Ghada F. El-Kabbany

Learn More
Load balancing algorithms are designed essentially to equally distribute the load on processors and maximize their utilities while minimizing the total task execution time. In order to achieve these goals, the load-balancing mechanism should be “fair” in distributing the load across the different processors. This implies that the difference between the(More)
Group communication can benefit from Internet Protocol (IP) multicast protocol to achieve efficient exchange of messages. However, IP multicast does not provide any mechanisms for authentication. In literature, many solutions to solve this problem were presented. It has been shown that Wong and Lam protocol is the only protocol that can resist both packet(More)
We take some parts of a theoretical mobility model in a two-dimension grid proposed by Greenlaw and Kantabutra to be our model. The model has eight necessary factors that we commonly use in a mobile wireless network: sources or wireless signal providers, the directions that a source can move, users or mobile devices, the given directions which define a(More)
Cryptography offers effective techniques to ensure users’ security and privacy in an efficient way. To protect networks from intruders/attackers and transmit a message over an insecure channel, encryption and digital signature algorithms could be used within different designs to provide secure networks and security solutions in order to protect users’(More)
In this paper, a parallel dynamic load balancing algorithm; which offers a good trade-off between the balancing degree and communication costs; is proposed. The proposed algorithm is analyzed, investigated, and implemented. Also, a new mathematical solution for that algorithm is presented. The analytical solution is tested on standard task graphs (STG) as(More)
The key distribution problem is considered one of the most important issues for providing secure multicast communication. Logical Key Hierarchy (LKH) protocols are considered one of the best solutions proposed for solving the scalability of multicast key distribution protocols. The use of LKH protocols reduces the computation complexity cost from O(n),(More)
  • 1