Yaser Khamayseh
Yaser Khamayseh
Associate Professor of Computer Science, JUST
Verified email at just.edu.jo
TitleCited byYear
Improvement on LEACH protocol of wireless sensor network (VLEACH
MB Yassein, Y Khamayseh, W Mardini
Int. J. Digit. Content Technol. Appl. 2009, 2009
Improvement on LEACH protocol of wireless sensor network (VLEACH
MB Yassein, Y Khamayseh, W Mardini
Int. J. Digit. Content Technol. Appl. 2009, 2009
Ma-aodv: Mobility aware routing protocols for mobile ad hoc networks
Y Khamayseh, OM Darwish, SA Wedian
2009 Fourth International Conference on Systems and Networks Communications …, 2009
Mobility and load aware routing protocol for ad hoc networks
Y Khamayseh, G Obiedat, MB Yassin
Journal of King Saud University-Computer and Information Sciences 23 (2 …, 2011
Rotated hybrid, energy-efficient and distributed (R-HEED) clustering protocol in WSN
W Mardini, MB Yassein, Y Khamayseh, BA Ghaleb
wseas transactions on communications 13, 275-290, 2014
Performance evaluation of different scheduling algorithms in WiMax
AZ Al-Howaide, AS Doulat, YM Khamayseh
arXiv preprint arXiv:1111.2996, 2011
A new protocol for detecting black hole nodes in ad hoc networks
Y Khamayseh, A Bader, W Mardini, MB Yasein
International Journal of Communication Networks and Information Security 3 …, 2011
Comprehensive study of symmetric key and asymmetric key encryption algorithms
MB Yassein, S Aljawarneh, E Qawasmeh, W Mardini, Y Khamayseh
2017 international conference on engineering and technology (ICET), 1-7, 2017
Application of artificial bee colony for intrusion detection systems
M Aldwairi, Y Khamayseh, M Al‐Masri
Security and Communication Networks 8 (16), 2730-2740, 2015
An active microwave sensor for near field imaging
AF Mirza, CH See, IM Danjuma, R Asif, RA Abd-Alhameed, JM Noras, ...
IEEE Sensors Journal 17 (9), 2749-2757, 2017
Malicious nodes detection in MANETs: behavioral analysis approach
Y Khamayseh, R Al-Salah, MB Yassein
Journal of networks 7 (1), 116, 2012
A Framework for an E-government Based on Service Oriented Architecture for Jordan
ZI Saleh, RA Obeidat, Y Khamayseh
International Journal of Information Engineering and Electronic Business 5 …, 2013
Fibonacci Backoff Algorithm for IEEE 802.15. 4/ZigBee.
MOB Yassein, M Salayma, W Mardini, YM Khamayseh
Network Protocols & Algorithms 4 (3), 62-78, 2012
Integration of wireless technologies in Smart University Campus environment: framework architecture
Y Khamayseh, W Mardini, S Aljawarneh, MB Yassein
International Journal of Information and Communication Technology Education …, 2015
Enhanced Fibonacci backoff algorithm for mobile Ad-hoc network
MB Yassein, O Al Oqaily, G Min, W Mardini, Y Khamayseh, SS Manaseer
2010 10th IEEE International Conference on Computer and Information …, 2010
Ensuring survivability against Black Hole Attacks in MANETS for preserving energy efficiency
YM Khamayseh, SA Aljawarneh, AE Asaad
Sustainable Computing: Informatics and Systems 18, 90-100, 2018
Interference problem between ZigBee and WiFi
W Mardini, Y Khamayseh, R Jaradatand, R Hijjawi
International Proceedings of Computer Science and Information Technology …, 2012
Adaptive RSSI-based localization scheme for wireless sensor networks
W Mardini, Y Khamayseh, AA Almodawar, E Elmallah
Peer-to-Peer Networking and Applications 9 (6), 991-1004, 2016
Optimal beacon and superframe orders in WSNs
M Salayma, W Mardini, Y Khamayseh, MB Yasin
topology 6, 8, 2013
Network size estimation in VANETs.
YM Khamayseh, MOB Yassein, M AbdAlghani, CX Mavromoustakis
Network Protocols & Algorithms 5 (3), 136-152, 2013
The system can't perform the operation now. Try again later.
Articles 1–20