Eyad Taqieddin
Cited by
Cited by
Energy-Efficient Fuzzy-Logic-Based Clustering Technique for Hierarchical Routing Protocols in Wireless Sensor Networks
A Hamzah, M Shurman, O Al-Jarrah, E Taqieddin
Sensors 19 (3), 561, 2019
Energy-efficient and coverage-aware clustering in wireless sensor networks
F Awad, E Taqieddin, A Seyam
Wireless Engineering and Technology 3, 142, 2012
EPC Gen2v2 RFID standard authentication and ownership management protocol
H Niu, E Taqieddin, S Jagannathan
IEEE Transactions on Mobile Computing 15 (1), 137-149, 2015
Fuzzy logic based energy efficient adaptive clustering protocol
F Al-Ma'aqbeh, O Banimelhem, E Taqieddin, F Awad, M Mowafi
Proceedings of the 3rd International Conference on Information and …, 2012
An efficient clustering approach using genetic algorithm and node mobility in wireless sensor networks
O Banimelhem, M Mowafi, E Taqieddin, F Awad, M Al Rawabdeh
2014 11th International Symposium on Wireless Communications Systems (ISWCS …, 2014
Location-Aware and Mobility-Based Performance Optimization for Wireless Sensor Networks
E Taqieddin, F Awad, H Ahmad
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2017
Efficient FPGA Implementation of the RC4 Stream Cipher using Block RAM and Pipelining
E Taqieddin, O Abu-Rjei, K Mhaidat, R Bani-Hani
Procedia Computer Science 63, 8-15, 2015
High-Throughput and Area-Efficient FPGA Implementations of Data Encryption Standard (DES)
R Bani-Hani, S Harb, K Mhaidat, E Taqieddin
Circuits and Systems 5 (03), 45, 2014
A Gen2v2 compliant RFID authentication and ownership management protocol
H Niu, S Jagannathan, ES Taqieddin
39th Annual IEEE Conference on Local Computer Networks, 331-336, 2014
An Energy-Balanced Cluster-Based Protocol for Wireless Sensor Networks
E Taqieddin, M Mowafi, F Awad, O Banimelhem, H Maher
International Journal of Information Technology and Web Engineering (IJITWE …, 2013
Vulnerability analysis of two ultra-lightweight RFID authentication protocols: RAPP and gossamer
E Taqieddin, J Sarangapani
2012 International Conference for Internet Technology and Secured …, 2012
Experimental evaluation of image compression and transmission for TinyOS-based imote2 platform
M Mowafi, F Awad, E Taqieddin, O Banimelhem
2011 International Conference on Innovations in Information Technology, 173-178, 2011
A Practical Study of Jointly Exploiting Multiple Image Compression Techniques for Wireless Multimedia Sensor Networks
MY Mowafi, FH Awad, ES Taqieddin, OQ Banimelhem
Journal of Communications 7 (4), 309-320, 2012
Performance Enhancement in 5G Cellular Networks Using Priorities in Network Slicing
M Shurman, E Taqieddin, O Oudat, R Al-Qurran, AA Al Nounou
2019 IEEE Jordan International Joint Conference on Electrical Engineering …, 2019
Fuzzy logic-based cluster heads percentage calculation for improving the performance of the LEACH protocol
O Banimelhem, E Taqieddin, MY Mowafi, F Awad
Fuzzy Systems: Concepts, Methodologies, Tools, and Applications, 609-627, 2017
Image Steganography using YCbCr Color Space and Matrix Pattern
M Mowafi, O Oudat, E Taqieddin, O Banimelhem
2019 2nd International Conference on Signal Processing and Information …, 2019
An Enhanced EPC Gen2v2 RFID Authentication and Ownership Management Protocol
E Taqieddin, H Al-Dahoud, M Mowafi, O Banimelhem
Local Computer Networks (LCN), 2017 IEEE 42nd Conference on, 683-689, 2017
On the Improper Use of CRC for Cryptographic Purposes in RFID Mutual Authentication Protocols
E Taqieddin
International Journal of Communication Networks and Information Security 9 …, 2017
A simulation testbed to jointly exploit multiple image compression techniques for wireless multimedia sensor networks
F Awad, E Taqieddin, M Mowafi, O Banimelhem, A AbuQdais
Wireless Communications Systems (ISWCS), 2014 11th International Symposium …, 2014
Survivability and Reliability Analysis of the Trusted Link State Routing Protocol for Wireless AD HOC Networks
E Taqieddin, A Miller, S Jagannathan
International Journal of Wireless & Mobile Networks (IJWMN) 3 (2), 77-89, 2011
The system can't perform the operation now. Try again later.
Articles 1–20