Papers by Mohammad Eyadat
International Journal of Machine Learning and Cybernetics, 2021
Recently 6G/IoT emerged the latest technology of traditional wireless sensor network devices for ... more Recently 6G/IoT emerged the latest technology of traditional wireless sensor network devices for 6G/IoT-oriented infrastructure. The construction of 6G/IoT utilizes the routing protocol for low power and lossy networks (RPL) protocol in the network layer. RPL is a proactive routing protocol with an IPV6 distance vector. The enormous number of connected smart devices and a huge amount of common information and services have shown the important need for an effective load balancing mechanism to distribute the load between nodes. The motivation of this research is to observe some of the load balancing challenges and problems and propose a solution. This paper proposes a new mechanism called Load Balancing Time Based (LBTB). The proposed LBTB is composed of the node count of neighbors and the remaining node power. The proposed LBTB deployed a modified edition of trickle timer algorithm to act as the constructor of the Destination Oriented Directed Acyclic Graph (DODAG) and controls the messages distribution between nodes. The simulation of the experiments performed using Cooja 2.7 on different network densities (low, medium, and high) under reception of success ratios (80%). Grid and random network topologies were deployed. The performance of RPL using the LBTB algorithm was measured using metrics including convergence time, the packet delivery ratio (PDR), power consumption, and delay. We compared the results with the LBSR and the standard algorithms. The results of the simulation showed that the average enhancement of the performance as follows: 68% convergence time, 16% power consumption, and 56% delay. In addition, the results showed that the PDR in some cases were better using the LBTB algorithm.
Bookmarks Related papers MentionsView impact
Digital watermarking is considered a possible solution to the problem of protecting digital mater... more Digital watermarking is considered a possible solution to the problem of protecting digital material. Many techniques have been proposed for watermarking images and videos. One major difference between these techniques is the actual embedding schema employed to embed data inside the host image; however, the literature lacks an effective comparison of the different embedding approaches. The work presented in this thesis introduces and highlights the technical challenges associated with watermarking. Our concern is to determine the best embedding schema for a watermarking algorithm and to use the Human Visual System (HVS) features for automatic optimization of watermarking embedding schema parameters. We first give an introduction to the watermarking systems, processes, properties, and applications and then an overview of the compression standards as well as a comprehensive survey of current watermarking techniques and approaches. Two different embedding schemes are considered in this...
Bookmarks Related papers MentionsView impact
Information systems produce significant benefits to organizations. Therefore, organizations inves... more Information systems produce significant benefits to organizations. Therefore, organizations invest tremendous amount of money and time to obtain and manage information in order to maintain a high level of performance and to remain competitive. There are many factors that can impact the organizational information management and performance. One of the significant factors is to keep organizational environment secure. Information Security program is considered as one of the key factors for making organizational environment more secure and efficient. The aim of this research is twofold: first, to investigate the impact of higher education administrators’ roles in strengthen the institutional information security system. Second, to explore the state and the importance of information security program in higher education. This research paper is based on theoretical of the existing information security strategic and approaches and a case study conducted at 59 institutes. The findings indica...
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
Bookmarks Related papers MentionsView impact
International Journal of Innovative Research in Computer and Communication Engineering, 2018
Over the most recent couple of years, the Internet of Things (IoT) has ended up being an intrigui... more Over the most recent couple of years, the Internet of Things (IoT) has ended up being an intriguing and promising worldview that plans to add to incalculable applications by interfacing more physical "things" to the Internet. Although it rose as a significant empowering influence for some cutting edge applications, it additionally acquainted new difficulties with virtually soaked networks. The IoT is becoming animated, particularly in medical care and shrewd climate applications, including countless low fueled sensors and actuators to improve life and acquaint new administrations with the network. The Internet Engineering Task Force (IETF) created RPL as the steering convention for low force and lossy networks (LLNs) and normalized it in RFC6550 in 2012. RPL immediately picked up intrigue, and many exploration papers were acquainted with assessing and improve its presence in various applications. In this paper, we present a conversation of the fundamental parts of RPL and ...
