Claim Missing Document
Check
Articles

Found 8 Documents
Search

Challenges in data representation for efficient execution of encryption operation Afendee Mohamed, Mohamad; Garba Shawai, Yahaya; Almaiah, Mohammed Amin; Derahman, Mohd Noor; Lutfi, Abdalwali; Abu Bakar, Khairul Azmi
Bulletin of Electrical Engineering and Informatics Vol 13, No 2: April 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v13i2.5437

Abstract

Big number operation has always been a bottleneck to computer system as it imposes high demand on computing power. With a limited power available, operations such as exponentiation and multiplication involving large integer belonging to encryption process requires grave scrutiny. One way to address this issue is by replacing an original complex computation into a sequence of small computations that in the end produces the same results. This paper takes an evolutionary approach to survey numerous articles that have contributed to the advancement of integer representation. Numerous representations were proposed, those that come into play concentrated on reducing non-zero digits and limiting non-zero spacing other than allowing subtraction operation. A comparison was made to distinguish the properties of each method from the others. This detailed outlook can be a guide for identifying the correct representation to be chosen for implementation within specific application.
Applying Structural Equation Modelling for Examining the Impact of Quality Dimensions in Improving the Adoption of Digital-Learning Platforms Alkhdour, Tayseer; Almaiah, Mohammed Amin; Shishakly, Rima; AlAli, Rommel
Journal of Applied Data Sciences Vol 6, No 1: JANUARY 2025
Publisher : Bright Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47738/jads.v6i1.518

Abstract

Although a number of studies have proved the significance of quality characteristics in improving Digital-learning platforms success, there is few research about the impact of quality dimensions in increasing system adoption and usage. As a result, our research investigated the impact of quality indicators such as Quality of Service, quality of learning content and information, and quality of system on Digital-learning platforms usability. Quality of Service, quality of learning content and information, and quality of system characteristics were determined to be the essential components impacting Digital-learning platforms adoption among learners. The study revealed that system quality was the most critical factor influencing the perceived ease of use and usefulness of Digital-learning platforms. Information quality also had a significant impact on both perceived ease of use and usefulness. Additionally, service quality affected these usability factors as well. The findings indicate that system quality significantly influenced usability factors, specifically perceived ease of use and perceived usefulness (H1: β = 0.321; H2: β = 0.366). Additionally, service quality is found to have a significant effect on both usability factors, ease of use and usefulness (H5: β = 0.371; H6: β = 0.366). Furthermore, the results are essential in determining the importance of those quality components that can be utilized by developers in institutions of higher education to enhance their Digital-learning platforms experiences.
Optimizing Mobile Robot Path Planning with a Hybrid Crocodile Hunting and Falcon Optimization Algorithm Hashim, Wassan Adnan; Ahmed, Saadaldeen Rashid; Mahmood, Mohammed Thakir; Almaiah, Mohammed Amin; Shehab, Rami; AlAli, Rommel
Journal of Robotics and Control (JRC) Vol. 6 No. 2 (2025)
Publisher : Universitas Muhammadiyah Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18196/jrc.v6i2.25586

Abstract

Thorough path planning is critical in unmanned ground vehicle control to reduce path length, computational time, and the number of collisions. This paper aims to introduce a new metaheuristic method called the Hybrid Crocodile Hunting-SearcH and Falcon Optimization (CHS-FO) algorithm. This method combines CHS's exploration and exploitation abilities with FO's rapid convergence rate. In this way, the use of both metaheuristic techniques limits the disadvantage of the individual approach, guaranteeing a high level of both global and local search. We conduct several simulations to compare the performance of the CHS-FO algorithm with conventional algorithms such as A* and Genetic Algorithms (GA). It is found The results show that the CHS-FO algorithm performs 30–50% better in terms of computation time, involves shorter path planning, and improves obstacle avoidance. Eristic also suggests that the path generation algorithm can adapt to environmental constraints and be used in real-world scenarios, such as automating product movement in a warehouse or conducting search and rescue operations for lost vehicles. The primary The proposed CHS-FO architecture makes the robot more independent and better at making choices, which makes it a good choice for developing the next generation of mobile robotic platforms. Goals will encompass the improvement of the algorithm's scalability for use in multiple robots, as well as the integration of the algorithm in a real environment in real time.
Investigating Quantum-Resilient Security Mechanisms for Flying Ad-Hoc Networks (FANETs) Abbood, Abdulnasser AbdulJabbar; AL-Shammri, Faris K.; Alzamili, Zainab Marid; Al-Shareeda‬‏, ‪Mahmood A.; Almaiah, Mohammed Amin; AlAli, Rommel
Journal of Robotics and Control (JRC) Vol. 6 No. 1 (2025)
Publisher : Universitas Muhammadiyah Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18196/jrc.v6i1.25351

