33 research outputs found

    Individual Adopter Differences Among Jordanian Technology Users

    Get PDF
    This paper draws upon innovation diffusion theory and more recent conceptualizations of IT adoption behavior to examine differences among Jordanian Internet across Rogers’ adopter categories. We extend Rogers’ theory by characterizing adopter categories based on personality, attitudinal and situational variables recently found to be salient in IT adoption behaviors, and determine that young, educated and upwardly-mobile members of developing economies in the Middle East and North Africa region are the best target for increasing the effectiveness of diffusion of information and communication technology initiatives

    Awareness of sustainability issues among science education and vocational education students at the Hashemite University in Jordan : an empirical investigation

    Get PDF
    The primary purpose of this study was to assess the level of students’ awareness about sustainability issues at the Hashemite University in Jordan. A 30-item instrument, adapted from Dunkerly-Kolb (1998), was used to collect data from a sample of 230 preservice science and vocational teachers during the academic year 2005-2006. Results indicated that preservice science and vocational teachers showed medium level of awareness about sustainability issues. Additionally, results indicated that participants appeared to be independent from their natural surroundings. The study suggested few practical solutions for faculty members and for the university administration to incorporate sustainability principles into university curricula.peer-reviewe

    Towards Green Computing Oriented Security: A Lightweight Postquantum Signature for IoE

    Full text link
    [EN] Postquantum cryptography for elevating security against attacks by quantum computers in the Internet of Everything (IoE) is still in its infancy. Most postquantum based cryptosystems have longer keys and signature sizes and require more computations that span several orders of magnitude in energy consumption and computation time, hence the sizes of the keys and signature are considered as another aspect of security by green design. To address these issues, the security solutions should migrate to the advanced and potent methods for protection against quantum attacks and offer energy efficient and faster cryptocomputations. In this context, a novel security framework Lightweight Postquantum ID-based Signature (LPQS) for secure communication in the IoE environment is presented. The proposed LPQS framework incorporates a supersingular isogeny curve to present a digital signature with small key sizes which is quantum-resistant. To reduce the size of the keys, compressed curves are used and the validation of the signature depends on the commutative property of the curves. The unforgeability of LPQS under an adaptively chosen message attack is proved. Security analysis and the experimental validation of LPQS are performed under a realistic software simulation environment to assess its lightweight performance considering embedded nodes. It is evident that the size of keys and the signature of LPQS is smaller than that of existing signature-based postquantum security techniques for IoE. It is robust in the postquantum environment and efficient in terms of energy and computations.This project was funded by the Deanship of Scientific Research (DSR), King Abdulaziz University. Jeddah. under grant No. (DF-457-156-1441).Rani, R.; Kumar, S.; Kaiwartya, O.; Khasawneh, AM.; Lloret, J.; Al-Khasawneh, MA.; Mahmoud, M.... (2021). Towards Green Computing Oriented Security: A Lightweight Postquantum Signature for IoE. Sensors. 21(5):1-20. https://doi.org/10.3390/s2105188312021

    Green Communication for Underwater Wireless Sensor Networks: Triangle Metric Based Multi-Layered Routing Protocol

    Full text link
    [EN] In this paper, we propose a non-localization routing protocol for underwater wireless sensor networks (UWSNs), namely, the triangle metric based multi-layered routing protocol (TM2RP). The main idea of the proposed TM2RP is to utilize supernodes along with depth information and residual energy to balance the energy consumption between sensors. Moreover, TM2RP is the first multi-layered and multi-metric pressure routing protocol that considers link quality with residual energy to improve the selection of next forwarding nodes with more reliable and energy-efficient links. The aqua-sim package based on the ns-2 simulator was used to evaluate the performance of the proposed TM2RP. The obtained results were compared to other similar methods such as depth based routing (DBR) and multi-layered routing protocol (MRP). Simulation results showed that the proposed protocol (TM2RP) obtained better outcomes in terms of energy consumption, network lifetime, packet delivery ratio, and end-to-end delay.This project was funded by the Deanship of Scientific Research (DSR), King Abdulaziz University, Jeddah (under grant no. DF-524-156-1441). The authors, therefore, gratefully acknowledge DSR for the technical and financial supportKhasawneh, AM.; Kaiwartya, O.; Lloret, J.; Abuaddous, HY.; Abualigah, L.; Shinwan, MA.; Al-Khasawneh, MA.... (2020). Green Communication for Underwater Wireless Sensor Networks: Triangle Metric Based Multi-Layered Routing Protocol. Sensors. 20(24):1-23. https://doi.org/10.3390/s20247278123202

    The Leadership Role of Academic Departments in Integrating New Faculty Members in Yarmouk University from Their Perspective

    Get PDF
    This study aimed to investigate the role that academic departments play to integrate new faculty members in Yarmouk University. The study sample consisted of (120) newly hired faculty members in the first semester of the academic year (2009/2010). The results showed that the leadership role of the academic departments was «moderate», from the responders respective. Furthermore, the results indicated that there was a significant statistical difference at (α<0.05) in the means of the responders' responses related to job title in favor of professors, whereas there was no significant statistical difference at (α<0.05) in the means of the responders' responses related to the gender or specialization

