- Advanced Authentication Protocols Security
- User Authentication and Security Systems
- Energy Efficient Wireless Sensor Networks
- Network Security and Intrusion Detection
- Advanced Malware Detection Techniques
- Internet Traffic Analysis and Secure E-voting
- Anomaly Detection Techniques and Applications
- IoT-based Smart Home Systems
- Energy Harvesting in Wireless Networks
- COVID-19 and Mental Health
- Human Mobility and Location-Based Analysis
- Biometric Identification and Security
- Security in Wireless Sensor Networks
- Software Testing and Debugging Techniques
- Global Healthcare and Medical Tourism
- Diverse Scientific Research in Ukraine
- Gene expression and cancer classification
- Information and Cyber Security
- Network Packet Processing and Optimization
- Software-Defined Networks and 5G
- Mobile Agent-Based Network Management
- COVID-19 diagnosis using AI
- IoT and Edge/Fog Computing
- Sleep and related disorders
- Wireless Communication Security Techniques
Middlesex University Dubai
2019-2025
University of Jordan
2010-2018
Al-Ahliyya Amman University
2016
Flower classification is a challenging task due to the wide range of flower species, which have similar shape, appearance or surrounding objects such as leaves and grass. In this study, authors propose novel two‐step deep learning classifier distinguish flowers species. First, region automatically segmented allow localisation minimum bounding box around it. The proposed segmentation approach modelled binary in fully convolutional network framework. Second, they build robust neural different...
Objectives: This study was designed to assess the effect of COVID-19 home quarantine and its lifestyle challenges on sleep quality mental health a large sample undergraduate University students in Jordan. It is first applied Jordanian population. The aim investigate how for several weeks changed students' habits affected their health. Methods: A cross-sectional conducted using random representative 6,157 (mean age 19.79 ± 1.67 years, males 28.7%) from Jordan through voluntarily filling an...
Internet of Things (IoT) consists a large number connected objects that are communicating with each other. In order to support trusted communication between IoT objects, effective authentication procedures should be applied the entities. this paper survey techniques, which proposed in literature, is presented. The aims help other researchers delving into details such techniques by going through their classification and comparison. has been done based on inherent features these technique as...
Ensuring secure communication for mobile patients in e-healthcare requires an efficient and robust key distribution mechanism. This study introduces a novel hierarchical architecture inspired by federated learning (FL), enabling seamless authentication moving across different healthcare centers. Unlike existing approaches, the proposed system allows central authority to share global security parameters with subordinate units, which then combine these their own local generate distribute...
Internet of Things (IoT) impacts the current network with many challenges due to variation, heterogeneity its devices and running technologies. For those reasons, monitoring controlling efficiently can rise performance adapts techniques according environment measurements. This paper proposes a new privacy aware-IoT architecture that combines benefits both Information Centric Network (ICN) Software Defined (SDN) paradigms. In this functionalities are distributed over multiple planes:...
Wireless Sensor Networks (WSNs) are used in different civilian, military, and industrial applications. Recently, many routing protocols have been proposed attempting to find suitable routes transmit data. In this paper we propose a Fuzzy Energy Aware tree-based Routing (FEAR) protocol that aims enhance existing prolong the network’s life time by considering sensors’ limited energy. The design implementation of new is based on cross-layer structure where information from layers utilized...
Many sorting algorithms have been proposed and implemented in previous years.These are usually judged by their performance term of algorithm growth rate according to the input size.Efficient implementation is important for optimizing use other such as searching algorithms, load balancing etc.In this paper, parallel Quicksort, Merge sort, Merge-Quicksort evaluated compared terms running time, speedup, efficiency.These using Message Passing Interface (MPI) library, results conducted IMAN1...
Architectural design is a crucial issue in software engineering. It makes testing more effective as it contribute to carry out the an early stage of development. To improve testability, architect should consider different testability metrics while building architecture. The main objective this research conduct assessment architecture for purpose its improvement order make process effective. In paper, evaluation model assess (Architecture Design Testability Evaluation Model (ADTEM))...
With the wide spread of devices that support mobile computing environment and applications, there is a need to develop new services satisfy needs user. In this paper, we propose approach selecting routes in public transport networks using combined criteria provide service finds geographical from source destination based on user transportation preferences. Based proposed allow path selection depend two main The first preference media which could include bus, train, metro, walking etc. second...
Internet of Things (IoT) is considered as the future that connects billions objects all together. Trusted communication between these a crucial requirement for wide deployment IoT services. Consequently, effective authentication procedures should be applied communicating objects. This paper provides comprehensive survey object in IoT. The aims to direct researchers field by delving into details schemes and going through different comparisons. Comparisons are based on various criteria which...
The rise of Artificial Intelligence (AI) and robotics in the past decade has created various career opportunities many industries such as robotics, manufacturing healthcare. Thus, skills AI will play a critical role coming years. This project focuses on introduction an platform for Low-cost using MATLAB. graphical based interface simplifies task design implantation machine learning functionalities object/pattern recognition classification. application offers three types methods Machine...
Secure routing services in Wireless Sensor Networks (WSNs) are essential, especially mission critical fields such as the military and medical applications.Additionally, they play a vital role current future Internet of Things (IoT) services.Lightness efficiency protocol not only requirements that guarantee success; security assurance also needs to be enforced.This paper proposes Secure-Fuzzy Energy Aware Routing Protocol (S-FEAR) for WSNs.S-FEAR applies model an existing energy efficient...
COVID-19 is a global pandemic that affected the everyday life activities of billions around world. It an unprecedented crisis modern world had never experienced before. mainly economic state and health care system. The rapid increasing number infected patients overwhelmed healthcare infrastructure, which causes high demand and, thus, shortage in required staff members medical resources. This necessitates practical ethical suggestions to guide clinicians centers when allocating reallocating...
Haematopoietic stem cells (HSC) are differentiated into red blood (erythrocytes) through a process called Erythropoiesis. During this process, the genes undergo global gene expression changes to reflect present developmental stage. Unsupervised clustering aims at highlighting co-expressed that share similar profiles. Some algorithms, like well-known and most commonly used K-means, need number of clusters as input in order group data based on similarity measurements. Determining sufficient is...