Abstract

Flying Ad Hoc Networks (FANETs) are indispensable in applications such as Surveillance, Disaster response missions, and Military operations. Both security and communication efficiency must meet certain requirements. However, their effectiveness is hobbled by dynamic topologies, resource constraints, and cyber threats. Therefore, Post-Quantum Cryptography (PQC) is necessary. Classical algorithms and current PQC schemes for FANETs have been discussed in this thesis, including cryptographic solutions that are lightweight enough for resourceconstrained environments. The numerical results of the experiment show that while lattice-based cryptography involves minimal risk of breaches, its power consumption is 25% higher than that for other systems and its processing time 30% slower. In contrast, multivariate polynomial cryptography is better on metrics like usage of electricity: only 10% more power consumed energywise and 15% more CPU cycles needed for processing. The introduction of PQC algorithms and architectures resulted in a 5–10% reduction in network throughput and increased latency to 20% in some scenarios. The results show that hybrid cryptographic systems—combining classical with PQC techniques— have the potential to achieve both high efficiency and long-term security. Case studies have validated the feasibility of tailored quantum-safe algorithms in FANETs, which can offer considerable security benefits while standing rigorous scrutiny in terms of scalability and computational performance on dynamic, missioncritical operations.
Assimilate Grid Search and ANOVA Algorithms into KNN to Enhance Network Intrusion Detection Systems Alsharaiah, Mohammad A.; Almaiah, Mohammed Amin; Shehab, Rami; Alkhdour, Tayseer; AlAli, Rommel; Alsmadi, Fares
Journal of Applied Data Sciences Vol 6, No 3: September 2025
Publisher : Bright Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47738/jads.v6i3.604

Abstract

The recent progress of operational network intrusion detection systems (NIDS) has become increasingly essential. Herein, a fruitful attempt to introduce an innovative NIDS methodology that integrates the grid search optimization algorithm and ANOVA techniques with the K nearest neighbor (KNN) algorithm to analyze both spatial and temporal characteristics of data for network traffic. We employ the UNSW-NB15 benchmark dataset, which presents various patterns and a notable imbalance between the training and testing data, with 257674 samples. Therefore, the Synthetic Minority Oversampling Technique has been used since this method is effective in handling imbalanced datasets. Further, to handle the overfitting issue the K folds cross-validation method has been applied. The feature sets within the dataset are meticulously selected using ANOVA mechanisms. Subsequently, the KNN classifier is fine-tuned through hyperparameter tuning using the grid search algorithm. This tuning process includes adjusting the number of K neighbors and evaluating various distance metrics such as 'euclidean', 'manhattan', and 'minkowski'. Herein, all attack types in the dataset were labeled as either 1 for abnormal instances or 0 for normal instances. Our model excels in binary classification by harnessing the strengths of these integrated techniques. By conducting extensive experiments and benchmarking against cutting-edge machine learning and deep learning models, the effectiveness and advantages of our proposed approach are thoroughly demonstrated. Achieving an impressive performance of 99.1%. Also, several performance metrics have been applied to assess the proposed model's efficiency.
SECRE-MEN: A Lightweight Quantum-Resilient Authentication Framework for IoT-Edge Networks Faleh, May Adnan; Abdulsada, Ali M.; Alaidany, Ali A.; Al-Shareeda‬‏, ‪Mahmood A.; Almaiah, Mohammed Amin; Shehab, Rami
Journal of Robotics and Control (JRC) Vol. 6 No. 4 (2025)
Publisher : Universitas Muhammadiyah Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18196/jrc.v6i4.26006

