Papers by Bassam Al-shargabi
Using the Binary Search Tree Structure as key to Encrypt Images
International Journal Of Computing and Digital System, Aug 23, 2021
A critical review of auditing at the time of blockchain technology – a bibliometric analysis
Euromed Journal of Business, Jul 5, 2023

Vehicular Ad hoc Networks (VANETs), a subcategory of Mobile ad hoc networks (MANETs), is a promis... more Vehicular Ad hoc Networks (VANETs), a subcategory of Mobile ad hoc networks (MANETs), is a promising approach that is now evolving, gaining attention and momentum. VANET consists of highly mobile nodes and roadside infrastructure to communicate essential information across a network, such as collisions, traffic congestion, and vehicular destinations. Due to its frequent vehicle movement, time-critical response and hybrid architecture, it comes with a plethora of network security and privacy issues ranging from the potential of malicious attacks to the availability of essential information across the network and its overall integrity. There is much research devoted to enabling secure communication in VANETs for the best Intelligent Transport System (ITS) experience. In this paper, we address and discuss the characteristics and security issues including the existing VANETs attacks and preventive approaches to each security attack emphasising the main features and the major drawbacks. The review of these different countermeasures shows their strengths and weaknesses and how they can be implemented independently or in a hybrid model best suited to the situation.

A modified lightweight <scp>DNA</scp> ‐based cryptography method for internet of things devices
Expert Systems, Mar 6, 2023
The data generated by the applications of the internet of things (IoT) that transmit sensitive an... more The data generated by the applications of the internet of things (IoT) that transmit sensitive and secret information via wireless sensor networks (WSN) must be safeguarded as major components of any cyber physical system (CPS). Interconnected devices, such as IoT devices or objects are viewed as constrained because they lack adequate computational resources. These resources consist of energy, memory, and processing power, however, when attempting to encrypt transferred data using traditional encryption methods, these obstacles offered by IoT devices are viewed as a challenge because their limited resources may dramatically limit the potential and performance of CPS. Therefore, we introduced the modified DNA‐based lightweight encryption method, which relies on the DNA sequence, as a way to get around the fact that IoT devices have insufficient computing processing and storage resources. The randomized structure of the DNA sequence was leveraged in the modified lightweight encryption method to obtain an encryption secret key. The secret key is employed to encrypt and decrypt data generated by IoT devices in a manner that is consistent with the computing capabilities of IoT devices during encryption operations involving substitution, transposition, and circular shifting to increase the confusion level of encrypted data. We also studied the effects of changing the size of the data block along with the key space of the modified DNA‐based lightweight encryption method. Performance and experimental results in terms of key lengths, the amount of time it takes to encrypt, the degree of distortion, and the security level of the modified DNA‐based lightweight encryption method surpass those of currently employed encryption algorithms.

Equalizing energy consumption among sensor nodes within Wireless Sensor Networks (WSNs) is an imp... more Equalizing energy consumption among sensor nodes within Wireless Sensor Networks (WSNs) is an important technique that can be used to prolong the network lifetime. Routing Protocol for Low Energy and Lossy networks (RPL) is a dedicated protocol for this type of networks of poor energy resources. In RPL there is only one routing metric that can be used at once in its Objective Function (OF); either reliability or saving energy of parent nodes. In the case of considering the reliability which is represented by Expected Number of Transmission (ETX) that will usually lead to unbalance energy distribution among nodes. On the other hand, when energy is being considered without taking into account the reliability of links, many packets might be lost. In this paper, an experimental study was conducted over two modified version of RPL that address issues of energy distribution among nodes with consideration of reliability network with less EXT. Cooja simulator was used for simulation purposes. The results obtained show that the distribution of energy consumption among nodes were achieved which in turn prolong the network lifetime.
An Improved DNA based Encryption Algorithm for Internet of Things Devices

Acceptance model of m-learning among student of Isra University
The recent development in the information and Communication industry is having a tremendous impac... more The recent development in the information and Communication industry is having a tremendous impact over the education industry. With the advent of technologies like e-learning and M-learning institutions have started to embrace these technologies. Various factors and issues influences the adoption and acceptance use of M-learning that must be studied in order to benefit from the inclusion on M-learning among students specially in Jordan and the Arab Region. In particular, the issues related to how to promote learners' acceptance of M-learning are largely unsolved. Research in this regard is very scare. Therefore, this paper aimed to considers the various models of technology acceptance recently for the sake of developing a theoretical model based on the Technology Acceptance Model (TAM) and identifies the various factors associated in the incorporation of M-learning among students of Ira university as case study to validate the proposed model, The results shows that four factors of proposed model out of five factors that influence students to accept the use of M-learning.

