Skip to main content

Research Repository

Advanced Search

Outputs (11)

A novel dynamic Q-learning-based scheduler technique for LTE-advanced technologies using neural networks (2012)
Conference Proceeding
Sorin Comsa, I., Zhang, S., Aydin, M., Kuonen, P., & Wagen, J. F. (2012). A novel dynamic Q-learning-based scheduler technique for LTE-advanced technologies using neural networks. In 37th Annual IEEE Conference on Local Computer Networks (332-335). https://doi.org/10.1109/LCN.2012.6423642

The tradeoff concept between system capacity and user fairness attracts a big interest in LTE-Advanced resource allocation strategies. By using static threshold values for throughput or fairness, regardless the network conditions, makes the scheduler... Read More about A novel dynamic Q-learning-based scheduler technique for LTE-advanced technologies using neural networks.

Forensic analysis of wireless networking evidence of Android smartphones (2012)
Conference Proceeding
Andriotis, P., Oikonomou, G., & Tryfonas, T. (2012). Forensic analysis of wireless networking evidence of Android smartphones. In 2012 IEEE International Workshop on Information Forensics and Security (WIFS) (109-114). https://doi.org/10.1109/WIFS.2012.6412634

This paper introduces a method for acquiring forensic-grade evidence from Android smartphones using open source tools. We investigate in particular cases where the suspect has made use of the smartphone's Wi-Fi or Bluetooth interfaces. We discuss the... Read More about Forensic analysis of wireless networking evidence of Android smartphones.

Towards an efficient and secure educational platform on cloud infrastructure (2012)
Conference Proceeding
Brohi, S., Bamiah, M. A., Chuprat, S., & Ab Manan, J. L. (2012). Towards an efficient and secure educational platform on cloud infrastructure. In Proceedings of 2012 International Conference on Cloud Computing Technologies, Applications and Management, ICCCTAM 2012 (145-150). https://doi.org/10.1109/ICCCTAM.2012.6488088

Existing educational platforms are highly cost-consuming and inefficient in-terms of scalability, flexibility of infrastructures, availability, recovery, accessibility and security. Cloud computing is considered as a flexible business and technologic... Read More about Towards an efficient and secure educational platform on cloud infrastructure.

Identifying and analyzing security threats to virtualized cloud computing infrastructures (2012)
Conference Proceeding
Brohi, S., Bamiah, M. A., Brohi, M. N., & Kamran, R. (2012). Identifying and analyzing security threats to virtualized cloud computing infrastructures. In 2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM) (151-155). https://doi.org/10.1109/ICCCTAM.2012.6488089

A multi-tenant Cloud Computing Infrastructure (CCI) consists of several Virtual Machines (VMs) running on same physical platform by using virtualization techniques. The VMs are monitored and managed by kernel based software i.e. Virtual Machine Monit... Read More about Identifying and analyzing security threats to virtualized cloud computing infrastructures.

Cloud implementation security challenges (2012)
Conference Proceeding
Bamiah, M., Brohi, S., Chuprat, S., & Brohi, M. N. (2012). Cloud implementation security challenges. In Proceedings of 2012 International Conference on Cloud Computing Technologies, Applications and Management, ICCCTAM 2012 (174-178). https://doi.org/10.1109/ICCCTAM.2012.6488093

Cloud computing offers significant features such as resource pooling, scalability, on-demand self service, availability, and reliability to organizations to improve their quality of services. For example by using cloud computing services in healthcar... Read More about Cloud implementation security challenges.

A study on significance of adopting cloud computing paradigm in healthcare sector (2012)
Conference Proceeding
Bamiah, M., Brohi, S., Chuprat, S., & Ab Manan, J. L. (2012). A study on significance of adopting cloud computing paradigm in healthcare sector. In Proceedings of 2012 International Conference on Cloud Computing Technologies, Applications and Management (65-68). https://doi.org/10.1109/ICCCTAM.2012.6488073

Healthcare sector is information critical industry that deals with human lives. Transforming from traditional paper-based to Electronic Health Records (EHRs) was not efficient enough since EHRs require resources, integration, maintenance and high cos... Read More about A study on significance of adopting cloud computing paradigm in healthcare sector.

FDAP: Fast data aggregation protocol in wireless sensor networks (2012)
Conference Proceeding
Boulkaboul, S., Djenouri, D., & Badache, N. (2012). FDAP: Fast data aggregation protocol in wireless sensor networks. https://doi.org/10.1007/978-3-642-32686-8_38

This paper focuses on data aggregation latency in wireless sensors networks. A distributed algorithm to generate a collision-free schedule for data aggregation in wireless sensor networks is proposed. The proposed algorithm is based on maximal indepe... Read More about FDAP: Fast data aggregation protocol in wireless sensor networks.

Cluster-based fast broadcast in duty-cycled wireless sensor networks (2012)
Conference Proceeding
Khiati, M., & Djenouri, D. (2012). Cluster-based fast broadcast in duty-cycled wireless sensor networks. In Proceedings of 2012 IEEE 11th International Symposium on Network Computing and Applicationshttps://doi.org/10.1109/nca.2012.21

This paper proposes a cluster-based broadcast protocol to disseminate delay-sensitive information throughout a wireless sensor network (WSN). The protocol considers the use of duty-cycling at the MAC layer, which is essential to reduce energy dissipa... Read More about Cluster-based fast broadcast in duty-cycled wireless sensor networks.

Slotted contention-based energy-efficient MAC protocols in delay-sensitive wireless sensor networks (2012)
Conference Proceeding
Doudou, M., Djenouri, D., Badache, N., & Bouabdallah, A. (2012). Slotted contention-based energy-efficient MAC protocols in delay-sensitive wireless sensor networks. https://doi.org/10.1109/iscc.2012.6249332

This paper considers slotted duty-cycled medium access control (MAC) protocols, where sensor nodes periodically and synchronously alternate their operations between active and sleep modes to save energy. Communications can occur only when nodes are i... Read More about Slotted contention-based energy-efficient MAC protocols in delay-sensitive wireless sensor networks.

Using virtual machine monitors to overcome the challenges of monitoring and managing virtualized cloud infrastructures (2012)
Conference Proceeding
Bamiah, M. A., Brohi, S., & Chuprat, S. (2012). Using virtual machine monitors to overcome the challenges of monitoring and managing virtualized cloud infrastructures. In Y. Li, & Z. Zeng (Eds.), Proceedings Volume 8349, Fourth International Conference on Machine Vision (ICMV 2011): Machine Vision, Image Processing, and Pattern Analysis. https://doi.org/10.1117/12.920880

Virtualization is one of the hottest research topics nowadays. Several academic researchers and developers from IT industry are designing approaches for solving security and manageability issues of Virtual Machines (VMs) residing on virtualized cloud... Read More about Using virtual machine monitors to overcome the challenges of monitoring and managing virtualized cloud infrastructures.