Abstract

The wide 6G-IoT and Mobile Edge Computing (MEC) deployments give rise to severe concerns in authentication, revocation and protection against quantum-post and side channel attacks. In this paper, SECRE-MEN (Secure and Efficient Cryptographic Revocable Authentication for MEC enabled Networks) is presented to be a lightweight and scalable authentication architecture specifically designed for the resource limited IoT systems. SECRE-MEN consists of three main parts: (1) Masked Cryptographic Techniques that are used to randomise elliptic curve operations, thereby mitigate side-channel attacks, (2) VCs, providing support for digitally-signed, lightweight authentication, without requiring the use of bulky certificates, and (3) a Bloom filter-based RDB, which is distributed across multiple MEC nodes, to allow for fast, memory-efficient revocation checks. To enable future-proof security post-quantum cryptography (PQC) is included in SECRE-MEN by lattice-based schemes, such as Kyber and Dilithium, which may incur additional computational cost on ultra-low-power platforms according to the trade-off introduced in this paper. Effort experiments show that the proposed RAM-MENAMI decreases 29.3% the computation cost, and reduces 21.8% the communication budget and improve 20.3% of power efficiency in comparison with the RAM-MEN. In addition, SECRE-MEN is resistant against impersonation, MITM, replay and quantum attacks, as well as allows for dynamic revocation and secure synchronization among MEC nodes. This places SECREMEN as an effective toolkit for cybersecurity of massive IoT-MEC networks in the era of the evolving 6G.
Artificial Intelligence-Driven and Secure 5G-VANET Architectures for Future Transportation Systems Saare, Murtaja Ali; Abdulhamed, Mohamed Abdulrahman; Al-Shareeda‬‏, ‪Mahmood A.; Almaiah, Mohammed Amin; Shehab, Rami
Journal of Robotics and Control (JRC) Vol. 6 No. 4 (2025)
Publisher : Universitas Muhammadiyah Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18196/jrc.v6i4.26295

Abstract

The advent of 5G has opened a new era of intelligent, adaptive and secure VANETs that is envisaged to serve as the backbone network architecture for next generation of vehicular transportation systems. In this work, we present a connected 5G VANETs-to-Edge Computing systems with Artificial Intelligence (AI) infrastructure to improve system adaptability, anomaly detection, trust management, and real-time decisionmaking. Crucial enabling technologies like Software-Defined Networking (SDN). Mobile Edge Computing (MEC), and millimeterwave communication are investigated in detail. We examine key security threats such as identity forgery, data interception, and denial-of-service attacks, and assess the AI-enhanced defense measures such as intrusion detection systems and blockchainbased trust models. Applications, like autonomous platooning, and collaborative vehicle authentication provide additional examples of AI technologies’ added value in the context of vehicular communications and safety. The paper concludes by providing open issues and future directions, including quantum-resistant protocols, lightweight AI models and cognitive networking in the context AI-driven 5G-VANET ecosystems.
CA-HBCA: A Software Engineering Framework for Secure, Scalable, and Adaptive Healthcare Blockchain Systems Qasim, Mustafa Moosa; Altmemi, Jalal M. H.; Ali, Akram Hussain Abd; Al-Shareeda‬‏, ‪Mahmood A.; Almaiah, Mohammed Amin; Shehab, Rami
Journal of Robotics and Control (JRC) Vol. 6 No. 4 (2025)
Publisher : Universitas Muhammadiyah Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18196/jrc.v6i4.26643

Abstract

Secure, scalable, and compliant solutions are becoming a requirement for healthcare systems handling sensitive medical data. Blockchain presents unique opportunities to create transparency and trust that is decentralized, yet has inherent challenges posed by scalability, sustainability and regulation. This study presents CA-HBCA, a Cognitive and Adaptive Software Engineering Framework for intelligent healthcare blockchain applications. The novel contribution of the research is the combination of four sledging modules, such as an AIbased cognitive security layer that triggers real-time anomaly detection, an adaptive sustainability engine that optimises energyperformance, a DevSecOps-based continuous delivery pipline, and a HL7/FHIR-compliant interoperability and consent management layer. Methodologically, the FEACAN was realized with Solidity, TensorFlow, and Ethereum/Hyperledger testnets, and tested by simulating healthcare scenarios such as EHR exchange, and adversary search. We obtained 93.2% precision of anomaly detection, 17.6% reduction of energy consumption, 42 transactions per second throughput in Hyperledger, and 98.7% of success rate of HL7-FHIR transformation, etc. The framework also demonstrated 100% smart contract–based consent compliance under test cases. The results indicate that CA-HBCA can be employed for the establishment of secure, sustainable and regulation-compliant blockchains in digital health infrastructures. In the future, we will also carry out validation with clinical real data sets and investigate the scalability in a variety of healthcare settings.