Search Results - "OMRAN ALMAGRABI, ALAA"
-
1
iPhosD-PseAAC: Identification of phosphoaspartate sites in proteins using statistical moments and PseAAC
Published in Biocell (2021)“…Phosphoaspartate is one of the major components of eukaryotes and prokaryotic two-component signaling pathways, and it communicates the signal from the sensor…”
Get full text
Journal Article -
2
Fuzzy Detection System for Rumors Through Explainable Adaptive Learning
Published in IEEE transactions on fuzzy systems (01-12-2021)“…Nowadays, rumor spreading has gradually evolved into a kind of organized behaviors, accompanied with strong uncertainty and fuzziness. However, existing fuzzy…”
Get full text
Journal Article -
3
RETRACTED: Challenges and vulnerability evaluation of smart cities in IoT device based on cybersecurity mechanism
Published in Expert systems (01-05-2023)“…In recent times, Cyber thieves discover new software vulnerabilities and attack vectors to take advantage of them. Cyber Security (CS) specialists are having a…”
Get full text
Journal Article -
4
-
5
Fair Energy Division Scheme to Permanentize the Network Operation for Wireless Rechargeable Sensor Networks
Published in IEEE access (2020)“…In the past years, the energy constraint problem is known as a design issue of Wireless Sensor Networks (WSNs) due to equipping the sensor nodes with limited…”
Get full text
Journal Article -
6
Advancing the State of the Fog Computing to Enable 5G Network Technologies
Published in Sensors (Basel, Switzerland) (21-03-2020)“…Fog Computing (FC) is promising to Internet architecture for the emerging of modern technological approaches such as Fifth Generation (5G) networks and the…”
Get full text
Journal Article -
7
A Quantum-Safe Key Hierarchy and Dynamic Security Association for LTE/SAE in 5G Scenario
Published in IEEE transactions on industrial informatics (01-01-2020)“…Millions of devices are becoming part of Internet of Things/5G. Securing these devices against all potential threats is a huge challenge. The 5G specification…”
Get full text
Journal Article -
8
A classification-based privacy-preserving decision-making for secure data sharing in Internet of Things assisted applications
Published in Digital communications and networks (01-08-2022)“…The introduction of the Internet of Things (IoT) paradigm serves as pervasive resource access and sharing platform for different real-time applications…”
Get full text
Journal Article -
9
A Content-Based Medical Image Retrieval Method Using Relative Difference-Based Similarity Measure
Published in Intelligent automation and soft computing (2023)Get full text
Journal Article -
10
RETRACTED ARTICLE: Optimized intelligent data management framework for a cyber-physical system for computational applications
Published in Complex & intelligent systems (01-06-2023)Get full text
Journal Article -
11
Numerical simulation of unsteady MHD bio-convective flow of viscous nanofluid through a stretching surface
Published in Case studies in thermal engineering (01-01-2024)“…The current flow model is prepared to explore the characteristics of heat and mass transfer through a time-dependent bio-convection slip flow of viscous…”
Get full text
Journal Article -
12
SDN-Powered Humanoid With Edge Computing for Assisting Paralyzed Patients
Published in IEEE internet of things journal (01-07-2020)“…The number of people afflicted with paralysis is increasing worldwide due to stroke, spinal cord injury, polio, and other related diseases. Exoskeletons have…”
Get full text
Journal Article -
13
A Storage Optimization and Energy Efficiency-Based Edge-Enabled Companion-Side eHealth Monitoring System for IoT-Based Smart Hospitals
Published in IEEE internet of things journal (15-01-2024)“…During the last years, due to the Covid-19 pandemic, there has been a significant development of eHealth monitoring systems. However, most of the systems to…”
Get full text
Journal Article -
14
Evaluation of requirement engineering best practices for secure software development in GSD: An ISM analysis
Published in Journal of software : evolution and process (01-05-2024)“…Technological advancement makes the world a global village. Security is an evergreen and everlasting area, because of the continuous threat from Hackers and…”
Get full text
Journal Article -
15
Analysis of S-Box Based on Image Encryption Application Using Complex Fuzzy Credibility Frank Aggregation Operators
Published in IEEE access (2022)“…This article is about a criterion based on credibility complex fuzzy set (CCFS) to study the prevailing substitution boxes (S-box) and learn their properties…”
Get full text
Journal Article -
16
OGMAD: Optimal GTS-Allocation Mechanism for Adaptive Data Requirements in IEEE 802.15.4 Based Internet of Things
Published in IEEE access (2019)“…Future Internet of Things (IoT) will utilize IEEE 802.15.4 based low data rate communication for various applications. In the IEEE 802.15.4 standard, nodes…”
Get full text
Journal Article -
17
A Poisson Process-Based Random Access Channel for 5G and Beyond Networks
Published in Mathematics (Basel) (01-03-2021)“…The 5th generation (5G) wireless networks propose to address a variety of usage scenarios, such as enhanced mobile broadband (eMBB), massive machine-type…”
Get full text
Journal Article -
18
Sliding Group Window with Rebacking off for Collision Avoidance in High-Efficiency Wireless Networks
Published in Mathematics (Basel) (01-10-2021)“…It is difficult for wireless local area networks (WLANs), IEEE 802.11ax high-efficiency WLAN (HEW), to join next-generation innovations such as 5th generation…”
Get full text
Journal Article -
19
Intelligence Context Aware Mobile Navigation using Augmented Reality Technology
Published in Journal of information systems engineering and business intelligence (28-04-2018)“…Most of the technologies of today’s world, which are enriched with various powerful features and amazing quality characteristics, enables software developers…”
Get full text
Journal Article -
20
Investigating the Acceptance of Mobile Library Applications with an Extended Technology Acceptance Model (TAM)
Published in Computers and education (01-02-2020)“…Mobile applications are getting a great deal of interest among researchers due to their proliferation and pervasiveness, especially in the context of digital…”
Get full text
Journal Article