Jamal Al-karaki | Iowa State University (original) (raw)

Papers by Jamal Al-karaki

Research paper thumbnail of Statistical analysis of factors associated with recent traffic accidents dataset: a practical study

International Journal of Quality Engineering and Technology, 2023

In this paper, we propose a logistic model to fit accidents dataset of 10,000 road crash incident... more In this paper, we propose a logistic model to fit accidents dataset of 10,000 road crash incidents for the Emirate of Abu Dhabi published in 2020. After cleaning up the dataset, we use descriptive and inferential statistical tools to study the attributes of each variable. Then, we identify the main independent variables that can be incorporated in a general logistic regression model which also includes the interactions between them. Our analysis using the significance level of (alpha = 0.05) found that there is a reduced logistic regression model that can fit the data in which the 'location of accident' can be represented using 'type of accident' and the 'age' of people involved in the accidents. Moreover, the results show that the interaction terms are not significant to be included in the model. Furthermore, the study shows that the odds for accidents by young age group (less than 40 years old) in external streets is 27% higher than the odds for internal streets, and that the odds for sequential type accidents in external streets is 13% higher than the odds for internal streets.

Research paper thumbnail of Intelligent Traffic Light Flow Control System Using Wireless Sensors Networks

Journal of Information Science and Engineering, May 1, 2010

Research paper thumbnail of An efficient design of 45-nm CMOS low power low noise charge sensitive amplifier for multi-standard wireless receiver

Research paper thumbnail of On the Lifetime Analytics of IoT Networks

The Internet of Things (IoT) is an evolving technology for improving human’s quality of life. Wir... more The Internet of Things (IoT) is an evolving technology for improving human’s quality of life. Wireless Sensor Network (WSN) is one of the key enablers for IoT infinite list of applications. However, minimizing energy consumption is a challenging task that directly affects the performance and lifetime of IoT networks due to limited energy available in these battery-powered devices. In order to improve the energy efficiency of such IoT sensor nodes, several approaches have been proposed in the literature with many trade-offs. In this paper, we study the problem of network lifetime analytics utilizing various routing protocols and parameters for IoT networks. We evaluate energy consumption and network lifetime through extensive simulation based on Sensoria simulator. Our simulation results confirm that the selected routing protocol and network connectivity play a significant role in reducing dissipated energy and prolonging network useful lifetime.

Research paper thumbnail of DASS-CARE: A Decentralized, Accessible, Scalable, and Secure Healthcare Framework using Blockchain

The healthcare industry is a complex system of interconnected entities. Each of these entities ha... more The healthcare industry is a complex system of interconnected entities. Each of these entities has disjoint information systems to manage patient data and records. The current IT solutions in healthcare systems have several challenges such as sharing and accessing medical records across several stakeholders while still maintaining security and privacy of these records. This global problem on how to create, maintain, and share sensitive medical records and clinical data among various stakeholders without sacrificing data privacy and integrity is still unresolved. In fact, existing healthcare records are decentralized, disjointed, non-uniform, and fragmented in nature. In this paper, we present a Blockchain-based framework, called DASS-CARE, that supports decentralized, accessible, scalable, and secure access to healthcare services including medical records. Such framework will greatly facilitate the process of real time access and updates without compromising security, integrity and confidentiality of patient data. Our objective is multifold. First, improve the quality of healthcare and lower the cost of delivery. Second, enhance medical records management including electronic health records unification. Finally, provide users with the ability to view their medical records regardless of their history, a task that is difficult to accomplish under the current fragmented systems.

Research paper thumbnail of A Taxonomy of Routing Techniques in Wireless Sensor Networks

CRC Press eBooks, Jan 27, 2006

Research paper thumbnail of Emerging Trends in Routing Protocols in Mobile Wireless Ad Hoc and Sensor Networks

... Mobile Wireless Ad Hoc and Sensor Networks Emerging Trends in Routing Protocols in Mobile Wir... more ... Mobile Wireless Ad Hoc and Sensor Networks Emerging Trends in Routing Protocols in Mobile Wireless Ad Hoc and Sensor Networks Jamal N. Al-Karaki, The Hashemite University, Jordan Introduction 1084 Routing Challenges in Mobile Ad Hoc and Sensor Networks 1084 ...

