Mohammad Alshinwan
YOU?
Author Swipe
View article: A novel Smishing defense approach based on meta-heuristic optimization algorithms
A novel Smishing defense approach based on meta-heuristic optimization algorithms Open
Phishing attacks have recently emerged as one of the most severe dangers to businesses, Internet users, service providers, cloud computing, and many other aspects of daily life. Most SMS phishing messages are short text with simple message…
View article: Edge-Based Data Hiding and Extraction Algorithm to Increase Payload Capacity and Data Security
Edge-Based Data Hiding and Extraction Algorithm to Increase Payload Capacity and Data Security Open
View article: Unsupervised text feature selection approach based on improved Prairie dog algorithm for the text clustering
Unsupervised text feature selection approach based on improved Prairie dog algorithm for the text clustering Open
Text clustering is suitable for dividing many text documents into distinct groups. The size of the documents has an impact on the performance of text clustering, reducing its effectiveness. Text documents often include sparse and uninforma…
View article: UltraSegNet: A Hybrid Deep Learning Framework for Enhanced Breast Cancer Segmentation and Classification on Ultrasound Images
UltraSegNet: A Hybrid Deep Learning Framework for Enhanced Breast Cancer Segmentation and Classification on Ultrasound Images Open
View article: Empowering Retail Dual Transformer-Based Profound Product Recommendation Using Multi-Model Review
Empowering Retail Dual Transformer-Based Profound Product Recommendation Using Multi-Model Review Open
Advancements in technology have significantly changed how we interact on social media platforms, where reviews and comments heavily influence consumer decisions. Traditionally, opinion mining has focused on textual data, overlooking the va…
View article: Enhanced Prairie Dog Optimization with Differential Evolution for solving engineering design problems and network intrusion detection system
Enhanced Prairie Dog Optimization with Differential Evolution for solving engineering design problems and network intrusion detection system Open
View article: Fortifying network security: machine learning-powered intrusion detection systems and classifier performance analysis
Fortifying network security: machine learning-powered intrusion detection systems and classifier performance analysis Open
Intrusion detection systems (IDS) protect networks from threats; they actively monitor network activity to identify and prevent malicious actions. This study investigates the application of machine learning methods to strengthen IDS, expli…
View article: Improved security of medical images using DWT–SVD watermarking mechanisms based on firefly Photinus search algorithm
Improved security of medical images using DWT–SVD watermarking mechanisms based on firefly Photinus search algorithm Open
Security is the primary concern in the transmission of medical images, as it involves sensitive patient information. This study introduces an optimized watermarking approach, constructed using discrete wavelet transform and singular value …
View article: Blockchain-Enabled Secure Data Sharing with Honey Encryption and DSNN-Based Key Generation
Blockchain-Enabled Secure Data Sharing with Honey Encryption and DSNN-Based Key Generation Open
Ensuring data confidentiality is a critical requirement for modern security systems globally. Despite the implementation of various access-control policies to enhance system security, significant threats persist due to insecure and inadequ…
View article: An Indexed Approach for Expectation-Confirmation Theory: A Trust-based model
An Indexed Approach for Expectation-Confirmation Theory: A Trust-based model Open
The present study utilised the Expectation-Confirmation Theory (ECT) as a theoretical framework to examine the temporal development of customer trust, satisfaction, and repurchase intent. In subsequent phases of the ECT, the significance o…
View article: Performance Comparison of Hyper-V and KVM for Cryptographic Tasks in Cloud Computing
Performance Comparison of Hyper-V and KVM for Cryptographic Tasks in Cloud Computing Open
As the extensive use of cloud computing raises questions about the security of any personal data stored there, cryptography is being used more frequently as a security tool to protect data confidentiality and privacy in the cloud environme…
View article: Smart Energy-Efficient Encryption for Wireless Multimedia Sensor Networks Using Deep Learning
Smart Energy-Efficient Encryption for Wireless Multimedia Sensor Networks Using Deep Learning Open
Wireless multimedia sensor networks (WMSNs) have gained considerable attention across various applications due to their capabilities for real-time multimedia data collection, efficient monitoring, and flexible deployment. Despite advanceme…
View article: A Low Complexity ML-Based Methods for Malware Classification
A Low Complexity ML-Based Methods for Malware Classification Open
View article: Comparative Analysis of Machine Learning Algorithms for Email Phishing Detection Using TF-IDF, Word2Vec, and BERT
Comparative Analysis of Machine Learning Algorithms for Email Phishing Detection Using TF-IDF, Word2Vec, and BERT Open
View article: Innovative Energy-Efficient Proxy Re-Encryption for Secure Data Exchange in Wireless Sensor Networks
Innovative Energy-Efficient Proxy Re-Encryption for Secure Data Exchange in Wireless Sensor Networks Open
In the realm of wireless sensor networks (WSNs), preserving data integrity, privacy, and security against cyberthreats is paramount. Proxy re-encryption (PRE) plays a pivotal role in ensuring secure intra-network communication. However, ex…
