Maha Saadeh

ORCID: 0000-0003-0119-5623
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Authentication Protocols Security
  • User Authentication and Security Systems
  • Energy Efficient Wireless Sensor Networks
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • Internet Traffic Analysis and Secure E-voting
  • Anomaly Detection Techniques and Applications
  • IoT-based Smart Home Systems
  • Energy Harvesting in Wireless Networks
  • COVID-19 and Mental Health
  • Human Mobility and Location-Based Analysis
  • Biometric Identification and Security
  • Security in Wireless Sensor Networks
  • Software Testing and Debugging Techniques
  • Global Healthcare and Medical Tourism
  • Diverse Scientific Research in Ukraine
  • Gene expression and cancer classification
  • Information and Cyber Security
  • Network Packet Processing and Optimization
  • Software-Defined Networks and 5G
  • Mobile Agent-Based Network Management
  • COVID-19 diagnosis using AI
  • IoT and Edge/Fog Computing
  • Sleep and related disorders
  • Wireless Communication Security Techniques

Middlesex University Dubai
2019-2025

University of Jordan
2010-2018

Al-Ahliyya Amman University
2016

Flower classification is a challenging task due to the wide range of flower species, which have similar shape, appearance or surrounding objects such as leaves and grass. In this study, authors propose novel two‐step deep learning classifier distinguish flowers species. First, region automatically segmented allow localisation minimum bounding box around it. The proposed segmentation approach modelled binary in fully convolutional network framework. Second, they build robust neural different...

10.1049/iet-cvi.2017.0155 article EN IET Computer Vision 2018-04-12

Objectives: This study was designed to assess the effect of COVID-19 home quarantine and its lifestyle challenges on sleep quality mental health a large sample undergraduate University students in Jordan. It is first applied Jordanian population. The aim investigate how for several weeks changed students' habits affected their health. Methods: A cross-sectional conducted using random representative 6,157 (mean age 19.79 ± 1.67 years, males 28.7%) from Jordan through voluntarily filling an...

10.3389/fpsyt.2021.605676 article EN cc-by Frontiers in Psychiatry 2021-02-16

Internet of Things (IoT) consists a large number connected objects that are communicating with each other. In order to support trusted communication between IoT objects, effective authentication procedures should be applied the entities. this paper survey techniques, which proposed in literature, is presented. The aims help other researchers delving into details such techniques by going through their classification and comparison. has been done based on inherent features these technique as...

10.1109/ccc.2016.22 article EN 2016-08-01

Ensuring secure communication for mobile patients in e-healthcare requires an efficient and robust key distribution mechanism. This study introduces a novel hierarchical architecture inspired by federated learning (FL), enabling seamless authentication moving across different healthcare centers. Unlike existing approaches, the proposed system allows central authority to share global security parameters with subordinate units, which then combine these their own local generate distribute...

10.3390/s25082357 article EN cc-by Sensors 2025-04-08

Internet of Things (IoT) impacts the current network with many challenges due to variation, heterogeneity its devices and running technologies. For those reasons, monitoring controlling efficiently can rise performance adapts techniques according environment measurements. This paper proposes a new privacy aware-IoT architecture that combines benefits both Information Centric Network (ICN) Software Defined (SDN) paradigms. In this functionalities are distributed over multiple planes:...

10.1109/sds.2019.8768582 article EN 2019-06-01

Wireless Sensor Networks (WSNs) are used in different civilian, military, and industrial applications. Recently, many routing protocols have been proposed attempting to find suitable routes transmit data. In this paper we propose a Fuzzy Energy Aware tree-based Routing (FEAR) protocol that aims enhance existing prolong the network’s life time by considering sensors’ limited energy. The design implementation of new is based on cross-layer structure where information from layers utilized...

10.4236/ijcns.2011.46048 article EN cc-by International Journal of Communications Network and System Sciences 2011-01-01

Many sorting algorithms have been proposed and implemented in previous years.These are usually judged by their performance term of algorithm growth rate according to the input size.Efficient implementation is important for optimizing use other such as searching algorithms, load balancing etc.In this paper, parallel Quicksort, Merge sort, Merge-Quicksort evaluated compared terms running time, speedup, efficiency.These using Message Passing Interface (MPI) library, results conducted IMAN1...

10.14257/ijast.2016.95.06 article EN International Journal of Advanced Science and Technology 2016-10-31

Architectural design is a crucial issue in software engineering. It makes testing more effective as it contribute to carry out the an early stage of development. To improve testability, architect should consider different testability metrics while building architecture. The main objective this research conduct assessment architecture for purpose its improvement order make process effective. In paper, evaluation model assess (Architecture Design Testability Evaluation Model (ADTEM))...

10.4236/jsea.2015.84021 article EN cc-by Journal of Software Engineering and Applications 2015-01-01

With the wide spread of devices that support mobile computing environment and applications, there is a need to develop new services satisfy needs user. In this paper, we propose approach selecting routes in public transport networks using combined criteria provide service finds geographical from source destination based on user transportation preferences. Based proposed allow path selection depend two main The first preference media which could include bus, train, metro, walking etc. second...

10.1109/ngmast.2015.72 article EN 2015-09-01

Internet of Things (IoT) is considered as the future that connects billions objects all together. Trusted communication between these a crucial requirement for wide deployment IoT services. Consequently, effective authentication procedures should be applied communicating objects. This paper provides comprehensive survey object in IoT. The aims to direct researchers field by delving into details schemes and going through different comparisons. Comparisons are based on various criteria which...

10.13052/jcsm2245-1439.932 article EN Journal of Cyber Security and Mobility 2020-07-01

The rise of Artificial Intelligence (AI) and robotics in the past decade has created various career opportunities many industries such as robotics, manufacturing healthcare. Thus, skills AI will play a critical role coming years. This project focuses on introduction an platform for Low-cost using MATLAB. graphical based interface simplifies task design implantation machine learning functionalities object/pattern recognition classification. application offers three types methods Machine...

10.1109/icspis51252.2020.9340156 article EN 2020-11-25

10.9734/bjast/2016/29653 article EN British Journal of Applied Science & Technology 2016-01-10

Secure routing services in Wireless Sensor Networks (WSNs) are essential, especially mission critical fields such as the military and medical applications.Additionally, they play a vital role current future Internet of Things (IoT) services.Lightness efficiency protocol not only requirements that guarantee success; security assurance also needs to be enforced.This paper proposes Secure-Fuzzy Energy Aware Routing Protocol (S-FEAR) for WSNs.S-FEAR applies model an existing energy efficient...

10.3837/tiis.2018.04.003 article EN KSII Transactions on Internet and Information Systems 2018-04-30

COVID-19 is a global pandemic that affected the everyday life activities of billions around world. It an unprecedented crisis modern world had never experienced before. mainly economic state and health care system. The rapid increasing number infected patients overwhelmed healthcare infrastructure, which causes high demand and, thus, shortage in required staff members medical resources. This necessitates practical ethical suggestions to guide clinicians centers when allocating reallocating...

10.3389/fmed.2021.600415 article EN cc-by Frontiers in Medicine 2021-03-22

Haematopoietic stem cells (HSC) are differentiated into red blood (erythrocytes) through a process called Erythropoiesis. During this process, the genes undergo global gene expression changes to reflect present developmental stage. Unsupervised clustering aims at highlighting co-expressed that share similar profiles. Some algorithms, like well-known and most commonly used K-means, need number of clusters as input in order group data based on similarity measurements. Determining sufficient is...

10.1109/cits55221.2022.9832988 article EN 2022-07-13
Coming Soon ...