Amjad Gawanmeh's research while affiliated with University of Dubai and other places
What is this page?
This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
Publications (141)
span lang="EN-US">The emergence of the coronavirus disease 2019 (COVID-19) global crisis negatively affected all aspects of human life. One of the most important methods used worldwide to survive this global crisis is the vaccination process to circumvent the proliferation of this pandemic. Many restrictions were alleviated in many countries such a...
Email security is critical to all types of businesses, as it represents 80% of the plethora of official communication tools used by most organizations worldwide. Attackers use several techniques to trick users into performing harmful actions, mainly via emails. Identifying such activities or circumventing them is better than relying on the end user...
p>With the increasing use of technologies and digitally driven healthcare systems worldwide, there will be several opportunities for the use of big data in personalized healthcare. In addition, With the advancements and availability of internet of things (IoT) based point-of-care (POC) technologies, big data analytics and artificial intelligence (A...
The COVID-19 pandemic has changed the way instructors teach and students learn. Rather than receiving education face-to-face on-campus, remote online education emerged as an alternative solution. If implemented properly though, online education can have its positive impact on the teaching and learning processes. Online education, however, may have...
Indoor localization (IL) is a significant topic of study with several practical applications. The area of IL has evolved greatly in recent years due to the introduction of numerous technologies such as WiFi, Bluetooth, cameras, and other sensors. Despite the growing interest in this field, there are numerous challenges and drawbacks that must be ad...
The emergence of the Cognitive Internet of Medical Things (CIoMT) during the COVID-19 pandemic has been transformational. The CIoMT is a rapidly evolving technology that uses artificial intelligence, big data, and the Internet of Things (IoT) to provide personalized patient care. The CIoMT can be used to monitor and track vital signs, such as tempe...
Mobile computing requires adopting various techniques to enhance the performance of the hardware used at the end device. Edge and mobile devices usually have limited resources, compared to data centers and dedicated machines that are designed and build to support huge computations. While the performance of these devices is practically doable throug...
A person’s privacy has become a growing concern, given the nature of an expansive reliance on real-time video activities with video capture, stream, and storage. This paper presents an innovative system design based on a privacy-preserving model. The proposed system design is implemented by employing an enhanced capability that overcomes today’s si...
The Internet of Things (IoT) has the potential to revolutionize agriculture by providing real-time data on crop and livestock conditions. This study aims to evaluate the performance scalability of wireless sensor networks (WSNs) in agriculture, specifically in two scenarios: monitoring olive tree farms and stables for horse training. The study prop...
The explosive increase in educational data and information systems has led to new teaching practices, challenges, and learning processes. To effectively manage and analyze this information, it is crucial to adopt innovative methodologies and techniques. Recommender systems (RSs) offer a solution for advising students and guiding their learning jour...
This paper proposes a secure internet of things (IoT) based smart radiation detection and measurement system. The Waspmote platform is utilized to build an intelligent IoT station that communicates over 3rd Generation (3G) cellular communication for transferring data to the cloud without redundancy. The IoT radiations monitoring station is enabled...
The proliferation of ransomware has become a significant threat to cybersecurity in recent years, causing significant financial, reputational, and operational damage to individuals and organizations. This paper aims to provide a comprehensive overview of the evolution of ransomware, its taxonomy, and its state-of-the-art research contributions. We...
A mobile telecommunications network has arguably become a vital part of today’s critical communications infrastructure underpinning society’s interconnectedness. A mobile telecommunications network can be considered a critical communications infrastructure that has been built upon a complex set of network technologies. However, the migration in rec...
Fog computing eliminates the need for a centralized cloud data center as it allows computation to be done by nodes closer to the edge. This helps in improving scalability, latency, and throughput compared to traditional cloud environment. Furthermore, with massive increase of IoT devices in the coming future, current solutions that consider central...
The development of online knowledge payment platforms in recent years has increased their respective market value by nurturing content resources and improving content ecology. Yet, the underlying factors of knowledge seekers’ payment behaviors and their information adoption mechanisms are poorly understood. Based on the information adoption model,...
The rapidly growing cloud computing paradigm provides a cost‐effective platform for storing, sharing, and delivering data and computation through internet connectivity. However, one of the biggest barriers for massive cloud adoption is the growing cybersecurity threats/risks that influence its confidence and feasibility. Existing threat models for...
Patient’s privacy, electronic health records’ confidentiality, integrity and all related e-health security issues are the most critical elements of a successful digital health, as they support building trust between patients and healthcare stakeholders. Blockchain technology appears to cover a wide range of these elements. However, the use of this...
