Остановите войну!
for scientists:
default search action
Yaser M. Khamayseh
Person information
- affiliation: Jordan University of Science and Technology, Department of Computer Science
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c16]Tawbah Ennab, Yaser M. Khamayseh, Wail Mardini, Yu Shen, Burak Kantarci:
Analysis of Version Number Attack using Multiple RPL Instances. ICNCC 2023: 6-15 - 2022
- [j29]Marah R. Bataineh, Wail Mardini, Yaser M. Khamayseh, Muneer O. Bani Yassein:
Novel and Secure Blockchain Framework for Health Applications in IoT. IEEE Access 10: 14914-14926 (2022) - [j28]Abdunasser Alowa, Thomas Fevens, Yaser M. Khamayseh:
Survival backup strategy for controller placement problem in Software Defined Networking. Comput. Commun. 185: 104-117 (2022) - [j27]Rabiah Al-qudah, Yaser M. Khamayseh, Monther Aldwairi, Sarfraz Khan:
The Smart in Smart Cities: A Framework for Image Classification Using Deep Learning. Sensors 22(12): 4390 (2022) - 2020
- [j26]Wail Mardini, M. Masadeh Bani Yassein, Rana Al-Rawashdeh, Shadi A. Aljawarneh, Yaser M. Khamayseh, Omar Meqdadi:
Enhanced Detection of Epileptic Seizure Using EEG Signals in Combination With Machine Learning Classifiers. IEEE Access 8: 24046-24055 (2020) - [j25]Yaser M. Khamayseh, Wail Mardini, J. William Atwood, Monther Aldwairi:
Dynamic framework to mining Internet of Things for multimedia services. Expert Syst. J. Knowl. Eng. 37(5) (2020) - [j24]Yaser M. Khamayseh, Wail Mardini, Monther Aldwairi, Hussein T. Mouftah:
On the Optimality of Route Selection in Grid Wireless Sensor Networks: Theory and Applications. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 11(2): 87-105 (2020)
2010 – 2019
- 2019
- [j23]Khaled M. Addali, Suhib Younis Bani Melhem, Yaser M. Khamayseh, Zhenjiang Zhang, Michel Kadoch:
Dynamic Mobility Load Balancing for 5G Small-Cell Networks Based on Utility Functions. IEEE Access 7: 126998-127011 (2019) - [c15]Muneer O. Bani Yassein, Ismail Hmeidi, Marwa Al-Harbi, Lina Mrayan, Wail Mardini, Yaser M. Khamayseh:
IoT-based healthcare systems: a survey. DATA 2019: 30:1-30:9 - [c14]Muneer O. Bani Yassein, Ismail Hmeidi, Farah Shatnawi, Wail Mardini, Yaser M. Khamayseh:
Smart Home Is Not Smart Enough to Protect You - Protocols, Challenges and Open Issues. EUSPN/ICTH 2019: 134-141 - [c13]Muneer O. Bani Yassein, Ameena Flefil, Dragana Krstic, Yaser M. Khamayseh, Wail Mardini, Mohammed Q. Shatnawi:
Performance Evaluation of RPL in High Density Networks for Internet of Things (IoT). ICSIE 2019: 183-187 - [c12]Muneer O. Bani Yassein, Ismail Hmeidi, Haneen Shehadeh, Waed Bani Yaseen, Esra'a Masa'deh, Wail Mardini, Yaser M. Khamayseh, Qanita Bani Baker:
Performance Evaluation of "Dynamic Double Trickle Timer Algorithm" in RPL for Internet of Things (IoT). IoTBDS 2019: 430-437 - 2018
- [j22]Wail Mardini, Yaser M. Khamayseh, Muneer O. Bani Yassein, Montaha Hani Khatatbeh:
Mining Internet of Things for intelligent objects using genetic algorithm. Comput. Electr. Eng. 66: 423-434 (2018) - [j21]Yaser M. Khamayseh, Rabiah Al-qudah:
