Search Results - "Tawalbeh, Lo’ai"

Refine Results
  1. 1

    Mobile Cloud Computing Model and Big Data Analysis for Healthcare Applications by Tawalbeh, Lo'ai A., Mehmood, Rashid, Benkhlifa, Elhadj, Houbing Song

    Published in IEEE access (2016)
    “…Mobile devices are increasingly becoming an indispensable part of people's daily life, facilitating to perform a variety of useful tasks. Mobile cloud…”
    Get full text
    Journal Article
  2. 2

    A Novel secure and privacy-preserving model for OpenID Connect based on Blockchain by Yousra, Belfaik, Yassine, Sadqi, Yassine, Maleh, Said, Safi, Lo'ai, Tawalbeh, Salah, Khaled

    Published in IEEE access (01-01-2023)
    “…OpenID Connect (OIDC) is one of the most widely used delegated authentication protocols in web and mobile applications providing a single sign-on experience…”
    Get full text
    Journal Article
  3. 3

    Efficient Dynamic S-Box Generation Using Linear Trigonometric Transformation for Security Applications by Zahid, Amjad Hussain, Tawalbeh, Lo'ai, Ahmad, Musheer, Alkhayyat, Ahmed, Hassan, Malik Tahir, Manzoor, Atif, Farhan, Alaa Kadhim

    Published in IEEE access (2021)
    “…Protection of data transmitted over the network from illegal access is one of the major challenges being posed by exponential growth of data in online digital…”
    Get full text
    Journal Article
  4. 4

    Reconsidering big data security and privacy in cloud and mobile cloud systems by Tawalbeh, Lo'ai A., Saldamli, Gokay

    “…Large scale distributed systems in particular cloud and mobile cloud deployments provide great services improving people's quality of life and organizational…”
    Get full text
    Journal Article
  5. 5

    IoT Privacy and Security: Challenges and Solutions by Tawalbeh, Lo’ai, Muheidat, Fadi, Tawalbeh, Mais, Quwaider, Muhannad

    Published in Applied sciences (01-06-2020)
    “…Privacy and security are among the significant challenges of the Internet of Things (IoT). Improper device updates, lack of efficient and robust security…”
    Get full text
    Journal Article
  6. 6

    Deep Learning Modalities for Biometric Alteration Detection in 5G Networks-Based Secure Smart Cities by Sedik, Ahmed, Tawalbeh, Lo'Ai, Hammad, Mohamed, El-Latif, Ahmed A. Abd, El-Banby, Ghada M., Khalaf, Ashraf A. M., El-Samie, Fathi E. Abd, Iliyasu, Abdullah M.

    Published in IEEE access (2021)
    “…Smart cities and their applications have become attractive research fields birthing numerous technologies. Fifth generation (5G) networks are important…”
    Get full text
    Journal Article
  7. 7

    Efficient multimodal deep-learning-based COVID-19 diagnostic system for noisy and corrupted images by Hammad, Mohamed, Tawalbeh, Lo'ai, Iliyasu, Abdullah M., Sedik, Ahmed, Abd El-Samie, Fathi E., Alkinani, Monagi H., Abd El-Latif, Ahmed A.

    Published in Journal of King Saud University. Science (01-04-2022)
    “…In humanity’s ongoing fight against its common enemy of COVID-19, researchers have been relentless in finding efficient technologies to support mitigation,…”
    Get full text
    Journal Article
  8. 8

    Greener and Smarter Phones for Future Cities: Characterizing the Impact of GPS Signal Strength on Power Consumption by Tawalbeh, Lo'ai A., Basalamah, Anas, Mehmood, Rashid, Tawalbeh, Hala

    Published in IEEE access (2016)
    “…Smart cities appear as the next stage of urbanization aiming to not only exploit physical and digital infrastructure for urban development but also the…”
    Get full text
    Journal Article
  9. 9

    Zero-day attack detection: a systematic literature review by Ahmad, Rasheed, Alsmadi, Izzat, Alhamdani, Wasim, Tawalbeh, Lo’ai

    Published in The Artificial intelligence review (01-10-2023)
    “…With the continuous increase in cyberattacks over the past few decades, the quest to develop a comprehensive, robust, and effective intrusion detection system…”
    Get full text
    Journal Article
  10. 10

    Efficient FPGA Implementation of a Programmable Architecture for GF(p) Elliptic Curve Crypto Computations by Tawalbeh, Lo’ai Ali, Mohammad, Abidalrahman, Gutub, Adnan Abdul-Aziz

    Published in Journal of signal processing systems (01-06-2010)
    “…This paper presents a processor architecture for elliptic curve cryptography computations over GF(p). The speed to compute the Elliptic-curve point…”
    Get full text
    Journal Article
  11. 11

    In-Home Floor Based Sensor System-Smart Carpet- to Facilitate Healthy Aging in Place (AIP) by Muheidat, Fadi, Tawalbeh, Lo'Ai A.

