
Aiman Ahmed AbusamraIslamic University of Gaza · Department of Computer Engineering
Aiman Ahmed Abusamra
PhD in Computer Engineering
Currently I am interested in Blockchains and smart contracts
About
39
Publications
14,153
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
123
Citations
Citations since 2017
Introduction
Additional affiliations
October 1996 - May 2019
Education
September 1992 - February 1996
Publications
Publications (39)
The emergence of the IoT technology has garnered significant interest in recent years, with its ability to integrate multiple sensors and nodes for seamless interconnectivity without human intervention. The three layers of the IoT system, namely the physical perception layer, network layer and application layer, require secure mechanisms to guarant...
There has been an increase in the adoption of mobile payment systems worldwide in the past few years. However, poor Internet connection in rural regions continues to be an obstacle to the widespread use of such technologies. On top of that, there are significant problems with the currently available offline wallets; for instance, the payee cannot v...
Online social networks have become essential to the everyday activities of millions of
users worldwide. Social networks are used to share content, interact with friends and
family, browse news, discuss events, and much more. This huge amount of data that
is shared on these platforms has made them a favourite target for many attackers to
obtain user...
Nowadays android is the most popular operating system. Android apps suffer from more and more malware attacks. So more and more research is done to get a reliable malware detection approaches. Android malware detection is mainly divided into dynamic approach and static approach. In this paper, we present a survey of the two major approaches of the...
Blockchain technology is a core technology in modern deployed payment applications. There has been widespread progress regarding the application of Blockchain in the financial field. Using the blockchain technology in the financial field, resulted in the creation and establishment of multiple applications of Blockchain Wallets based on Blockchain t...
The main drawback of the Bitcoin cryptocurrency is its low scalability, which somehow is a consequence of the Proof-of-Work (PoW) consensus algorithm. So many other cryptocurrencies use the Proof-of-Stake (PoS) algorithm. In this paper, we present an outline of the architectural design of ARAM technology and arrangements built on PoS, ARAM is a sca...
Blockchain technology is a core technology in modern deployed payment applications. There has been widespread progress regarding the application of Blockchain in the financial field. Using the blockchain technology in the financial field, resulted in the creation and establishment of multiple applications of Blockchain Wallets based on Blockchain t...
Due to the widespread use of smart phones, location-based services (LBS) has become important in all aspects of human’s life. LBS offer many advantages to the mobile users to retrieve information about their location. Some LBS services use the smartphone’s location and service provider information to offer directions, targeted recommendations, or o...
Homomorphic Cryptography raised as a new solution used in electronic voting systems. In this
research, Fully Homomorphic encryption used to design and implement an e-voting system. The purpose of the
study is to examine the applicability of Fully Homomorphic encryption in real systems and to evaluate the performance of fully homomorphic encryption...
Due to rapid changes and consequent new threats to computer networks there is a need for the design of systems that enhance network security. These systems make network administrators fully aware of the potential vulnerability of their networks. This paper designs a Network Monitoring System (NMS) which is an active defense and complex network surv...
Voice over Internet Protocol (VoIP) service is growing very fast. Service providers offer VoIP service along with traditional data services using the same IP infrastructure. That is why today it is one of the most dominant technologies for communication. In this paper, simulative investigations have been done for VoIP service in WiFi campus network...
The increasing number of malwares has led to an increase in research work on malware analysis studying the malware behavior. The malware tries to leak sensitive information from infected devices. In this paper, we study a specific attack method, which distributes the data source and the point of data loss on different versions of the malware applic...
Voice over Internet Protocol (VoIP) service is growing very fast and supported by many applications. Its interactive nature makes it very attractive service. VoIP requires a precise level of quality to be utilized. Quality of Service (QoS) is determined by factors like jitter, traffic sent, traffic received and end-to-end delay. In this paper, we s...
Enterprise network (EN) supports thousands of users, and interconnects many networks. EN integrates different operating systems and hosts hundreds of servers that provide several services such as web applications, databases, E-mail, and others. Security threats represent a serious problem to EN. They try to damage enterprise confidentiality, integr...
Many researches were done to find creative techniques, for Android platform, that can detect malware in easy and reliable manner. The aim is not only the effectiveness but to have less processing time, and less resources consumption. This research provide a solution for a part of this problem by finding an easy and fast way to analyze static applic...
This thesis presents a new approach to the visualization of sound for deaf assistance that simultaneously illustrates important dynamic sound properties and the recognized sound icons in an easy readable view. .In order to visualize general sounds efficiently, the MFCC sound features was utilized to represent robust discriminant properties of the s...
Positioning systems can be used for different purposes and for different services, so a lot of research tries to find low error techniques with good results, GPS Global Positioning System is widely used but unfortunately it is difficult to use for indoor applications, WiFi positioning system (WPS) solve this problem, So in this paper we introduce s...
Mobile computing is an important field in information technology, because of the wide use of mobile devises and mobile applications. Clustering gives good results with information retrieval (IR), It aims to automatically put similar applications in one cluster. In this paper, we evaluate clustering techniques in Android applications. We explain how...
In Palestine, 44.7% of the population is under 16 with literacy rate of 91.9% over all of the
population. More than half of Palestinian youth own computers and have access to the
Internet. With such prospect, ensuring information security and spreading awareness of it is
one of the main challenges facing researchers on a national level. In this...
Power consumption is an increasingly pressing problem in modern processor design. Since the on-chip caches usually consume a significant amount of power so power and energy consumption parameters have become one of the most important design constraint. It is one of the most attractive targets for power reduction. This paper presents an approach to...
In this paper, we present a new block replacement policy in which we proposed a new efficient algorithm for combining two important policies Least Recently Used (LRU) and Least Frequently Used (LFU). The implementation of the proposed policy is simple. It requires limited calculations to determine the victim block. We proposed our models to impleme...
Abstract- Failure of addressing all IEEE 802.11i Robust Security Networks (RSNs) vulnerabilities enforces many researchers to revise robust and reliable Wireless Intrusion Detection Techniques (WIDTs).In this paper we propose an algorithm to enhance the performance of the correlation of two WIDTs in detecting MAC spoofing Denial of Service (DoS) at...
A software framework is dedicated to the efficient execution of procedures for supporting the construction of applications. Nowadays Java Application Servers are widely used in software development. Islamic University of Gaza Information Technology teamwork uses JBoss jBPM enterprise framework to develop IUG systems. In this paper, we study the fea...
Power consumption is an important issue for embedded computing systems. We proposed a novel Low Power Architecture (LPA) cache which reduced dynamic write power dissipation. The new architecture based on separating the sets in the cache. We added a new separating bit named mostly bit to each cache line. The in-coming cache spreading in each set to...
In recent years Mashups are increasingly found in the eLearning field to offer instructors the opportunity oflinking students to multiple sources of information as well as offering students the ability of accessing learning tools andservices in an easy manner. In this paper we describe the design and implementation of our Mashup web application tha...
681.324 МЕТОДЫ ОЦЕНКИ И СРЕДСТВА ПОВЫШЕНИЯ ЭФФЕКТИВНОСТИ ПРОТОКОЛОВ ДОСТУПА ВЫЧИСЛИТЕЛЬНЫХ СЕТЕЙ Специальность 05.13.08-Вычислительные машины, системы и сети, элементы и устройства вычислительной техники и систем управления АВТОРЕФЕРАТ Диссертации на соискание ученой степени кандидата технических наук Киев-1995 г.