Processing, Please wait...

  • Home
  • About Us
  • Search:
  • Advanced Search

Growing Science » Authors » Mohammad Shehab

Journals

  • IJIEC (747)
  • MSL (2643)
  • DSL (668)
  • CCL (508)
  • USCM (1092)
  • ESM (413)
  • AC (562)
  • JPM (271)
  • IJDS (912)
  • JFS (96)
  • HE (32)
  • SCI (26)

Keywords

Supply chain management(166)
Jordan(161)
Vietnam(149)
Customer satisfaction(120)
Performance(113)
Supply chain(111)
Service quality(98)
Competitive advantage(95)
Tehran Stock Exchange(94)
SMEs(87)
optimization(86)
Trust(83)
TOPSIS(83)
Financial performance(83)
Sustainability(82)
Job satisfaction(80)
Factor analysis(78)
Social media(78)
Artificial intelligence(77)
Knowledge Management(77)


» Show all keywords

Authors

Naser Azad(82)
Mohammad Reza Iravani(64)
Zeplin Jiwa Husada Tarigan(63)
Endri Endri(45)
Muhammad Alshurideh(42)
Hotlan Siagian(39)
Jumadil Saputra(36)
Dmaithan Almajali(36)
Muhammad Turki Alshurideh(35)
Barween Al Kurdi(32)
Ahmad Makui(32)
Basrowi Basrowi(31)
Hassan Ghodrati(31)
Mohammad Khodaei Valahzaghard(30)
Sautma Ronni Basana(29)
Shankar Chakraborty(29)
Ni Nyoman Kerti Yasa(29)
Sulieman Ibraheem Shelash Al-Hawary(28)
Prasadja Ricardianto(28)
Haitham M. Alzoubi(27)


» Show all authors

Countries

Iran(2184)
Indonesia(1290)
India(788)
Jordan(786)
Vietnam(504)
Saudi Arabia(453)
Malaysia(441)
United Arab Emirates(220)
China(206)
Thailand(153)
United States(111)
Turkey(106)
Ukraine(104)
Egypt(98)
Canada(92)
Peru(88)
Pakistan(85)
United Kingdom(80)
Morocco(79)
Nigeria(78)


» Show all countries
Sort articles by: Volume | Date | Most Rates | Most Views | Reviews | Alphabet
1.

Euler spiral based backoff algorithm for MAC protocol in mobile Ad Hoc networks Pages 853-862 Right click to download the paper Download PDF

Authors: Afaf Edinat, Mohammad Shehab, Fatima Haimour, Mariam Al Ghamri, Mais K. Al-Tarawneh

DOI: 10.5267/j.ijdns.2025.7.002

Keywords: MAC, Fibonacci, IEEE 802.11, Backoff Algorithm, Binary Exponential Backoff, MANETs

Abstract:
Researchers have developed different backoff algorithms to help boost how well IEEE 802.11 distributed coordination function (DCF) performs. The standard approach, known as binary exponential backoff (BEB), is commonly used, but alternatives exist. One alternative that has gained attention is the Fibonacci incremental backoff (FIB), mainly because it is shown to be quite effective. This paper introduces a novel backoff method that’s inspired by the Euler spiral curve. To assess its performance, we performed simulations comparing the proposed approach with both BEB and FIB. We focused on key performance measures like network throughput and end-to-end delay, particularly in mobile ad hoc networks. The results are encouraging: our method delivers better throughput than both BEB and FIB. However, it does come with a trade-off. It does exhibit slightly higher end-to-end delay compared to FIB.
Details
  • 0
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: IJDS | Year: 2025 | Volume: 9 | Issue: 4 | Views: 100 | Reviews: 0

 
2.

