Mohammad S. Obaidat
YOU?
Author Swipe
View article: Building a Self-Evolving Digital Twin System with Bayesian Optimization and Deep Reinforcement Learning for Complex Equipment Optimization and Control
Building a Self-Evolving Digital Twin System with Bayesian Optimization and Deep Reinforcement Learning for Complex Equipment Optimization and Control Open
View article: SafeSurf Darknet 2025: A Novel Dataset for Darknet Traffic Detection and Analysis
SafeSurf Darknet 2025: A Novel Dataset for Darknet Traffic Detection and Analysis Open
The growing threat of darknet-related activities, ranging from illegal marketplaces to command-and-control infrastructures, has made the accurate identification of darknet traffic a critical concern for cybersecurity professionals. In resp…
View article: Quantum Safe Proxy Blind Signature Protocol Based on 3D Entangled GHZ‐Type States
Quantum Safe Proxy Blind Signature Protocol Based on 3D Entangled GHZ‐Type States Open
As quantum technology advances, classical digital signatures exhibit vulnerabilities in preserving security properties during the transmission of information. Working toward a reliable communication protocol, we introduce a proxy blind sig…
View article: CSAS-V: Certificateless Schnorr Aggregate Signature for VANETs
CSAS-V: Certificateless Schnorr Aggregate Signature for VANETs Open
Efficient message authentication mechanisms for securing vehicular message exchange in VANETs are essential for meeting the diverse needs of real-time communication, driver safety, and data integrity. As such, certificateless aggregate sig…
View article: Delay‐Aware Dynamic Resource Orchestration for IoT‐Enabled Software‐Defined Edge Networks
Delay‐Aware Dynamic Resource Orchestration for IoT‐Enabled Software‐Defined Edge Networks Open
In the rapidly evolving Internet of Things (IoT) ecosystem, the integration of software‐defined networking (SDN) with edge computing is critical for optimizing performance in IoT applications. This paper introduces a novel framework, named…
View article: Integration of Artificial Intelligence and GIS to Evaluate Horizontal Curves Consistency on Rural Highways
Integration of Artificial Intelligence and GIS to Evaluate Horizontal Curves Consistency on Rural Highways Open
View article: Integration of Artificial Intelligence and GIS to Evaluate Horizontal Curves Consistency on Rural Highways
Integration of Artificial Intelligence and GIS to Evaluate Horizontal Curves Consistency on Rural Highways Open
View article: Cross-subject Brain Functional Connectivity Analysis for Multi-task Cognitive State Evaluation
Cross-subject Brain Functional Connectivity Analysis for Multi-task Cognitive State Evaluation Open
Cognition refers to the function of information perception and processing, which is the fundamental psychological essence of human beings. It is responsible for reasoning and decision-making, while its evaluation is significant for the avi…
View article: Efficient and Privacy-Enhanced Asynchronous Federated Learning for Multimedia Data in Edge-based IoT
Efficient and Privacy-Enhanced Asynchronous Federated Learning for Multimedia Data in Edge-based IoT Open
With the rapid development of smart device technology, the current version of the Internet of Things (IoT) is moving towards a multimedia IoT because of multimedia data. This innovative concept seamlessly integrates multimedia data with th…
View article: A provably secure authenticated key agreement protocol for industrial sensor network system
A provably secure authenticated key agreement protocol for industrial sensor network system Open
Summary The convergence of reliable and self‐organizing characteristics of Wireless Sensor Networks (WSNs) and the IoT has increased the utilization of WSN in different scenarios such as healthcare, industrial units, battlefield monitoring…
View article: An Effective Learning Management System for Revealing Student Performance Attributes
An Effective Learning Management System for Revealing Student Performance Attributes Open
A learning management system streamlines the management of the teaching process in a centralized place, recording, tracking, and reporting the delivery of educational courses and student performance. Educational knowledge discovery from su…
View article: Real-Time Screen Space Rendering Method for Particle-Based Multiphase Fluid Simulation
Real-Time Screen Space Rendering Method for Particle-Based Multiphase Fluid Simulation Open
View article: SustainCom 2023 Steering Committee
SustainCom 2023 Steering Committee Open
View article: Privacy-Preserving Three-Factor Authentication Protocol for Wireless Sensor Networks Deployed in Agricultural Field
Privacy-Preserving Three-Factor Authentication Protocol for Wireless Sensor Networks Deployed in Agricultural Field Open
The agriculture is the backbone of economic system, and it plays an essential part in the survival of a nation’s prosperity. In addition to providing raw materials and food, it also offers numerous employment opportunities. Consequently, a…
View article: M&S Bok Core Areas and the Big Picture
M&S Bok Core Areas and the Big Picture Open
View article: A COVID-19 X-ray image classification model based on an enhanced convolutional neural network and hill climbing algorithms
A COVID-19 X-ray image classification model based on an enhanced convolutional neural network and hill climbing algorithms Open
View article: Fuzzy-epo Optimization Technique for Optimised Resource Allocation and Minimum Energy Consumption With the Brownout Algorithm.