Research paper thumbnail of Security and Privacy Challenges of Integrated Disruptive Technologies

Recently, many disruptive technologies have evolved dramatically rendering our world increasingly... more Recently, many disruptive technologies have evolved dramatically rendering our world increasingly connected. As such, it is critical to consider what implications these technologies and their integrations have on security and privacy. This paper presents an overview of the integration pathways of some leading technologies today, namely, clouds, Internet of things, Big data, block chain, AI, and social media. The authors highlight the security and privacy challenges and future directions in these fields. First, the paper highlights how disruptive technologies leverage each other to overcome their limitations resulting in new business models worldwide. For example, Blockchain technology introduces robust solutions for challenging and critical IoT security problems. Then, the paper identifies security and privacy challenges that results from the integration perspectives of these technologies. The paper concluded by highlighting future challenges in this growing filed.

Research paper thumbnail of DASS-CARE 2.0: Blockchain-Based Healthcare Framework for Collaborative Diagnosis in CIoMT Ecosystem

Research paper thumbnail of Enhanced DASS-CARE 2.0: a blockchain-based and decentralized FL framework

Annals of Telecommunications

Research paper thumbnail of A trust-based authentication framework for security of WPAN using network slicing

International Journal of Electrical and Computer Engineering (IJECE)

New technologies bring along many challenges including security and privacy. Wireless personal ar... more New technologies bring along many challenges including security and privacy. Wireless personal area networks (WPANs) are characterized by limited energy resources and computing power that calls for lightweight security mechanisms in these networks as a mandatory requirement. In this paper, a lightweight trust-based framework for node authentication in WPAN is proposed. Our main objective is to minimise the effort in distinguishing valid requests of trustworthy nodes from invalid requests of malicious nodes that can result in network compromises. We achieve this through network slicing which divides the network into virtually primary and secondary networks. The proposed framework has three-fold benefits. First, it authenticates nodes’ requests based on a novel method of trust value calculation. Second, the framework maintains energy efficiency while authenticating nodes’ requests to access WPAN resources. Finally, the framework provides a solution for biasing problem that can arise d...

Research paper thumbnail of A simple and predictive model for covid-19 evolution in large scale infected countries

Journal of theoretical and applied information technology, Dec 31, 2020

Research paper thumbnail of A Cross-Layer-Based Clustered Multipath Routing with QoS-Aware Scheduling for Wireless Multimedia Sensor Networks

International Journal of Distributed Sensor Networks, 2012

Wireless multimedia sensor networks (WMSNs) can handle different traffic classes of multimedia co... more Wireless multimedia sensor networks (WMSNs) can handle different traffic classes of multimedia content (video, audio streams, and still images) as well as scalar data over the network. To ensure correct delivery of real-time multimedia data and efficient resource utilization, a proposed solution should provide both quality of service (QoS) assurance and energy efficiency. In this paper, we propose a cross-layer-based routing protocol that can utilize MAC-layer QoS-based scheduling for more efficient routing mechanism in WMSNs. Our proposed optimization is based on clustered multipath routing protocol and adaptive QoS-aware scheduling for the different traffic classes in WMSNs. Our design exploits the hierarchical structure of powerful cluster heads and the optimized multiple paths along with the adaptive scheduling to support reliable, high-throughput, and energy-efficient multimedia transmission in WMSNs. Simulation results show a significant performance improvement of our proposed design when compared to other similar routing schemes.