Integrating blockchain technology for secure access control in smart home environments: A comprehensive review Pages 373-384 Right click to download the paper Download PDF

Authors: Tariq Bishtawi, Mohammad Shehab, Reem Alzubi, Ayman Ghaben, Suaad M. Alenzi

DOI: 10.5267/j.ijdns.2025.4.003

Keywords: Blockchain, Access control, Smart home, IoT, Cryptographic techniques

Abstract:
Smart home technologies have revolutionized modern living by enhancing convenience, efficiency, and security. In contrast, many interconnected devices introduce significant security and privacy challenges. This comprehensive review investigates the integration of blockchain technology as a robust solution for secure access control in smart home environments. The decentralized and tamper-resistant nature of blockchain technology effectively solves important problems, including device authentication, data integrity, and access management, through the use of cryptography and distributed ledgers. The study synthesizes findings from 52 research papers, categorizing them into three thematic areas: blockchain in access control systems, its applications in IoT, and specific implementations for smart homes. It highlights the transformative potential of blockchain in mitigating vulnerabilities inherent in centralized systems, fostering trust, and enhancing security frameworks. Despite its promising applications, challenges such as scalability, interoperability, and energy consumption persist, warranting further research. This paper stresses the necessity of collaboration to tackle these limitations and enhance blockchain-based access control solutions for smart homes, setting the stage for more secure and user-focused smart environments.
Details
  • 0
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: IJDS | Year: 2025 | Volume: 9 | Issue: 3 | Views: 1156 | Reviews: 0

 
3.

Machine learning approaches for enhancing smart contracts security: A systematic literature review Pages 1349-1368 Right click to download the paper Download PDF

Authors: Areej AlShorman, Fatima Shannaq, Mohammad Shehab

DOI: 10.5267/j.ijdns.2024.4.007

Keywords: Ethereum, Smart Contracts, Machine Learning, Vulnerability, Attack, Detection

Abstract:
Smart contracts offer automation for various decentralized applications but suffer from vulnerabilities that cause financial losses. Detecting vulnerabilities is critical to safeguarding decentralized applications before deployment. Automatic detection is more efficient than manual auditing of large codebases. Machine learning (ML) has emerged as a suitable technique for vulnerability detection. However, a systematic literature review (SLR) of ML models is lacking, making it difficult to identify research gaps. No published systematic review exists for ML approaches to smart contract vulnerability detection. This research focuses on ML-driven detection mechanisms from various databases. 46 studies were selected and reviewed based on keywords. The contributions address three research questions: vulnerability identification, machine learning model approaches, and data sources. In addition to highlighting gaps that require further investigation, the drawbacks of machine learning are discussed. This study lays the groundwork for improving ML solutions by mapping technical challenges and future directions.
Details
  • 0
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: IJDS | Year: 2024 | Volume: 8 | Issue: 3 | Views: 1538 | Reviews: 0

 
4.

Integrated multi-layer perceptron neural network and novel feature extraction for handwritten Arabic recognition Pages 1501-1516 Right click to download the paper Download PDF

Authors: Husam Ahmad Al Hamad, Mohammad Shehab

DOI: 10.5267/j.ijdns.2024.3.015

Keywords: Arabic handwritten recognition, Block density and location feature, Pixel density, Feature extraction

Abstract:
Arabic handwritten script recognition presents an energetic area of study. These types of recognitions face several obstacles, such as vast open databases, boundless diversity in individuals' penmanship, and freestyle writing. Thus, Arabic handwriting requires effective techniques to achieve better recognition results. On the other hand, Multilayer Perceptron (MLP) is one of the most common Artificial Neural Networks (ANNs) which deals with various problems efficiently. Therefore, this study introduces a new technique called Block Density and Location Feature (BDLF) with MLP, namely BDLF-MLP, which aims to extract novel features from letter images and estimate the letter's pixel density and its location for each equal-sized block in the image. In other words, BDLF-MLP can deal with various styles of Arabic handwritten, such as overlapping letters. The BDLF-MLP starts with the Block Feature Extraction (BFE) of the image by dividing the image into sixteen parts. After that, it calculates the density and location of each block (i.e., BDLF) by finding the sum of all values inside blocks. Finally, it determines the position of the greatest pixel density to obtain better recognition accuracy. The dataset containing 720 images is used to evaluate the efficiency of the proposed technique. Also, 1440 letters are used for training and testing divided evenly between them. The experiment results illustrate that BDLF-MLP outperformed the other algorithms in the literature with an accuracy of 97.26 %.
Details
  • 0
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: IJDS | Year: 2024 | Volume: 8 | Issue: 3 | Views: 712 | Reviews: 0

 

® 2010-2026 GrowingScience.Com