Scientific Published Papers: Recent submissions

  • Abusubaih, Murad (Springer, 2011)
    Hidden node is a fundamental problem that severely degrades the performance of wireless networks. The problem occurs when nodes that do not hear each other transmit at the same time, which leads to data packet collision. ...
  • Abusubaih, Murad (IET, 2012)
    Packet loss in 802.11 WLANs (wireless local area networks) can occur either because of collision or a signal that is not strong enough at the receiver antenna. A challenging issue is the determination of packet loss cause ...
  • Abusubaih, Murad (Elsevier, 2012)
    It is well known that the 802.11 Medium Access Control Protocol faces challenging problems in dense WLAN deployments. The major problem is interference, which leads to collisions or causes wireless nodes to defer from ...
  • Abusubaih, Murad (Wiely, 2012)
    This article addresses the problem of uncoordinated heterogeneous deployment of 802.11 wireless local area networks (WLANs). It is expected that such deployments by different WLAN owners and WiFi providers will become a ...
  • Abusubaih, Murad (Springer, 2016)
    In this paper, we revisit the channel assignment problem in 802.11 Wireless Local Area Networks (WLANs). We focus on the Orthogonal Frequency Division Multiplexing IEEE802.11g networks and report results of experimental ...
  • Abusubaih, Murad (Inderscience, 2016)
    IEEE 802.11-based WLANs are becoming the dominant access technology for enterprises, homes, and hot spots. Standardisation bodies have recently released the so-called 5G 802.11ac technology. This paper addresses the channel ...
  • Abusubaih, Murad (Wiely, 2020-12-10)
    Nowadays, Artificial Intelligence (AI) and Machine Learning (ML) are gaining increased attention. The huge amount of information coupled with a plethora of multimedia applications have posed a great challenge to scientists ...
  • Younis, Ghadi (Jordanian Engineers Association - Jerusalem, 2019-11-25)
    Nowadays, the use of modern and precise GNSS technologies for precise positioning is the most common tool for field surveyors. The output coordinate of GNSS are divided into geometric horizontal coordinates (latitude, ...
  • Younis, Ghadi (2020-12-04)
    The recent developments in spatial data collection, management and software require the availability of proper geodetic infrastructures for integrating different types and sources of coordinates without causing effective ...
  • Ali Sharida; Hashlamon, Iyad (WSEAS Transactions on Signal Processing, 2020)
    This paper investigates a real time distributed controller for a 3 DOF delta robot using low-cost educational simple microcontrollers. The parallel computing technique is used were the computational load is divided among ...
  • Dweik, Ghassan; Nasereddin, Ilham; Nasereddin, Haya (Wessex Institute, Conference: ISLAMIC HERITAGE 2020, 2020-07)
    Throne villages, Palestinian villages known for the political or military power of their local leaders, gained the name from having their own separate administrations. Located strategically in the central mountains of ...
  • Abutaha, Mohammed; Hamidouche, Wassim; Sidaty, Naty; Viitanen, Marko; Vanne, Jarno; Assad, Safwan El; Déforges, Olivier (Multidisciplinary Digital Publishing Institute, 2020)
    Video protection and access control have gathered steam over recent years. However, the most common methods encrypt the whole video bit stream as unique data without taking into account the structure of the compressed ...
  • Abutaha, Mohammed; ABUJOODEH, MOHAMMAD (2020)
    Pseudo-Random Number Generators (PRNGs) play an important role in many cryptographic applications. Many network security algorithms and protocols that are based on cryptography also require random or pseudorandom numbers ...
  • Amar, Islam; Abutaha, Mohammed (IEEE, 2020)
    Nowadays with a tremendous speed and continuous development, the world’s connection to the Internet has increased to a point that it has become part of their unsteady lives. Thus as technology evolves, encryption has become ...
  • Atawneh, Basil; Layla, AL-Hammoury; Abutaha, Mohammed (IEEE, 2020)
    With the huge usage of the Internet of Things (IoT), lots of sensitive data are being transferred between devices. This raises the need for security so that unauthorized parties can't access the data. IoT devices are known ...
  • Abutaha, Mohammed; Sidaty, Naty; Hamidouche, Wassim; Dforges, O; Vanne, Jarno; Viitanen, Marko (IEEE, 2018)
    In this paper, we present an end-to-end real-time encryption of Region of Interest (ROI) in HEVC videos. The proposed ROI encryption makes use of the independent tile concept of HEVC that splits the video frame into separable ...
  • SALHAB, OMAR; JWEIHAN, NOUR; JODEH, MOHAMMED ABU; Abutaha, Mohammed; FARAJALLAH, MOUSA (2018)
    Many security applications are based on Pseudo Random Number Generators (PRNGs). Random binary numbers constitute a major reliance in many network security algorithms. For example, common cryptosystems require a long dynamic ...
  • Hammoudi, Karim; Abutaha, Mohammed; Benhabiles, Halim; Melkemi, Mahmoud; Windal, Feryal; El Assad, Safwan; Queudet, Audrey (Springer, Singapore, 2020)
    Nowadays, urban and vehicular surveillance systems are collecting large amounts of image data for feeding recognition systems, for example, toward proposing localization or navigation services. In many cases, these image data ...
  • Abutaha, Mohammed; Assad, Safwan El; Queudet, Audrey; Deforges, Olivier (Inderscience Publishers (IEL), 2017)
    We designed and implemented a stream cipher cryptosystem based on an efficient chaotic generator of finite computing precision (N = 32). The proposed structure of the chaotic generator is formed by a Key-setup, an IVsetup, ...
  • Jallouli, Ons; El Assad, Safwan; Abutaha, Mohammed; Chetto, Maryline; Lozi, René; Caragata, Daniel (2016)
    ryptosystems require a very good and secure source of randomness for their security. Such a source is extremely difficult to obtain in practice. Hence, developing a secure pseudo-random number generator reveals necessary. ...

Search DSpace


Browse

My Account