Mohammad S. Obaidat

Mohammad S. Obaidat
University of Jordan | UJ · Department of Computer Science

Doctor of Philosophy

About

1,151
Publications
177,392
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
20,291
Citations
Introduction
Professor Mohammad S. Obaidat (Life Fellow of IEEE, Fellow of AAIA, and Fellow of SCS) is an internationally known academic/researcher/scientist/ scholar. He received his Ph.D. degree in Computer Engineering with a minor in Computer Science from The Ohio State University, Columbus, USA. He has received extensive research funding and published To Date over One Thousand and Two Hundred and Fifty (1,250) refereed technical articles-About half of them are journal articles, over 100 books, and about

Publications

Publications (1,151)
Article
The increasing prevalence of malicious activities in IoT-enabled healthcare and Internet of Medical Things (IoMT) systems necessitates robust intrusion detection mechanisms. This article introduces a novel approach combining meta-heuristic optimization and machine learning techniques to analyze network traffic for enhanced detection accuracy. Our p...
Article
Benefitting from the recent breakthrough of wireless power transfer technology, Wireless Rechargeable Sensor Networks (WRSNs) have become an important research topic. Most prior arts focus on system performance enhancement in the ideal environment that ignores the impact of obstacles. This contradicts the practical applications in which obstacles c...
Article
Full-text available
The concept of Ultra Dense Networks (UDNs) stands out as one of the most promising approaches to meet the escalating capacity requirements and elevate user experience. When it comes to fulfilling the exceptionally high capacity density needs of 5G networks, UDN proves to be one of the most effective solutions. For 5G of cellular networks, non-ortho...
Article
Full-text available
The technology of connected intelligent objects dedicated to health has become a buzzword in medical circles. It has emerged as a popular trend in the world of health technology, but its growing popularity also raises concerns about security. Sensitive data stored on these devices, such as personal medical information, make them vulnerable to cyber...
Article
Machine learning has emerged as a promising avenue for enhancing the efficiency and intelligence of channel allocation processes. However, deploying machine learning algorithms on resource-constrained edge devices poses significant challenges due to their limited computational capabilities and storage capacities. In this study, we propose leveragin...
Article
Full-text available
In the present‐day scenario, multimedia technology serves as a vital medium for communication, facilitating the exchange of information among individuals across various sectors such as education, mass media, banking, and healthcare. In our proposal for a centralized system to store patient data, we aim to enhance healthcare services by enabling doc...
Preprint
Full-text available
Cognition refers to the function of information perception and processing, which is the fundamental psychological essence of human beings. It is responsible for reasoning and decision-making, while its evaluation is significant for the aviation domain in mitigating potential safety risks. Existing studies tend to use varied methods for cognitive st...
Article
With the rapid development of smart device technology, the current version of the Internet of Things (IoT) is moving towards a multimedia IoT because of multimedia data. This innovative concept seamlessly integrates multimedia data with the IoT-Edge Continuum. Recently, a distributed learning framework shows promise in revolutionizing various indus...
Article
The convergence of reliable and self‐organizing characteristics of Wireless Sensor Networks (WSNs) and the IoT has increased the utilization of WSN in different scenarios such as healthcare, industrial units, battlefield monitoring and so forth, yet has also led to significant security risks in their deployment. So, several researchers are developi...
Article
Efficiently navigating to a specific kind of objects in an unknown environment is an important and challenging research topic in Embodied AI. Existing methods, such as end-to-end learning ones and modular ones still struggle at this task as they have poor efficiency, interpretability and/or generalization. This paper proposes an object-driven navig...
Article
In the ever-evolving landscape of technology, healthcare continuously harnesses its benefits, propelling advancements in medical practices. Within intelligent healthcare, medical robots play a pivotal role, providing integral support to healthcare professionals, streamlining processes, and delivering efficient services. These robots securely transm...
Article
The Internet of Things (IoT) is a network of interconnected objects, which congregate and exchange gigantic amounts of data. Usually, pre-deployed embedded sensors sense this massive data. Soon, several applications of IoT are anticipated to exploit emerging 6G technology. Healthcare is one of them, where the 6G-inspired paradigm may facilitate the...
Book
The book covers the exploitation of computational models for effectively developing and managing large-scale wireless communication systems. The goal is to create and establish computational models for seamless human interaction and efficient decision-making in beyond 5G wireless systems. Computational Modeling and Simulation of Advanced Wireless...
Article
Full-text available
