Found: 136
Select item for more details and to access through your institution.
T‐RESIN: Throughput‐aware dynamic resource orchestration for Internet of Everything‐enabled software‐defined edge networks.
- Published in:
- International Journal of Communication Systems, 2024, v. 37, n. 12, p. 1, doi. 10.1002/dac.5802
- By:
- Publication type:
- Article
An efficient privacy-preserved authentication technique based on conformable fractional chaotic map for TMIS under smart homes environments.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 2, p. 2514, doi. 10.1007/s11227-023-05536-1
- By:
- Publication type:
- Article
The Relationship Between Brain Dominance Patterns and the Increase in Academic Achievement Among Psychology Students in Jordanian Universities.
- Published in:
- Journal of Higher Education Theory & Practice, 2024, v. 24, n. 2, p. 107
- By:
- Publication type:
- Article
Privacy preserving content distribution framework for multidistributor DRM systems.
- Published in:
- Security & Privacy, 2024, v. 7, n. 1, p. 1, doi. 10.1002/spy2.327
- By:
- Publication type:
- Article
A probably secure biometric‐based authentication and key agreement scheme for Internet of Drones.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2024, v. 35, n. 1, p. 1, doi. 10.1002/ett.4893
- By:
- Publication type:
- Article
Construction of a secure and efficient content key distribution framework for DRM systems.
- Published in:
- International Journal of Communication Systems, 2023, v. 36, n. 17, p. 1, doi. 10.1002/dac.5605
- By:
- Publication type:
- Article
ECC-based Efficient and Secure Access Control Scheme for Content Centric Network-A Next Generation Internet.
- Published in:
- Wireless Personal Communications, 2023, v. 132, n. 1, p. 571, doi. 10.1007/s11277-023-10625-8
- By:
- Publication type:
- Article
An efficient caching security approach for content‐centric mobile networks in internet of things systems.
- Published in:
- Security & Privacy, 2023, v. 6, n. 4, p. 1, doi. 10.1002/spy2.294
- By:
- Publication type:
- Article
MADP-IIME: malware attack detection protocol in IoT-enabled industrial multimedia environment using machine learning approach.
- Published in:
- Multimedia Systems, 2023, v. 29, n. 3, p. 1785, doi. 10.1007/s00530-020-00743-9
- By:
- Publication type:
- Article
A novel efficient and lightweight authentication scheme for secure smart grid communication systems.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 7, p. 7360, doi. 10.1007/s11227-022-04944-z
- By:
- Publication type:
- Article
Fuzzy-EPO Optimization Technique for Optimised Resource Allocation and Minimum Energy Consumption with the Brownout Algorithm.
- Published in:
- Wireless Personal Communications, 2023, v. 129, n. 4, p. 2633, doi. 10.1007/s11277-023-10250-5
- By:
- Publication type:
- Article
A COVID-19 X-ray image classification model based on an enhanced convolutional neural network and hill climbing algorithms.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 9, p. 14219, doi. 10.1007/s11042-022-13826-8
- By:
- Publication type:
- Article
Classical versus reinforcement learning algorithms for unmanned aerial vehicle network communication and coverage path planning: A systematic literature review.
- Published in:
- International Journal of Communication Systems, 2023, v. 36, n. 5, p. 1, doi. 10.1002/dac.5423
- By:
- Publication type:
- Article
Sheep and goats are reservoirs of colistin resistant Escherichia coli that co‐resist critically important antimicrobials: First study from Jordan.
- Published in:
- Journal of Food Safety, 2023, v. 43, n. 1, p. 1, doi. 10.1111/jfs.13023
- By:
- Publication type:
- Article
An intelligent system for complex violence pattern analysis and detection.
- Published in:
- International Journal of Intelligent Systems, 2022, v. 37, n. 12, p. 10400, doi. 10.1002/int.22537
- By:
- Publication type:
- Article
Seroprevalence and Risk Factors for Brucella Infections in Jordan.
- Published in:
- American Journal of Tropical Medicine & Hygiene, 2022, v. 107, n. 3, p. 576, doi. 10.4269/ajtmh.21-0952
- By:
- Publication type:
- Article
A PUF‐based lightweight authentication and key agreement protocol for smart UAV networks.
