About
43
Publications
63,304
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
321
Citations
Publications
Publications (43)
This paper presents a method for improving the accuracy of determining a person's proximity to a building entrance in urban and indoor settings, where the Global Positioning System (GPS) and Wireless Fidelity (WiFi) signals are often interfered with. Fuzzy logic can be applied to variations in signal strengths in order to interpret the inverse rela...
As wireless communication technologies advance, protecting networks from emerging threats becomes increasingly important. This paper focuses on deauthentication detection and recovery in the context of WPA3 SAE (WIFI Protected Access 3 - Simultaneous Authentication of Equals), a widely used protocol for securing wireless networks. Deauthentication...
The widespread adoption of the Wi-Fi Protected Access III (WPA3) standard has been critical in wireless network security. However, the inherent vulnerability of wireless communication to unauthorized access presents a significant challenge. A critical concern is the potential for downgrade attacks, which can force the network's security protocol fr...
This paper proposes a method for identifying indoor landmarks that can serve as fingerprints in indoor environments. The reason for this proposal is that every building has several distinctive locations. These signatures will be used as positional markers if they can be found. Landmarks such as Wi-Fi, entrance, windows, and elevators are recognizab...
This paper proposes a fully automated vision-based system for real-time COVID-19 personal protective equipment detection and monitoring. Through this paper, we aim to enhance the capability of on-edge real-time face mask detection as well as improve social distancing monitoring from real-live digital videos. Using deep neural networks, researchers...
In this paper, we present a new method for Lane Detection (LD) to reduce the impact of some issues associated with Autonomous Driving Cars (ADCs). It relies on the fact that self-driving will be the getaway of the transportation future. The ADC technology has expanded as it does not require human assistance. For ACD to be fully utilized, Machine Le...
The use-case diagram is a software artifact. Thus, as with any software artifact, the use-case diagrams change across time through the software development life cycle. Therefore, several versions of the same diagram are existed at distinct times. Thus, comparing all use-case diagram variants to detect common and variable use-cases becomes one of th...
The use-case diagram is a software artifact. Thus, as with any software artifact, the use-case diagrams change across time through the software development life cycle. Therefore, several versions of the same diagram are existed at distinct times. Thus, comparing all use-case diagram variants to detect common and variable use-cases becomes one of th...
One of the most difficult problems analysts and decision-makers may face is how to improve the forecasting and predicting of financial time series. However, several efforts were made to develop more accurate and reliable forecasting methods. The main purpose of this study is to use technical analysis methods to forecast Jordanian insurance companie...
As for the low-cost and accuracy benefits of integrating Artificial Intelligence (AI) technologies in smartphones, the embedded smart sensors have been utilized in indoor localization and distance estimation applications rather than the requirement of wearable sensors. However, the effect of a potential noise during the user’s movement is still an...
As for the low-cost and accuracy benefits of integrating Artificial Intelligence (AI) technologies in smartphones, the embedded smart sensors have been utilized in indoor localization and distance estimation applications rather than the requirement of wearable sensors. However, the effect of a potential noise during the user's movement is still an...
Femtocell technology has improved cellular coverage and capacity allowing the provision of rich and interactive
communication services in current mobile networks. However, this technology suffers from several drawbacks including; increased
interference and packet loss, frequent handovers, and high energy consumption. This paper presents a new hando...
Traditionally, Jordanian butter has always been made from yogurt. Raw milk of sheep are collected, fermented, and then churned by mechanical shaking until butter granules are formed. A fter extracting the butter, the remaining buttermilk, called Makheedh or Shaneena in Jordan, is used to produce a type of dry yogurt called Jameed, a local dairy pro...
This paper aims at combining machine learning techniques with Smartphone sensors (i.e. accelerometer sensor) to develop a smart model
capable of classifying vehicle driving style into (Excellent, good or weak) categories. In this paper, we use several machine learning algorithms (Neural
network, KNN, Naïve Bayes and Random forest tree) to train and...
This paper aims at detecting an accurate position of the main entrance of the buildings. The proposed approach relies on the fact that the GPS signals drop significantly when the user enters a building. Moreover, as most of the public buildings provide Wi-Fi services, the Wi-Fi received signal strength (RSS) can be utilized in order to detect the e...
Direct Mobile-to-Mobile communication mode known also as Device-to-Device (D2D) communication is expected to be supported in the 5G mobile system. D2D communication aims to improve system spectrum efficiency, overall system throughput, energy efficiency and reduce the connection delay between devices. However, new security threats and challenges ne...
This paper presents an approach to automatically detect the position of the Wi-Fi access points. It uses Wi-Fi received signal strength as well as some characteristics of the buildings such as the height of the building and the movement direction of the user to detect the position of the access points. This approach comprised of two phases: In phas...
Direct Mobile-to-Mobile communication mode
known also as Device-to-Device (D2D) communication is
expected to be supported in the 5G mobile system. D2D
communication aims to improve system spectrum efficiency,
overall system throughput, energy efficiency and reduce the
connection delay between devices. However, new security
threats and challenges ne...
This study provides a new Crowdsourcing-based approach to identify the most crowded places in an indoor environment. The Crowdsourcing Indoor Localization system (CSI) has been one of the most used techniques in locationbased applications. However, many applications suffer from the inability to locate the most crowded locations for various purposes...
This work is targeting a solid security improvement in the wireless communication between existing and possibly future implantable medical devices (IMDs) and Programmer Monitor Device (PMD). A public medical server acting as a trusted Authority is introduced. A dedicated Pacemaker Proxy Device (PPD) is proposed to serve as a security mediator betwe...
Indoor localization and tracking systems are harvesting more attention from the researchers. Recently, several approaches for localization systems have been proposed that use the sensors which are available on smartphones. In this paper, a new filtering approach based on Hidden Markov Model (HMM) techniques to enhance the accuracy of the localizati...
In this paper, a new Smartphone sensor based algorithm is proposed to detect accurate distance estimation. The algorithm consists of two phases, the first phase is for detecting the peaks from the Smartphone accelerometer sensor. The other one is for detecting the step length which varies from step to step. The proposed algorithm is tested and impl...
Recently, a significant amount of research attention has been given to monitoring the road surface anomalies such as potholes and speed bumps. In this paper, speed bump detection method based on a fuzzy inference system (FIS) is proposed. The fuzzy inference system detects and recognizes the speed bumps from the variance of the vertical acceleratio...
Indoor positioning and tracking services are garnering more attention. Recently, several state-of-the-art localization techniques have been proposed that use radio maps or the sensors readily available on smartphones. This paper presents a localization system called construction of indoor floor plan and localization (CALL), which is based on a floo...