Engineering
Browse by
Collections in this community
Recent Submissions
-
Enhanced resting‐state dynamics of the hemoglobin signal as a novel biomarker for detection of breast cancer
(American Association of Physicists in Medicine, 2015-11)The work presented here demonstrates an application of diffuse optical tomography (DOT) to the problem of breast-cancer diagnosis. The potential for using spatial and temporal variability measures of the hemoglobin signal ... -
The impact of perceived social support during pregnancy on postpartum infant-focused anxieties: A prospective cohort study of mothers in Northern Jordan
(Taylor & Francis, 2021-10)This study aimed to evaluate the association between perceived social support during pregnancy and levels of anxiety among postpartum women using an anxiety-specific screening instrument. Using a prospective cohort design, ... -
Cardiac disease classification using total variation denoising and morlet continuous wavelet transformation of ECG signals
(IEEE, 2018-03)Cardiac diseases (CDs) are a leading cause of death, and electrocardiogram (ECG) is the most important noninvasive method for the diagnosis of CDs. The objective of this study was to diagnose CDs using Morlet continuous ... -
Integrating the principles of evidence based medicine and evidence based public health: Impact on the quality of patient care and hospital readmission rates in Jordan
(Ubiquity Press, 2016-08)Hospital readmissions impose not only an extra burden on health care systems but impact patient health outcomes. Identifying modifiable behavioural risk factors that are possible causes of potentially avoidable readmissions ... -
The design and characterization of a digital optical breast cancer imaging system
(IEEE, 2008-08)Optical imaging has the potential to play a major role in breast cancer screening and diagnosis due to its ability to image cancer characteristics such as angiogenesis and hypoxia. A promising approach to evaluate and ... -
Computer-based Cobb angle measurement using deflection points in adolescence idiopathic scoliosis from radiographic images
(Springer London, 2019-05)Idiopathic scoliosis treatment depends on the accurate assessment of the Cobb angle, which is usually performed manually. Manual measurements, however, can lead to observer variations, which depend on the correct selection ... -
Validation of near infrared spectroscopic (NIRS) imaging using programmable phantoms
(International Society for Optics and Photonics, 2008-02)For much of the past decade, we have developed most of the essential hardware and software components needed for practical implementation of dynamic NIRS imaging. Until recently, however, these efforts have been hampered ... -
Self-referencing optical measurement for breast cancer detection
(Research Foundation of State University of New York, 2017-08)Optical data is obtained from a pair of breasts, employing a simultaneous bilateral referencing protocol, and is subsequently analyzed employing a self-referencing data analysis method. Optical measurements can be performed ... -
Objective detection of chronic stress using physiological parameters
(Springer, 2018-06)The aim of this study was to design a system to diagnose chronic stress, based on blunted reactivity of the autonomic nervous system (ANS) to cognitive load (CL). The system concurrently measures CL-induced variations in ... -
Low-cost screening system for breast cancer detection
(Research Foundation of State University of New York, 2015-07)A portable and wearable tumor detector includes a brassier and devices for enabling optical tomography in a non-clinical setting. Light emitting devices and light sensing devices are provided on the brassier, and a controller ... -
The Impact of Applying Quality Management Practices on Patient Centeredness in Jordanian Public Hospitals: Results of Predictive Modeling
(SAGE Publications, 2018-02)Targeting the patient’s needs and preferences has become an important contributor for improving care delivery, enhancing patient satisfaction, and achieving better clinical outcomes. This study aimed to examine the impact ... -
Optomechanical imaging system for breast cancer detection
(Optical Society of America, 2011-12)Imaging studies of the breast comprise three principal sensing domains: structural, mechanical, and functional. Combinations of these domains can yield either additive or wholly new information, depending on whether one ... -
Digital optical tomography system for dynamic breast imaging
(Society of Photo-Optical Instrumentation Engineers, 2011-07)Diffuse optical tomography has shown promising results as a tool for breast cancer screening and monitoring response to chemotherapy. Dynamic imaging of the transient response of the breast to an external stimulus, such ... -
Secure Mechanism for Handling Targeted Attacks in Infrastructure Based Wireless Mesh Networks
(Springer Link, 2010)Infrastructure based Wireless mesh networks allow heterogeneous types of networks to be connected at a time through wireless mesh routers. Since the nodes of every network have different processing power, bandwidth, amount ... -
An Improved and Anonymous Three-factor Authentication Key Exchange Protocol for Wireless Sensor Networks
(ResearchGate, 2017-09)The concepts of Internet of Things (IOT) show that everything in the global network is interconnected and accessible. In IOT environment Wireless Sensor Networks (WSNs) play a very important role because of its ubiquitous ... -
Comment on ‘SFVCC: Chaotic map‐based security framework for vehicular cloud computing’
(The Institution of Engineering and Technology, 2020-12)This comment is presented to identify the drawbacks in a recently published scheme SFVCC by Mishra et al.doi:10.1049/iet-its.2019.0250. In this scheme, a malicious adversary may initiate a replay attack and denial ... -