Research paper thumbnail of On energy efficient routing for wireless sensor networks

2008 International Conference on Innovations in Information Technology, 2008

The design of energy-efficient protocols for Wireless Sensor Networks (WSNs) is a crucial problem... more The design of energy-efficient protocols for Wireless Sensor Networks (WSNs) is a crucial problem as energy is a stringent resource in these networks. In this paper, we propose an energy-aware routing protocol using a new approach. To be more specific, we present a protocol called High Power Short Distance protocol (HPSD). HPSD is a node-based protocol that selects the route to the base station (BS) based on the closest node that has the highest battery power relative to its surrounding neighbors. Thus, the energy load can be distributed among all sensor nodes instead of using certain path each time. As such, HPSD can increase the life time of the network. We simulate the performance of HPSD and compare it to other routing protocols for WSNs. Our results show that albeit being simple, HPSD proved to be a very efficient routing protocol in terms of increasing the life time of the network. Moreover, simulation results show that HPSD can efficiently adapt routes to the nodes available power.

Research paper thumbnail of Data aggregation in wireless sensor networks - exact and approximate algorithms

2004 Workshop on High Performance Switching and Routing, 2004. HPSR.

Research paper thumbnail of Integrating Blockchain with Fog and Edge Computing for Micropayment Systems

Research paper thumbnail of An efficient design of 45-nm CMOS low-noise charge sensitive amplifier for wireless receivers

International Journal of Electrical and Computer Engineering (IJECE), 2022

Amplifiers are widely used in signal receiving circuits, such as antennas, medical imaging, wirel... more Amplifiers are widely used in signal receiving circuits, such as antennas, medical imaging, wireless devices and many other applications. However, one of the most challenging problems when building an amplifier circuit is the noise, since it affects the quality of the intended received signal in most wireless applications. Therefore, a preamplifier is usually placed close to the main sensor to reduce the effects of interferences and to amplify the received signal without degrading the signal-to-noise ratio. Although different designs have been optimized and tested in the literature, all of them are using larger than 100 nm technologies which have led to a modest performance in terms of equivalent noise charge (ENC), gain, power consumption, and response time. In contrast, we consider in this paper a new amplifier design technology trend and move towards sub 100 nm to enhance its performance. In this work, we use a pre-well-known design of a preamplifier circuit and rebuild it using ...

Research paper thumbnail of Reverse-Engineering Malware

Advances in Information Security, Privacy, and Ethics, 2022

<jats:p>Cyberspace is quickly becoming overwhelmed with ever-evolving malware that breaches... more <jats:p>Cyberspace is quickly becoming overwhelmed with ever-evolving malware that breaches all security defenses and secretly leaks confidential business data. One of the most pressing challenges faced by business organizations when they experience a cyber-attack is that, more often than not, those organizations do not have the knowledge nor readiness of how to analyze malware. The objective of this research is to present the fundamentals of malware reverse-engineering, the tools, and techniques needed to properly analyze malicious programs to determine their characteristics. Those tools and techniques will provide insights to incident response teams and digital investigation professionals. In order to stop hackers in their tracks, we need to equip cyber security professionals with the knowledge and skills necessary to detect and respond to malware attacks. Additionally, the authors discuss what ransomware is, how it infects systems, and how to prevent infection. It will also examine some different variations of ransomware, as well as explore some cases of ransomware. </jats:p>

Research paper thumbnail of Quality of Service Routing in Mobile Ad Hoc Networks

Research paper thumbnail of Integrating Internet into Traditional Education: A Practical Study of University Students ’ Usage and Attitudes

Abstract: This paper describes a study conducted on the attitudes of students towards the integra... more Abstract: This paper describes a study conducted on the attitudes of students towards the integration of the web as a channel of communication and a study tool in traditional teaching at the Hashemite University of Jordan. In particular, the study aims at studying the effect of certain variables such as gender, major, computer experience, and the percentage of internet usage on the learning process. A survey was carried out with a sample of 502 male and female of the university students. A comprehensive and reliable questionnaire was designed and distributed to the students ' sample. Drawing on evidence from lesson observations, teacher/student interviews and project reports, this paper also examines the university perspectives and strategies to incorporate use of internet resources and associated information and communication technology tools into humanities, social, and scientific studies. Amazingly, the results revealed a low percentage of internet usage in university educat...