    Published in IEEE access (2020)
    “…With the rapidly aging population, there is a need to detect elderly's activity, monitor their health, alert health care personnel, and provide real-time and…”
    Get full text
    Journal Article
  12. 12

    Hardware Design and Implementation of ElGamal Public-Key Cryptography Algorithm by Tawalbeh, Lo'ai A., Sweidan, Saadeh

    Published in Information security journal. (28-10-2010)
    “…Demands on secure communications have increased dramatically in the last few years. Cryptography is widely used for secure data transmission. In fact,…”
    Get full text
    Journal Article
  13. 13

    Delay-aware power optimization model for mobile edge computing systems by Jararweh, Yaser, Al-Ayyoub, Mahmoud, Al-Quraan, Muneera, Tawalbeh, Lo’ai A., Benkhelifa, Elhadj

    Published in Personal and ubiquitous computing (01-12-2017)
    “…Reducing the total power consumption and network delay are among the most interesting issues facing large-scale Mobile Cloud Computing (MCC) systems and their…”
    Get full text
    Journal Article
  14. 14

    Resource Efficient Mobile Computing Using Cloudlet Infrastructure by Jararweh, Yaser, Tawalbeh, Loai, Ababneh, Fadi, Dosari, Fahd

    “…Mobile Cloud Computing (MCC) has been introduced as a viable solution to the inherited limitations of mobile computing. These limitations include battery…”
    Get full text
    Conference Proceeding
  15. 15

    A Novel High Quality High Capacity Image Hiding Scheme Based on Image Compression and an Optical Pixel Adjustment Process by Tawalbeh, Lo'ai A., Banimelhem, Omar, Al-Batati, Mohammed

    Published in Information security journal. (01-01-2012)
    “…Image hiding methods embed a secret image into a host image. The resultant stego-image does not attract the interceptors that would not detect the differences…”
    Get full text
    Journal Article
  16. 16

    Towards building data analytics benchmarks for IoT intrusion detection by Ahmad, Rasheed, Alsmadi, Izzat, Alhamdani, Wasim, Tawalbeh, Lo’ai

    Published in Cluster computing (01-06-2022)
    “…Data analytics projects span all types of domains and applications. Researchers publish results using certain datasets and classification models. They present…”
    Get full text
    Journal Article
  17. 17

    Improved gossip protocol for blockchain applications by Saldamli, Gokay, Upadhyay, Charit, Jadhav, Devika, Shrishrimal, Rohit, Patil, Bapugouda, Tawalbeh, Lo’ai

    Published in Cluster computing (01-06-2022)
    “…Blockchain is a distributed digital ledger consisting of sequence of blocks. These blocks are groups of transactions that make up a sequence where each block…”
    Get full text
    Journal Article
  18. 18

    IoT Cloud Enabeled Model for Safe and Smart Agriculture Environment by Tawalbeh, Mais, Quwaider, Muhannad, Tawalbeh, Lo'ai A.

    “…The Internet of Things (IoT) has proven its effectiveness in developing several sectors by introduces smart systems to make sectors more efficient. So, cloud…”
    Get full text
    Conference Proceeding
  19. 19

    Effect of simulation modules on Jordanian nursing student knowledge and confidence in performing critical care skills: A randomized controlled trial by Tawalbeh, Loai I.

    “…Simulation is known to have a significant effect as a teaching strategy in nursing education. However, no studies have been conducted to examine the effect of…”
    Get full text
    Journal Article
  20. 20

    Investigating the Security Threats on Networked Medical Devices by Zaldivar, David, Tawalbeh, Lo'ai A., Muheidat, Fadi

    “…This paper explores the cyber security threat of Implanted Medical Devices. The widely use of Internet of Thing capable devices in healthcare like pacemakers,…”
    Get full text
    Conference Proceeding