Drone-based secure communication model for goods collection and delivery: a strategic management perspective
(Inderscience Publishers (IEL), 2021)With the advancements in communication and information technologies, the internet of drones (IoD) has become reality. The IoD is gaining rapid popularity and has several applications including drone-based rescue and delivery ... -
Guest editorial of the special issue “remote sensing in water management and hydrology”
(Taylor & Francis, 2021-03)This special issue starts with an article on high seismicity detection, namely “Fluid-Induced High Seismicity in Songliao Basin of China,” co-authored by Sheng et al. (2020). The authors attempt to assess and review the ... -
Blockchain for Fool-Proof E-Voting Systems
(Springer Link, 2022)Blockchain-enabled e-voting system (BEV) is the need of the hour for many organizations and for democracies. With allegations being raised on validity of the voting system and mass protests, e.g., in the USA as well as the ... -
Security, Trust and Privacy for Cloud, Fog and Internet of Things
(Hindawi, 2022-01)Internet of Things (IoT) is a promising networking scenario in the cyber world, bridging physical devices and virtual objects. By considering the limited capacity of smart things, cloud computing is generally applied to ... -
Security Hardened and Privacy Preserved Vehicle-to-Everything (V2X) Communication
(Hindawi, 2022-04)Vehicle-to-everything (V2X) communications have recently gained concentration of researchers for both, academia as well as industry. In the V2X system, the information is communicated from vehicle sensors to other vehicles, ... -
Designing an Enhanced User Authenticated Key Management Scheme for 6G-Based Industrial Applications
(IEEE Xplore, 2022-08)In the Sixth Generation (6G) mobile system, the importance of security increases even more in the communication system. One of the potential technologies of 6G is the Network in a Box (NIB). The 6G-enabled NIB is a ... -
An Identity-Based Encryption Method for SDN-Enabled Source Routing Systems
(Hindawi, 2022-04)In this study, we consider endpoints communicating over a software-defined networking (SDN)-based architecture using source routing, i.e., packets are routed through a path selected by the packet sender, and we provide a ... -
TFPPASV: A Three-Factor Privacy Preserving Authentication Scheme for VANETs
(Hindawi, 2022-09)A vehicular ad hoc network (VANET) is essential for the autonomous vehicle industry, and with the advancement in VANET technology, security threats are increasing rapidly. Mitigation of these threats needs an intelligent ... -
AAKE-BIVT: Anonymous Authenticated Key Exchange Scheme for Blockchain-Enabled Internet of Vehicles in Smart Transportation
(IEEE Xplore, 2022-11)The next-generation Internet of vehicles (IoVs) seamlessly connects humans, vehicles, roadside units (RSUs), and service platforms, to improve road safety, enhance transit efficiency, and deliver comfort while conserving ... -
Structure modeling and mutational analysis of gap junction beta 2 (GJB2)
(AJOL, 2012)The genome sequencing accomplishes complete genetic blue prints for hundreds of organisms, including humans. In the current era, we are trying to focus on analyzing, controlling and modifying functions of proteins encoded ... -
Ensuring Minimal Communication Overhead in Low Bandwidth Network File
(Springer Link, 2012)All wireless networks are resource constrained, the battery power, memory and bandwidth are main constraints along with security of information in wireless networks. Running of ordinary file systems on such wireless networks ... -
SF-LAP: Secure M2M Communication in IIoT with a Single-Factor Lightweight Authentication Protocol
(Hindawi, 2022-11)Machine-to-machine communication allows smart devices like sensors, actuators, networks, gateways, and other controllers to communicate with one another. The industrial Internet of things (IIoT) has become a vital component. ... -
A Provable Secure Cross-Verification Scheme for IoT Using Public Cloud Computing
(Hindawi, 2022-11)Public cloud computing has become increasingly popular due to the rapid advancements in communication and networking technology. As a result, it is widely used by businesses, corporations, and other organizations to boost ... -
Architecture, Protocols, and Security in IoV: Taxonomy, Analysis, Challenges, and Solutions
(Hindawi, 2022-10)Internet of Vehicles (IoV) is a multinode network that exchanges information in an open, wireless environment. Various communication activities exist between IoV entities to share important information such as (ID, location, ... -
Further comments on ‘SFVCC: Chaotic map-based security framework for vehicular cloud computing’
(The Institution of Engineering and Technology, 2020-12)By simulating a clogging attack [1–5], an adversary forces a communicating entity to process a forged/replayed authentication request by the adversary impersonating on behalf of a legitimate entity. The clogging attack ... -
A symmetric cryptography based key agreement protocol for distributed cloud computing environment
(ResearchGate, 2021)In literature, many researchers put forward different types of authentication schemes for Distributed Cloud Computing environments. Some of the recently proposed schemes are based on a multi-factor authentication system, ... -
An Improved Biometric Multi-Server Authentication Scheme for Chang et al.'s Protocol
(KTU, 2019-06)By simulating a clogging attack [1–5], an adversary forces a communicating entity to process a forged/replayed authentication request by the adversary impersonating on behalf of a legitimate entity. The clogging attack ... -