Research paper thumbnail of Statistical analysis of factors associated with recent traffic accidents dataset: a practical study

International Journal of Quality Engineering and Technology, 2023

In this paper, we propose a logistic model to fit accidents dataset of 10,000 road crash incident... more In this paper, we propose a logistic model to fit accidents dataset of 10,000 road crash incidents for the Emirate of Abu Dhabi published in 2020. After cleaning up the dataset, we use descriptive and inferential statistical tools to study the attributes of each variable. Then, we identify the main independent variables that can be incorporated in a general logistic regression model which also includes the interactions between them. Our analysis using the significance level of (alpha = 0.05) found that there is a reduced logistic regression model that can fit the data in which the 'location of accident' can be represented using 'type of accident' and the 'age' of people involved in the accidents. Moreover, the results show that the interaction terms are not significant to be included in the model. Furthermore, the study shows that the odds for accidents by young age group (less than 40 years old) in external streets is 27% higher than the odds for internal streets, and that the odds for sequential type accidents in external streets is 13% higher than the odds for internal streets.

Research paper thumbnail of Intelligent Traffic Light Flow Control System Using Wireless Sensors Networks

Journal of Information Science and Engineering, May 1, 2010

Research paper thumbnail of An efficient design of 45-nm CMOS low power low noise charge sensitive amplifier for multi-standard wireless receiver

Research paper thumbnail of On the Lifetime Analytics of IoT Networks

The Internet of Things (IoT) is an evolving technology for improving human’s quality of life. Wir... more The Internet of Things (IoT) is an evolving technology for improving human’s quality of life. Wireless Sensor Network (WSN) is one of the key enablers for IoT infinite list of applications. However, minimizing energy consumption is a challenging task that directly affects the performance and lifetime of IoT networks due to limited energy available in these battery-powered devices. In order to improve the energy efficiency of such IoT sensor nodes, several approaches have been proposed in the literature with many trade-offs. In this paper, we study the problem of network lifetime analytics utilizing various routing protocols and parameters for IoT networks. We evaluate energy consumption and network lifetime through extensive simulation based on Sensoria simulator. Our simulation results confirm that the selected routing protocol and network connectivity play a significant role in reducing dissipated energy and prolonging network useful lifetime.

Research paper thumbnail of DASS-CARE: A Decentralized, Accessible, Scalable, and Secure Healthcare Framework using Blockchain

The healthcare industry is a complex system of interconnected entities. Each of these entities ha... more The healthcare industry is a complex system of interconnected entities. Each of these entities has disjoint information systems to manage patient data and records. The current IT solutions in healthcare systems have several challenges such as sharing and accessing medical records across several stakeholders while still maintaining security and privacy of these records. This global problem on how to create, maintain, and share sensitive medical records and clinical data among various stakeholders without sacrificing data privacy and integrity is still unresolved. In fact, existing healthcare records are decentralized, disjointed, non-uniform, and fragmented in nature. In this paper, we present a Blockchain-based framework, called DASS-CARE, that supports decentralized, accessible, scalable, and secure access to healthcare services including medical records. Such framework will greatly facilitate the process of real time access and updates without compromising security, integrity and confidentiality of patient data. Our objective is multifold. First, improve the quality of healthcare and lower the cost of delivery. Second, enhance medical records management including electronic health records unification. Finally, provide users with the ability to view their medical records regardless of their history, a task that is difficult to accomplish under the current fragmented systems.

Research paper thumbnail of A Taxonomy of Routing Techniques in Wireless Sensor Networks

CRC Press eBooks, Jan 27, 2006

Research paper thumbnail of Emerging Trends in Routing Protocols in Mobile Wireless Ad Hoc and Sensor Networks

... Mobile Wireless Ad Hoc and Sensor Networks Emerging Trends in Routing Protocols in Mobile Wir... more ... Mobile Wireless Ad Hoc and Sensor Networks Emerging Trends in Routing Protocols in Mobile Wireless Ad Hoc and Sensor Networks Jamal N. Al-Karaki, The Hashemite University, Jordan Introduction 1084 Routing Challenges in Mobile Ad Hoc and Sensor Networks 1084 ...