Fuzzy-epo Optimization Technique for Optimised Resource Allocation and Minimum Energy Consumption With the Brownout Algorithm. Open
Cloud Computing is an eminent and reputable agenda which relies on large-scale distributed processing to provide access to their resources and services. In the cloud environment a rigorous management system is mandatory to collect all info…
View article: Advanced computing and communication technologies for Internet of Drones
Advanced computing and communication technologies for Internet of Drones Open
View article: An Efficient Object Navigation Strategy for Mobile Robots Based on Semantic Information
An Efficient Object Navigation Strategy for Mobile Robots Based on Semantic Information Open
In recent years, the rapid development of computer vision makes it possible for mobile robots to be more intelligent. Among the related technologies, the visual SLAM system allows the mobile robot to locate itself, build the map, and provi…
View article: A PUF‐based lightweight authentication and key agreement protocol for smart UAV networks
A PUF‐based lightweight authentication and key agreement protocol for smart UAV networks Open
With the advancement of information technology and the reduction of costs, the application of unmanned aerial vehicle (UAV) has gradually expanded from the military field to the industrial field and civilian field. It brings great convenie…
View article: Design and analysis of a multi-core whispering gallery mode bio-sensor for detecting cancer cells and diabetes tear cells
Design and analysis of a multi-core whispering gallery mode bio-sensor for detecting cancer cells and diabetes tear cells Open
Whispering gallery modes (WGM) have revolutionized the field of optical sensors. This paper presents a design and simulation of a novel structure called a “multi-core whispering gallery mode (WGM)” based on multiple evanescent waves coupli…
View article: BCovX: Blockchain-based COVID Diagnosis Scheme using Chest X-Ray for Isolated Location
BCovX: Blockchain-based COVID Diagnosis Scheme using Chest X-Ray for Isolated Location Open
The COVID-19 pandemic has adversely affected the lives of millions of people worldwide. With an alarming increase in COVID-19 cases, it is important to detect and diagnose COVID-19 in its early stages to prevent its spread. To diagnose rem…
View article: <i>Retracted</i> : Comparative analysis of distributive linear and nonlinear optimized spectrum sensing clustering techniques in cognitive radio network systems
<i>Retracted</i> : Comparative analysis of distributive linear and nonlinear optimized spectrum sensing clustering techniques in cognitive radio network systems Open
Retraction: “Comparative analysis of distributive linear and nonlinear optimized spectrum sensing clustering techniques in cognitive radio network systems” by authors Ganesh Babu R, Mohammad S. Obaidat, Amudha V, Rajesh Manoharan and Sitha…
View article: <i>Retracted</i> : Selection of intermediate routes for secure data communication systems using graph theory application and grey wolf optimization algorithm in MANETs
<i>Retracted</i> : Selection of intermediate routes for secure data communication systems using graph theory application and grey wolf optimization algorithm in MANETs Open
Retraction: “Selection of intermediate routes for secure data communication systems using graph theory application and grey wolf optimization algorithm in MANETs” by authors Subbiah Balaji, Mohammad S. Obaidat, Sriram Suthir, Manoharan Raj…
View article: Editorial: Special Section on Pervasive Edge Computing for Industrial Internet of Things
Editorial: Special Section on Pervasive Edge Computing for Industrial Internet of Things Open
The papers in this special section focus on pervasive edge computing (PEC)for industrial Internet of Things. With the development of 5G technology and intelligent terminals, computation, communication, and storage capacities of devices are…
View article: The Role of Internet of Things to Control the Outbreak of COVID-19 Pandemic
The Role of Internet of Things to Control the Outbreak of COVID-19 Pandemic Open
Currently, COVID-19 pandemic is the major cause of disease burden globally. So, there is a need for an urgent solution to fight against this pandemic. Internet of Things (IoT) has the ability of data transmission without human interaction.…
View article: Computational intelligence applied to wildfire prediction using wireless sensor networks
Computational intelligence applied to wildfire prediction using wireless sensor networks Open
In this paper we present a novel algorithm, implemented in a wireless sensor network environment, for the
\nstudy of fire in a natural environment. This algorithm can offer two kinds of information: the risk of a fire
\nand, in case of an …
View article: Guest editorial special issue on “P2P computing for deep learning”
Guest editorial special issue on “P2P computing for deep learning” Open
View article: Contact Tracing Incentive for COVID-19 and Other Pandemic Diseases From a Crowdsourcing Perspective
Contact Tracing Incentive for COVID-19 and Other Pandemic Diseases From a Crowdsourcing Perspective Open
Governments of the world have invested a lot of manpower and material resources to combat COVID-19 this year. At this moment, the most efficient way that could stop the epidemic is to leverage the contact tracing system to monitor people's…
View article: Use of Sentiment Analysis in Order to Learn the Public Perception for Organizations Providing Covid-19 Vaccinations in the UAE
Use of Sentiment Analysis in Order to Learn the Public Perception for Organizations Providing Covid-19 Vaccinations in the UAE Open