- Published in:
- IET Communications (Wiley-Blackwell), 2022, v. 16, n. 10, p. 1142, doi. 10.1049/cmu2.12295
- By:
- Publication type:
- Article
An access control protocol for IoT‐based critical infrastructure in smart grid environment.
- Published in:
- International Journal of Communication Systems, 2022, v. 35, n. 8, p. 1, doi. 10.1002/dac.5115
- By:
- Publication type:
- Article
On the Security of A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing.
- Published in:
- Wireless Personal Communications, 2022, v. 124, n. 1, p. 283, doi. 10.1007/s11277-021-09338-7
- By:
- Publication type:
- Article
An Efficient Object Navigation Strategy for Mobile Robots Based on Semantic Information.
- Published in:
- Electronics (2079-9292), 2022, v. 11, n. 7, p. 1136, doi. 10.3390/electronics11071136
- By:
- Publication type:
- Article
Efficient design of an authenticated key agreement protocol for dew-assisted IoT systems.
- Published in:
- Journal of Supercomputing, 2022, v. 78, n. 3, p. 3696, doi. 10.1007/s11227-021-04003-z
- By:
- Publication type:
- Article
Prediction of heart abnormalities using deep learning model and wearabledevices in smart health homes.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 1, p. 543, doi. 10.1007/s11042-021-11346-5
- By:
- Publication type:
- Article
Selection of intermediate routes for secure data communication systems using graph theory application and grey wolf optimization algorithm in MANETs.
- Published in:
- IET Networks (Wiley-Blackwell), 2021, v. 10, n. 5, p. 246, doi. 10.1049/ntw2.12026
- By:
- Publication type:
- Article
Comparative analysis of distributive linear and nonlinear optimized spectrum sensing clustering techniques in cognitive radio network systems.
- Published in:
- 2021
- By:
- Publication type:
- Correction Notice
ATPS: an adaptive trajectory prediction system based on semantic information for dynamic objects.
- Published in:
- Neural Computing & Applications, 2021, v. 33, n. 17, p. 11447, doi. 10.1007/s00521-021-05819-9
- By:
- Publication type:
- Article
An effective mobile-healthcare emerging emergency medical system using conformable chaotic maps.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2021, v. 25, n. 14, p. 8905, doi. 10.1007/s00500-021-05781-7
- By:
- Publication type:
- Article
Guest editorial special issue on "P2P computing for deep learning".
- Published in:
- 2021
- By:
- Publication type:
- Editorial
Rift Valley Fever and Crimean-Congo Hemorrhagic Fever Viruses in Ruminants, Jordan.
- Published in:
- 2021
- By:
- Publication type:
- letter
A lightweight anonymous authentication scheme for secure cloud computing services.
- Published in:
- Journal of Supercomputing, 2021, v. 77, n. 2, p. 1693, doi. 10.1007/s11227-020-03313-y
- By:
- Publication type:
- Article
Routing and collision avoidance techniques for unmanned aerial vehicles: Analysis, optimal solutions, and future directions.
- Published in:
- International Journal of Communication Systems, 2020, v. 33, n. 18, p. 1, doi. 10.1002/dac.4628
- By:
- Publication type:
- Article
An efficient authentication and key agreement scheme for secure smart grid communication services.
- Published in:
- International Journal of Communication Systems, 2020, v. 33, n. 15, p. 1, doi. 10.1002/dac.4558
- By:
- Publication type:
- Article
Optimized Time Synchronized Multilayer MAC Protocol for WSN Using Relay Nodes.
- Published in:
- Adhoc & Sensor Wireless Networks, 2020, v. 48, n. 1-4, p. 1
- By:
- Publication type:
- Article
Seroepidemiology, Spatial Distribution, and Risk Factors of Francisella tularensis in Jordan.
- Published in:
- American Journal of Tropical Medicine & Hygiene, 2020, v. 103, n. 2, p. 659, doi. 10.4269/ajtmh.19-0335
- By:
- Publication type:
- Article
A Novel Identity-based Deniable Authentication Protocol Using Bilinear Pairings for Mobile Ad Hoc Networks.
- Published in:
- Adhoc & Sensor Wireless Networks, 2020, v. 47, n. 1-4, p. 227
- By:
- Publication type:
- Article
Scalable and efficient authentication scheme for secure smart grid communication.