    CIPM: Common identification process model for database forensics field

    Get PDF
    Database Forensics (DBF) domain is a branch of digital forensics, concerned with the identification, collection, reconstruction, analysis, and documentation of database crimes. Different researchers have introduced several identification models to handle database crimes. Majority of proposed models are not specific and are redundant, which makes these models a problem because of the multidimensional nature and high diversity of database systems. Accordingly, using the metamodeling approach, the current study is aimed at proposing a unified identification model applicable to the database forensic field. The model integrates and harmonizes all exiting identification processes into a single abstract model, called Common Identification Process Model (CIPM). The model comprises six phases: 1) notifying an incident, 2) responding to the incident, 3) identification of the incident source, 4) verification of the incident, 5) isolation of the database server and 6) provision of an investigation environment. CIMP was found capable of helping the practitioners and newcomers to the forensics domain to control database crimes

    Comparative analysis of network forensic tools and network forensics processes

    Get PDF
    Network Forensics (NFs) is a branch of digital forensics which used to detect and capture potential digital crimes over computer networked environments crime. Network Forensic Tools (NFTs) and Network Forensic Processes (NFPs) have abilities to examine networks, collect all normal and abnormal traffic/data, help in network incident analysis, and assist in creating an appropriate incident detection and reaction and also create a forensic hypothesis that can be used in a court of law. Also, it assists in examining the internal incidents and exploitation of assets, attack goals, executes threat evaluation, also by evaluating network performance. According to existing literature, there exist quite a number of NFTs and NTPs that are used for identification, collection, reconstruction, and analysing the chain of incidents that happen on networks. However, they were vary and differ in their roles and functionalities. The main objective of this paper, therefore, is to assess and see the distinction that exist between Network Forensic Tools (NFTs) and Network Forensic Processes (NFPs). Precisely, this paper focuses on comparing among four famous NFTs: Xplico, OmniPeek, NetDetector, and NetIetercept. The outputs of this paper show that the Xplico tool has abilities to identify, collect, reconstruct, and analyse the chain of incidents that happen on networks than other NF tools

    A Novel Deep Convolutional Neural Network Model to Monitor People following Guidelines to Avoid COVID-19

    No full text
    COVID-19, a deadly disease that originated in Wuhan, China, has resulted in a global outbreak. Patients infected with the causative virus SARS-CoV-2 are placed in quarantine, so the virus does not spread. The medical community has not discovered any vaccine that can be immediately used on patients infected with SARS-CoV-2. The only method discovered so far to protect people from this virus is keeping a distance from other people, wearing masks and gloves, as well as regularly washing and sanitizing hands. Government and law enforcement agencies are involved in banning the movement of people in different cities, to control the spread and monitor people following the guidelines of the CDC. But it is not possible for the government to monitor all places, such as shopping malls, hospitals, government offices, and banks, and guide people to follow the safety guidelines. In this paper, a novel technique is developed that can guide people to protect themselves from someone who has high exposure to the virus or has symptoms of COVID-19, such as having fever and coughing. Different deep Convolutional Neural Networks (CNN) models are implemented to test the proposed technique. The proposed intelligent monitoring system can be used as a complementary tool to be installed at different places and automatically monitor people adopting the safety guidelines. With these precautionary measurements, humans will be able to win this fight against COVID-19

    Pressure based routing protocol for underwater wireless sensor networks: a survey

    No full text
    Underwater wireless sensor networks (UWSNs) are similar to the terrestrial sensor networks. Nevertheless, there are different characteristics among them such as low battery power, limited bandwidth and high variable propagation delay. One of the common major problems in UWSNs is determining an efficient and reliable routing between the source node and the destination node. Therefore, researchers tend to design efficient protocols with consideration of the different characteristics of underwater communication. Furthermore, many routing protocols have been proposed and these protocols may be classified as location-based and location-free routing protocols. Pressure-based routing protocols are a subcategory of the location-free routing protocols. This paper focuses on reviewing the pressure-based routing protocols that may further be classified into non-void avoidance protocols and void avoidance protocols. Moreover, non-void avoidance protocols have been classified into single factor based and multi factor based routing protocols. Finally, this paper provides a comparison between these protocols based on their features, performance and simulation parameters and the paper concludes with some future works on which further study can be conducted

    On the Potential of Fuzzy Logic for Solving the Challenges of Cooperative Multi-Robotic Wireless Sensor Networks

    No full text
    Wireless sensor networks have recently been widely used in several applications and scenarios, especially because they have the ability and flexibility for establishing a scalable and reliable wireless network. Cooperative multi-robotic systems (CMRS) are one example of these applications where establishing a wireless network between robots is essential and paramount to their operation. Further, these robots can utilize their mobility to provide sensing functionality for areas that are not covered by the static sensor. This can be achieved by equipping the robots with specific sensors to sense the area of interest (AoI) and report the sensed data to a remote monitoring center for further processing and decision-making. However, the nodes that form the sensor network have limited energy, and, as such, efficient algorithms in clusters&rsquo; formation, packets&rsquo; routing, and energy and mobility management are paramount. In this paper, a literature survey is presented containing the most related works that have been proposed to solve these challenges utilizing fuzzy logic. Most of the literature work attempted to utilize a de-centralized approach, where certain input parameters such as the residual energy, communication link quality, network congestion status, the nodes&rsquo; distance to the sink node and its location with respect to the other nodes, and the data and their sampling rate are all used as inputs to the fuzzy logic controller. These input parameters are used to determine several performance vital factors such as the cluster formation and its cluster head, best route to the sink node, optimal power management policies in terms of sleep/awake times needed to maximize the network lifetime, nodes&rsquo; mobility management policies to maintain network connectivity, and best route in terms of packet loss and delay
    corecore