Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

    Mohammad Eyadat

    Recently 6G/IoT emerged the latest technology of traditional wireless sensor network devices for 6G/IoT-oriented infrastructure. The construction of 6G/IoT utilizes the routing protocol for low power and lossy networks (RPL) protocol in... more
    Recently 6G/IoT emerged the latest technology of traditional wireless sensor network devices for 6G/IoT-oriented infrastructure. The construction of 6G/IoT utilizes the routing protocol for low power and lossy networks (RPL) protocol in the network layer. RPL is a proactive routing protocol with an IPV6 distance vector. The enormous number of connected smart devices and a huge amount of common information and services have shown the important need for an effective load balancing mechanism to distribute the load between nodes. The motivation of this research is to observe some of the load balancing challenges and problems and propose a solution. This paper proposes a new mechanism called Load Balancing Time Based (LBTB). The proposed LBTB is composed of the node count of neighbors and the remaining node power. The proposed LBTB deployed a modified edition of trickle timer algorithm to act as the constructor of the Destination Oriented Directed Acyclic Graph (DODAG) and controls the messages distribution between nodes. The simulation of the experiments performed using Cooja 2.7 on different network densities (low, medium, and high) under reception of success ratios (80%). Grid and random network topologies were deployed. The performance of RPL using the LBTB algorithm was measured using metrics including convergence time, the packet delivery ratio (PDR), power consumption, and delay. We compared the results with the LBSR and the standard algorithms. The results of the simulation showed that the average enhancement of the performance as follows: 68% convergence time, 16% power consumption, and 56% delay. In addition, the results showed that the PDR in some cases were better using the LBTB algorithm.
    Digital watermarking is considered a possible solution to the problem of protecting digital material. Many techniques have been proposed for watermarking images and videos. One major difference between these techniques is the actual... more
    Digital watermarking is considered a possible solution to the problem of protecting digital material. Many techniques have been proposed for watermarking images and videos. One major difference between these techniques is the actual embedding schema employed to embed data inside the host image; however, the literature lacks an effective comparison of the different embedding approaches. The work presented in this thesis introduces and highlights the technical challenges associated with watermarking. Our concern is to determine the best embedding schema for a watermarking algorithm and to use the Human Visual System (HVS) features for automatic optimization of watermarking embedding schema parameters. We first give an introduction to the watermarking systems, processes, properties, and applications and then an overview of the compression standards as well as a comprehensive survey of current watermarking techniques and approaches. Two different embedding schemes are considered in this...
    Information systems produce significant benefits to organizations. Therefore, organizations invest tremendous amount of money and time to obtain and manage information in order to maintain a high level of performance and to remain... more
    Information systems produce significant benefits to organizations. Therefore, organizations invest tremendous amount of money and time to obtain and manage information in order to maintain a high level of performance and to remain competitive. There are many factors that can impact the organizational information management and performance. One of the significant factors is to keep organizational environment secure. Information Security program is considered as one of the key factors for making organizational environment more secure and efficient. The aim of this research is twofold: first, to investigate the impact of higher education administrators’ roles in strengthen the institutional information security system. Second, to explore the state and the importance of information security program in higher education. This research paper is based on theoretical of the existing information security strategic and approaches and a case study conducted at 59 institutes. The findings indica...
    Over the most recent couple of years, the Internet of Things (IoT) has ended up being an intriguing and promising worldview that plans to add to incalculable applications by interfacing more physical "things" to the Internet.... more
    Over the most recent couple of years, the Internet of Things (IoT) has ended up being an intriguing and promising worldview that plans to add to incalculable applications by interfacing more physical "things" to the Internet. Although it rose as a significant empowering influence for some cutting edge applications, it additionally acquainted new difficulties with virtually soaked networks. The IoT is becoming animated, particularly in medical care and shrewd climate applications, including countless low fueled sensors and actuators to improve life and acquaint new administrations with the network. The Internet Engineering Task Force (IETF) created RPL as the steering convention for low force and lossy networks (LLNs) and normalized it in RFC6550 in 2012. RPL immediately picked up intrigue, and many exploration papers were acquainted with assessing and improve its presence in various applications. In this paper, we present a conversation of the fundamental parts of RPL and ...
