IOT technologies during and beyond COVID-19: A comprehensive review

M Yousif, C Hewage, L Nawaf - Future internet, 2021 - mdpi.com
The COVID-19 pandemic provided a much-needed sanity check for IoT-inspired frameworks
and solutions. IoT solutions such as remote health monitoring and contact tracing provided …

Hierarchical multi-agent optimization for resource allocation in cloud computing

X Gao, R Liu, A Kaushik - IEEE Transactions on Parallel and …, 2020 - ieeexplore.ieee.org
In cloud computing, an important concern is to allocate the available resources of service
nodes to the requested tasks on demand and to make the objective function optimum, ie …

A delaunay edges and simulated annealing-based integrated approach for mesh router placement optimization in wireless mesh networks

T Oda - Sensors, 2023 - mdpi.com
Wireless Mesh Networks (WMNs) can build a communications infrastructure using only
routers (called mesh routers), making it possible to form networks over a wide area at low …

A binary multi-objective approach for solving the WMNs topology planning problem

SM Taleb, K Baiche, Y Meraihi, S Yahia… - Peer-to-Peer Networking …, 2025 - Springer
This paper addresses the multi-objective topology planning problem in Wireless Mesh
Networks (WMNs), traditionally solved using Multi-Objective Particle Swarm Optimization …

Optimization of cyber security through the implementation of AI technologies

L Nawaf, V Bentotahewa - Journal of Intelligent Systems, 2025 - degruyter.com
Identification of cyber threats is crucial and significant for determining substantial security
techniques and approaches. This research illustrates a brief discussion of cyberspace …

[HTML][HTML] Detection and Minimization of Malware by Implementing AI in SMEs

N Rawindaran, L Nawaf, V Bentotahewa… - Malware-Detection …, 2022 - intechopen.com
The malware can threaten personal privacy by opening backdoors for attackers to access
user passwords, IP addresses, banking information, and other personal data, whilst some …