Search Results - "Tawalbeh, Lo’ai"
-
1
Mobile Cloud Computing Model and Big Data Analysis for Healthcare Applications
Published in IEEE access (2016)“…Mobile devices are increasingly becoming an indispensable part of people's daily life, facilitating to perform a variety of useful tasks. Mobile cloud…”
Get full text
Journal Article -
2
A Novel secure and privacy-preserving model for OpenID Connect based on Blockchain
Published in IEEE access (01-01-2023)“…OpenID Connect (OIDC) is one of the most widely used delegated authentication protocols in web and mobile applications providing a single sign-on experience…”
Get full text
Journal Article -
3
Efficient Dynamic S-Box Generation Using Linear Trigonometric Transformation for Security Applications
Published in IEEE access (2021)“…Protection of data transmitted over the network from illegal access is one of the major challenges being posed by exponential growth of data in online digital…”
Get full text
Journal Article -
4
Reconsidering big data security and privacy in cloud and mobile cloud systems
Published in Journal of King Saud University. Computer and information sciences (01-09-2021)“…Large scale distributed systems in particular cloud and mobile cloud deployments provide great services improving people's quality of life and organizational…”
Get full text
Journal Article -
5
IoT Privacy and Security: Challenges and Solutions
Published in Applied sciences (01-06-2020)“…Privacy and security are among the significant challenges of the Internet of Things (IoT). Improper device updates, lack of efficient and robust security…”
Get full text
Journal Article -
6
Deep Learning Modalities for Biometric Alteration Detection in 5G Networks-Based Secure Smart Cities
Published in IEEE access (2021)“…Smart cities and their applications have become attractive research fields birthing numerous technologies. Fifth generation (5G) networks are important…”
Get full text
Journal Article -
7
Efficient multimodal deep-learning-based COVID-19 diagnostic system for noisy and corrupted images
Published in Journal of King Saud University. Science (01-04-2022)“…In humanity’s ongoing fight against its common enemy of COVID-19, researchers have been relentless in finding efficient technologies to support mitigation,…”
Get full text
Journal Article -
8
Greener and Smarter Phones for Future Cities: Characterizing the Impact of GPS Signal Strength on Power Consumption
Published in IEEE access (2016)“…Smart cities appear as the next stage of urbanization aiming to not only exploit physical and digital infrastructure for urban development but also the…”
Get full text
Journal Article -
9
Zero-day attack detection: a systematic literature review
Published in The Artificial intelligence review (01-10-2023)“…With the continuous increase in cyberattacks over the past few decades, the quest to develop a comprehensive, robust, and effective intrusion detection system…”
Get full text
Journal Article -
10
Efficient FPGA Implementation of a Programmable Architecture for GF(p) Elliptic Curve Crypto Computations
Published in Journal of signal processing systems (01-06-2010)“…This paper presents a processor architecture for elliptic curve cryptography computations over GF(p). The speed to compute the Elliptic-curve point…”
Get full text
Journal Article -
11
In-Home Floor Based Sensor System-Smart Carpet- to Facilitate Healthy Aging in Place (AIP)
Published in IEEE access (2020)“…With the rapidly aging population, there is a need to detect elderly's activity, monitor their health, alert health care personnel, and provide real-time and…”
Get full text
Journal Article -
12
Hardware Design and Implementation of ElGamal Public-Key Cryptography Algorithm
Published in Information security journal. (28-10-2010)“…Demands on secure communications have increased dramatically in the last few years. Cryptography is widely used for secure data transmission. In fact,…”
Get full text
Journal Article -
13
Delay-aware power optimization model for mobile edge computing systems
Published in Personal and ubiquitous computing (01-12-2017)“…Reducing the total power consumption and network delay are among the most interesting issues facing large-scale Mobile Cloud Computing (MCC) systems and their…”
Get full text
Journal Article -
14
Resource Efficient Mobile Computing Using Cloudlet Infrastructure
Published in 2013 IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks (01-12-2013)“…Mobile Cloud Computing (MCC) has been introduced as a viable solution to the inherited limitations of mobile computing. These limitations include battery…”
Get full text
Conference Proceeding -
15
A Novel High Quality High Capacity Image Hiding Scheme Based on Image Compression and an Optical Pixel Adjustment Process
Published in Information security journal. (01-01-2012)“…Image hiding methods embed a secret image into a host image. The resultant stego-image does not attract the interceptors that would not detect the differences…”
Get full text
Journal Article -
16
Towards building data analytics benchmarks for IoT intrusion detection
Published in Cluster computing (01-06-2022)“…Data analytics projects span all types of domains and applications. Researchers publish results using certain datasets and classification models. They present…”
Get full text
Journal Article -
17
Improved gossip protocol for blockchain applications
Published in Cluster computing (01-06-2022)“…Blockchain is a distributed digital ledger consisting of sequence of blocks. These blocks are groups of transactions that make up a sequence where each block…”
Get full text
Journal Article -
18
IoT Cloud Enabeled Model for Safe and Smart Agriculture Environment
Published in 2021 12th International Conference on Information and Communication Systems (ICICS) (24-05-2021)“…The Internet of Things (IoT) has proven its effectiveness in developing several sectors by introduces smart systems to make sectors more efficient. So, cloud…”
Get full text
Conference Proceeding -
19
Effect of simulation modules on Jordanian nursing student knowledge and confidence in performing critical care skills: A randomized controlled trial
Published in International journal of Africa nursing sciences (2020)“…Simulation is known to have a significant effect as a teaching strategy in nursing education. However, no studies have been conducted to examine the effect of…”
Get full text
Journal Article -
20
Investigating the Security Threats on Networked Medical Devices
Published in 2020 10th Annual Computing and Communication Workshop and Conference (CCWC) (01-01-2020)“…This paper explores the cyber security threat of Implanted Medical Devices. The widely use of Internet of Thing capable devices in healthcare like pacemakers,…”
Get full text
Conference Proceeding