Skip to main content

Research Repository

Advanced Search

All Outputs (59)

Scalable Machine Learning Architectures for IPA-Driven Maintenance Task Allocation in Large-Scale Building Portfolios (2024)
Presentation / Conference Contribution
Huang, Z., Liu, X., Romdhani, I., & Shih, C. (2024, August). Scalable Machine Learning Architectures for IPA-Driven Maintenance Task Allocation in Large-Scale Building Portfolios. Presented at The 7th International Conference on Information Science and Sy

This research presents a groundbreaking approach to Building Maintenance Management (BMM) by introducing an Intelligent Process Automation (IPA)-Driven Building Maintenance Management (IBMM) model. This innovative model harnesses the synergies betwee... Read More about Scalable Machine Learning Architectures for IPA-Driven Maintenance Task Allocation in Large-Scale Building Portfolios.

Lessons Learnt from An Online Pilot Study About Strategic Alignment at A Higher Education Institution (2023)
Presentation / Conference Contribution
Kachale, T., Demeke, W., Chrysoulas, C., & Romdhani, I. (2023, March). Lessons Learnt from An Online Pilot Study About Strategic Alignment at A Higher Education Institution. Presented at 16th IADIS International Conference on Information Systems (IS 2023)

This article is a report on the lessons learned when conducting an interpretive case study in a developing country. From the literature review, it was apparent that there are few reported lessons from pilot studies about strategic alignment in higher... Read More about Lessons Learnt from An Online Pilot Study About Strategic Alignment at A Higher Education Institution.

Resolving the Decreased Rank Attack in RPL’s IoT Networks (2023)
Presentation / Conference Contribution
Ghaleb, B., Al-Duba, A., Hussain, A., Romdhani, I., & Jaroucheh, Z. (2023). Resolving the Decreased Rank Attack in RPL’s IoT Networks. In 2023 19th International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-Io

The Routing Protocol for Low power and Lossy networks (RPL) has been developed by the Internet Engineering Task Force (IETF) standardization body to serve as a part of the 6LoWPAN (IPv6 over Low-Power Wireless Personal Area Networks) standard, a core... Read More about Resolving the Decreased Rank Attack in RPL’s IoT Networks.

An exploratory qualitative study of middle managers' lived experiences in contribution to strategic alignment at a public university (2022)
Presentation / Conference Contribution
Kachale, T., Demeke, W., Chrysoulas, C., & Romdhani, I. (2023, April). An exploratory qualitative study of middle managers' lived experiences in contribution to strategic alignment at a public university. Presented at 11th World Conference on Information

This study draws attention to less studied areas of middle management role in business strategy formulation, information strategy formulation, and their alignment in developing countries. It was conducted as a case study at a public university in Mal... Read More about An exploratory qualitative study of middle managers' lived experiences in contribution to strategic alignment at a public university.

An Ontological Model for Courses and Academic Profiles Representation: A case study of King Abdulaziz University (2020)
Presentation / Conference Contribution
Ashour, G., Al-Dubai, A., Romdhani, I., & Aljohani, N. (2020). An Ontological Model for Courses and Academic Profiles Representation: A case study of King Abdulaziz University. In 2020 International Conference Engineering Technologies and Computer Scienc

Educational data is growing continuously. This huge amount of data that is scattered and come from different resources with different formats usually is noisy, duplicated, inconsistent, and unorganized. These data can be more efficient and usable whe... Read More about An Ontological Model for Courses and Academic Profiles Representation: A case study of King Abdulaziz University.

Delegation of Authentication to the Data Plane in Software-Defined Networks (2020)
Presentation / Conference Contribution
Almaini, A., Al-Dubai, A., Romdhani, I., & Schramm, M. (2019, October). Delegation of Authentication to the Data Plane in Software-Defined Networks. Presented at 2019 IEEE International Conferences on Ubiquitous Computing & Communications (IUCC) and Data

OpenFlow is considered as the most known protocol for Software Defined Networking (SDN). The main drawback of OpenFlow is the lack of support of new header definitions, which is required by network operators to apply new packet encapsulations. While... Read More about Delegation of Authentication to the Data Plane in Software-Defined Networks.

BCFR: Blockchain-based Controller Against False Flow Rule Injection in SDN (2020)
Presentation / Conference Contribution
Boukria, S., Guerroumi, M., & Romdhani, I. (2020). BCFR: Blockchain-based Controller Against False Flow Rule Injection in SDN. In 2019 IEEE Symposium on Computers and Communications (ISCC) (1034-1039). https://doi.org/10.1109/ISCC47284.2019.8969780

Software Defined Networking (SDN) technology increases the evolution of Internet and network development. SDN, with its logical centralization of controllers and global network overview changes the network's characteristics, on term of flexibility, a... Read More about BCFR: Blockchain-based Controller Against False Flow Rule Injection in SDN.