Security Vulnerabilities and Improvements of SPAM: A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks
(KTU, 2017-06)The main contribution of this paper is to analyze a secure passwordauthentication mechanism (SPAM), proposed by Chuang et al. in 2013(IEEE Syst J.). The SPAM was used for designing a secure handover inProxy Mobile IPv6 ... -
Comments and improvements of “HOTA: Handover optimized ticket-based authentication in network-based mobility management”
(IEEE Xplore, 2017-03)Nowadays, various mobile devices are being an inseparable part of our normal life. Mobile users tend to be connected to the Internet seamlessly, which is provided by mobility management protocols. One of the latest mobility ... -
Efficient neighbour feedback based trusted multi authenticated node routing model for secure data transmission
(MDPI, 2021-12)The Mobile Ad Hoc Network (MANET) is a network that does not have a fixed infrastructure. Migratory routes and related hosts that are connected via wireless networks self-configure it. Routers and hosts are free to wander, ... -
SKIA-SH: A Symmetric Key-Based Improved Lightweight Authentication Scheme for Smart Homes
(Hindawi, 2022-02)Being one of the finest applications of the IoT, smart homes (SHs) with an aim to improve quality of life are taking over the traditional lifestyles. The entities within a SH communicate with each other and with the ... -
A Provably Secure Lightweight Key Agreement Protocol for Wireless Body Area Networks in Healthcare System
(IEEE Xplore, 2022-08)Wireless Body Area Network (WBAN) is a vital application of the Internet of Things (IoT) that plays a significant role in gathering a patient's healthcare information. This collected data helps special professionals like ... -
Performance analysis of secure communications over correlated slow‐fading additive white Gaussian noise channels
(Wiley Online Library, 2019-08)The broadcast nature of communications in wireless communication networks makes it vulnerable to some attacks, particularly eavesdrop attack. Hence, information security can have a key role to protect privacy and avoid ... -
Comment on ‘ElGamal cryptosystem‐based secure authentication system for cloud‐based IoT applications’
(Wiley Online Library, 2021-09)This comment is presented to identify the drawbacks in a recently demonstrated scheme by Maitra et al., SAS‐Cloud: doi:10.1049/iet-net.2019.0004, which adopted an ElGamal cryptosystem‐based technique for biometric ... -
An efficient and secure design of multi-server authenticated key agreement protocol
(Springer Link, 2018-09)Multi-server authentication, being a crucial component of remote communication, provides the ease of one-time registration to users from a centralized registration authority. Therefore, the users could avail the offered ... -
An energy-efficient and secure identity based RFID authentication scheme for vehicular cloud computing
(ELSEVIER, 2022-11)Vehicular Cloud Computing (VCC) is a contemporary paradigm that includes the Internet of Things (IoT), cloud computing, and vehicular networking technologies. VCC offers vehicle-to-device, vehicle-to-infrastructure, and ... -
A Resource-Friendly Authentication Protocol for UAV-Based Massive Crowd Management Systems
(Hindawi, 2021-11)As a part of the smart city revolution, crowd management is an emerging trend and it can enhance the quality of life. Unmanned ariel vehicles (UAVs) can help in making the crowd management process more efficient and more ... -
An Improved Authentication Scheme for Digital Rights Management System
(Hindawi, 2022-01)With the increasing number and popularity of digital content, the management of digital access rights has become an utmost important field. Through digital rights management systems (DRM-S), access to digital contents can ... -
A low-cost privacy preserving user access in mobile edge computing framework
(ELSEVIER, 2022-03)The computational offloading from conventional cloud datacenter towards edge devices sprouted a new world of prospective applications in pervasive and Mobile Edge Computing (MEC) paradigm, leading to substantial gains in ... -
A seamless anonymous authentication protocol for mobile edge computing infrastructure
(ELSEVIER, 2022-03)Mobile Edge Computing (MEC) accommodates processing and data storage and manipulation capabilities across the scope of wireless network. In MEC environment, MEC servers along with the computing and storage capabilities are ... -
On the security of an authentication scheme for smart metering infrastructure
(IEEE Xplore, 2020-12)Recently, in 2019, Kumar et al. (IEEE Transactions on Smart Grid 10.4 (2018): 4349-4359) proposed an ECC based lightweight authentication and Key agreement scheme (LAKA) to secure the communication among a smart meter (SM) ... -
A Physical Capture Resistant Authentication Scheme for the Internet of Drones
(IEEE Xplore, 2021-12)The internet of Drones (IoD) can encompass many essential services, including surveillance and emergency/rescue operations. While IoD is becomin popular and experiencing a rapid usage increase, privacy and security are the ... -
An efficient and provably secure certificateless protocol for industrial Internet of Things
(IEEE Xplore, 2022-03)The Internet of Things (IoT) has a wide range of applications that influence the life of people expeditiously. In recent years, IoT becomes an emerging technology in a number of fields. Different devices with divergent ... -
Cryptanalysis and improvement of a Multi-server Authentication protocol by Lu et al.
(Korean Society for Internet Information, 2018)The increasing number of subscribers and demand of multiplicity of services has turned Multi-Server Authentication (MSA) into an integral part of remote authentication paradigm. MSA not only offers an efficient mode to ...