New direction of cryptography: A review on text-to-image encryption algorithms based on RGB color value

A Abusukhon, S AlZu'bi - 2020 Seventh International …, 2020 - ieeexplore.ieee.org
Data encryption techniques are important for answering the question: How secure is the
Internet for sending sensitive data. Keeping data secure while they are sent through the …

Load balancing techniques in software-defined cloud computing: an overview

AAA AlKhatib, T Sawalha… - 2020 seventh international …, 2020 - ieeexplore.ieee.org
With the expansion of the network and increasing their users, as well as emerging new
technologies, such as cloud computing and big data, managing traditional networks is …

A hybrid network security algorithm based on Diffie Hellman and Text-to-Image Encryption algorithm

A Abusukhon, MN Anwar, Z Mohammad… - Journal of Discrete …, 2019 - Taylor & Francis
Nowadays, the rapid growth of Internet applications open the doors for people to
communicate and do business around the world and thus saving time, efforts and money …

Toward achieving a balance between the user satisfaction and the power conservation in the Internet of Things

A Abusukhon - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
In the recent era of digital revolution, life has become simple and more comfortable than it
was before. Today, we are witnessing a revolution in the information technology domain …

An efficient cold start solution for recommender systems based on machine learning and user interests

B Hawashin, S Alzubi, A Mughaid… - … on software defined …, 2020 - ieeexplore.ieee.org
Recommender Systems are used to provide suggestions to users based on their interests.
One of the well-known problems in recommender systems is the cold start problem, which …

Security weaknesses and attacks on the internet of things applications

Z Mohammad, TA Qattam… - 2019 IEEE Jordan …, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) is a contemporary concept for connecting the existing things in our
environment with the Internet for a sake of making the objects information are accessible …

S-box design based on optimize LFT parameter selection: a practical approach in recommendation system domain

S Beg, N Ahmad, A Anjum, M Ahmad, A Khan… - Multimedia Tools and …, 2020 - Springer
The strength of cryptography encryption is strongly depended upon the substitution box (S-
box), hence highly non-linear S-box is appreciated in cryptography. In this work, we …

[PDF][PDF] An Efficient System for Reducing the Power Consumption in Offices Using the Internet of Things.

A Abusukhon, B Hawashin, M Lafi - … of Advances in Soft Computing & Its …, 2021 - i-csrs.org
Nowadays, Electricity energy is considered the lifeblood of many companies and industrial
institutions. Most of these companies and industrial institutions are suffering from the high …

Efficient and secure key exchange protocol based on elliptic curve and security models

A Abusukhon, Z Mohammad… - 2019 IEEE Jordan …, 2019 - ieeexplore.ieee.org
nowadays, the success of many online applications relays on keeping the data sent through
the global network secure and far away from hackers. To carry out this task, the two …

Efficient texture classification using independent component analysis

B Hawashin, A Mansour, J Abukhait… - 2019 IEEE Jordan …, 2019 - ieeexplore.ieee.org
Texture classification is the assignment of texture to one or more texture classes. It has been
largely used in various fields. This paper proposes a system for Texture Classification using …