Cross-Layer Multipath Multichannel MAC protocol for MANETs (2018)
Presentation / Conference Contribution
Mirza, N., Taylor, H., Abdelshafy, M., King, P., Romdhani, I., & Alghamdi, A. (2018). Cross-Layer Multipath Multichannel MAC protocol for MANETs. In Proceedings of the International Symposium on Networks, Computers and Communications (ISNCC). https://doi

Utilising multiple disjoint paths in multiple channels can improve network performance by enabling a node to reroute data along discovered paths seamlessly when link failure is detected. However, depending on a stale route to recover from a broken li... Read More about Cross-Layer Multipath Multichannel MAC protocol for MANETs.

Collaborative Computing: Networking, Applications and Worksharing: 13th International Conference, CollaborateCom 2017, Edinburgh, UK, December 11–13, 2017, Proceedings (2018)
Presentation / Conference Contribution
(2017, December). Collaborative Computing: Networking, Applications and Worksharing: 13th International Conference, CollaborateCom 2017, Edinburgh, UK, December 11–13, 2017, Proceedings. Presented at CollaborateCom 2017, Edinburgh, UK

This book constitutes the thoroughly refereed proceedings of the 13th International Conference on Collaborative Computing: Networking, Applications, and Worksharing, CollaborateCom 2017, held in Edinburgh, UK, in December 2017. The 65 papers presente... Read More about Collaborative Computing: Networking, Applications and Worksharing: 13th International Conference, CollaborateCom 2017, Edinburgh, UK, December 11–13, 2017, Proceedings.

Reliable and Energy-Efficient Two Levels Unequal Clustering Mechanism for Wireless Sensor Networks (2018)
Presentation / Conference Contribution
Ali, A. E., Al-Dubai, A., Romdhani, I., & Eshaftri, M. (2018, June). Reliable and Energy-Efficient Two Levels Unequal Clustering Mechanism for Wireless Sensor Networks. Paper presented at The 16th IEEE International Conference on Smart City (IEEE SmartCit

In Wireless Sensor Networks, clustering sensor nodes into disjoint groups is widely used to achieve load balance and increase network lifetime. In particular, traditional unequal clustering approaches where small clusters located close to the base st... Read More about Reliable and Energy-Efficient Two Levels Unequal Clustering Mechanism for Wireless Sensor Networks.

A new Zigbee-based device for measuring visual reaction time in sport activities (2018)
Presentation / Conference Contribution
Ali, B. B., Dugas, É., Naceur, A., & Romdhani, I. (2018). A new Zigbee-based device for measuring visual reaction time in sport activities. In 2017 International Conference on Engineering & MIS (ICEMIS). https://doi.org/10.1109/icemis.2017.8273005

There is a growing demand for smart tools and devices that measure visual reaction time during sports and physical activities in outdoor environments. However, one of the major problems is the need to maintain an on-time 1 pulse per second (pps) refe... Read More about A new Zigbee-based device for measuring visual reaction time in sport activities.

A Trust-based Intrusion Detection System for Mobile RPL Based Networks (2018)
Presentation / Conference Contribution
Faiza, M., Tandjaoui, D., Romdhani, I., & Nabil, D. (2018). A Trust-based Intrusion Detection System for Mobile RPL Based Networks. In Proceedings of 10th IEEE International Conference on Internet of Things (iThings-2017). https://doi.org/10.1109/iThings

Successful deployment of Low power and Lossy Networks (LLNs) requires self-organising, self-configuring, security, and mobility support. However, these characteristics can be exploited to perform security attacks against the Routing Protocol for Low-... Read More about A Trust-based Intrusion Detection System for Mobile RPL Based Networks.

A new dynamic weight clustering algorithm for wireless sensor networks (2017)
Presentation / Conference Contribution
Essa, A., Al-Dubai, A., Romdhani, I., & Eshaftri, M. (2016, May). A new dynamic weight clustering algorithm for wireless sensor networks. Presented at 1st EAI International Conference on Smart Grid Inspired Future Technologies (SmartGift 2016)

Since sensor nodes have limited energy resources, prolonging network lifetime and improving scalability are essential elements in energy-efficient Wireless Sensor Networks (WSNs). Most existing approaches consider the residual energy of a single node... Read More about A new dynamic weight clustering algorithm for wireless sensor networks.

