Increasing spectrum capacity for ad hoc networks using cognitive radios: an analytical model H Al-Mahdi, MA Kalil, F Liers, A Mitschele-Thiel IEEE Communications Letters 13 (9), 676-678, 2009 | 73 | 2009 |
Spectrum handoff reduction for cognitive radio ad hoc networks MA Kalil, H Al-Mahdi, A Mitschele-Thiel 2010 7th International symposium on wireless communication systems, 1036-1040, 2010 | 51 | 2010 |
Analysis of opportunistic spectrum access in cognitive ad hoc networks MA Kalil, H Al-Mahdi, A Mitschele-Thiel Analytical and Stochastic Modeling Techniques and Applications: 16th …, 2009 | 36 | 2009 |
Queueing analysis of an ATM multimedia multiplexer with non-pre-emptive priority H Nassar, H Al Mahdi IEE Proceedings-Communications 150 (3), 189-196, 2003 | 31 | 2003 |
Asymmetric DNA encryption and decryption technique for Arabic plaintext M Alruily, OR Shahin, H Al-Mahdi, AI Taloba Journal of Ambient Intelligence and Humanized Computing, 1-17, 2021 | 23 | 2021 |
Design and analysis of DNA encryption and decryption technique based on asymmetric cryptography system H Al-Mahdi, M Alruily, OR Shahin, K Alkhaldi International Journal of Advanced Computer Science and Applications 10 (2), 2019 | 13 | 2019 |
Lha: logical hierarchical addressing protocol for mobile ad-hoc networks A Yousef, H Al-Mahdi, MA Kalil, A Mitschele-Thiel Proceedings of the 2nd ACM workshop on Performance monitoring and …, 2007 | 13 | 2007 |
Performance evaluation of secondary users operating on a heterogeneous spectrum environment MA Kalil, H Al-Mahdi, A Mitschele-Thiel Wireless personal communications 72, 2251-2262, 2013 | 11 | 2013 |
A priority discrete queueing model for multimedia multiplexers H Nassar, HA Mahdy Mathematical and Computer Modelling of Dynamical Systems 8 (2), 199-211, 2002 | 11 | 2002 |
Characterization of task response time in a fog-enabled IoT network using queueing models with general service times AS Ibrahim, H Al-Mahdi, H Nassar Journal of King Saud University-Computer and Information Sciences 34 (9 …, 2022 | 10 | 2022 |
A buffering and switching scheme for admission control in cognitive radio networks MA Kalil, H Al-Mahdi, H Hammam, IA Saroit IEEE Wireless Communications Letters 6 (3), 358-361, 2017 | 10 | 2017 |
Design and analysis of a TDMA call assignment scheme for cellular networks H Nassar, H Al-Mahdi Computer Communications 32 (7-10), 1200-1206, 2009 | 10 | 2009 |
An enhanced routing algorithm based on a re-position particle swarm optimization (RA-RPSO) for wireless sensor network M Elshrkawey, H Al-Mahdi, W Atwa Journal of King Saud University-Computer and Information Sciences 34 (10 …, 2022 | 9 | 2022 |
A dynamic hop-aware buffer management scheme for multi-hop ad hoc networks H Al-Mahdi, MA Kalil IEEE Wireless Communications Letters 6 (1), 22-25, 2016 | 9 | 2016 |
An enhanced intrusion detection system based on multi-layer feature reduction for probe and dos attacks M Elshrkawey, M Alalfi, H Al-Mahdi Journal of Internet Services and Information Security (JISIS) 11 (4), 40-57, 2021 | 8 | 2021 |
The effect of mobility models and traffic patterns on the performance of routing protocols in MANETs M Wahed, H Al-Mahdi, TM Mahmoud, H Shaban International Journal of Computer Applications 101 (9), 52-58, 2014 | 7 | 2014 |
Performance analysis of an autoconfiguration addressing protocol for ad hoc networks H Al-Mahdi, H Nassar, SA El-Aziz Journal of Computer and Communications 2013, 2013 | 7 | 2013 |
Performance evaluation of hop-aware buffer management scheme in multihop ad hoc networks MA Kalil, H Al-Mahdi, A Mitschele-Thiel 2008 The Fourth International Conference on Wireless and Mobile …, 2008 | 7 | 2008 |
Sda-sm: An efficient secure data aggregation scheme using separate mac across wireless sensor networks M Elshrkawey, H Al-Mahdi INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL 16 (2), 2021 | 6 | 2021 |
Design and analysis of DNA binary cryptography algorithm for plaintext H Al-Mahdi, OR Shahin, Y Fouad, K Alkhaldi Int. J. Eng. Technol 10, 699-706, 2018 | 6 | 2018 |