Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Mohammad Hayajneh is active.

Publication


Featured researches published by Mohammad Hayajneh.


IEEE Communications Letters | 2004

Distributed joint rate and power control game-theoretic algorithms for wireless data

Mohammad Hayajneh; Chaouki T. Abdallah

In this letter, we consider two distributed game theoretic algorithms to jointly solve the problem of optimizing the transmission rates and transmit powers for future wireless data communication systems. We then establish the existence, uniqueness and Pareto optimality of Nash equilibria of both games.


Sensors | 2013

Data Management for the Internet of Things: Design Primitives and Solution

Mervat Abu-Elkheir; Mohammad Hayajneh; Najah A. Abu Ali

The Internet of Things (IoT) is a networking paradigm where interconnected, smart objects continuously generate data and transmit it over the Internet. Much of the IoT initiatives are geared towards manufacturing low-cost and energy-efficient hardware for these objects, as well as the communication technologies that provide objects interconnectivity. However, the solutions to manage and utilize the massive volume of data produced by these objects are yet to mature. Traditional database management solutions fall short in satisfying the sophisticated application needs of an IoT network that has a truly global-scale. Current solutions for IoT data management address partial aspects of the IoT environment with special focus on sensor networks. In this paper, we survey the data management solutions that are proposed for IoT or subsystems of the IoT. We highlight the distinctive design primitives that we believe should be addressed in an IoT data management solution, and discuss how they are approached by the proposed solutions. We finally propose a data management framework for IoT that takes into consideration the discussed design elements and acts as a seed to a comprehensive IoT data management solution. The framework we propose adapts a federated, data- and sources-centric approach to link the diverse Things with their abundance of data to the potential applications and services that are envisioned for IoT.


ad hoc networks | 2014

Fibonacci sequence based multipath load balancing approach for mobile ad hoc networks

Yahya M. Tashtoush; Omar M. Darwish; Mohammad Hayajneh

This paper explores Fibonacci Multipath Load Balancing protocol (FMLB) for Mobile Ad Hoc Networks (MANETs). The FMLB protocol distributes transmitted packets over multiple paths through the mobile nodes using Fibonacci sequence. Such distribution can increase the delivery ratio since it reduces the congestion. The FMLB protocols responsibility is balancing the packets transmission over the selected paths and ordering them according to hops count. The shortest path is used more frequently than the other ones. The simulation results show that the FMLB protocol has achieved an enhancement on packet delivery ratio, up to 21%, as compared to the Ad Hoc On-demand Distance Vector routing protocol (AODV) protocol, and up to 11% over the linear Multiple-path routing protocol. Also the results show the effect of nodes pause time and speed on each of the data delivery ratio and End-to-End (E2E) delay transmission time. Finally, the simulation results are obtained by the well-known Glomosim Simulator, version 2.03, without any distance or location measurements devices.


Sensors | 2012

An Adaptive OFDMA-Based MAC Protocol for Underwater Acoustic Wireless Sensor Networks

Issa Khalil; Yasser Gadallah; Mohammad Hayajneh; Abdallah Khreishah

Underwater acoustic wireless sensor networks (UAWSNs) have many applications across various civilian and military domains. However, they suffer from the limited available bandwidth of acoustic signals and harsh underwater conditions. In this work, we present an Orthogonal Frequency Division Multiple Access (OFDMA)-based Media Access Control (MAC) protocol that is configurable to suit the operating requirements of the underwater sensor network. The protocol has three modes of operation, namely random, equal opportunity and energy-conscious modes of operation. Our MAC design approach exploits the multi-path characteristics of a fading acoustic channel to convert it into parallel independent acoustic sub-channels that undergo flat fading. Communication between node pairs within the network is done using subsets of these sub-channels, depending on the configurations of the active mode of operation. Thus, the available limited bandwidth gets fully utilized while completely avoiding interference. We derive the mathematical model for optimal power loading and subcarrier selection, which is used as basis for all modes of operation of the protocol. We also conduct many simulation experiments to evaluate and compare our protocol with other Code Division Multiple Access (CDMA)-based MAC protocols.


IEEE Transactions on Wireless Communications | 2010

Congestion-Based Pricing Resource Management in Broadband Wireless Networks

Najah AbuAli; Mohammad Hayajneh; Hossam S. Hassanein

Supporting the diverse QoS requirements of multimedia applications is an essential requirement for broadband wireless access (BWA) networks. Due to the projected dynamics in traffic patterns, more capable resource management functionalities are needed. We propose a game-theoretic, congestion-based pricing scheduler that incorporates two sub-schemes: a bandwidth provisioning sub-scheme to address the bandwidth scarcity to provision in fourth generation (4G) BWA technologies and an efficient packet scheduler sub-scheme. To the best of our knowledge, the proposed scheduler is the first one to simultaneously control congestion and fairness while providing differentiated QoS guarantees in BWA networks. Simulation results show that the proposed scheme realizes our objectives of controlling congestion, providing differentiated QoS guarantees, and catering to proportional fairness among the different network classes and among connections within the same class.


