Zobrazeno 1 - 10
of 30
pro vyhledávání: '"Shadi Nashwan"'
Publikováno v:
Egyptian Informatics Journal, Vol 24, Iss 3, Pp 100386- (2023)
Predicting defect-prone software components can play a significant role in allocating relevant testing resources to fault-prone modules and hence increasing the business value of software projects. Most of the current software defect prediction studi
Externí odkaz:
https://doaj.org/article/a7d5d828b963401881cdce53a39b3c80
Publikováno v:
Egyptian Informatics Journal, Vol 23, Iss 2, Pp 173-185 (2022)
Security issues are the most critical challenges facing new technologies associated with the internet of things (IoT), big data, and cloud computing. A secure and efficient intrusion detection system (IDS) is crucial to detect security threats. Exist
Externí odkaz:
https://doaj.org/article/676b8ec4f8044c98bca4e4e0aaa27d0c
Autor:
Mohammed G. Sghaireen, Kiran Kumar Ganji, Kumar Chandan Srivastava, Mohammad Khursheed Alam, Shadi Nashwan, Fayeq Hasan Migdadi, Ahmad Al-Qerem, Yousef Khader
Publikováno v:
Journal of Clinical Medicine, Vol 12, Iss 7, p 2678 (2023)
We evaluated the correlation that Vitamin D (Vit D), cholesterol levels, and T- and Z-scores of dual-energy X-ray absorptiometry (DXA) scans have with cone beam computed tomography values assessed in the anterior and posterior regions of maxillary an
Externí odkaz:
https://doaj.org/article/94bd21e2dadf4aa7a75ea307d00d4d77
AAA-WSN: Anonymous access authentication scheme for wireless sensor networks in big data environment
Autor:
Shadi Nashwan
Publikováno v:
Egyptian Informatics Journal, Vol 22, Iss 1, Pp 15-26 (2021)
The data capturing and access process is an important stage in the big data applications. Most of these applications are exploited the wireless sensor networks (WSNs) to accomplish this process through the sensor nodes that are deployed in unsecure a
Externí odkaz:
https://doaj.org/article/39c3b736362b4c8991b3a27f6cf38032
Autor:
Shadi Nashwan, Imad. I. H. Nashwan
Publikováno v:
IEEE Access, Vol 9, Pp 97539-97545 (2021)
One of the recently proposed authentication schemes for 4G/5G mobile networks is a secure anonymity key of authentication and key agreement scheme (SAK-AKA), wherein the home subscriber server (HSS), mobility management entity (MME), and user equipme
Externí odkaz:
https://doaj.org/article/6be0a3f963864c40a867cef9966385fc
Autor:
Kiran Kumar Ganji, Anil Kumar Nagarajappa, Mohammed G Sghaireen, Kumar Chandan Srivastava, Mohammad Khursheed Alam, Shadi Nashwan, Ahmad Al-Qerem, Yousef Khader
Publikováno v:
Healthcare, Vol 11, Iss 5, p 735 (2023)
In the modern era of dentistry, role modeling/roleplaying is one of the most prevalent and recommended methods of dental education. Working on video production projects and using student-centred learning also help students create feelings of ownershi
Externí odkaz:
https://doaj.org/article/c4733c9eccab4f0eb8c48aa8c08b6fd4
Autor:
Mohammed G. Sghaireen, Yazan Al-Smadi, Ahmad Al-Qerem, Kumar Chandan Srivastava, Kiran Kumar Ganji, Mohammad Khursheed Alam, Shadi Nashwan, Yousef Khader
Publikováno v:
Diagnostics, Vol 12, Iss 12, p 3117 (2022)
Metabolic syndrome (MetS) is a cluster of risk factors including hypertension, hyperglycemia, dyslipidemia, and abdominal obesity. Metabolism-related risk factors include diabetes and heart disease. MetS is also linked to numerous cancers and chronic
Externí odkaz:
https://doaj.org/article/766bd9da32724b09af3a675ad65f9e4f
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 16 (2020)
Wavelet family and differential evolution are proposed for categorization of epilepsy cases based on electroencephalogram (EEG) signals. Discrete wavelet transform is widely used in feature extraction step because it efficiently works in this field,
Externí odkaz:
https://doaj.org/article/f349ffd14c75422eadeb30b6df079075
Autor:
Shadi Nashwan, Imad I. H. Nashwan
Publikováno v:
Sensors, Vol 21, Iss 15, p 4980 (2021)
In an end-to-end authentication (E2EA) scheme, the physician, patient, and sensor nodes authenticate each other through the healthcare service provider in three phases: the long-term authentication phase (LAP), short-term authentication phase (SAP),
Externí odkaz:
https://doaj.org/article/0188ca986d5747f88ea906e072a09697
Autor:
Mohammad Khursheed Alam, Kamalakannan Vadivel, Ayyanr Natesan, Mohammed Ghazi Sghaireen, Kiran Kumar Ganji, Kumar Chandan Srivastava, Shadi Nashwan, Yousef Khader
Publikováno v:
Optical and Quantum Electronics. 55
Detection of low index liquid analytes in real-time, in-situ, and with high accuracy is of great importance in various scientific fields, particularly in medicine and biology. Accurate detection of plasma concentration in blood samples is one of the