![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Moad Yassin Mowafi
Person information
Refine list
![note](https://dblp.uni-trier.de./img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c12]Aya Jaradat, Moad Mowafi
, Eyad Taqieddin:
A Steganographic Method for Color Images using the Salp Swarm Algorithm and Chaotic Maps. LCN 2023: 1-4 - 2022
- [j13]Moad Mowafi
, Fahed Awad, Fida'a Al-Quran
:
Distributed Visual Crowdsensing Framework for Area Coverage in Resource Constrained Environments. Sensors 22(15): 5467 (2022) - 2021
- [j12]Moad Mowafi
, Eyad Taqieddin, Hiba Al-Dahoud:
Energy efficient fuzzy-based DASH adaptation algorithm. Digit. Commun. Networks 7(1): 113-119 (2021) - [j11]Aya Jaradat
, Eyad Taqieddin
, Moad Mowafi
:
A High-Capacity Image Steganography Method Using Chaotic Particle Swarm Optimization. Secur. Commun. Networks 2021: 6679284:1-6679284:11 (2021)
2010 – 2019
- 2019
- [c11]Moad Mowafi
, Omar Oudat, Eyad Taqieddin, Omar Banimelhem:
Image Steganography using YCbCr Color Space and Matrix Pattern. ICSPIS 2019: 1-4 - 2018
- [j10]Moad Mowafi
, Omar Banimelhem
, Yosef Taher:
Fuzzy Logic Based Cross-Layer Design for Image Transmission in Wireless Sensor Networks. Int. J. Comput. Intell. Syst. 11(1): 882-893 (2018) - [c10]Fida'a Al-Quran, Abdallah Y. Alma'aitah, Moad Mowafi
, Eyad Taqieddin:
Energy-Efficient and QoS-Aware Multi-Path Geographic Routing Protocol for WMSN. GLOBECOM Workshops 2018: 1-6 - 2017
- [c9]Moad Mowafi
, Dima Kasasbeh
, Faruq Al-Omari:
A data compression scheme using adaptive word-based pattern matching. IISA 2017: 1-4 - [c8]Eyad Taqieddin, Hiba Al-Dahoud, Moad Mowafi
, Omar Banimelhem:
An Enhanced EPC Gen2v2 RFID Authentication and Ownership Management Protocol. LCN 2017: 683-689 - 2015
- [j9]Omar Banimelhem
, Eyad Salah Taqieddin, Moad Yassin Mowafi
, Fahed Hasan Awad, Feda Al-Ma'aqbeh:
Fuzzy Logic-Based Cluster Heads Percentage Calculation for Improving the Performance of the LEACH Protocol. Int. J. Fuzzy Syst. Appl. 4(4): 100-118 (2015) - [c7]Fahed Hasan Awad, Moad Yassin Mowafi
, Walid A. Aljoby:
Correlation model for randomly deployed heterogeneous cameras in wireless multimedia sensor networks. EUROCON 2015: 1-5 - 2014
- [j8]Moad Yassin Mowafi
, Fahed Hasan Awad
, Walid A. Aljoby:
A novel approach for extracting spatial correlation of visual information in heterogeneous wireless multimedia sensor networks. Comput. Networks 71: 31-47 (2014) - [c6]Omar Banimelhem, Moad Yassin Mowafi
, Eyad Salah Taqieddin, Fahed Hasan Awad
, Manar Al Rawabdeh:
An efficient clustering approach using genetic algorithm and node mobility in wireless sensor networks. ISWCS 2014: 858-862 - [c5]Fahed Hasan Awad
, Eyad Salah Taqieddin, Moad Yassin Mowafi
, Omar Banimelhem, Amani AbuQdais:
A simulation testbed to jointly exploit multiple image compression techniques for wireless multimedia sensor networks. ISWCS 2014: 905-911 - 2013
- [j7]Lo'ai Ali Tawalbeh
, Moad Mowafi
, Walid A. Aljoby:
Use of elliptic curve cryptography for multimedia encryption. IET Inf. Secur. 7(2) (2013) - [j6]Omar Banimelhem
, Lo'ai Ali Tawalbeh
, Moad Mowafi
, Mohammed A. Al-Batati:
A More Secure Image Hiding Scheme Using Pixel Adjustment and Genetic Algorithm. Int. J. Inf. Secur. Priv. 7(3): 1-15 (2013) - [j5]Eyad Salah Taqieddin, Moad Mowafi
, Fahed Awad
, Omar Banimelhem
, Hani Maher:
An Energy-Balanced Cluster-Based Protocol for Wireless Sensor Networks. Int. J. Inf. Technol. Web Eng. 8(3): 50-63 (2013) - [j4]Moad Yassin Mowafi
, Fahed Hasan Awad
, Mohammed A. Al-Batati:
Opportunistic Network Coding for Real-Time Transmission over Wireless Networks. Netw. Protoc. Algorithms 5(1): 1-19 (2013) - [c4]Moad Mowafi
, Fahed Awad
, Walid A. Aljoby:
Spatial correlation model for heterogeneous cameras in wireless multimedia sensor networks. WOWMOM 2013: 1-6 - 2012
- [j3]Moad Yassin Mowafi
, Fahed Hasan Awad
, Eyad Salah Taqieddin, Omar Qasem Banimelhem
:
A Practical Study of Jointly Exploiting Multiple Image Compression Techniques for Wireless Multimedia Sensor Networks. J. Commun. 7(4): 309-320 (2012) - [j2]Moad Yassin Mowafi
, Mamoun F. Al-Mistarihi, Mohammad Marei:
Cognitive Radio Based Bandwidth Allocation Scheme for WiMAX Networks. J. Commun. 7(10): 758-764 (2012) - [j1]Moad Mowafi
, Lo'ai Ali Tawalbeh, Walid A. Aljoby, Mohammad Al-Rousan:
C3SM: Information Assurance Based on Cryptographic Checksum with Clustering Security Management Protocol. J. Information Security 3(4): 272-280 (2012) - [c3]Mamoun F. Al-Mistarihi, Moad Yassin Mowafi, Mohammad Marei:
An optimum scheme for WiMAX bandwidth management using Dynamic Channel Allocation. MIPRO 2012: 538-541 - [c2]Moad Yassin Mowafi, Mamoun F. Al-Mistarihi, Mohammad Marei:
A dual usage of Cognitive Radio in managing the WiMAX bandwidth. MIPRO 2012: 548-551
2000 – 2009
- 2002
- [c1]Moad Mowafi
, Nan Jiang, Thomas P. Caudell, Wei Shu, Min-You Wu:
Real-time transmission of stereo images over the access grid. ISCAS (5) 2002: 633-636
Coauthor Index
aka: Eyad Taqieddin
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:06 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint