Skip to main content

and
  1. Chapter and Conference Paper

    A Trust-Based Routing Protocol for Ad Hoc Networks

    Ad hoc networks are particularly vulnerable as compare to traditional networks mainly due to their lack of infrastructure. A malicious node can easily disrupt both the routing discovery phase and the data forw...

    **aoyun Xue, Jean Leneutre, Jalel Ben-Othman in Mobile and Wireless Communication Networks (2005)

  2. Article

    Open Access

    Dynamic power control for energy harvesting wireless multimedia sensor networks

    Optimization of energy usage in wireless sensor networks (WSN) has been an active research field for the last decades and various approaches have been explored. In fact, A well designed energy consumption mode...

    Mohammed-Amine Koulali, Abdellatif Kobbane in EURASIP Journal on Wireless Communications… (2012)

  3. No Access

    Article

    Traffic management based on token bucket mechanism for WiMAX networks

    In large scale networks like the IEEE 802.16 (WiMAX), it is very important not only to monitor, but also to control the amount of traffic injected into the network. This process helps in decreasing congestion ...

    Sahar Ghazal, Jalel Ben Othman, Jean-Pierre Claudé in Cluster Computing (2012)

  4. No Access

    Article

    Performance Analysis of WiMAX Networks AC

    In WiMAX networks, contention based bandwidth requests are allowed in the uplink channel on the time division duplexing frame. The standard allows some types of traffic classes to use this period while prevent...

    Jalel Ben Othman, Lynda Mokdad, Sahar Ghazal in Wireless Personal Communications (2014)

  5. No Access

    Article

    CCS_WHMS: A Congestion Control Scheme for Wearable Health Management System

    Wearable computing is becoming a more and more attracting field in the last years thanks to the miniaturisation of electronic devices. Wearable healthcare monitoring systems (WHMS) as an important client of we...

    Mohamed Amine Kafi, Jalel Ben Othman, Miloud Bagaa in Journal of Medical Systems (2015)

  6. Article

    Open Access

    Achieving QoS in Virtual MIMO systems: a satisfaction equilibrium analysis

    This paper presents a game theoretic framework to analyze a cellular-WLAN heterogeneous network from a virtual multiple-input multiple-output (VMIMO) perspective. Namely, we restrict to the uplink case and con...

    Hassan Bennani, Essaid Sabir in EURASIP Journal on Wireless Communications… (2016)

  7. No Access

    Chapter and Conference Paper

    A Game Theoretic Approach Against the Greedy Behavior in MAC IEEE 802.11

    In recent years, mobile ad hoc networks are invading more and more our daily lives. Indeed, several persons are linked daily to ad hoc networks, which aim to exchange data via smartphones, computers, or tablet...

    Mohammed-Alamine El Houssaini, Abdessadek Aaroud, Ali El Hore in Ubiquitous Networking (2017)

  8. No Access

    Chapter and Conference Paper

    A New Model for Cooperative Cognitive Radio Network Using Coalitional Game

    In this paper we study the resources access problem in cognitive radio networks, especially we are interested in the large number of secondary users (SUs) present in the system. We propose a model based on cha...

    Sara Gmira, Abdellatif Kobbane, Mouna El Machkour, Jalel Ben-othman in Wireless Internet (2018)

  9. No Access

    Article

    A New Energy Efficiency/Spectrum Efficiency Model for Cooperative Cognitive Radio Network

    In this paper we study the resources access problem in cognitive radio networks, especially we are interested in the large number of secondary users (SUs). We establish a model based on channel access process ...

    Sara Gmira, Abdellatif Kobbane, Jalel Ben-Othman in Mobile Networks and Applications (2018)

  10. No Access

    Book and Conference Proceedings

    Advanced Communication Systems and Information Security

    Second International Conference, ACOSIS 2019, Marrakesh, Morocco, November 20–22, 2019, Revised Selected Papers

    Mostafa Belkasmi, Jalel Ben-Othman in Communications in Computer and Information Science (2020)

  11. Article

    Editorial: Intelligent and Holistic Solutions for Next Generation Wireless Networks

    Shuai Han, Jalel Ben-Othman, Shiwen Mao, Ruoyu Su in Mobile Networks and Applications (2020)

  12. No Access

    Book and Conference Proceedings

    E-Business and Telecommunications

    17th International Conference on E-Business and Telecommunications, ICETE 2020, Online Event, July 8–10, 2020, Revised Selected Papers

    Mohammad S. Obaidat, Jalel Ben-Othman in Communications in Computer and Information Science (2021)

  13. No Access

    Book and Conference Proceedings

    Ubiquitous Networking

    7th International Symposium, UNet 2021, Virtual Event, May 19–22, 2021, Revised Selected Papers

    Halima Elbiaze, Prof. Dr. Essaid Sabir in Lecture Notes in Computer Science (2021)

  14. No Access

    Chapter

    Machine Learning Methods for Enhanced Cyber Security Intrusion Detection System

    In the ever-changing world of information security, networks had expanded in scale and complexity that integrates wide range of business functions, intrusion threats have increased in occurrence and intelligen...

    M Satheesh Kumar, Jalel Ben-Othman in Advances in Computing, Informatics, Networ… (2022)

  15. No Access

    Article

    Blockchain based secure, efficient and coordinated energy trading and data sharing between electric vehicles

    In this study, a secure and coordinated blockchain based energy trading system for Electric Vehicles (EVs) is presented. The major goals of this study are to provide secure and efficient energy trading between...

    Muhammad Umar Javed, Nadeem Javaid, Muhammad Waseem Malik in Cluster Computing (2022)

  16. No Access

    Article

    Markov Chain Mobility Model for Multi-lane Highways

    Traffic congestion is one of the biggest challenges around the world, resulting in multiple harmful consequences such as air pollution, road fatalities, and traffic jams. Thus, it is a vital need to develop pr...

    Oumaima EL Joubari, Jalel Ben Othman, Véronique Vèque in Mobile Networks and Applications (2022)