    ... Page 3. α=1,(c) W1 watermark and α=5, and (d) W2 watermark and α=5. Table 1: Lena watermarked images detection values Image A B C D Detection Value - 0.5623 - 0.9771 - 0.9654 - 0.9992 ... References [1] IJ Cox, J. Kilian, T. Leighton,... more
    ... Page 3. α=1,(c) W1 watermark and α=5, and (d) W2 watermark and α=5. Table 1: Lena watermarked images detection values Image A B C D Detection Value - 0.5623 - 0.9771 - 0.9654 - 0.9992 ... References [1] IJ Cox, J. Kilian, T. Leighton, T. Shamoon. ...
    An effective Security Awareness and Training (SAT) program enables organizational members to understand the organization’s security strategies, know their responsibilities, and control risks that are caused by security incidents.... more
    An effective Security Awareness and Training (SAT) program enables organizational members to understand the organization’s security strategies, know their responsibilities, and control risks that are caused by security incidents. Therefore, deploying a SAT program is one of the most important steps for any organization to assure that information assets are appropriately secured. The aim of this paper is into folds: first, to gain an insight and determine the information security awareness and training program levels in Middle Eastern higher education sector through a case study that examined 182 institute websites over eight countries. Second, to provide recommendations based on the findings that aid information security professionals to establish a new or improved existing awareness and training program. Literature showed that no study has been done on the SAT program at the level of the Middle Eastern region. However, there was a need to this investigation and therefore, it was a ...
    Dynamic Graph Watermarking (DGW) is vulnerable to attack. We propose theuse of a multiple secret sharing scheme to improve the robustness of DGW.We propose using Mignotte Sequences as the way to create the watermarkshares needed by the... more
    Dynamic Graph Watermarking (DGW) is vulnerable to attack. We propose theuse of a multiple secret sharing scheme to improve the robustness of DGW.We propose using Mignotte Sequences as the way to create the watermarkshares needed by the method. The new scheme is suitable for inclusion in theSandMark test program. All necessary algorithms are identified.
    The Web has great potential as the content on the Web can be presented in different formats to make information available to individuals with disabilities. However, the potential of the Web is still largely unrealized. Most of the... more
    The Web has great potential as the content on the Web can be presented in different formats to make information available to individuals with disabilities. However, the potential of the Web is still largely unrealized. Most of the students in the information systems program are unaware of accessibility issues. Few information systems departments have incorporated universal design and Web accessibility in their curriculum. The objective of the research is to examine WAI (Web accessibility initiative) guidelines for Web accessibility so as to incorporate Web accessibility in information systems curriculum
    Security challenges have been raised by private and public sectors related to exchange digital data electronically. In the current state, protocols such as the simple mail transfer protocol (SMTP), post office protocol (POP), and internet... more
    Security challenges have been raised by private and public sectors related to exchange digital data electronically. In the current state, protocols such as the simple mail transfer protocol (SMTP), post office protocol (POP), and internet message access protocol (IMAP) transfer and store email messages in plaintext. Therefore, the confidentiality of email messages cannot be assured. Email sent using these protocols
    ABSTRACT We have developed a new watermarking process based on the curvelet transform. By selectively removing specific ranges of curvelet coefficients we introduce a high fidelity watermark into an image. This mark has a natural... more
    ABSTRACT We have developed a new watermarking process based on the curvelet transform. By selectively removing specific ranges of curvelet coefficients we introduce a high fidelity watermark into an image. This mark has a natural resilience against rotation and scaling. The watermark can be exactly retrieved.
    Purpose – The purpose of this research is to examine web accessibility initiative (WAI) guidelines for web accessibility so as to incorporate web accessibility in information systems (IS) curriculum. Design/methodology/approach – The... more
    Purpose – The purpose of this research is to examine web accessibility initiative (WAI) guidelines for web accessibility so as to incorporate web accessibility in information systems (IS) curriculum. Design/methodology/approach – The authors used the WebXact software accessibility evaluation tool to test the top pages of web sites of the 23 California State University (CSU) campuses in order to identify
    ABSTRACT In this paper, we propose a scheme in which the watermarking is carried out in the spatial domain using robust feature points to aid in its embedding and extraction. Specific feature points are not only used to embed the... more
    ABSTRACT In this paper, we propose a scheme in which the watermarking is carried out in the spatial domain using robust feature points to aid in its embedding and extraction. Specific feature points are not only used to embed the information, but also act as a geometrical reference. We propose here a new algorithm that uses the scale invariant feature transform (SIFT), Shape theory, and projective area-invariants. The Projective Area-Invariants Transformation allows an image with a distinguished triangle to be put in correspondence with a an affine invariant universal image. The new algorithm is based on embedding the watermark in region around robust feature points and using shape theory to remediate the effects of affine attacks.