-The Internet of Robotic Things (IoRT) is growing rapidly with new applications. Co-operatory robotics enables the sharing of information, autonomy, and fail-safe interaction with environment, humans, and other robots. They can also self-maintain, self-aware, and self-heal. To provide reliable and robust online monitoring of the industrial manipula...
Article
Full-text available
Inflatable penile prosthesis (IPP) surgery is an effective treatment for erectile dysfunction (ED), but infections pose a significant threat to its success. Current guidelines lack antifungal recommendations, despite rising fungal infection rates post-IPP surgery. This review examines epidemiology, risk factors (including diabetes mellitus, immunos...
Preprint
Full-text available
Purpose Prostate cancer exhibits significant heterogeneity in terms of its aggressiveness. The precise role of metabolic syndrome in this variability remains unclear. This study will investigate the relationship between metabolic factors and their potential role in predicting the aggressiveness of prostate cancer. Methods This was a prospective stu...
Article
In recent years, the integration of advanced technologies such as communication advancements (e.g., 5G), Artificial Intelligence (AI), industrial edge computing, and adversarial Machine Learning (ML) has accelerated the evolution of Industry 5.0 systems, shaping digital ecosystems for consumers. This convergence of technologies holds promise for ad...
Article
Full-text available
The leverage of satellite resources to establish a communication network offers a wide range of benefits, including the capability to support news gathering, broadcasting, and aeronautical and maritime tracking. The unique aspects of the satellite‐linked terrestrial network provide high‐speed services, dependable and consistent network quality, and...
Article
Full-text available
In this work, we address the problem of resource allocation in Internet of Everything (IoE)‐enabled software‐defined edge networks. In the existing literature, the researchers considered optimizing the performance of the software‐defined networking (SDN) platform using a single‐tier architecture, where the Internet of Things (IoT) devices are in th...
Article
Full-text available
Recent ground-breaking research in the Internet of Things (IoT) and drone technology has brought about revolutionary advancements in automation, remote sensing, and remote operations. Drones have gained massive popularity in IoT applications, like remote monitoring and task automation. Consequently, an innovative business model called Drones-as-a-S...
Article
Road damage detection (RDD) through computer vision and deep learning techniques can ensure the safety of vehicles and humans on the roads. Integrating unmanned aerial vehicles (UAVs) in RDD and infrastructure evaluation (IE) has also emerged as a key enabler, contributing significantly to data acquisition and real-time monitoring of road damages s...
Article
Introduction One of the most difficult challenges in prosthetic urology is the insertion of penile implants into corpora scarred from an episode of priapism. In cases of scarred penile cavernosal bodies, surgery becomes challenging even for experienced surgeons, as it can be very difficult to dilate the corpora. Objective Usually, the initial inse...
Article
Introduction Erectile function (EF) is a major concern for the patients after radical prostatectomy (RP). The precise evaluation of EF before RP is one of the crucial prognostic factors for its recovery after surgery. Due mainly to time constraints, most urologists routinely just ask vaguely a question about EF before surgery. Also, most patients n...
Article
Full-text available
Purpose: The aim of this study is the evaluation of the distribution of Paclitaxel (PTX) released by a coated balloon in the layers of rabbit’s urethra. Methods: 18 rabbits were included. A Laser Device was used for the stricture formation. After two weeks, dilation of the strictured urethra was performed by using Advance 35LP PTA balloons and Adva...
Article
Objective To evaluate the efficacy and safety of Holmium: Yttrium-Aluminum-Garnet (Ho:YAG) laser in bladder lithotripsy using high-power settings > 100 W. Materials and Methods A combined experimental and clinical study was conducted. The Quanta Cyber: Ho 150 with a 550 μm Quanta optical fiber was utilized in all set-ups. Ablation rates for soft a...
Article
Full-text available
Purpose To investigate the learning curve in four basic surgical skills in laparoscopic and robotic surgeries, and evaluate the approximate time needed to reach sufficient expertise in performing these tasks with the avatera® system. Methods Twenty urology residents with no previous experience in dry-lab and robotic surgery were asked to complete...
Article
In the Internet of Vehicles (IoV), data privacy concerns have prompted the adoption of Federated Learning (FL). Efficiency improvements in FL remain a focal area of research, with recent studies exploring model pruning to lessen both computation and communication overhead. However, in the IoV, model pruning presents unique challenges and remains un...
Article
Broadcast plays a significant role in the emergency message propagation in Vehicular Ad hoc Networks (VANETs). However, current broadcast relay strategies easily cause serious message loss and larger broadcast costs due to the poor environmental adaptability. In this paper, to handle the above problems, we propose an Adaptive Connectivity-Aware Rel...
Article
A Multi-Channel Cognitive MAC Protocol for ad-hoc cognitive networks that uses a distributed learning reinforcement scheme is proposed in this paper. The proposed protocol learns the Primary User (PU) traffic characteristics and then selects the best channel to transmit. The scheme, whichaddresses overlay cognitive networks,avoids collision with th...
