Toward achieving a balance between the user satisfaction and the power conservation in the Internet of Things

A Abusukhon - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
In the recent era of digital revolution, life has become simple and more comfortable than it
was before. Today, we are witnessing a revolution in the information technology domain …

Load balancing techniques in software-defined cloud computing: an overview

AAA AlKhatib, T Sawalha… - 2020 seventh international …, 2020 - ieeexplore.ieee.org
With the expansion of the network and increasing their users, as well as emerging new
technologies, such as cloud computing and big data, managing traditional networks is …

An efficient cold start solution for recommender systems based on machine learning and user interests

B Hawashin, S Alzubi, A Mughaid… - … on software defined …, 2020 - ieeexplore.ieee.org
Recommender Systems are used to provide suggestions to users based on their interests.
One of the well-known problems in recommender systems is the cold start problem, which …

A survey on symmetric and asymmetric key based image encryption

S Kumar, BK Singh, S Pundir, S Batra… - … conference on data …, 2020 - ieeexplore.ieee.org
Image Encryption is a technique where an algorithm along with a set of characters called
key encrypts the data into cipher text. The cipher text can be converted back into plaintext by …

Security weaknesses and attacks on the internet of things applications

Z Mohammad, TA Qattam… - 2019 IEEE Jordan …, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) is a contemporary concept for connecting the existing things in our
environment with the Internet for a sake of making the objects information are accessible …

[PDF][PDF] An Efficient System for Reducing the Power Consumption in Offices Using the Internet of Things.

A Abusukhon, B Hawashin, M Lafi - … of Advances in Soft Computing & Its …, 2021 - i-csrs.org
Nowadays, Electricity energy is considered the lifeblood of many companies and industrial
institutions. Most of these companies and industrial institutions are suffering from the high …

An authenticated, secure, and mutable multiple‐session‐keys protocol based on elliptic curve cryptography and text‐to‐image encryption algorithm

A Abusukhon, Z Mohammad… - … Practice and Experience, 2022 - Wiley Online Library
Most of the key agreement protocols (eg, Menezes–Qu–Vanstone [MQV] family) generate
one common key per session. This leaves the session key vulnerable against various …

Efficient and secure key exchange protocol based on elliptic curve and security models

A Abusukhon, Z Mohammad… - 2019 IEEE Jordan …, 2019 - ieeexplore.ieee.org
nowadays, the success of many online applications relays on keeping the data sent through
the global network secure and far away from hackers. To carry out this task, the two …

Efficient texture classification using independent component analysis

B Hawashin, A Mansour, J Abukhait… - 2019 IEEE Jordan …, 2019 - ieeexplore.ieee.org
Texture classification is the assignment of texture to one or more texture classes. It has been
largely used in various fields. This paper proposes a system for Texture Classification using …

Mimic encryption box for network multimedia data security

X Zhou, B Li, Y Qi, W Dong - Security and Communication …, 2020 - Wiley Online Library
With the rapid development of the Internet, the security of network multimedia data has
attracted increasingly more attention. The moving target defense (MTD) and cyber mimic …