Resource Allocation using Genetic Algorithm in Multimedia Wireless Networks. Int. J. Commun. Networks Inf. Secur. 10(2) (2018) - [j20]Yaser M. Khamayseh, Wail Mardini, Nadhir Ben Halima:
Evolutionary Algorithm for Scheduling in Wireless Sensor Networks. J. Comput. 13(3): 262-270 (2018) - [j19]Yaser M. Khamayseh, Shadi A. Aljawarneh, Alaa Ebrahim Asaad:
Ensuring survivability against Black Hole Attacks in MANETS for preserving energy efficiency. Sustain. Comput. Informatics Syst. 18: 90-100 (2018) - 2017
- [j18]Wail Mardini, Yaser M. Khamayseh, Marwa Salayma, Muneer O. Bani Yassein, Hussein T. Mouftah:
Adaptive Duty Cycle (ADC) energy efficient algorithm for ZigBee networks. Comput. Syst. Sci. Eng. 32(1) (2017) - [c11]Wail Mardini, Yaser M. Khamayseh, Ashraf Smadi:
Messenger Bot for IoT devices. ICIME 2017: 182-186 - 2016
- [j17]Muneer Bani Yasin, Yaser M. Khamayseh, Mai AbuJazoh:
Feature Selection for Black Hole Attacks. J. Univers. Comput. Sci. 22(4): 521-536 (2016) - [j16]Wail Mardini, Yaser M. Khamayseh, Abedl Rahman Almodawar, Ehab S. Elmallah:
Adaptive RSSI-based localization scheme for wireless sensor networks. Peer-to-Peer Netw. Appl. 9(6): 991-1004 (2016) - 2015
- [j15]Yaser M. Khamayseh, Wail Mardini, Rana Al-Hijjawi, Reem Jaradat, Hussein T. Mouftah:
Prediction-based Schemes for Coexistence in Personal Wireless Networks. Ad Hoc Sens. Wirel. Networks 26(1-4): 259-285 (2015) - [j14]Yaser M. Khamayseh, Wail Mardini, Hadeel Tbashate:
Leveraging The Data Gathering and Analysis Phases to Gain Situational Awareness. Intell. Autom. Soft Comput. 21(4): 523-542 (2015) - [j13]Yaser M. Khamayseh, Wail Mardini, Shadi A. Aljawarneh, Muneer O. Bani Yassein:
Integration of Wireless Technologies in Smart University Campus Environment: Framework Architecture. Int. J. Inf. Commun. Technol. Educ. 11(1): 60-74 (2015) - [j12]Monther Aldwairi, Yaser M. Khamayseh, Mohammad Al-Masri:
Application of artificial bee colony for intrusion detection systems. Secur. Commun. Networks 8(16): 2730-2740 (2015) - [c10]Nadhir Ben Halima, Yaser M. Khamayseh, Wail Mardini, Abedl Rahman Almodawar:
Empirical Experiments for Sensors' Distance Estimation in Smart Places. CIT/IUCC/DASC/PICom 2015: 1614-1619 - 2014
- [j11]Monther Aldwairi, Bashar Al-Hajasad, Yaser M. Khamayseh:
A classifier system for predicting RNA secondary structure. Int. J. Bioinform. Res. Appl. 10(3): 307-320 (2014) - 2013
- [j10]Muneer O. Bani Yassein, Yaser M. Khamayseh, Ali M. Hatamleh:
Intelligent Randomize Round Robin for Cloud Computing. Int. J. Cloud Appl. Comput. 3(1): 27-33 (2013) - [j9]Yaser M. Khamayseh, Muneer O. Bani Yassein, Mariam AbdAlghani, Constandinos X. Mavromoustakis:
Network Size Estimation in VANETs. Netw. Protoc. Algorithms 5(3): 136-152 (2013) - [c9]Muneer Bani Yasin, Maryan Yatim, Marwa Salaymeh, Yaser M. Khamayseh, Wail Mardini:
Optimal Personal Area Network Coordinator Placement in Grid Topology. MobiWIS 2013: 260-273 - 2012
- [j8]Yaser M. Khamayseh, Ruba Al-Salah, Muneer O. Bani Yassein:
