
Hamzah F Zmezm
Address: Seri Kembangan, Selangor, Malaysia
less
Related Authors
Mustafa S Khalefa
University Putra Malaysia, UPM
Wael Elmedany
University of Bahrain
Kamal Eldahshan
Al-Azhar University
Amal Dandashi
Qatar University
Prashant Dahiwale
Rajiv Gandhi College Of Engineering And Research, Nagpur
InterestsView All (14)
Uploads
Papers by Hamzah F Zmezm
this process involve in a great number of new applications, which contributed in increasing the number of the users
for this type of network. Transferring video in this type of network may suffer from many problems such as connection
failures, weakness in the network layer, fading, network traffic overload, storage capacity, and so on. This study involves
analyzing video transmission over heterogeneous using Network Simulation-NS2, the main errors which have occurred
during video transferring, the types of video transmission techniques error correction methods, and various performance
parameters such as the packet delivery ratio, throughput, normalized overhead control, and peak signal to noise ratio. The
effect on the quality of the delivered video are calculated, and the results show that the quality of video transmitted over
heterogeneous networks has improved using the proposed algorithm.
infrastructure. In this network type, the use of the clustering technique significantly reduces the routing traffic that occurs
during the routing process. Clustering is used to divide an ad-hoc network into small sets of nodes, where each
cluster consist of a cluster head, ordinary nodes and gateway nodes. Clustering can be used for the effective utilization of
resources for large ad-hoc networks. This paper measures the impact of using clustering strategy in MANET and how this
strategy can enhance the performance of this network, and resulted in increasing the calculated quality parameters, like
throughput, packet delivery ratio, end-to-end delay and normalized control overhead. This study produced a simulation
for Low-Energy Adaptive Clustering Hierarchy (LEACH) which is considered one of the clustering based routing protocols.
A comparison is done between LEACH with the other types of routing protocols such as AODV, DSDV and OLSR which are
considered non-clustering routing protocol. Conclusion and discussion of the simulation results have demonstrated the
importance and effect of using clustering in MANETs.
this term, ranging from any system that has sensors and actuators to a solitary
interconnected network of physical items. This Paper shows that this term does not give
enough information to construct a software architecture on. This is accomplished by
taking an inside look at the IoT described in literature as well as the types of
applications that exist on the market today and using the concept of software
architectural styles to show how different areas in the IoT will need varying styles. This
paper continued to classify solutions in the Internet of Things into different classes. The
outcomes are that for a subset of the classes there is a reasonable style, however for
remaining classes there are still different decisions where more context information is
needed
security. One of the major challenges concerning the performance of mobile WiMAX is seamless
handover. Research shows that a large portion of delay related to handover actually comes from
user authentication and network entry and re-entry.
In general, total delay associated with the handover process can be divided into three categories:
i) link layer handover delay, ii) IP layer handover delay, and iii) security sub-layer handover
delay. We propose a pre-authentication design that can provide seamless and safe connection
when handover takes place.
Our design is based on the least privilege principle; therefore, our approach guarantees
backward/forward secrecy. We conduct research using an ns-2 simulation tool to measure the
performance of our seamless handover. Our approach is validated using automated validation of
Internet Security Protocols and Applications (AVISPA).
this process involve in a great number of new applications, which contributed in increasing the number of the users
for this type of network. Transferring video in this type of network may suffer from many problems such as connection
failures, weakness in the network layer, fading, network traffic overload, storage capacity, and so on. This study involves
analyzing video transmission over heterogeneous using Network Simulation-NS2, the main errors which have occurred
during video transferring, the types of video transmission techniques error correction methods, and various performance
parameters such as the packet delivery ratio, throughput, normalized overhead control, and peak signal to noise ratio. The
effect on the quality of the delivered video are calculated, and the results show that the quality of video transmitted over
heterogeneous networks has improved using the proposed algorithm.
infrastructure. In this network type, the use of the clustering technique significantly reduces the routing traffic that occurs
during the routing process. Clustering is used to divide an ad-hoc network into small sets of nodes, where each
cluster consist of a cluster head, ordinary nodes and gateway nodes. Clustering can be used for the effective utilization of
resources for large ad-hoc networks. This paper measures the impact of using clustering strategy in MANET and how this
strategy can enhance the performance of this network, and resulted in increasing the calculated quality parameters, like
throughput, packet delivery ratio, end-to-end delay and normalized control overhead. This study produced a simulation
for Low-Energy Adaptive Clustering Hierarchy (LEACH) which is considered one of the clustering based routing protocols.
A comparison is done between LEACH with the other types of routing protocols such as AODV, DSDV and OLSR which are
considered non-clustering routing protocol. Conclusion and discussion of the simulation results have demonstrated the
importance and effect of using clustering in MANETs.
this term, ranging from any system that has sensors and actuators to a solitary
interconnected network of physical items. This Paper shows that this term does not give
enough information to construct a software architecture on. This is accomplished by
taking an inside look at the IoT described in literature as well as the types of
applications that exist on the market today and using the concept of software
architectural styles to show how different areas in the IoT will need varying styles. This
paper continued to classify solutions in the Internet of Things into different classes. The
outcomes are that for a subset of the classes there is a reasonable style, however for
remaining classes there are still different decisions where more context information is
needed
security. One of the major challenges concerning the performance of mobile WiMAX is seamless
handover. Research shows that a large portion of delay related to handover actually comes from
user authentication and network entry and re-entry.
In general, total delay associated with the handover process can be divided into three categories:
i) link layer handover delay, ii) IP layer handover delay, and iii) security sub-layer handover
delay. We propose a pre-authentication design that can provide seamless and safe connection
when handover takes place.
Our design is based on the least privilege principle; therefore, our approach guarantees
backward/forward secrecy. We conduct research using an ns-2 simulation tool to measure the
performance of our seamless handover. Our approach is validated using automated validation of
Internet Security Protocols and Applications (AVISPA).