International Journal of Computing and Digital Systems, Sep 30, 2022
Due to the ever-increasing cybercrime and hazards on digital information stored or in transit ove... more Due to the ever-increasing cybercrime and hazards on digital information stored or in transit over computer clouds and networks, so many encryption algorithms were developed and practically implemented. On the other hand, hackers and intruders keep on developing methods to break those algorithms. Hence, new methods are always sought and developed by researchers. A binary search tree (BST) is implemented in this paper to produce a new algorithm for image encryption. The BST is utilized to generate an encryption key that consists of two parts; local and global with flexible length capabilities that provide better security. Sharing all image contents to encrypt any byte of the source image helped to achieve Shannon's concept of diffusion and confusion. The experimental application of this algorithm has manifested a satisfactory security performance as compared with the widely used cryptographic systems such as Advanced Encryption Standard (AES) and Data Encryption Standard (DES). These Comparisons included measurement of encryption time complexity, Peak Signal to Noise Ratio (PSNR), Entropy, encryption key space. Besides, the new method offers encryption key length flexibility and involvement of all image contents in its generation.

Enhancing Multi-Layer Perception for Breast Cancer Prediction
Social Science Research Network, Oct 1, 2019
Breast cancer (BC) is a standout disease of the most well-known cancers among women around the wo... more Breast cancer (BC) is a standout disease of the most well-known cancers among women around the world. The analysis and prediction of BC leads to early manage the disease and protect the patients from further medical complications. In the light of its noticeable focal points in basic highlights identification from complex BC datasets, Machine Learning (ML) is generally perceived as the technique of decision in BC design order and gauge displaying. Because of the high performance of the Multi-layer Perceptron (MLP) algorithm as one of the ML techniques, we conducted experiments in order to enhance the accuracy rate of MLP by tuning its hyper-parameters along with studying the effect of feature selection methods and feature reduction of MLP. As feature selection results indicated that an increase in the number of input parameters tends to reduce the error associated with the estimator model. The tuned MLP proposed in this paper, based MLP best fit hyper-parameters along with feature selection is applied for breast cancer classification using Wisconsin Diagnostic Breast Cancer (WDBC) dataset. As the tuned MLP experimental result shows an accuracy reached 97.70% as it outperforms the basic MLP.
Proceedings of the The International Conference on Engineering & MIS 2015
Welcome to the ICEMIS 2015, our International Conference on Engineering and MIS. We are delighted... more Welcome to the ICEMIS 2015, our International Conference on Engineering and MIS. We are delighted that this conference, is organized by the International Association of Researchers (IARES), technically sponsored by ICPS at ACM, USA and hosted by the Istanbul Kemerburgaz University, Turkey. The ICEMIS 2015 includes participation by professionals from 30 countries, presenting 120 papers, together with 3 key-note speakers who will look at the academia's responsibility to acknowledge the engineering and MIS groups and labs over world.

Web Service Composition in Cloud: A Fuzzy Rule Model
Recent advances in computer science and communications, Aug 12, 2020
Cloud Computing has drawn much attention in the industry due to its costefficient schema along wi... more Cloud Computing has drawn much attention in the industry due to its costefficient schema along with more prospects, such as elasticity and scalability nature of Cloud Computing. One of the main service models of a Cloud is software as a service, where many web services are published and hosted in the Cloud environment. Many web services offered in a Cloud have similar functionality, with different of characteristics non-functional requirements such as Quality of Service (QoS). In addition, as individual web services are limited in their capability. Therefore, there is a need for composing existing services to create new functionality in the form of composite service to fulfill the requirements of Cloud user for certain processes. This paper introduces a fuzzy rule approach to compose web service based on QoS from different Cloud Computing providers. The fuzzy rule is generated based on QoS of discovered web service from Cloud in order to compose web services that only match user requirements. The proposed model is based on an agent that is responsible for discovering and composing web service that only stratified user requirements. the experimental result shows that the proposed model is efficient in terms of time and the use of fuzzy rules to compose web services from different Cloud providers under different specifications and configurations of Cloud Computing environment. In this paper, an agent-based model was proposed to compose web services based on fuzzy rule in Cloud environment. The agent is responsible for discovering web services and generating composition plans based on offered QoS for each web service. The agent employs a set of fuzzy rules to carry out an intelligent selection to select the best composition plan that fulfills the requirements of the end user. The model was implemented on CloudSim to ensure the validity of the proposed model and performance time analysis was performed that showed good result in terms of time with regard to the Cloud Computing configuration.

