Skip to main content
    • by 
    • Routing Protocols in WSN
All-optical networks with wavelength division multiplexing capability are the promising candidates for the next generation Internet. As these networks carry enormous bandwidth, it is not optional for them to be survivable. Although the... more
    • by 
    • Optical Networks
The increasing demand for bandwidth that has resulted from the emergence of various bandwidth-thirsty applications has increased the need for employing WDM as a dominant technology for the next-generation optical internet. As these... more
    • by 
    •   3  
      Optical NetworkingNext GenerationBlocking Probability
    • by 
Optical Burst Switching (OBS) has been proposed as a new paradigm to achieving a practical balance between Optical Circuit Switching (OCS) and Optical Packet Switching (OPS). Hybrid Optical Networks (HON) that combines OCS and OBS has... more
    • by 
    •   17  
      Distributed ComputingHigh Performance ComputingService QualityPacket Switching
Active restoration (AR) is a novel lightpath restoration scheme proposed to guarantee a certain degree of survivability in WDM optical networks with a reasonable tradeoff between capacity requirement and restoration time. An analytical... more
    • by 
    •   6  
      ProbabilityPerformance AnalysisOptical networkAnalytical Model
The ever-increasing demand for network bandwidth makes network survivability an issue of great concern. Lightpath restoration is a valuable approach to guaranteeing an acceptable level of survivability in WDM optical networks with better... more
    • by 
    •   7  
      Performance AnalysisOptical networkWavelength ConversionAnalytical Model
Active restoration (AR) is a novel lightpath restoration scheme proposed recently to guarantee a certain degree of survivability in wavelength-division multiplexing (WDM) optical networks with a reasonable trade-off between capacity... more
    • by 
    •   12  
      Distributed ComputingComputational ComplexityOptical CommunicationPerformance Analysis
Dedicated protection and shared protection are the main protection schemes in optical wavelength division multiplexing (WDM) networks. Shared protection techniques surpass the dedicated protection techniques by providing the same level of... more
    • by 
    •   3  
      MESH NETWORKElectrical And Electronic EngineeringEcoc
In optical Wavelength Division Multiplexing (WDM) networks, different protection schemes have been proposed in the literature, namely, dedicated protection and shared protection. Shared protection techniques significantly reduce the... more
    • by 
    •   2  
      Computer ScienceElectrical And Electronic Engineering
Evaluation of availability and unavailability of optical connections is necessary for WDM optical networks to make efficient use of optical resources. The design of a protection scheme that improves the availability of high priority... more
    • by 
    •   3  
      EngineeringApplicationsWavelength Division Multiplexing
Will-beset by IN -TECH resulting in network holes, cuts (partitions) or even breakdown of the overall network connectivity as shown in Fig. 1. Therefore, it is essential to assess the vulnerabilities of mission critical networks to such... more
    • by 
    • Computer Science
Will-beset by IN -TECH resulting in network holes, cuts (partitions) or even breakdown of the overall network connectivity as shown in Fig. 1. Therefore, it is essential to assess the vulnerabilities of mission critical networks to such... more
    • by 
    • Computer Science
Will-beset by IN -TECH resulting in network holes, cuts (partitions) or even breakdown of the overall network connectivity as shown in Fig. 1. Therefore, it is essential to assess the vulnerabilities of mission critical networks to such... more
    • by 
    • Computer Science
Evaluation of availability and unavailability of optical connections is necessary for WDM optical networks to make efficient use of optical resources. The design of a protection scheme that improves the availability of high priority... more
    • by 
    •   5  
      EngineeringComputer ScienceApplicationsComputer Network
Abstract—The Internet explosion and the increase in crucial web applications such as ebanking and e-commerce, make essential the need for network security tools. One of such tools is an Intrusion detection system which can be classified... more
    • by  and +1
The Internet explosion and the increase in crucial web applications such as ebanking and e-commerce, make essential the need for network security tools. One of such tools is an Intrusion detection system which can be classified based on... more
    • by 
    •   6  
      Data MiningNetwork SecurityFuzzy LogicSoftware Agents
Recently, Wireless Sensor Networks (WSNs) have been deployed into a variety of applications including homeland security, military systems, and health care. Sensor nodes deployed in such networks are subject to several attacks such as... more
    • by 
    •   2  
      Cognitive ScienceDistributed Computing
This paper introduces a new secure hybrid payment system in KSA that enables people to pay their bills, recharge their mobiles, as well as transfer balance using secure SMS messages. The proposed system implements a flexible and scalable... more
    • by 
Generation of chaos from acousto-optic (A-O)Bragg cell modulators with an electronic feedback has been studied for over 3 decades. Since an acousto-optic Bragg cell with zeroth-and first-order feedback exhibits chaotic behavior past the... more
    • by  and +1
    •   9  
      Optical EngineeringOptical CommunicationOptical Communication SystemFeedback