Search Results - "Younis, Ossama"
-
1
Hierarchical Clustering-Task Scheduling Policy in Cluster-Based Wireless Sensor Networks
Published in IEEE transactions on industrial informatics (01-05-2018)“…Organizing sensor nodes into a clustered architecture is an effective method for load balancing and prolonging the network lifetime. However, a serious…”
Get full text
Journal Article -
2
Cooperative Adaptive Spectrum Sharing in Cognitive Radio Networks
Published in IEEE/ACM transactions on networking (01-08-2010)“…The cognitive radio (CR) paradigm calls for open spectrum access according to a predetermined etiquette. Under this paradigm, CR nodes access the spectrum…”
Get full text
Journal Article -
3
Throughput-oriented MAC for mobile ad hoc networks: A game-theoretic approach
Published in Ad hoc networks (2009)“…The conservative nature of the 802.11 channel access scheme has instigated extensive research whose goal is to improve the spatial reuse and/or energy…”
Get full text
Journal Article -
4
Employing Cyber-Physical Systems: Dynamic Traffic Light Control at Road Intersections
Published in IEEE internet of things journal (01-12-2017)“…Traffic lights (TLs) are used to control traffic at road intersections. Typically, the TL control mechanism on the road operates according to a fixed periodic…”
Get full text
Journal Article -
5
An Architecture for Robust Sensor Network Communications
Published in International journal of distributed sensor networks (01-07-2005)Get full text
Journal Article -
6
EmpTurnoverML: An Efficient Model for Employee Turnover and Customer Churn Prediction Using Machine Learning Algorithms
Published in 2023 International Mobile, Intelligent, and Ubiquitous Computing Conference (MIUCC) (27-09-2023)“…Employee turnover and customer churn a significant challenges for organizations worldwide. The loss of employees can significantly impact the company's growth…”
Get full text
Conference Proceeding -
7
An energy-aware distributed clustering protocol in wireless sensor networks using fuzzy logic
Published in Ad hoc networks (01-09-2012)“…Clustering is an effective approach for organizing a network into a connected hierarchy, load balancing, and prolonging the network lifetime. On the other…”
Get full text
Journal Article -
8
Cyber-physical systems: A framework for dynamic traffic light control at road intersections
Published in 2016 IEEE Wireless Communications and Networking Conference (01-04-2016)“…Traffic control at road intersections is based on traffic lights (TLs). The control mechanism typically used for traffic lights operates based on a periodic…”
Get full text
Conference Proceeding -
9
Node clustering in wireless sensor networks: recent developments and deployment challenges
Published in IEEE network (01-05-2006)“…The large-scale deployment of wireless sensor networks (WSNs) and the need for data aggregation necessitate efficient organization of the network topology for…”
Get full text
Journal Article -
10
Distributed clustering in ad-hoc sensor networks: a hybrid, energy-efficient approach
Published in IEEE INFOCOM 2004 (2004)“…Prolonged network lifetime, scalability, and load balancing are important requirements for many ad-hoc sensor network applications. Clustering sensor nodes is…”
Get full text
Conference Proceeding -
11
Location-unaware coverage in wireless sensor networks
Published in Ad hoc networks (01-09-2008)“…In scenarios where sensors are placed randomly, redundant deployment is essential for ensuring adequate field coverage. This redundancy needs to be efficiently…”
Get full text
Journal Article -
12
Maintaining Colored Trees for Disjoint Multipath Routing Under Node Failures
Published in IEEE/ACM transactions on networking (01-02-2009)“…Colored trees (CTs) is an efficient approach to route packets along link- or node-disjoint paths in packet-switched networks. In this approach, two trees,…”
Get full text
Journal Article -
13
FlowMate
Published in IEEE/ACM transactions on networking (01-04-2005)“…We design and implement an efficient on-line approach, FlowMate, for clustering flows (connections) emanating from a busy server, according to shared…”
Get full text
Journal Article -
14
ROC: Resilient Online Coverage for Surveillance Applications
Published in IEEE/ACM transactions on networking (01-02-2011)“…We consider surveillance applications in which sensors are deployed in large numbers to improve coverage fidelity. Previous research has studied how to select…”
Get full text
Journal Article -
15
Automated design algorithms for tactical wireless networks
Published in Ad hoc networks (01-11-2013)“…To guide users who attempt to deploy wireless networks in military applications, there is an evolving need for developing systematic methodologies to…”
Get full text
Journal Article -
16
Energy-Efficient Clustering/Routing for Cooperative MIMO Operation in Sensor Networks
Published in IEEE INFOCOM 2009 (01-04-2009)“…Employing multi-input multi-output (MIMO) links can improve energy efficiency in wireless sensor networks (WSNs). Although a sensor node is likely to be…”
Get full text
Conference Proceeding -
17
FlowMate: scalable on-line flow clustering
Published in IEEE/ACM transactions on networking (01-04-2005)“…We design and implement an efficient on-line approach, FlowMate, for clustering flows (connections) emanating from a busy server, according to shared…”
Get full text
Journal Article -
18
TDMA scheduling and channel assignment for cognitive tactical networks
Published in MILCOM 2012 - 2012 IEEE Military Communications Conference (01-10-2012)“…Shortage of spectrum constrains military applications that need to support different classes of traffic. In this work, we study efficient utilization of…”
Get full text
Conference Proceeding -
19
Dynamic Spectrum Access Protocol Without Power Mask Constraints
Published in IEEE INFOCOM 2009 (01-04-2009)“…In this work, we investigate a statistical approach for dynamic spectrum access and radio resource management (RRM) in opportunistic cognitive radio (CR)…”
Get full text
Conference Proceeding -
20
Coverage Without Location Information
Published in 2007 IEEE International Conference on Network Protocols (01-10-2007)“…When sensors are redundantly deployed, a subset of senors should be selected to actively monitor the field (referred to as a "cover"), while the rest of the…”
Get full text
Conference Proceeding