- Published in:
- IET Networks (Wiley-Blackwell), 2020, v. 9, n. 4, p. 165, doi. 10.1049/iet-net.2019.0225
- By:
- Publication type:
- Article
Effect of Low-dose ColchiciNe on the InciDence of Atrial Fibrillation in Open Heart Surgery Patients: END-AF Low Dose Trial.
- Published in:
- Journal of International Medical Research, 2020, v. 48, n. 7, p. 1, doi. 10.1177/0300060520939832
- By:
- Publication type:
- Article
An approach for solving fully fuzzy multi-objective linear fractional optimization problems.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2020, v. 24, n. 12, p. 9105, doi. 10.1007/s00500-019-04442-0
- By:
- Publication type:
- Article
Prolonging lifetime for wireless rechargeable sensor networks through sleeping and charging scheduling.
- Published in:
- International Journal of Communication Systems, 2020, v. 33, n. 8, p. 1, doi. 10.1002/dac.4355
- By:
- Publication type:
- Article
An efficient key authentication procedure for IND-CCA2 secure Paillier-based cryptosystem.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2020, v. 24, n. 9, p. 6531, doi. 10.1007/s00500-020-04768-0
- By:
- Publication type:
- Article
Comparative analysis of IoT based products, technology and integration of IoT with cloud computing.
- Published in:
- IET Networks (Wiley-Blackwell), 2020, v. 9, n. 2, p. 43, doi. 10.1049/iet-net.2019.0180
- By:
- Publication type:
- Article
E2CA‐SM: an energy‐efficient channel allocation with sleep mode for base station in fifth‐generation‐based cellular network systems.
- Published in:
- IET Networks (Wiley-Blackwell), 2020, v. 9, n. 2, p. 74, doi. 10.1049/iet-net.2019.0045
- By:
- Publication type:
- Article
Statistical vertical reduction‐based data abridging technique for big network traffic dataset.
- Published in:
- International Journal of Communication Systems, 2020, v. 33, n. 4, p. N.PAG, doi. 10.1002/dac.4249
- By:
- Publication type:
- Article
Power‐saving policies for annual energy cost savings in green computing.
- Published in:
- International Journal of Communication Systems, 2020, v. 33, n. 4, p. N.PAG, doi. 10.1002/dac.4225
- By:
- Publication type:
- Article
PRATIT: a CNN-based emotion recognition system using histogram equalization and data augmentation.
- Published in:
- Multimedia Tools & Applications, 2020, v. 79, n. 3/4, p. 2285, doi. 10.1007/s11042-019-08397-0
- By:
- Publication type:
- Article
Swarm intelligence‐based radio resource management for V2V‐based D2D communication.
- Published in:
- International Journal of Communication Systems, 2019, v. 32, n. 17, p. N.PAG, doi. 10.1002/dac.3817
- By:
- Publication type:
- Article
A Comparative Study on Frameworks, MAC Layer Protocols and Open Research Issues in Internet of Things.
- Published in:
- Adhoc & Sensor Wireless Networks, 2019, v. 45, n. 3/4, p. 275
- By:
- Publication type:
- Article
An energy sensitive system framework for cloud robotic network.
- Published in:
- International Journal of Communication Systems, 2019, v. 32, n. 14, p. N.PAG, doi. 10.1002/dac.4028
- By:
- Publication type:
- Article
Anonymous identity authentication mechanism for hybrid architecture in mobile crowd sensing networks.
- Published in:
- International Journal of Communication Systems, 2019, v. 32, n. 14, p. N.PAG, doi. 10.1002/dac.4099
- By:
- Publication type:
- Article
ElGamal cryptosystem‐based secure authentication system for cloud‐based IoT applications.
- Published in:
- IET Networks (Wiley-Blackwell), 2019, v. 8, n. 5, p. 289, doi. 10.1049/iet-net.2019.0004
- By:
- Publication type:
- Article
Seroprevalence and Risk Factors for Coxiella burnetii in Jordan.
- Published in:
- American Journal of Tropical Medicine & Hygiene, 2019, v. 101, n. 1, p. 40, doi. 10.4269/ajtmh.19-0049
- By:
- Publication type:
- Article