咨询与建议

限定检索结果

文献类型

  • 3 篇 期刊文献

馆藏范围

  • 3 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3 篇 工学
    • 2 篇 信息与通信工程
    • 1 篇 仪器科学与技术
    • 1 篇 电子科学与技术(可...
    • 1 篇 计算机科学与技术...
    • 1 篇 软件工程

主题

  • 2 篇 node
  • 2 篇 sensor
  • 2 篇 networks
  • 2 篇 wireless
  • 1 篇 genetic
  • 1 篇 throughput
  • 1 篇 deployment
  • 1 篇 authentication
  • 1 篇 message
  • 1 篇 buffer
  • 1 篇 target
  • 1 篇 attack
  • 1 篇 capture
  • 1 篇 security
  • 1 篇 algorithm
  • 1 篇 dash
  • 1 篇 coverage
  • 1 篇 bitrate adaptati...
  • 1 篇 code
  • 1 篇 cryptographic

机构

  • 2 篇 department of co...
  • 2 篇 department of ne...
  • 1 篇 department of ne...

作者

  • 3 篇 moad mowafi
  • 2 篇 walid aljoby
  • 1 篇 omar banimelhem
  • 1 篇 lo'ai tawalbeh
  • 1 篇 mohammad al-rous...
  • 1 篇 eyad taqieddin
  • 1 篇 hiba al-dahoud

语言

  • 3 篇 英文
检索条件"作者=Moad Mowafi"
3 条 记 录,以下是1-10 订阅
排序:
Energy efficient fuzzy-based DASH adaptation algorithm
收藏 引用
Digital Communications and Networks 2021年 第1期7卷 113-119页
作者: moad mowafi Eyad Taqieddin Hiba Al-Dahoud Department of Network Engineering and Security Jordan University of Science and TechnologyIrbid22110Jordan
With the expansive demand for video streaming over mobile networks,it is necessary to adopt schemes that balance the need for high video quality with the available network resources when streaming or downloading the *... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Genetic Algorithm Based Node Deployment in Hybrid Wireless Sensor Networks
收藏 引用
Communications and Network 2013年 第4期5卷 273-279页
作者: Omar Banimelhem moad mowafi Walid Aljoby Department of Computer Engineering Jordan University of Science and Technology Irbid Jordan Department of Network Engineering and Security Jordan University of Science and Technology Irbid Jordan
In hybrid wireless sensor networks composed of both static and mobile sensor nodes, the random deployment of stationary nodes may cause coverage holes in the sensing field. Hence, mobile sensor nodes are added after t... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
C3SM: Information Assurance Based on Cryptographic Checksum with Clustering Security Management Protocol
收藏 引用
Journal of Information Security 2012年 第4期3卷 272-280页
作者: moad mowafi Lo'ai Tawalbeh Walid Aljoby Mohammad Al-Rousan Department of Computer Engineering Jordan University of Science and Technology Irbid Jordan Department of Network Engineering and Security Jordan University of Science and Technology Irbid Jordan
Wireless Sensor Networks (WSNs) are resource-constrained networks in which sensor nodes operate in an aggressive and uncontrolled environment and interact with sensitive data. Traffic aggregated by sensor nodes is sus... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论