Ensuring trust between Internet of Things (IoT) devices is crucial to ensure the quality and the functionality of the system. However, with the dynamism and distributed nature of IoT systems, finding a solution that not only provides trust among IoT systems but is also suitable to their nature of operation is considered a challenge. In recent years...
Energy demand has increased significantly in the recent years due to the emerging of new technologies and industries, in particular in the developing countries. This increase requires much more developed power grid system than the existing traditional ones. Smart grid (SG) offers a potential solution to this problem. Being one of the most needed an...
High-performance and cost-effective Heterogeneous Computing Systems (HCS) are highly dependent on the efficiency of task scheduling, which has been proven to be NP-complete. This makes scheduling problem a vital issue which researchers have attempted optimization in different aspects under the expense of tradeoffs. The problem of scheduling a singl...
Internet of things (IoT) provides connectivity between different smart devices. IoT systems aim to make data collection, and processing easier. Studies show that we can expect over 75 billion IoT devices to be active by 2025. The increasing great interest in IoT systems is due to their ability to provide quality of services to end users. However, c...
The COVID-19 Pandemic affected all sectors worldwide including education sector changing the students learning environment at a large scale. In the education sector, governments had to close schools and universities around the world and turn into online mode of delivery. The sudden transformation to online learning demands educators and institution...
New technologies bring along many challenges including security and privacy. Wireless personal area networks (WPANs) are characterized by limited energy resources and computing power that calls for lightweight security mechanisms in these networks as a mandatory requirement. In this paper, a lightweight trust-based framework for node authentication...
The correctness of group key protocols in communication systems remains a great challenge because of dynamic characteristics of group key construction as we deal with an open number of group members. In this paper, we propose a solution to model group key protocols and to verify their required properties, in particular secrecy property, using the e...
Group key security protocols play an important role in today's communication systems. Their verification, however, remains a great challenge because of the dynamic characteristics of group key construction and distribution protocols. Security properties that are well defined in normal two-party protocols have different meanings and different interp...
Disruptive technologies continuously and significantly alter the way people communicate and collaborate as well as the way industries operate today and in the future. To create new business models and opportunities, several combinations of disruptive technologies are being introduced nowadays. Among these technologies, cloud computing, IoT, Blockch...
Blockchain plays a significant role to connect end users with utmost security and reliability as it is well-suited to handle critical privacy issues in medical and business data sharing. It is considered as one of the best cutting edge technology in providing a suitable framework for sharing critical medical information across various experts globa...
Internet of things (IoT) plays a key role in enabling smart sustainable cities. Pervasive computing over the IoT platform makes life more convenient by embedding sensors based on context-aware computing devices in the physical environment for the ubiquitous availability of computing resources. The sensors gather contextual information from the phys...
Information security concerns are evolving and expanding in recent years due to the Internet era where people often transmit private information through the Internet. For this reason, steganography gained much attention and played an emerging role in digital communications. In steganographic technique, the concealed secret information can be carrie...
One of the appealing applications of smart home is remote monitoring of vital signs, such as heart and respiratory, which has gained more attention during the last two decades. The recent developments in IoT, sensing devices, and smart technologies increased the demand for such technology due to the need for devices that can continuously monitor ph...
This paper presents a methodology for verifying non-linear arithmetic circuits by applying diffident concepts. In our proposed methodology, a combination of gate-level netlist, Functionally Reduced And-inverter Graph (FRAIG) and Taylor Expansion Diagram (TED) is used to verify that the implementation satisfies the specification. Backward algebraic...
The lack of national security standardization bodies can have adverse impact on the adoption of international security standards and best practices. To assure security confidence among various organizations and to promote systematic adoption of standards and best standards, a practical framework that can support comparative measures is needed. . Th...
Blockchain is a very promising technology that spans many use cases other than cryptocurrencies. For example, its implementation in the Internet of Things (IoT) based networks is still unclear and demands further research. This is mainly due to the limited constraints of IoT devices and the ledger-based design of blockchain protocol. IoT may offer...
Multi-agent systems are automated form of software technology to enhance many applications in our life. However, this technology does not come along with embedded security features which hindering its widespread usage in commercial systems such as those that depend on location-based services. This paper aims to design, develop, test and evaluate an...
This paper presents focusing of microparticles in multiple paths within the direction of the flow using dielectrophoresis. The focusing of microparticles is realized through partially perforated electrodes within the microchannel. A continuous electrode on the top surface of the microchannel is considered, while the bottom side is made of a circula...
Abstract—The healthcare industry is a complex system of inter-
connected entities. Each of these entities has disjoint information
systems to manage patient data and records. The current IT
solutions in healthcare systems have several challenges such as
sharing and accessing medical records across several stakeholders
while still maintaining securi...