Reliable multipath multi-channel route migration over multi link-failure in wireless ad hoc networks (2017)
Presentation / Conference Contribution
Mirza, N. S., King, P. J. B., Romdhani, I., Abdelshafy, M. A., & Alghamdi, A. A. (2017). Reliable multipath multi-channel route migration over multi link-failure in wireless ad hoc networks. In Wireless and Mobile Computing, Networking and Communications

The route recovery algorithm is a crucial part of an ad hoc routing protocol. Designing an efficient and fast route recovery mechanism scheme without incurring extra overheads or delays to repair the broken link is a desirable goal for any routing pr... Read More about Reliable multipath multi-channel route migration over multi link-failure in wireless ad hoc networks.

A New Weight based Rotating Clustering Scheme for WSNs (2017)
Presentation / Conference Contribution
Essa, A., Al-Dubai, A. Y., Romdhani, I., & Esriaftri, M. A. (2017). A New Weight based Rotating Clustering Scheme for WSNs. In 2017 International Symposium on Networks, Computers and Communications (ISNCC). https://doi.org/10.1109/ISNCC.2017.8072000

Although energy efficiency in Wireless Sensor Networks (WSNs) has been investigated widely, it is still a challenging dilemma. Clustering mechanisms are among the most widely recommended approaches to sustaining a network throughout its lifetime. Des... Read More about A New Weight based Rotating Clustering Scheme for WSNs.

Performance Evaluation of RPL Protocol under Mobile Sybil Attacks (2017)
Presentation / Conference Contribution
Medjek, F., Tandjaoui, D., Romdhani, I., & Djedjig, N. (2017). Performance Evaluation of RPL Protocol under Mobile Sybil Attacks. In 2017 IEEE Trustcom/BigDataSE/ICESS. https://doi.org/10.1109/trustcom/bigdatase/icess.2017.351

In Sybil attacks, a physical adversary takes multiple fabricated or stolen identities to maliciously manipulate the network. These attacks are very harmful for the Internet of Things (IoT) applications. In this paper we implemented and evaluated the... Read More about Performance Evaluation of RPL Protocol under Mobile Sybil Attacks.

Drizzle: Adaptive and fair route maintenance algorithm for Low-power and Lossy Networks in IoT (2017)
Presentation / Conference Contribution
Ghaleb, B., Al-Dubai, A., Romdhani, I., Nasser, Y., & Boukerche, A. (2017). Drizzle: Adaptive and fair route maintenance algorithm for Low-power and Lossy Networks in IoT. In 2017 IEEE International Conference on Communications (ICC) (1-6). https://doi.o

Low-power and Lossy Networks (LLNs) have been a key component in the Internet of Things (IoT) paradigm. Recently, a standardized algorithm, namely Trickle algorithm, is adopted for routing information maintenance in such networks. This algorithm is o... Read More about Drizzle: Adaptive and fair route maintenance algorithm for Low-power and Lossy Networks in IoT.

Trust-Based Defence Model Against MAC Unfairness Attacks for IoT (2017)
Presentation / Conference Contribution
Djedjig, N., Tandjaoui, D., Romdhani, I., & Medjek, F. (2017). Trust-Based Defence Model Against MAC Unfairness Attacks for IoT. In C. Westphall, K. El-Khatib, D. Krstić, & H. Menouar (Eds.), Proceedings of the Thirteenth International Conference on Wire

The vulnerability of IoT networks makes channel access security a serious problem. The IEEE 802.15.4 MAC (Media Access Control) layer faces the risk of attacks from malicious nodes which attempts to get a dominating position and hold unfair advantage... Read More about Trust-Based Defence Model Against MAC Unfairness Attacks for IoT.

Performance evaluation of RPL metrics in environments with strained transmission ranges. (2017)
Presentation / Conference Contribution
Thomson, C., Wadhaj, I., Romdhani, I., & Al-Dubai, A. (2017). Performance evaluation of RPL metrics in environments with strained transmission ranges. In 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA). https://

An examination of existing studies in the area of Routing Protocol for Low-Power and Lossy Networks (RPL) implementation in wireless sensor networks (WSNs) reveals a consistent approach taken of optimal node distribution. This in order to best evalua... Read More about Performance evaluation of RPL metrics in environments with strained transmission ranges..

New trust metric for the RPL routing protocol (2017)
Presentation / Conference Contribution
Romdhani, I., Djedjig, N., Medjek, F., & Tandjaoui, D. (2017). New trust metric for the RPL routing protocol. In 2017 8th International Conference on Information and Communication Systems (ICICS),. https://doi.org/10.1109/iacs.2017.7921993

Establishing trust relationships between routing nodes represents a vital security requirement to establish reliable routing processes that exclude infected or selfish nodes. In this paper, we propose a new security scheme for the Internet of things... Read More about New trust metric for the RPL routing protocol.