi, Islam T., Al-Abed, Loiy, Al-Karaki, Jamal N., Zapata, Manel Guerrero

    “…IoT systems provide excellent solutions to many applications in both civilian and military aspects. This is even facilitated by the advent of many types of…”
    Get full text
    Conference Proceeding
  7. 7

    A lightweight and efficient digital image encryption using hybrid chaotic systems for wireless network applications by Almalkawi, Islam T., Halloush, Rami, Alsarhan, Ayoub, Al-Dubai, Ahmed, Al-karaki, Jamal N.

    “…Due to limited processing capabilities and other constraints of most wireless networks, many existing security algorithms do not consider the network…”
    Get full text
    Journal Article
  8. 8

    Probabilistic analysis of security attacks in cloud environment using hidden Markov models by Al‐Karaki, Jamal N., Gawanmeh, Amjad, Almalkawi, Islam T., Alfandi, Omar

    “…Summary The rapidly growing cloud computing paradigm provides a cost‐effective platform for storing, sharing, and delivering data and computation through…”
    Get full text
    Journal Article
  9. 9

    Optimizing Multi-Class Classification in Educational Data with Ensemble Learning and Data Balancing Techniques by Al-Hammouri, Mohammad F., Hammouri, Ziad Akram Ali, Almalkawi, Islam T., Lafee, Ansam

    “…The field of education is increasingly embracing AI tools to improve student outcomes. This work aims to reduce academic failure in higher education by…”
    Get full text
    Conference Proceeding
  10. 10

    An Efficient Digital Image Encryption Using Pixel Shuffling and Substitution for Wireless Networks by Almalkawi, Islam T., Al-Karaki, Jamal N., Alsarhan, Ayoub, Abu-Ajamiyah, Randa, Al-Mughrabi, Deena

    “…Most of the proposed security algorithms for wireless networks consider only securing scalar data, which are not suitable for other data types, e.g., digital…”
    Get full text
    Conference Proceeding