Research paper thumbnail of Security and Privacy Challenges of Integrated Disruptive Technologies

Recently, many disruptive technologies have evolved dramatically rendering our world increasingly... more Recently, many disruptive technologies have evolved dramatically rendering our world increasingly connected. As such, it is critical to consider what implications these technologies and their integrations have on security and privacy. This paper presents an overview of the integration pathways of some leading technologies today, namely, clouds, Internet of things, Big data, block chain, AI, and social media. The authors highlight the security and privacy challenges and future directions in these fields. First, the paper highlights how disruptive technologies leverage each other to overcome their limitations resulting in new business models worldwide. For example, Blockchain technology introduces robust solutions for challenging and critical IoT security problems. Then, the paper identifies security and privacy challenges that results from the integration perspectives of these technologies. The paper concluded by highlighting future challenges in this growing filed.

Research paper thumbnail of DASS-CARE 2.0: Blockchain-Based Healthcare Framework for Collaborative Diagnosis in CIoMT Ecosystem

Research paper thumbnail of Enhanced DASS-CARE 2.0: a blockchain-based and decentralized FL framework

Annals of Telecommunications

Research paper thumbnail of A trust-based authentication framework for security of WPAN using network slicing

International Journal of Electrical and Computer Engineering (IJECE)

New technologies bring along many challenges including security and privacy. Wireless personal ar... more New technologies bring along many challenges including security and privacy. Wireless personal area networks (WPANs) are characterized by limited energy resources and computing power that calls for lightweight security mechanisms in these networks as a mandatory requirement. In this paper, a lightweight trust-based framework for node authentication in WPAN is proposed. Our main objective is to minimise the effort in distinguishing valid requests of trustworthy nodes from invalid requests of malicious nodes that can result in network compromises. We achieve this through network slicing which divides the network into virtually primary and secondary networks. The proposed framework has three-fold benefits. First, it authenticates nodes’ requests based on a novel method of trust value calculation. Second, the framework maintains energy efficiency while authenticating nodes’ requests to access WPAN resources. Finally, the framework provides a solution for biasing problem that can arise d...

Research paper thumbnail of A simple and predictive model for covid-19 evolution in large scale infected countries

Journal of theoretical and applied information technology, Dec 31, 2020

Research paper thumbnail of A Cross-Layer-Based Clustered Multipath Routing with QoS-Aware Scheduling for Wireless Multimedia Sensor Networks

International Journal of Distributed Sensor Networks, 2012

Wireless multimedia sensor networks (WMSNs) can handle different traffic classes of multimedia co... more Wireless multimedia sensor networks (WMSNs) can handle different traffic classes of multimedia content (video, audio streams, and still images) as well as scalar data over the network. To ensure correct delivery of real-time multimedia data and efficient resource utilization, a proposed solution should provide both quality of service (QoS) assurance and energy efficiency. In this paper, we propose a cross-layer-based routing protocol that can utilize MAC-layer QoS-based scheduling for more efficient routing mechanism in WMSNs. Our proposed optimization is based on clustered multipath routing protocol and adaptive QoS-aware scheduling for the different traffic classes in WMSNs. Our design exploits the hierarchical structure of powerful cluster heads and the optimized multiple paths along with the adaptive scheduling to support reliable, high-throughput, and energy-efficient multimedia transmission in WMSNs. Simulation results show a significant performance improvement of our proposed design when compared to other similar routing schemes.