wireless communications and networking conference | 2003

Statistical learning theory to evaluate the performance of game theoretic power control algorithms for wireless data in arbitrary channels

Mohammad Hayajneh; Chaouki T. Abdallah

In this paper we use statistical learning theory to evaluate the performance of game theoretic power control algorithms for wireless data in arbitrary channels, i.e., no presumed channel model is required. To show the validity of statistical learning theory in this context, we studied a flat fading channel, and more specifically, we simulated the case of Rayleigh flat fading channel. With the help of a relatively small number of training samples, the results suggest the learnability of the utility function classes defined by changing the user power (adjusted parameter) for each users utility function.


international conference on wireless communications and mobile computing | 2009

An OFDMA-based MAC protocol for under water acoustic wireless sensor networks

Mohammad Hayajneh; Issa Khalil; Yasser Gadallah

In this study, we introduce a novel OFDMA-based MAC protocol for underwater acoustic sensor networks. The design approach of this protocol exploits the multi-path characteristics of a fading acoustic channel. The goal is to convert the channel into parallel independent acoustic sub-channels that undergo flat fading. Communication between node pairs within the network is then done using subsets of these sub-channels thus fully utilizing the available limited bandwidth while avoiding interference completely. We derive the mathematical model for optimal sub-channel selection. We also present the results of the experiments that we conducted to evaluate the new protocol and we compare these results to those of a MAC protocol that is based on the CDMA scheme.


international symposium on computers and communications | 2009

SVNM: Secure verification of neighborhood membership in static multi-hop wireless networks

Issa Khalil; Mohammad Hayajneh; Mamoun Awad

Secure verification of neighborhood membership (SVNM) is a relatively recently stated problem that has an increasing number of practical applications. The problem can be stated as the capability of a wireless network node (verifier) to verify the claim by another node (claimer) that it exists within a certain physical distance from the verifier. Several physical properties of the received signal are used for onehop location estimation — signal strength, time of flight, and angle of arrival, etc. However, many of these approaches are either not practically applicable or prohibitively expensive in many wireless network scenarios. In this work, we propose algorithms to detect and isolate nodes that lie about their location in the incremental addition phase of static sensor networks. Every node should announce its position and the power level it uses for transmission. Cooperative and base station verifications are used to detect nodes that lie about their locations. Our results show that we can achieve perfect detection (100%) of nodes that falsify their location information using either high power transmission or with the help of other nodes.


international conference on communications | 2008

Cross Layer Scheduling Algorithm for IEEE 802.16

Najah A. Abu Ali; Mohammad Hayajneh; Hossam S. Hassanein

In order to support different types of user applications, the IEEE 802.16 standard defines different service classes together with their associated Quality of Service (QoS) parameters. However, the standard lacks a MAC scheduling architecture that guarantees these defined QoS requirements. The importance of efficient scheduling is crucial to QoS provisioning for multimedia flows. In this paper we propose an opportunistic and optimized downlink scheduler that pledges fairness among admitted connections. Our approach involves separating the scheduling problem into two sub-problems. In the first problem, the proposed scheduler calculates the number of time-slots in each time frame corresponding to the service classes with the objective minimizing the blocking probability of each class. In the second problem, time-slots for each class connection are allocated using an integrated cross-layer priority functions that guarantee proportional fairness. The simulation results reveal that the proposed scheduler realizes our objectives, and provides efficient QoS scheduling without starving the connections of the best effort class.


acs/ieee international conference on computer systems and applications | 2008

Impact of fading wireless channel on the performance of game theoretic power control algorithms for CDMA wireless data

Mohammad Hayajneh; Chaouki T. Abdallah; Walid Ibrahim

Our goal in this paper is to study the performance of the game-theoretic power control algorithms for wireless data introduced by Saraydar et al [1] in two realistic channels: (a1) fast flat fading channel and (a2) Slow flat fading channel. The fading coefficients under both (a1) and (a2) are studied under an appropriate small scale channel model that is used in the CDMA cellular systems, namely Nakagami channel model. To do so, we derive a closed- form expression of the average utility function which represents the number of bits received correctly at the receiver per one Joule expended. Then, using this expression we study the existence, uniqueness of Nash equilibrium (NE), and the social desirability of NE in the Pareto sense.

Collaboration


Dive into the Mohammad Hayajneh's collaboration.

Top Co-Authors

Avatar

Najah A. Abu Ali

United Arab Emirates University

View shared research outputs
Top Co-Authors

Avatar

Issa Khalil

Qatar Computing Research Institute

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Walid Ibrahim

United Arab Emirates University

View shared research outputs
Top Co-Authors

Avatar

Omar M. Darwish

Jordan University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Yahya M. Tashtoush

Jordan University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Falah Awwad

United Arab Emirates University

View shared research outputs
Top Co-Authors

Avatar

Imad Barhumi

United Arab Emirates University

View shared research outputs
Top Co-Authors

Avatar

Abdallah Khreishah

New Jersey Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge