Zobrazeno 1 - 10
of 35
pro vyhledávání: '"Amer A. Sallam"'
Autor:
Zeyad Ghaleb Al-Mekhlafi, Saima Anwar Lashari, Jalal Mohammed Hachim Altmemi, Mahmood A. Al-Shareeda, Badiea Abdulkarem Mohammed, Amer A. Sallam, Bassam Ali Al-Qatab, Mohammad T. Alshammari, Abdulaziz M. Alayba
Publikováno v:
IEEE Access, Vol 12, Pp 100152-100166 (2024)
The fast development of vehicle technology and the appearance of 5G networks have brought new opportunities as well as challenges for vehicular fog computing. On the one hand, these advances would bring a safer, more efficient, and comfortable car on
Externí odkaz:
https://doaj.org/article/c140d739e8614c089255920c1b124acb
Autor:
Badiea Abdulkarem Mohammed, Mahmood A. Al-Shareeda, Abeer Abdullah Alsadhan, Zeyad Ghaleb Al-Mekhlafi, Amer A. Sallam, Bassam Ali Al-Qatab, Mohammad T. Alshammari, Abdulaziz M. Alayba
Publikováno v:
IEEE Access, Vol 12, Pp 33089-33099 (2024)
The driving experience in fifth-generation (5G)-assisted vehicular fog computing systems has improved thanks to recent advancements in intelligent transportation. However, in the present vehicular system setup, the phenomenon of providing low computa
Externí odkaz:
https://doaj.org/article/8481976cc845442f923934dc3d86a800
Autor:
Badiea Abdulkarem Mohammed, Mahmood A. Al-Shareeda, Selvakumar Manickam, Zeyad Ghaleb Al-Mekhlafi, Abdulaziz M. Alayba, Amer A. Sallam
Publikováno v:
Mathematics, Vol 11, Iss 6, p 1446 (2023)
Vehicular fog computing enabled by the Fifth Generation (5G) has been on the rise recently, providing real-time services among automobiles in the field of smart transportation by improving road traffic safety and enhancing driver comfort. Due to the
Externí odkaz:
https://doaj.org/article/ff246722b1bf4a30a6057664f848592b
Autor:
Mahmood A. Al-Shareeda, Selvakumar Manickam, Badiea Abdulkarem Mohammed, Zeyad Ghaleb Al-Mekhlafi, Amjad Qtaish, Abdullah J. Alzahrani, Gharbi Alshammari, Amer A. Sallam, Khalil Almekhlafi
Publikováno v:
Sensors, Vol 22, Iss 13, p 5026 (2022)
The security and privacy concerns in vehicular communication are often faced with schemes depending on either elliptic curve (EC) or bilinear pair (BP) cryptographies. However, the operations used by BP and EC are time-consuming and more complicated.
Externí odkaz:
https://doaj.org/article/e6af1199bf53447eb87e1b4f40f9c313
Autor:
Mahmood A. Al-Shareeda, Selvakumar Manickam, Badiea Abdulkarem Mohammed, Zeyad Ghaleb Al-Mekhlafi, Amjad Qtaish, Abdullah J. Alzahrani, Gharbi Alshammari, Amer A. Sallam, Khalil Almekhlafi
Publikováno v:
Applied Sciences, Vol 12, Iss 12, p 5939 (2022)
The privacy and security vulnerabilities in fifth-generation (5G)-enabled vehicular networks are often required to cope with schemes based on either bilinear pair cryptography (BPC) or elliptic curve cryptography (ECC). Nevertheless, these schemes su
Externí odkaz:
https://doaj.org/article/ca0f25afa44f4f7fb200dcf58096199d
Publikováno v:
2021 1st International Conference on Emerging Smart Technologies and Applications (eSmarTA).
Globally, skin lesion is known as one of the deadliest diseases among humans. Such that skin cancer, which is recognized as dangerous cancer, causes death in many cases. Therefore, many scholars have investigated in this area to design automated skin
Autor:
Anas A. Alqadi, Abdullah A. Hasan, Akram Q. M. Algaolahi, Aseel A. Abdu, Amer A. Sallam, Abdullah M. Sharaf
Publikováno v:
2021 1st International Conference on Emerging Smart Technologies and Applications (eSmarTA).
Different attacks are done on data confidentiality, integrity, and availability. A famous type of network attacks is Port Scanning. Port Scanning attacks are done by attackers to know gather information about the devices and to know what services are
Autor:
Nasrin M. Makbol, Amer A. Sallam, Hadeel Al Amery, Safaa Al-Ghorbani, Taha H. Rassem, Somaia Al-Qudasi
Identification system is one of the important parts in security domains of the present time. The traditional protection methods considered to be inefficient and unreliable as they are subjected to the theft, imitation or forgetfulness. In contrast, b
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f45c003e998f9eefefd52c0a06d7ee7a
https://eprints.bournemouth.ac.uk/37436/1/2021133080.pdf
https://eprints.bournemouth.ac.uk/37436/1/2021133080.pdf
Publikováno v:
International Journal of Advanced Networking and Applications. 11:4283-4288
Autor:
Mahmood A. Al-Shareeda, Selvakumar Manickam, Badiea Abdulkarem Mohammed, Zeyad Ghaleb Al-Mekhlafi, Amjad Qtaish, Abdullah J. Alzahrani, Gharbi Alshammari, Amer A. Sallam, Khalil Almekhlafi
Publikováno v:
Sustainability; Volume 14; Issue 16; Pages: 9961
The vehicles in the fifth-generation (5G)-enabled vehicular networks exchange the data about road conditions, since the message transmission rate and the downloading service rate have been considerably brighter. The data shared by vehicles are vulner