Research paper thumbnail of On energy efficient routing for wireless sensor networks

2008 International Conference on Innovations in Information Technology, 2008

The design of energy-efficient protocols for Wireless Sensor Networks (WSNs) is a crucial problem... more The design of energy-efficient protocols for Wireless Sensor Networks (WSNs) is a crucial problem as energy is a stringent resource in these networks. In this paper, we propose an energy-aware routing protocol using a new approach. To be more specific, we present a protocol called High Power Short Distance protocol (HPSD). HPSD is a node-based protocol that selects the route to the base station (BS) based on the closest node that has the highest battery power relative to its surrounding neighbors. Thus, the energy load can be distributed among all sensor nodes instead of using certain path each time. As such, HPSD can increase the life time of the network. We simulate the performance of HPSD and compare it to other routing protocols for WSNs. Our results show that albeit being simple, HPSD proved to be a very efficient routing protocol in terms of increasing the life time of the network. Moreover, simulation results show that HPSD can efficiently adapt routes to the nodes available power.

Research paper thumbnail of Data aggregation in wireless sensor networks - exact and approximate algorithms

2004 Workshop on High Performance Switching and Routing, 2004. HPSR.

Research paper thumbnail of Integrating Blockchain with Fog and Edge Computing for Micropayment Systems

Research paper thumbnail of An efficient design of 45-nm CMOS low-noise charge sensitive amplifier for wireless receivers

International Journal of Electrical and Computer Engineering (IJECE), 2022

Amplifiers are widely used in signal receiving circuits, such as antennas, medical imaging, wirel... more Amplifiers are widely used in signal receiving circuits, such as antennas, medical imaging, wireless devices and many other applications. However, one of the most challenging problems when building an amplifier circuit is the noise, since it affects the quality of the intended received signal in most wireless applications. Therefore, a preamplifier is usually placed close to the main sensor to reduce the effects of interferences and to amplify the received signal without degrading the signal-to-noise ratio. Although different designs have been optimized and tested in the literature, all of them are using larger than 100 nm technologies which have led to a modest performance in terms of equivalent noise charge (ENC), gain, power consumption, and response time. In contrast, we consider in this paper a new amplifier design technology trend and move towards sub 100 nm to enhance its performance. In this work, we use a pre-well-known design of a preamplifier circuit and rebuild it using ...

Research paper thumbnail of Reverse-Engineering Malware

Advances in Information Security, Privacy, and Ethics, 2022

<jats:p>Cyberspace is quickly becoming overwhelmed with ever-evolving malware that breaches... more <jats:p>Cyberspace is quickly becoming overwhelmed with ever-evolving malware that breaches all security defenses and secretly leaks confidential business data. One of the most pressing challenges faced by business organizations when they experience a cyber-attack is that, more often than not, those organizations do not have the knowledge nor readiness of how to analyze malware. The objective of this research is to present the fundamentals of malware reverse-engineering, the tools, and techniques needed to properly analyze malicious programs to determine their characteristics. Those tools and techniques will provide insights to incident response teams and digital investigation professionals. In order to stop hackers in their tracks, we need to equip cyber security professionals with the knowledge and skills necessary to detect and respond to malware attacks. Additionally, the authors discuss what ransomware is, how it infects systems, and how to prevent infection. It will also examine some different variations of ransomware, as well as explore some cases of ransomware. </jats:p>

Research paper thumbnail of Quality of Service Routing in Mobile Ad Hoc Networks

Research paper thumbnail of Integrating Internet into Traditional Education: A Practical Study of University Students ’ Usage and Attitudes

Abstract: This paper describes a study conducted on the attitudes of students towards the integra... more Abstract: This paper describes a study conducted on the attitudes of students towards the integration of the web as a channel of communication and a study tool in traditional teaching at the Hashemite University of Jordan. In particular, the study aims at studying the effect of certain variables such as gender, major, computer experience, and the percentage of internet usage on the learning process. A survey was carried out with a sample of 502 male and female of the university students. A comprehensive and reliable questionnaire was designed and distributed to the students ' sample. Drawing on evidence from lesson observations, teacher/student interviews and project reports, this paper also examines the university perspectives and strategies to incorporate use of internet resources and associated information and communication technology tools into humanities, social, and scientific studies. Amazingly, the results revealed a low percentage of internet usage in university educat...