Malicious Nodes Detection in MANETs: Behavioral Analysis Approach. J. Networks 7(1): 116-125 (2012) - [j7]Wail Mardini, Yaser M. Khamayseh:
Algorithms and Protocols in Information and Communication Systems. Netw. Protoc. Algorithms 4(3): 1-3 (2012) - [j6]Muneer O. Bani Yassein, Marwa Salayma, Wail Mardini, Yaser M. Khamayseh:
Fibonacci Backoff Algorithm for IEEE 802.15.4/ZigBee. Netw. Protoc. Algorithms 4(3): 62-78 (2012) - 2011
- [j5]Yaser M. Khamayseh, Abdulraheem Bader, Wail Mardini, Muneer O. Bani Yassein:
A New Protocol for Detecting Black Hole Nodes in Ad Hoc Networks. Int. J. Commun. Networks Inf. Secur. 3(1) (2011) - [j4]Yaser M. Khamayseh, Muneer O. Bani Yassein, Iman I. Badran, Wail Mardini:
An Adaptive Backoff Algorithm for Mobile Ad-Hoc Networks. Int. J. Mob. Comput. Multim. Commun. 3(3): 1-19 (2011) - [j3]Yaser M. Khamayseh, Ghadeer Obiedat, Munner Bani Yassin:
Mobility and Load aware Routing protocol for ad hoc networks. J. King Saud Univ. Comput. Inf. Sci. 23(2): 105-113 (2011) - [c8]Wail Mardini, Yaser M. Khamayseh, Marwa Salayma:
Optimal Power Consumption in Cooperative WSNs for a random Distance using a linear propagation model. ANT/MobiWIS 2011: 489-496 - [i1]Ala'a Z. Al-Howaide, Ahmad S. Doulat, Yaser M. Khamayseh:
Performance Evaluation of Different Scheduling Algorithms in WiMAX. CoRR abs/1111.2996 (2011) - 2010
- [c7]Muneer O. Bani Yassein, Osama Al Oqaily, Geyong Min, Wail Mardini, Yaser M. Khamayseh, Saher S. Manaseer:
Enhanced Fibonacci Backoff Algorithm for Mobile Ad-Hoc Network. CIT 2010: 749-754
2000 – 2009
- 2009
- [j2]Muneer O. Bani Yassein, A. Al-zou'bi, Yaser M. Khamayseh, Wail Mardini:
Improvement on LEACH Protocol of Wireless Sensor Network (VLEACH). J. Digit. Content Technol. its Appl. 3(2): 132-136 (2009) - [j1]Mohammad Ghaleb Ali, Wail Mardini, Akbar Ghaffar Pour Rahbar, Yaser M. Khamayseh:
Improvement of Metropolitan Wireless Networking Using Wireless Optical Mesh Networks. J. Digit. Content Technol. its Appl. 3(3): 60-73 (2009) - [c6]Yaser M. Khamayseh, Wail Mardini, Muneer O. Bani Yassein:
Performance evaluation of different minimum spanning trees schemes for scheduling in WMNS. IADIS AC (2) 2009: 160-164 - [c5]Mostafa Z. Ali, Yaser M. Khamayseh, Robert G. Reynolds:
Cultural Swarms - Knowledge-driven Framework for Solving Nonlinearly Constrained Global Optimization Problems. IJCCI 2009: 103-110 - [c4]Yaser M. Khamayseh, Ghadeer Obeidat, Asmahan Abu Alhassan:
Enhanced VON-AODV based on delayed rebroadcast scheme. PM2HW2N@MSWiM 2009: 78-83 - 2007
- [c3]Yaser M. Khamayseh, Ehab S. Elmallah:
Admission Control Framework for Delay Bounded Traffic in Cellular Networks. GLOBECOM 2007: 5070-5074 - 2006
- [c2]Yaser M. Khamayseh, Ehab S. Elmallah:
An Adaptive Non-preemptive Scheduling Framework for Delay Bounded Traffic in Cellular Networks. LCN 2006: 81-88 - 2005
- [c1]Yaser M. Khamayseh, Ehab S. Elmallah:
A delay bounded approach for streaming services in CDMA cellular networks. Q2SWinet 2005: 130-135
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:53 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint