Please login first
Hossein Jahankhani  - - - 
Top co-authors
Lazaros Iliadis

44 shared publications

Democritus University of Thrace

Elias Pimenidis

29 shared publications

University of East London

Hossein Jahankhani

3 shared publications

Devon Bennett

1 shared publications

University of East London

Publication Record
Distribution of Articles published per year 
(1970 - 2009)
Total number of journals
published in
BOOK-CHAPTER 0 Reads 0 Citations The UK Government’s Critical National Infrastructure Policy for Emergency Services Communications Platforms: Vulnerabili... Devon Bennett, Hossein Jahankhani, Hamid Jahankhani Published: 01 January 2009
Highlights of Practical Applications of Agents, Multi-Agent Systems, and Complexity: The PAAMS Collection, doi: 10.1007/978-3-642-04062-7_6
DOI See at publisher website
ABS Show/hide abstract
In this era of global communications individual communities and entire cities rely heavily on the public telecommunication platforms to support the emergency services workers to provide a professional service in extreme situations, such as natural disasters - floods, earthquakes and hurricanes etc; or terrorist / political attacks, such as London, New York and Madrid. Previous experiences have demonstrated that in such situations entire cities find their general communication platforms such as the Public Switched Telephone Networks and Cellular systems are overwhelmed with emergency communication traffic, as huge number of calls are made locally and internationally to the disaster area to determine if love ones are injured or safe. Until recently under these extreme conditions the emergency services would have to rely solely on the available telecommunications bandwidth and any contingency bandwidth that has been allocated for such situations. However the UK government has a part of its Critical National Infrastructure as deployed a TETRA based private mobile radio (PMR) system to separate critical emergency communication from the general communication platforms. This paper analyzes whether this new system is resilient or could the use of MANET’s be utilised to operate in extreme situations to provide a crucial short/mid-term communication platform.
Article 2 Reads 0 Citations E-learning in the work-places in the rural sector of northeastern Greece Elias Pimenidis, Lazaros Iliadis, Hossein Jahankhani Published: 01 January 2005
Operational Research, doi: 10.1007/bf02944159
DOI See at publisher website
ABS Show/hide abstract
Internet based applications and in particular e-learning ones have proved very successful when applied to training diverse groups in small and disparate communities. This paper discusses the potential of e-learning methods in training in the rural sector of north-eastern Greece. A survey was carried out amongst Greek rural communities in the region of Eastern Macedonia and Thrace during the autumn of 2003. The results of the survey have been analyzed and discussed with two axes of focus in mind: Establishing which areas of learning would be the most immediately acceptable for use in an e-learning application of training within the farming industry and to ascertain the extent to which e-learning has already been adopted within the rural areas of north-eastern Greece.
BOOK-CHAPTER 0 Reads 0 Citations Evaluation of Tools for Protection of Interest against Hacking and Cracking Hossein Jahankhani, Branko Antonijevic, Terry Walcott
Highlights of Practical Applications of Agents, Multi-Agent Systems, and Complexity: The PAAMS Collection, doi: 10.1007/978-3-540-69403-8_7
DOI See at publisher website
ABS Show/hide abstract
The internet considered a tool that effectively ensures communication globally has been hindered by hackers and crackers continuously. In so doing, a multitude of network facilitated tools such as firewalls, virtual private networks (VPN) and a variety of antivirus software packages has been enabled for dealing with such predicaments. However, more often than not these facilitated tools are marketed as perfect solutions to the ever culminating problems such as loss of data and privacy in networked and world wide intercommunications. We provide a forum for addressing these perceived problems in this paper.