Zobrazeno 1 - 10
of 13
pro vyhledávání: '"Keyan Abdul-Aziz Mutlaq"'
Autor:
Vincent Omollo Nyangaresi, Zaid Ameen Abduljabbar, Keyan Abdul-Aziz Mutlaq, Salim Sabah Bulbul, Junchao Ma, Abdulla J. Y. Aldarwish, Dhafer G. Honi, Mustafa A. Al Sibahee, Husam A. Neamah
Publikováno v:
Scientific Reports, Vol 14, Iss 1, Pp 1-17 (2024)
Abstract Advancements in cloud computing, flying ad-hoc networks, wireless sensor networks, artificial intelligence, big data, 5th generation mobile network and internet of things have led to the development of smart cities. Owing to their massive in
Externí odkaz:
https://doaj.org/article/9aff3fba431d4fbd8c28769fbf8d9ac6
Autor:
Keyan Abdul-Aziz Mutlaq, Vincent Omollo Nyangaresi, Mohd Adib Omar, Zaid Ameen Abduljabbar, Iman Qays Abduljaleel, Junchao Ma, Mustafa A Al Sibahee
Publikováno v:
PLoS ONE, Vol 19, Iss 1, p e0296781 (2024)
The incorporation of information and communication technologies in the power grids has greatly enhanced efficiency in the management of demand-responses. In addition, smart grids have seen considerable minimization in energy consumption and enhanceme
Externí odkaz:
https://doaj.org/article/00846b4f30fd40e89b0d856d7dddfddc
Autor:
Vincent Omollo Nyangaresi, Zaid Ameen Abduljabbar, Keyan Abdul-Aziz Mutlaq, Junchao Ma, Dhafer G. Honi, Abdulla J. Y. Aldarwish, Iman Qays Abduljaleel
Publikováno v:
Applied Sciences, Vol 12, Iss 24, p 12688 (2022)
Highly sensitive information about people’s social life and daily activities flows in smart home networks. As such, if attackers can manage to capture or even eavesdrop on this information, the privacy of the users can be compromised. The consequen
Externí odkaz:
https://doaj.org/article/e051fb97d1d44e948658f143fcec2611
Autor:
Mustafa A Al Sibahee, Songfeng Lu, Zaid Ameen Abduljabbar, Ayad Ibrahim, Zaid Alaa Hussien, Keyan Abdul-Aziz Mutlaq, Mohammed Abdulridha Hussain
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 14 (2018)
Encryption is one of the best methods to safeguard the security and privacy of an image. However, looking through encrypted data is difficult. A number of techniques for searching encrypted data have been devised. However, certain security solutions
Externí odkaz:
https://doaj.org/article/49294bcb46314cdc8b5fb7d4e6739d7a
Autor:
Dhafer G. Honi, Ali Hasan Ali, Zaid Ameen Abduljabbar, Junchao Ma, Vincent Omollo Nyangaresi, Keyan Abdul-Aziz Mutlaq, Samir M. Umran
Publikováno v:
2022 IEEE 21st International Conference on Ubiquitous Computing and Communications (IUCC/CIT/DSCI/SmartCNS).
Autor:
Vincent Omollo Nyangaresi, Zaid Ameen Abduljabbar, Keyan Abdul-Aziz Mutlaq, Mohammed Abdulridha Hussain, Zaid Alaa Hussien
Publikováno v:
Human-Centric Smart Computing ISBN: 9789811954023
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4bd105eab105a6176c70fb0b57efe97f
https://doi.org/10.1007/978-981-19-5403-0_2
https://doi.org/10.1007/978-981-19-5403-0_2
Publikováno v:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783031170805
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::2edd8cb20488dd146c614228bdb29174
https://doi.org/10.1007/978-3-031-17081-2_4
https://doi.org/10.1007/978-3-031-17081-2_4
Autor:
Mustafa A. Al Sibahee, Zainab Amin Abduljabbar, Erasmus (Xin) Liu, Keyan Abdul-Aziz Mutlaq, Zaid Ameen Abduljabbar
Publikováno v:
Proceedings of the 2020 5th International Conference on Cloud Computing and Internet of Things.
In this work, we attempt to investigate the impact of locality awareness algorithm implemented in P2P file sharing application. BitTorrent has dominated in the field of P2P file sharing application. It selects node randomly from content swarm. Develo
Autor:
Keyan Abdul-Aziz Mutlaq, Zaid Ameen Abduljabbar, Songfeng Lu, Ayad Ibrahim, Zaid Alaa Hussien, Mustafa A. Al Sibahee, Mohammed Abdulridha Hussain
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 14 (2018)
Encryption is one of the best methods to safeguard the security and privacy of an image. However, looking through encrypted data is difficult. A number of techniques for searching encrypted data have been devised. However, certain security solutions
Autor:
Keyan Abdul-Aziz Mutlaq, Mustafa A. Al Sibahee, Mohammed Abdulridha Hussain, Zaid Ameen Abduljabbar, Zaid Alaa Hussien, Songfeng Lu
Publikováno v:
2017 International Conference on Computing Intelligence and Information System (CIIS).
Wireless Sensor Networks (WSNs), applications are growing rapidly, so the needs to protect such applications are increased. Cryptography plays a main role in information system security where encryption algorithm is the essential component of the sec