Bookmarks Related papers MentionsView impact
… Coding and Computing, 2004. Proceedings. ITCC …, 2004
... Page 3. α=1,(c) W1 watermark and α=5, and (d) W2 watermark and α=5. Table 1: Lena watermarked... more ... Page 3. α=1,(c) W1 watermark and α=5, and (d) W2 watermark and α=5. Table 1: Lena watermarked images detection values Image A B C D Detection Value - 0.5623 - 0.9771 - 0.9654 - 0.9992 ... References [1] IJ Cox, J. Kilian, T. Leighton, T. Shamoon. ...
Bookmarks Related papers MentionsView impact
Asian Journal of Computer and Information Systems
An effective Security Awareness and Training (SAT) program enables organizational members to unde... more An effective Security Awareness and Training (SAT) program enables organizational members to understand the organization’s security strategies, know their responsibilities, and control risks that are caused by security incidents. Therefore, deploying a SAT program is one of the most important steps for any organization to assure that information assets are appropriately secured. The aim of this paper is into folds: first, to gain an insight and determine the information security awareness and training program levels in Middle Eastern higher education sector through a case study that examined 182 institute websites over eight countries. Second, to provide recommendations based on the findings that aid information security professionals to establish a new or improved existing awareness and training program. Literature showed that no study has been done on the SAT program at the level of the Middle Eastern region. However, there was a need to this investigation and therefore, it was a ...
Bookmarks Related papers MentionsView impact
Journal of Information Privacy and Security
Bookmarks Related papers MentionsView impact
Journal of International Management Studies, 2014
Bookmarks Related papers MentionsView impact
Dynamic Graph Watermarking (DGW) is vulnerable to attack. We propose theuse of a multiple secret ... more Dynamic Graph Watermarking (DGW) is vulnerable to attack. We propose theuse of a multiple secret sharing scheme to improve the robustness of DGW.We propose using Mignotte Sequences as the way to create the watermarkshares needed by the method. The new scheme is suitable for inclusion in theSandMark test program. All necessary algorithms are identified.
Bookmarks Related papers MentionsView impact
International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II, 2005
Bookmarks Related papers MentionsView impact
Fourth International Conference on Information Technology (ITNG'07), 2007
The Web has great potential as the content on the Web can be presented in different formats to ma... more The Web has great potential as the content on the Web can be presented in different formats to make information available to individuals with disabilities. However, the potential of the Web is still largely unrealized. Most of the students in the information systems program are unaware of accessibility issues. Few information systems departments have incorporated universal design and Web accessibility in their curriculum. The objective of the research is to examine WAI (Web accessibility initiative) guidelines for Web accessibility so as to incorporate Web accessibility in information systems curriculum
Bookmarks Related papers MentionsView impact
2011 Eighth International Conference on Information Technology: New Generations, 2011
Security challenges have been raised by private and public sectors related to exchange digital da... more Security challenges have been raised by private and public sectors related to exchange digital data electronically. In the current state, protocols such as the simple mail transfer protocol (SMTP), post office protocol (POP), and internet message access protocol (IMAP) transfer and store email messages in plaintext. Therefore, the confidentiality of email messages cannot be assured. Email sent using these protocols
Bookmarks Related papers MentionsView impact
Third International Conference on Information Technology: New Generations (ITNG'06), 2006
Bookmarks Related papers MentionsView impact
Image, Video and Audio Applications, 2010
Bookmarks Related papers MentionsView impact
International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II, 2005
Bookmarks Related papers MentionsView impact
2009 Sixth International Conference on Information Technology: New Generations, 2009
ABSTRACT We have developed a new watermarking process based on the curvelet transform. By selecti... more ABSTRACT We have developed a new watermarking process based on the curvelet transform. By selectively removing specific ranges of curvelet coefficients we introduce a high fidelity watermark into an image. This mark has a natural resilience against rotation and scaling. The watermark can be exactly retrieved.
Bookmarks Related papers MentionsView impact
Pattern Recognition Letters, 2005
Bookmarks Related papers MentionsView impact
International Journal of Web Information Systems, 2007
Purpose – The purpose of this research is to examine web accessibility initiative (WAI) guideline... more Purpose – The purpose of this research is to examine web accessibility initiative (WAI) guidelines for web accessibility so as to incorporate web accessibility in information systems (IS) curriculum. Design/methodology/approach – The authors used the WebXact software accessibility evaluation tool to test the top pages of web sites of the 23 California State University (CSU) campuses in order to identify
Bookmarks Related papers MentionsView impact
Uploads
Papers by Mohammad Eyadat