Bader Alwasel
YOU?
Author Swipe
View article: An Adaptive PSO Approach with Modified Position Equation for Optimizing Critical Node Detection in Large-Scale Networks: Application to Wireless Sensor Networks
An Adaptive PSO Approach with Modified Position Equation for Optimizing Critical Node Detection in Large-Scale Networks: Application to Wireless Sensor Networks Open
In recent years, wireless sensor networks (WSNs) have been employed across various domains, including military services, healthcare, disaster response, industrial automation, and smart infrastructure. Due to the absence of fixed communicat…
View article: Dominating Sets-Based Approach for Maximizing Lifetime of IoT-Based Heterogeneous WSNs Enabled Sustainable Smart City Applications
Dominating Sets-Based Approach for Maximizing Lifetime of IoT-Based Heterogeneous WSNs Enabled Sustainable Smart City Applications Open
The versatility and diverse applications of IoT-based Heterogeneous WSN (HWSN) technologies make them valuable tools for achieving sustainability goals in Sustainable Smart Cities (SSCs). Proper management of underlying heterogeneous archi…
View article: Leveraging Graph-Based Representations to Enhance Machine Learning Performance in IIoT Network Security and Attack Detection
Leveraging Graph-Based Representations to Enhance Machine Learning Performance in IIoT Network Security and Attack Detection Open
In the dynamic and ever-evolving realm of network security, the ability to accurately identify and classify portscan attacks both inside and outside networks is of paramount importance. This study delves into the underexplored potential of…
View article: DGTTSSA: Data Gathering Technique Based on Trust and Sparrow Search Algorithm for WSNs
DGTTSSA: Data Gathering Technique Based on Trust and Sparrow Search Algorithm for WSNs Open
Wireless Sensor Networks (WSNs) have been successfully utilized for developing various collaborative and intelligent applications that can provide comfortable and smart-economic life. This is because the majority of applications that emplo…
View article: Reliability Evaluation for Chain Routing Protocols in Wireless Sensor Networks Using Reliability Block Diagram
Reliability Evaluation for Chain Routing Protocols in Wireless Sensor Networks Using Reliability Block Diagram Open
There are many different fields in which wireless sensor networks (WSNs) can be used such as environmental monitoring, healthcare, military, and security. Due to the vulnerability of WSNs, reliability is a critical concern. Evaluation of a…
View article: SOMACA: A New Swarm Optimization-Based and Mobility-Aware Clustering Approach for the Internet of Vehicles
SOMACA: A New Swarm Optimization-Based and Mobility-Aware Clustering Approach for the Internet of Vehicles Open
The Internet of Vehicles (IoV) has evolved from the classic Vehicular Ad-hoc NETworks (VANETs) as a result of the emergence of the Internet of Things (IoT). IoV is used for communication among vehicles in real-time with their drivers, othe…
View article: Simulating Robustness of Structural Controllability for Directed Networks Under Multi-Round Edge Strategies
Simulating Robustness of Structural Controllability for Directed Networks Under Multi-Round Edge Strategies Open
The study of structural controllability of control systems is a crucial property in the design and analysis of complex networks as well as networks which require a control relationship between nodes. The fundamental aim of attack vulnerabi…
View article: Robustness Analysis Of Structural Controllability for Directed Networks Against Single Edge Attacks
Robustness Analysis Of Structural Controllability for Directed Networks Against Single Edge Attacks Open
Infrastructure systems are an essential component, evolving with greater interconnectivity and interdependence at varying degrees. The control robustness of a network against malicious attack and random failure also becomes a further consi…
View article: Recovery of Structural Controllability into Critical Infrastructures under Malicious Attacks
Recovery of Structural Controllability into Critical Infrastructures under Malicious Attacks Open
The problem of controllability of networks can be seen in critical infrastructure systems which are increasingly susceptible to random failures and/or malicious attacks. The ability to recover controllability quickly following an attack ca…