Follow
Eyad Taqieddin
Title
Cited by
Cited by
Year
Energy-Efficient Fuzzy-Logic-Based Clustering Technique for Hierarchical Routing Protocols in Wireless Sensor Networks
A Hamzah, M Shurman, O Al-Jarrah, E Taqieddin
Sensors 19 (3), 561, 2019
962019
Energy-efficient and coverage-aware clustering in wireless sensor networks
F Awad, E Taqieddin, A Seyam
Wireless Engineering and Technology 3, 142, 2012
452012
EPC Gen2v2 RFID standard authentication and ownership management protocol
H Niu, E Taqieddin, S Jagannathan
IEEE Transactions on Mobile Computing 15 (1), 137-149, 2015
382015
Fuzzy logic based energy efficient adaptive clustering protocol
F Al-Ma'aqbeh, O Banimelhem, E Taqieddin, F Awad, M Mowafi
Proceedings of the 3rd International Conference on Information and …, 2012
242012
An efficient clustering approach using genetic algorithm and node mobility in wireless sensor networks
O Banimelhem, M Mowafi, E Taqieddin, F Awad, M Al Rawabdeh
2014 11th International Symposium on Wireless Communications Systems (ISWCS …, 2014
172014
Location-Aware and Mobility-Based Performance Optimization for Wireless Sensor Networks
E Taqieddin, F Awad, H Ahmad
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2017
142017
Efficient FPGA Implementation of the RC4 Stream Cipher using Block RAM and Pipelining
E Taqieddin, O Abu-Rjei, K Mhaidat, R Bani-Hani
Procedia Computer Science 63, 8-15, 2015
112015
High-Throughput and Area-Efficient FPGA Implementations of Data Encryption Standard (DES)
R Bani-Hani, S Harb, K Mhaidat, E Taqieddin
Circuits and Systems 5 (03), 45, 2014
112014
Tag ownership transfer in radio frequency identification systems: a survey of existing protocols and open challenges
E Taqieddin, H Al-Dahoud, H Niu, J Sarangapani
IEEE Access 6, 32117-32155, 2018
92018
A High-Capacity Image Steganography Method Using Chaotic Particle Swarm Optimization
A Jaradat, E Taqieddin, M Mowafi
Security and Communication Networks 2021, 11, 2021
82021
A Gen2v2 compliant RFID authentication and ownership management protocol
H Niu, S Jagannathan, ES Taqieddin
39th Annual IEEE Conference on Local Computer Networks, 331-336, 2014
82014
Performance Enhancement in 5G Cellular Networks Using Priorities in Network Slicing
M Shurman, E Taqieddin, O Oudat, R Al-Qurran, AA Al Nounou
2019 IEEE Jordan International Joint Conference on Electrical Engineering …, 2019
72019
An Energy-Balanced Cluster-Based Protocol for Wireless Sensor Networks
E Taqieddin, M Mowafi, F Awad, O Banimelhem, H Maher
International Journal of Information Technology and Web Engineering (IJITWE …, 2013
72013
Experimental evaluation of image compression and transmission for TinyOS-based imote2 platform
M Mowafi, F Awad, E Taqieddin, O Banimelhem
2011 International Conference on Innovations in Information Technology, 173-178, 2011
72011
Fuzzy logic-based cluster heads percentage calculation for improving the performance of the LEACH protocol
O Banimelhem, E Taqieddin, MY Mowafi, F Awad
Fuzzy Systems: Concepts, Methodologies, Tools, and Applications, 609-627, 2017
52017
Vulnerability analysis of two ultra-lightweight RFID authentication protocols: RAPP and gossamer
E Taqieddin, J Sarangapani
2012 International Conference for Internet Technology and Secured …, 2012
52012
A Practical Study of Jointly Exploiting Multiple Image Compression Techniques for Wireless Multimedia Sensor Networks
MY Mowafi, FH Awad, ES Taqieddin, OQ Banimelhem
Journal of Communications 7 (4), 309-320, 2012
52012
Image Steganography using YCbCr Color Space and Matrix Pattern
M Mowafi, O Oudat, E Taqieddin, O Banimelhem
2019 2nd International Conference on Signal Processing and Information …, 2019
42019
Energy-Efficient and QoS-Aware Multi-Path Geographic Routing Protocol for WMSN
A Alma'aitah, M Mowafi, E Taqieddin
2018 IEEE Globecom Workshops (GC Wkshps), 1-6, 2018
42018
An Enhanced EPC Gen2v2 RFID Authentication and Ownership Management Protocol
E Taqieddin, H Al-Dahoud, M Mowafi, O Banimelhem
Local Computer Networks (LCN), 2017 IEEE 42nd Conference on, 683-689, 2017
32017
The system can't perform the operation now. Try again later.
Articles 1–20