Moath Alsafasfeh

Moath Alsafasfeh
Al-Hussein Bin Talal University | AHU · Department of Computer Engineering

Electrical and Computer Engineering, Ph.D.

About

20
Publications
16,049
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
98
Citations

Publications

Publications (20)
Article
Full-text available
Real-time inspections for the large-scale solar system may take a long time to get the hazard situations for any failures that may take place in the solar panels normal operations, where prior hazards detection is important. Reducing the execution time and improving the system’s performance are the ultimate goals of multiprocessing or multicore sys...
Article
Full-text available
Tamper detection and recovery have been successfully modeled as a source-channel coding problem for an erasure channel. Set partitioning in hierarchical trees (SPIHT) and Reed Solomon (RS) codes have been proven very effective for source and channel coding. This paper presents an optimized tamper detection and recovery method that provides high rec...
Article
Full-text available
The study of software engineering professional practices includes the use of the formal methodology in a software development. Identifying the appropriate methodology will not only reduce the failure of software but will also help to deliver the software in accordance with the predetermined budget and schedule. In literature, few works have been de...
Article
Full-text available
Deep neural networks (DNN) are widely employed in a wide range of intelligent applications, including image and video recognition. However, due to the enormous amount of computations required by DNN. Therefore, performing DNN inference tasks locally is problematic for resource constrained Internet of Things (IoT) devices. Existing cloud approaches...
Article
Full-text available
Decision gathering process in target‐detection wireless sensor networks (WSNs) has an essential impact on the overall performance. Among the different decision gathering approaches, a recently proposed scheme, denoted by index modulation based WSN (IM‐WSN), has shown a significant enhancement in the decision error rate (DER). The IM‐WSN scheme expl...
Article
Full-text available
Wireless sensor networks (WSNs) have gotten a lot of attention as useful tools for gathering data. The energy problem has been a fundamental constraint and challenge faced by many WSN applications due to the size and cost constraints of the sensor nodes. This paper proposed a data fusion model based on the back propagation neural network (BPNN) mod...
Article
Full-text available
Abstract – Detecting, recognizing, and manipulating data in a digital image provides much information to the end-user. Translating this data into more meaningful information has paved the way for advancing a wide range of computer vision applications, such as autonomous vehicles, security systems, traffic monitoring, etc. In this paper, a novel met...
Article
Full-text available
The Internet has penetrated all aspects of human society and has promoted social progress. Cyber-crimes in many forms are commonplace and are dangerous to society and national security. Cybersecurity has become a major concern for citizens and governments. The Internet functions and software applications play a vital role in cybersecurity research...
Article
Full-text available
Decision gathering in cluster-based Wireless Sensor Networks (WSNs) plays an important role in the overall performance of WSNs employed for target detection applications. Recently, a novel decision gathering scheme has been proposed that relies on the Index Modulation (IM) concept, called IM-based WSN (IM-WSN). It achieves a significant improvement...
Article
Aiming at the problem of optimal power flow in photovoltaic (PV) Inverters, this paper proposes a real-time algorithm for optimal power flow (OPF) in distributed PV inverters with sophisticated communication technologies and measurement. A higher accuracy and computation speed are obtained by proposing a linear, time-varying optimization method, an...
Article
Full-text available
Physical layer security has gained an increasing attention due to its efficiency and simplicity as compared to other conventionalsecurity protocols.Thus, it has been recently nominatedfor Internet of Things(IoT)applications. Inthis paper, a novel key distribution mechanism is proposed for IoT networks. The proposed mechanism exploits the channel di...
Article
Full-text available
The original version of this article unfortunately contained mistakes in the author group and affiliation sections.
Article
Full-text available
One of the most important sources of clean energy in the future is expected to be solar energy which is considered a real time source. Research efforts to optimize solar energy utilization are mainly concentrated on the components of solar energy systems. Photovoltaic (PV) modules are considered the main components of solar energy systems and PVs’...
Conference Paper
Multicore systems are widely used to improve performance and satisfy time and power demands from users. A computer system with more than one core working simultaneously does satisfy such demands. The main importance of the multicore system is to increase the speed of the execution, which enables the algorithm designer to run tasks in parallel. In t...
Research
Full-text available
The file contains a simple code to develop the constitutive relationship for a stack of composite material with known properties and orientations.
Article
Nowadays, computer networks play an important role in our daily live, and the widely use of computer networks are for accessing the internet. The network administrator has a full ability to control all access types to network, and tasked to allow or discard some of the connections. By using Snort Intrusion Detection System (IDS), the network admini...

Network

Cited By

Projects

Project (1)
Project
The NATO-SPS-PHYSEC project aims at exploiting the physical-layer parameters to provide the different security aspects including confidentiality and authentication for IoT applications in military and security applications. PROJECT COORDINATOR: - Jonathan Rodriguez [Instituto de Telecomunicações] CO-DIRECTORS: - Marwa Qaraqe [Hamad Bin Khalifa University] - Saud Althunibat [Al Hussein Bin Talal University] PARTNERS: - Instituto de Telecomunicações - Portugal - Hamad Bin Khalifa University - Qatar - Al Hussein Bin Talal University - Jordan WEBSITE: http://nato-physec.com/