Article
Objective To evaluate the tissue injury caused by the force applied by the robotic-assisted graspers of avatera robotic surgical system on bowel tissue. Methods An experimental in vivo porcine model with 1 pig was conducted. After a standard transperitoneal setup of the avatera robotic surgical system, different laparoscopic and robotic graspers w...
Article
Full-text available
The Internet of Drones (IoD) is one of the world's most recent and innovative technology. Drones are most prominent IoT (Internet of Things) gadgets and their applications span from commercial to domestic. The sensitive data stored in drones has increased the demand for the security of communication in the IoD. As a result, numerous authentication...
Article
Embedded real-time systems are widely adopted in safety-critical domains such as aircrafts, automobiles and space vehicles. Unfortunately, with the sharp rise in the use of common-off-the-shelf components in systems and the drive towards remote communication through untrusted networks, such as WiFi, radio or cellular, the security is increasingly b...
Article
In this paper, we investigate the auxiliary vehicle positioning system and localization method for intelligent transportation systems, as a supplement to the Global Navigation Satellite System which is prone to large positioning deviations and even failures in occluded scenes such as urban canyons and tunnels. The time modulated antenna arrays are...
Article
The emerging Internet of Things (IoTs) and cloud technologies spark dramatic growth in efficiency and productivity for the conventional e-health sector. However, the extensive applications of the communication network also expose the sensitive medical data to the unprecedented cyber threats. To protect the data privacy in IoTs-based e-health cloud...
Article
In the edge-based Internet of Things (IoT) era, wireless sensor networks (WSNs) are the prime source for data collection. In such WSNs, mobile edge nodes such as mobile sinks (MSs) are the superior means to collect sensed data by visiting rendezvous points (RPs). However, WSNs are often obstacle-ridden, which creates hurdles to the movement of the...
Chapter
Computers are used as controlling and monitoring tools, especially in the industrial IoT sector. Data is born at the edge by millions of IoT devices.
Article
Full-text available
Introduction The aim of this study was to evaluate outflow variation in different locations of the pyelocaliceal system with the use of different ureteral access sheath (UAS) sizes and different UAS positioning. Material and methods The experimental setup included an anaesthetised porcine model, a 7.5-Fr ureteroscope with a 200-μm laser fibre inse...
Article
Full-text available
Recent advances in networks and digital technology have provided many user‐friendly environments such as telemedicine, e‐banking, e‐content, and e‐commerce. It has revolutionized the multimedia industry and made it accessible anytime and anywhere. However, its limitation also appeared in digital content piracy, which is more prevalent nowadays. Dig...
Article
Full-text available
People with special needs can receive health care services in their own homes through the use of smart home systems. In essence, this type of smart home has specialized electronics that allow remote operation of automated remote health care gadgets, enabling patient security and health tracking. These sensors are linked to a local intelligence unit...
Article
Objective: To evaluate the transfer of the practical skills of robot-assisted surgery acquired in the dry-lab into a real live experimental setting for performing upper and lower urinary tract surgeries. Material and methods: An in vivo experimental study design was utilized. Six urology trainees and fellows; two 2nd year trainees with no previo...
Article
Full-text available
Content centric network (CCN) is initially envisaged as a next generation Internet paradigm to cope up with the recent growing demand of content delivery. CCN reduces the network response time for content access due to its inherent content caching mechanism by intermediate CCN routers. As in CCN architecture, content is available in routers’ cache,...
Article
The agriculture is the backbone of economic system, and it plays an essential part in the survival of a nation’s prosperity. In addition to providing raw materials and food, it also offers numerous employment opportunities. Consequently, agriculture necessitates modern technology to increase productivity. In these circumstances, Wireless Sensor Net...
Article
Underwater acoustic wave propagation time delay and fluctuations are much greater than radio waves. However, many of the protocols used for underwater acoustic networking and communication are designed according to the principles of terrestrial wireless communication networks, failing to give full consideration to utilizing the underwater acoustic...
Article
Full-text available
Wireless Powered Mobile Edge Computing (WPMEC) is an integration of Mobile Edge Computing (MEC) and Wireless Power Transfer (WPT) technologies, to both improve computing capabilities of mobile devices and energy compensation for their limited battery capabilities. Generally, energy transmitters, mobile devices, and edge servers form a WPMEC system...
Article
Growing network technology and computing facilities present greater opportunities for the e‐commerce industry to sell digital content on an easily assessable platform. However, digital content creators need help due to digital content easily copying and redistributing without quality degradation. Digital rights management (DRM) systems are built up...