Skip to main content

Research Repository

Advanced Search

All Outputs (7)

A secure routing approach based on league championship algorithm for wireless body sensor networks in healthcare (2023)
Journal Article
Hosseinzadeh, M., Mohammed, A. H., Rahmani, A. M., A Alenizi, F., Zandavi, S. M., Yousefpoor, E., …Tightiz, L. (2023). A secure routing approach based on league championship algorithm for wireless body sensor networks in healthcare. PLoS ONE, 18(10), Article e0290119. https://doi.org/10.1371/journal.pone.0290119

Patients must always communicate with their doctor for checking their health status. In recent years, wireless body sensor networks (WBSNs) has an important contribution in Healthcare. In these applications, energy-efficient and secure routing is rea... Read More about A secure routing approach based on league championship algorithm for wireless body sensor networks in healthcare.

A novel fuzzy trust-based secure routing scheme in flying ad hoc networks (2023)
Journal Article
Hosseinzadeh, M., Mohammed, A. H., Alenizi, F. A., Malik, M. H., Yousefpoor, E., Yousefpoor, M. S., …Tightiz, L. (2023). A novel fuzzy trust-based secure routing scheme in flying ad hoc networks. Vehicular Communications, 44, Article 100665. https://doi.org/10.1016/j.vehcom.2023.100665

Today, many studies assess vulnerabilities, threats, and attacks in flying ad hoc networks (FANETs) to provide solutions for countermeasures. Protecting FANETs against attackers and coordinating connections are challenging. The purpose of this study... Read More about A novel fuzzy trust-based secure routing scheme in flying ad hoc networks.

Task scheduling mechanisms for fog computing: A systematic survey (2023)
Journal Article
Hosseinzadeh, M., Azhir, E., Lansky, J., Mildeova, S., Ahmed, O. H., Malik, M. H., & Khan, F. (2023). Task scheduling mechanisms for fog computing: A systematic survey. IEEE Access, 11, 50994-51017. https://doi.org/10.1109/ACCESS.2023.3277826

In the Internet of Things (IoT) ecosystem, some processing is done near data production sites at higher speeds without the need for high bandwidth by combining Fog Computing (FC) and cloud computing. Fog computing offers advantages for real-time syst... Read More about Task scheduling mechanisms for fog computing: A systematic survey.

Self-adapting security monitoring in Eucalyptus cloud environment (2023)
Journal Article
Mahmood, S., Yahaya, A., Hasan, R., Hussain, S., Malik, M. H., & Kamal Sarker, U. (2023). Self-adapting security monitoring in Eucalyptus cloud environment. International Journal of Advanced Computer Science and Applications, 14(3), 80-93. https://doi.org/10.14569/IJACSA.2023.0140310

This paper discusses the importance of virtual machine (VM) scheduling strategies in cloud computing environments for handling the increasing number of tasks due to virtualization and cloud computing technology adoption. The paper evaluates legacy me... Read More about Self-adapting security monitoring in Eucalyptus cloud environment.

Toward designing a secure authentication protocol for IoT environments (2023)
Journal Article
Hosseinzadeh, M., Malik, M. H., Safkhani, M., Bagheri, N., Le, Q. H., Tightiz, L., & Mosavi, A. H. (2023). Toward designing a secure authentication protocol for IoT environments. Sustainability, 15(7), 5934. https://doi.org/10.3390/su15075934

Authentication protocol is a critical part of any application to manage the access control in many applications. A former research recently proposed a lightweight authentication scheme to transmit data in an IoT subsystem securely. Although the desig... Read More about Toward designing a secure authentication protocol for IoT environments.

Inventory management optimization with data analytics for a trading company (2023)
Journal Article
Khan, S. O., Hasan, R., Hussain, S., Malik, M. H., & Mahmood, S. (2023). Inventory management optimization with data analytics for a trading company. Journal of Big Data & Smart City,

Distributors, manufacturers, and suppliers face the daunting challenge of inventory control. Each supply management problem that arises has ramifications. To satisfy supply and demand, inventory optimization will ensure that the correct commodity is... Read More about Inventory management optimization with data analytics for a trading company.

An energy-aware routing method using firefly algorithm for flying ad hoc networks (2023)
Journal Article
Lansky, J., Rahmani, A. M., Malik, M. H., Yousefpoor, E., Yousefpoor, M. S., Khan, M. U., & Hosseinzadeh, M. (2023). An energy-aware routing method using firefly algorithm for flying ad hoc networks. Scientific Reports, 13(1), Article 1323. https://doi.org/10.1038/s41598-023-27567-7

Flying ad-hoc networks (FANETs) include a large number of drones, which communicate with each other based on an ad hoc model. These networks provide new opportunities for various applications such as military, industrial, and civilian applications. H... Read More about An energy-aware routing method using firefly algorithm for flying ad hoc networks.