A modified lightweight DNA‐based cryptography method for internet of things devices
Expert Systems
The data generated by the applications of the internet of things (IoT) that transmit sensitive an... more The data generated by the applications of the internet of things (IoT) that transmit sensitive and secret information via wireless sensor networks (WSN) must be safeguarded as major components of any cyber physical system (CPS). Interconnected devices, such as IoT devices or objects are viewed as constrained because they lack adequate computational resources. These resources consist of energy, memory, and processing power, however, when attempting to encrypt transferred data using traditional encryption methods, these obstacles offered by IoT devices are viewed as a challenge because their limited resources may dramatically limit the potential and performance of CPS. Therefore, we introduced the modified DNA‐based lightweight encryption method, which relies on the DNA sequence, as a way to get around the fact that IoT devices have insufficient computing processing and storage resources. The randomized structure of the DNA sequence was leveraged in the modified lightweight encryption...
Comparing Traditional Machine Learning Methods for COVID-19 Fake News
2021 22nd International Arab Conference on Information Technology (ACIT), 2021
This article describes some supervised classification techniques for COVID-19 fake news detection... more This article describes some supervised classification techniques for COVID-19 fake news detection in English, where the sources of data are annotated posts from various social media platforms such as Twitter, Facebook, or Instagram. The main objective is to examine the performance of traditional machine learning techniques of COVID-19 fake news detection. In this Situation, models trained with Support Vector Machine and Naïve Bayes algorithms outperformed all other strategies.

Nowadays, Cloud Computing and Web services are the main backbone of e-government applications bec... more Nowadays, Cloud Computing and Web services are the main backbone of e-government applications because of its interoperability and accessibility nature. Web services that are maintained in Cloud brought much attention in research and industry in terms of securing the communicated Web services. Thus, securing and trusting between the communicated Web services has been gradually becoming more challenging for Web services consumers, administrators, and Web service providers especially the egovernment services. Thus, In this paper, a Cloudlet based security trust model was proposed to guarantee a proper and secure communication between Web services through exploiting the cloud computing infrastructure . In addition, the proposed model is tackling the issues arises when Web service consumers are communicating with any of the e-governmental Web services through a trusted Cloud-based third party that is controlled by any governmental agency. Moreover, the Cloudlet is also used to measure th...
Internet of Things: An exploration study of opportunities and challenges
2017 International Conference on Engineering & MIS (ICEMIS), 2017
Internet of Things (IoT) has drawn great attention in industry, academia, and research As the IoT... more Internet of Things (IoT) has drawn great attention in industry, academia, and research As the IoT technology still in beginning of its implementation in all industries and so much research are ongoing to study and develop business model to grasp the opportunities brought by IoT. A research market conducted by Gartner expects that around 25 billion IoT devices or sensors to be connected by 2020. As expected IoT technology will enter every aspect of our life. Therefore, the main objective of this paper is to provide an exploration of how businesses will be affected by IoT introduction and listing the opportunities brought IoT technology and what challenges are facing its implementation.

PeerJ Computer Science, 2021
Background The e-learning system has gained a phenomenal significance than ever before in the pre... more Background The e-learning system has gained a phenomenal significance than ever before in the present COVID-19 crisis. The E-learning delivery mechanisms have evolved to enhanced levels facilitating the education delivery with greater penetration and access to mass student population worldwide. Nevertheless, there is still scope to conduct further research in order to innovate and improve higher quality delivery mechanism using the state-of-the-art information and communication technologies (ICT) available today. In the present pandemic crisis all the stakeholders in the higher education system, i.e., the governments, institutions, and the students expect seamless and efficient content delivery via e-learning platforms. This study proposes the adoption of the e-learning system by the integration of the model proposed by Delon and Mcclean “Information System Success Model” in Jazan University, Kingdom of Saudi Arabia (KSA) and further attempts to identify the factors affecting E-lear...

