Search Results - "Shuwandy, Moceheb Lazam"

  • Showing 1 - 13 results of 13
Refine Results
  1. 1

    Empowering Communication: A Deep Learning Framework for Arabic Sign Language Recognition with an Attention Mechanism by Abdul Ameer, R. S., Ahmed, M. A., Al-Qaysi, Z. T., Salih, M. M., Shuwandy, Moceheb Lazam

    Published in Computers (Basel) (01-06-2024)
    “…This article emphasises the urgent need for appropriate communication tools for communities of people who are deaf or hard-of-hearing, with a specific emphasis…”
    Get full text
    Journal Article
  2. 2
  3. 3

    Sensor-Based mHealth Authentication for Real-Time Remote Healthcare Monitoring System: A Multilayer Systematic Review by Shuwandy, Moceheb Lazam, Zaidan, B. B., Zaidan, A. A., Albahri, A. S.

    Published in Journal of medical systems (01-02-2019)
    “…The new and groundbreaking real-time remote healthcare monitoring system on sensor-based mobile health (mHealth) authentication in telemedicine has…”
    Get full text
    Journal Article
  4. 4

    mHealth Authentication Approach Based 3D Touchscreen and Microphone Sensors for Real-Time Remote Healthcare Monitoring System: Comprehensive Review, Open Issues and Methodological Aspects by Shuwandy, Moceheb Lazam, Zaidan, B.B., Zaidan, A.A., Albahri, A.S., Alamoodi, A.H., Albahri, O.S., Alazab, Mamoun

    Published in Computer science review (01-11-2020)
    “…Patient authentication acquires superior attention as a necessary security requirement in a remote health monitoring system. From a usability perspective,…”
    Get full text
    Journal Article
  5. 5

    Systematic review of training environments with motor imagery brain–computer interface: Coherent taxonomy, open issues and recommendation pathway solution by Al-Qaysi, Z. T., Ahmed, M. A., Hammash, Nayif Mohammed, Hussein, Ahmed Faeq, Albahri, A. S., Suzani, M. S, Al-Bander, Baidaa, Shuwandy, Moceheb Lazam, Salih, Mahmood M

    Published in Health and technology (01-07-2021)
    “…The brain–computer interface (BCI) technique represents one of the furthermost active interdisciplinary study domains and includes a wide knowledge spectrum…”
    Get full text
    Journal Article
  6. 6

    Sensor-based authentication in smartphone: A systematic review by Shuwandy, Moceheb Lazam, Jouda, A.S., Ahmed, M.A., Salih, Mahmood M., Al-qaysi, Z.T., Alamoodi, A.H., Garfan, Salem, Albahri, O.S., Zaidan, B.B., Albahri, A.S.

    Published in Maǧallaẗ al-abḥath al-handasiyyaẗ (01-02-2024)
    “…With the widespread usage of smartphones, users not just using their smartphone for calls and messaging only, but they are using it for a variety of purposes…”
    Get full text
    Journal Article
  7. 7

    A systematic review into the assessment of medical apps: motivations, challenges, recommendations and methodological aspect by Alamoodi, A. H., Garfan, Salem, Zaidan, B. B., Zaidan, A. A., Shuwandy, Moceheb Lazam, Alaa, Mussab, Alsalem, M. A., Mohammed, Ali, Aleesa, A. M., Albahri, O. S., Al-Hussein, Ward Ahmed, Alobaidi, O. R.

    Published in Health and technology (01-09-2020)
    “…Recent years have shown significantly pervasive interest in mobile applications (hereinafter “apps”). The number and popularity of these apps are dramatically…”
    Get full text
    Journal Article
  8. 8

    Development MOLAZ Method in Multi Blocks: D3MB by Abboud, Udai Wasmi, Shuwandy, Moceheb Lazam

    “…Data security and confidentiality are of utmost importance since sensitive information is continually being sent through networks and kept on devices. Against…”
    Get full text
    Conference Proceeding
  9. 9

    SDA Plus: Improving the Performance of the System Determine Algorithm (SDA) of the Switching Between AES-128 and AES-256 (MOLAZ Method) by Abboud, Udai Wasmi, Shuwandy, Moceheb Lazam

    “…There are many encryption algorithms; some of them are strong but slow in decryption, unlike other methods. The MOLAZ method is one of the encryption…”
    Get full text
    Conference Proceeding
  10. 10

    Biometric Authentication Utilizing EEG Based-on a Smartphone's 3D Touchscreen Sensor by Younis, Aseel Yasir, Shuwandy, Moceheb Lazam

    “…Recently, smartphone manufacturers have begun including large storage capacities and powerful processors. Users' personal lives, professional lives, and vast…”
    Get full text
    Conference Proceeding
  11. 11

    LightRing-MO: Light Sensor Static-Authentication Using a Semi-Biometric Interacting with a LightRing by Shareef, Omar Ahmed, Shuwandy, Moceheb Lazam

    “…At this time, the smartphone is one of the most popular and commonly utilized instruments for protecting private information. One of the smartphone…”
    Get full text
    Conference Proceeding
  12. 12

    MagRing-SASB: Static Authentication of Magnetism Sensor Using Semi-Biometric Interaction Magnetic Ring by Jouda, A. S., Sagheer, Ali Makki, Shuwandy, Moceheb Lazam

    “…The Smartphone is one of the most well-known and widely used devices in contemporary times for protecting private information. Biometric methods are one way…”
    Get full text
    Conference Proceeding
  13. 13

    BAWS3TS: Browsing Authentication Web-Based Smartphone Using 3D Touchscreen Sensor by Shuwandy, Moceheb Lazam, Aljubory, H. A., Hammash, N. M., Salih, M. M., Altaha, M. A., Alqaisy, Z. T.

    “…Modern mobile devices, especially smartphones, have developed rapidly and are widely adopted by people of all ages. Smartphones can assist users in various…”
    Get full text
    Conference Proceeding