The agriculture sector is facing major challenges to enhance production in a situation of dwindling natural resources. The growing demand for agricultural products, however, also offers opportunities for producers to sustain, improve productivity and reduce waste in the supply chain. Recent advancements in information and communication technologies...
In this Letter, we present a theoretical investigation for collision occurrence between adjacent IEEE 802.15.4 WPANs, thus laying the foundation for collision-prevention approaches. Specifically, we identify and present the necessary and sufficient conditions to prevent collisions. The identified conditions can be used to devise collision-preventio...
Energy-efficient Cloud Infrastructure Resource Allocation Framework is getting popularity as it is paying effective attention to cloud data management with a view to achieve maximize revenue and minimize cost. This infrastructure can encourage for both cloud providers and users for allocating cloud infrastructure resources for fulfilling not only g...
Secured cyber-physical systems (CPS) requires reliable handling of a high volume of sensitive data, which is in many cases integrated from several distributed sources. This data can usually be interconnected with physical applications, such as power grids or SCADA systems. As most of these datasets store records using numerical values, many of the...
Energy demand has increased significantly in the recent years due to the emerging of new technologies and industries, in particular in the developing countries. This increase requires much more developed
power grid system than the existing traditional ones. Smart grid (SG) offers a potential solution to this problem. Being one of the most needed an...
Decision trees are among the best-known decision-making techniques and have been used extensively for both data analysis and predictive modeling. BPM+ is a novel process modeling approach that helps represent business process models in a consistent and structured way to meet different stakeholders' process representation needs. This paper reports o...
Electrocardiography (ECG) is a heart signal wave that is recorded using medical sensors, which are normally attached to the human body by the heart. ECG waves have repetitive patterns that can be efficiently used in the diagnosis of heart problems as they carry several characteristics of heart operation. Traditionally, the analysis of ECG waves is...
The era of cloud computing allowed the instant scale up of provided services into massive capacities without the need for investing in any new on site infrastructure. Hence, the interest of this type of services has been increased, in particular, by medium scale entities who can afford to completely outsource their data-center and their infrastruct...
CPS uses recent computing, communication, and control methods to monitor and control geographically dispersed field sites in order provide and maintain a high level of confidence about their operation and, hence, plays an important role in several sustainable systems and has extraordinary significance for the future of several industrial domains. T...
This article is a survey of the latest technologies, algorithms and state of the art localization techniques that can be used to serve as Internet of Things communication protocol by automating an RFID system. There is a lack of a reliable and up-to- date reference that can help inventory management systems developers and operators to enhance the m...
Testing and verifying the operation of bio-sensor nodes is essential due to the sensitivity and safetycritical aspects of their applications. Simulation technique is frequently used for this task; however, a proper set of test cases is required in order to carry out the simulation process. This paper focuses on enhancing the verification operations...
Cyber Physical Systems (CPS) use emerging computing, communication, and control methods to monitor and control geographically dispersed critical system components to allow a high level of confidence about their operation. Simulation methods are frequently used in testing such critical system components, however, it might not be adequate to show the...
Finding an optimal node deployment strategy in Wireless Sensor networks (WSNs) that would reduce cost, be robust to node failures, reduce computation and communication overhead, and guarantee a high level of coverage along with network connectivity is a difficult problem. In fact, Sensing coverage and network connectivity are two of the most fundam...
Securing biomedical information is a critical issue in wireless body sensor networks (WBSNs). However, since sensors used in a WBSN tend to have limited processing capabilities and energy sources, minimizing the overhead imposed by security protocol is a challenging problem. This paper proposes a scheme that uses the electrocardiogram (ECG) feature...
The era of cloud computing allows the instant scale up of provided services into massive capacities without the need for investing in any new on-site infrastructure. Hence, the interest of these type of services has been increased. In addition, large companies may wish to provide support for wide range of load capacities, including peak ones. This,...
Blood cell separation microdevices are designed in biomedical engineering for the separation of particular cells from blood, such as cancer cells. The movement of blood microparticles, specially these cancer cells, in a continuous flow microfluidic device is controlled by several forces, as a result, understanding and guiding the movement of these...
This paper discusses implementing a Location-Aware Library RFID service employing Radio Frequency Identification as a communication technology. Automating a library system with passive RFID tag infrastructure is proven to be feasible, and can be achieved with even distribution of RFID Antennas, well designed RFID network, an appropriate middleware,...
Internet of Things (IoT) is a hot and debated subjectin current digitalized era. IoT enables internet connectivity for all kinds of devices and physical objects. The current world isapproaching towards virtualization of different types of systems that enables performing activities without direct physical inter-action. The combination of high-speed...