International Journal of Advanced Trends in Computer Science and Engineering, 2020
We are witnessing the era of Internet of Things (IoT), where its applications such as smart citie... more We are witnessing the era of Internet of Things (IoT), where its applications such as smart cities and smart homes catch sensitive data gathered mostly by IoT surveillance cameras among other sensors or devices. Therefore, security and privacy protection is a key concern during transmitting such sensitive data across the IoT network to be processed and stored on Cloud. In this paper, we proposed a lightweight encryption model that complies with the limited resources of IoT devices in terms of process and memory. Also, the encryption model also provides a high level of security for the transmitted data through a constant change of the key used for encrypting of transmitted IoT data. In addition, the key size used to encrypt transmitted data in the proposed model is large enough which makes it hard to break by the attackers. The experimental results show outstanding results with an average of 170.7 ms of encryption time for a key size 80 bits where the key size is relatively large and with an average PSNR of 7.7 compared to other algorithms.

International Journal of Emerging Trends in Engineering Research, 2020
The new advances of the Internet of Things (IoT) technology can be utilized to promote service de... more The new advances of the Internet of Things (IoT) technology can be utilized to promote service delivery in several real-life applications such as the healthcare systems. The Routing Protocol for Low Power and Loss Network (RPL) is a routing protocol designed to serve as a proper routing protocol for packets in Wireless Sensor Networks (WSN). Among the most prominent issues exist in the RPL protocol are packet loss within the WSN and sensors power consumption especially in healthcare WSNs. Multiple Objective Functions (OF) in RPL intended to find the routes from source nodes to a destination node. This paper presents an evaluation to discover which OF is more efficient for a WSN in a healthcare scenario where the Packet Delivery Ratio (PDR) of WSN and the sensors' power consumption are prominent concerns. Expected transmission Count (ETX) and Objective Function Zero (OF0) of RPL were examined in various network densities and network topologies such as the grid and random topology. The simulation outcomes revealed that the OF0 is more efficient regarding the PDR and power consumption compared to the ETX in random topology.

Web Service Composition in Cloud: A Fuzzy Rule Model
Recent Patents on Computer Science, 2018
Cloud Computing has drawn much attention in the industry due to its costefficient schema along wi... more Cloud Computing has drawn much attention in the industry due to its costefficient schema along with more prospects, such as elasticity and scalability nature of Cloud Computing. One of the main service models of a Cloud is software as a service, where many web services are published and hosted in the Cloud environment. Many web services offered in a Cloud have similar functionality, with different of characteristics non-functional requirements such as Quality of Service (QoS). In addition, as individual web services are limited in their capability. Therefore, there is a need for composing existing services to create new functionality in the form of composite service to fulfill the requirements of Cloud user for certain processes. This paper introduces a fuzzy rule approach to compose web service based on QoS from different Cloud Computing providers. The fuzzy rule is generated based on QoS of discovered web service from Cloud in order to compose web services that only match user requirements. The proposed model is based on an agent that is responsible for discovering and composing web service that only stratified user requirements. the experimental result shows that the proposed model is efficient in terms of time and the use of fuzzy rules to compose web services from different Cloud providers under different specifications and configurations of Cloud Computing environment. In this paper, an agent-based model was proposed to compose web services based on fuzzy rule in Cloud environment. The agent is responsible for discovering web services and generating composition plans based on offered QoS for each web service. The agent employs a set of fuzzy rules to carry out an intelligent selection to select the best composition plan that fulfills the requirements of the end user. The model was implemented on CloudSim to ensure the validity of the proposed model and performance time analysis was performed that showed good result in terms of time with regard to the Cloud Computing configuration.
An Evaluation of MIS Implementation Success Factors
Proceedings of the The International Conference on Engineering & MIS 2015, 2015
Management Information Systems (MIS) does not only include information systems, rather than a loo... more Management Information Systems (MIS) does not only include information systems, rather than a look to the entire business processes and resources that are directed toward pulling information from functional or tactical systems. Many challenges are facing organization when implementing and managing MIS system and projects. This paper aimed to explore those challenges and provide a model in order to tackle these challenges and lead to a successful implementation MIS system organization.
Uploads
Papers by Bassam Al-shargabi