Self organizing method for handover performance optimization in LTE-advanced network

S Chaudhuri, I Baig, D Das - Computer Communications, 2017 - Elsevier
Classical wireless cellular networks configure semi-static values of handover decision
parameters, which are usually been modified manually by the operator at a certain time …

IoT Security Frameworks: A Comparative Review with a Focus on Privacy

A Al-Hasnawi, Y Niu, JF Tawfeq… - … on Cyber Resilience …, 2024 - ieeexplore.ieee.org
The privacy of sensitive data within the Internet of Things (IoT) is at risk due to potential
privacy violations. These violations can occur through illegal access by external entities, as …

Enhancing Cloud Security: A Comprehensive Review of Machine Learning Approaches

W Safi, S Ghwanmeh, M Mahfuri… - 2024 2nd International …, 2024 - ieeexplore.ieee.org
Cloud Computing (CC) has ushered in a paradigm shift in the provisioning of IT resources,
offering users enhanced cost-efficiency and streamlined infrastructure management …

Ant colony prediction by using sectorized diurnal mobility model for handover management in PCS networks

AI Saleh, MS Elkasas, AA Hamza - Wireless Networks, 2019 - Springer
Recently, mobile phones are extremely used in lifestyle. Historical records of mobile users
(MUs) play an important role in predicting future movements of new visitors of the underlying …

An integrated MIH-FPMIPv6 mobility management approach for evolved-packet system architectures

A Michalas, A Sgora, DD Vergados - Journal of Network and Computer …, 2017 - Elsevier
Abstract Following the Always Best Connection (ABC) principle of the 4th generation
wireless networks users of mobile services would be provided with connectivity to the best …

Transforming Cybersecurity in the Digital Era: The Power of AI

M Mahfuri, S Ghwanmeh, R Almajed… - … on Cyber Resilience …, 2024 - ieeexplore.ieee.org
In the midst of the digital revolution of the 21st century, cybersecurity has come to be a
primary social situation, requiring revolutionary and Innovative solution. To find the proper …

Watermarking and Encryption for Electronic Medical Records (EMR) Security Based on mCloud

HR Abdulshaheed, YS Abbas… - … on Cyber Resilience …, 2024 - ieeexplore.ieee.org
Providing quality healthcare services and promoting collaborative clinical research are
easier and more efficient with electronic medical record (EMR) systems. All aspects of care …

A route optimized distributed IP-based mobility management protocol for seamless handoff across wireless mesh networks

PA Shah, KM Awan, K Iqbal, F Aadil… - Mobile Networks and …, 2018 - Springer
Abstract A Wireless Mesh Network (WMN) can provide Internet connectivity to end users
through heterogenous access network technologies. However, the mobility of mobile nodes …

An In-Depth Examination of Cybersecurity: Unveiling Contemporary Trends and Recent Advancements in the World of Cyber Threats

W Alhasan, M Wannous, A Abualkishik… - … on Cyber Resilience …, 2024 - ieeexplore.ieee.org
The virtual realm now serves as the primary stage for a wide variety of global interactions
spanning economic, industrial, cultural, social and governmental exchanges, between …

3D Remote Laboratory Design Based on Interactive Mobile Learning

SI Kadhem, Y Niu, JF Tawfeq… - … on Cyber Resilience …, 2024 - ieeexplore.ieee.org
With the continuous development of cloud computing technology, cloud technology has
become an optional solution for constructing college laboratories. In this paper, we introduce …