View article: Online Banking User Authentication Methods: A Systematic Literature Review
Online Banking User Authentication Methods: A Systematic Literature Review Open
Online banking has become increasingly popular in recent years, making it a target for cyberattacks. Banks have implemented various user authentication methods to protect their customers’ online accounts. This paper reviews the state-of-th…
View article: Erratum to: Recent Advances of Chimp Optimization Algorithm: Variants and Applications
Erratum to: Recent Advances of Chimp Optimization Algorithm: Variants and Applications Open
View article: MRI brain segmentation based on improved global best-guided artificial bee colony
MRI brain segmentation based on improved global best-guided artificial bee colony Open
Brain Magnetic Resonance Imaging (MRI) plays a critical role in medical research and clinical applications, ranging from quantifying tissue volume, facilitating surgical simulations, assisting in treatment planning, enabling brain mapping,…
View article: A Fragile Watermarking Method for Content-Authentication of H.264-AVC Video
A Fragile Watermarking Method for Content-Authentication of H.264-AVC Video Open
This work proposes a blind fragile GOP-based watermarking technique that ensures the H.264-AVC video's content authenticity. In the H.264 video, the self-authentication code is created by securely hashing a number of intra prediction modes…
View article: Accelerated Arithmetic Optimization Algorithm by Cuckoo Search for Solving Engineering Design Problems
Accelerated Arithmetic Optimization Algorithm by Cuckoo Search for Solving Engineering Design Problems Open
Several metaheuristic algorithms have been implemented to solve global optimization issues. Nevertheless, these approaches require more enhancement to strike a suitable harmony between exploration and exploitation. Consequently, this paper…
View article: The determinants of reliable smart grid from experts’ perspective
The determinants of reliable smart grid from experts’ perspective Open
A smart grid integrates communication networks with the conventional electrical grid. Due to their potential, smart grids are anticipated to achieve widespread deployment. A key component of the success and adoption of smart grids is relia…
View article: Antecedents of Intention to Use E-Auction: An Empirical Study
Antecedents of Intention to Use E-Auction: An Empirical Study Open
Many public health organizations worldwide have used E-auctions to monitor, curtail, and improve the transmission of new coronavirus illnesses. However, user population size and acceptance of these technologies significantly impact their e…
View article: Dynamic Multimedia Encryption Using a Parallel File System Based on Multi-Core Processors
Dynamic Multimedia Encryption Using a Parallel File System Based on Multi-Core Processors Open
Securing multimedia data on disk drives is a major concern because of their rapidly increasing volumes over time, as well as the prevalence of security and privacy problems. Existing cryptographic schemes have high computational costs and …
View article: Improved Graph Convolutional Network with Enriched Graph Topology Representation for Skeleton-Based Action Recognition
Improved Graph Convolutional Network with Enriched Graph Topology Representation for Skeleton-Based Action Recognition Open
Lately, skeleton-based action recognition has drawn remarkable attention to graph convolutional networks (GCNs). Recent methods have focused on graph learning because graph topology is the key to GCNs. We propose to align graph learning on…
View article: Improved Reptile Search Algorithm by Salp Swarm Algorithm for Medical Image Segmentation
Improved Reptile Search Algorithm by Salp Swarm Algorithm for Medical Image Segmentation Open
View article: Integrated cloud computing and blockchain systems: A review
Integrated cloud computing and blockchain systems: A review Open
Blockchain technology is one of the crypto-currency technologies that has received a lot of attention. It has also found use in various applications, including the Internet of Things (IoT) and Cloud computing. Nonetheless, Blockchain has a…
View article: Improved flat mobile core network architecture for 5G mobile communication systems
Improved flat mobile core network architecture for 5G mobile communication systems Open
The current mobile network core is built based on a centralized architecture, including the S-GW and P-GW entities to serve as mobility anchors. Nevertheless, this architecture causes non-optimal routing and latency for control messages. I…
View article: A Novel Hybrid Prairie Dog Algorithm and Harris Hawks Algorithm for Resource Allocation of Wireless Networks
A Novel Hybrid Prairie Dog Algorithm and Harris Hawks Algorithm for Resource Allocation of Wireless Networks Open
Enhancing the performance of wireless networks and communication systems requires careful resource allocation. Resource allocation optimization, however, is regarded as a mixed-integer non-linear programming (MINLP) problem, which is NP-ha…
View article: The effect of multimodality on customers' decision-making and experiencing: A comparative study
The effect of multimodality on customers' decision-making and experiencing: A comparative study Open
The primary objective of this article is to present the findings of an experimental study on the use of a human-like “naturalistic” avatar (of both genders) for information presentations. The primary goal is to investigate how users' frame…
View article: Black hole algorithm: A comprehensive survey
Black hole algorithm: A comprehensive survey Open