- Advanced Malware Detection Techniques
- Software Engineering Research
- Anomaly Detection Techniques and Applications
- Network Security and Intrusion Detection
- COVID-19 diagnosis using AI
- Software Reliability and Analysis Research
- Information and Cyber Security
- Advanced Steganography and Watermarking Techniques
- Software Engineering Techniques and Practices
- ECG Monitoring and Analysis
- Chaos-based Image/Signal Encryption
- Misinformation and Its Impacts
- Spam and Phishing Detection
- Software Testing and Debugging Techniques
- IoT and Edge/Fog Computing
- Artificial Intelligence in Healthcare
- Biomedical and Engineering Education
- Cardiac electrophysiology and arrhythmias
- Biometric Identification and Security
- Flood Risk Assessment and Management
- Smart Grid Security and Resilience
- Hydrology and Watershed Management Studies
- Online Learning and Analytics
- Hydrological Forecasting Using AI
- EEG and Brain-Computer Interfaces
University of Jordan
2016-2024
St. Cloud State University
2023
Dakota State University
2015
North Dakota State University
2015
As the COVID-19 pandemic rapidly spreads across world, regrettably, misinformation and fake news related to have also spread remarkably. Such has confused people. To be able detect such misinformation, an effective detection method should applied obtain more accurate information. This will help people researchers easily differentiate between true news. The objective of this research was introduce enhanced evolutionary approach better results compared with previous approaches. proposed aimed...
Due to the availability of several social media platforms and their use in sending text messages, it is necessary provide an easy safe way protect messages from being hacked especially presence intruders data thieves, taking into consideration that most those are confidential personal, hacked.In this research paper, a simple method message cryptography will be proposed.The divides blocks with fixed sizes.The block size ranges 2 60.The uses secret color image generate array equal number...
Colored digital images are one of the most important types data to be used in many vital applications, which require a safe way protect them from hacking operations and danger intruders thieves. This paper presents an effective method for storing colored (CASDC). A high level protection is provided through complex secret key agreed upon between sender receiver. The consists nine decimal digits (and can increased as needed). These processed extract three values each color channels. left...
Abstract Arrhythmia is a heart condition that poses severe threat to life and requires prompt medical attention. One of the challenges in detecting arrhythmias accurately incorrect diagnoses can have consequences. In light this, it critical develop solution both effective reliable. this study, we propose residual Convolution Neural Network Bidirectional Long Short-Term Memory (DeepResidualBiLSTM) model for classifying types, which addresses vanishing gradient problem captures relevant...
Software engineering is one of the most significant areas, which extensively used in educational and industrial fields. education plays an essential role keeping students up to date with software technologies, products, processes that are commonly applied industry. The development project important parts course, because it covers practical side course. This type helps strengthening students' skills collaborate a team spirit work on projects. involves composition product process parts. part...
The coronavirus (COVID-19) started in China 2019, has spread rapidly every single country and millions of cases worldwide. This paper presents a proposed approach that involves identifying the relative impact COVID-19 on specific gender, mortality rate age, investigating different safety measures adopted by each their virus growth rate. Our study proposes data-driven analysis prediction modeling three aspects pandemic (gender patients, global rate, social distancing). Several machine...
This study presents an innovative approach to combat the rapid spread of fake news on social media. By combining Salp Swarm Algorithm with a Support Vector Machine, proposed model achieves improved prediction accuracy. The Popular World Twitter dataset, comprising 10 million tweets, is utilized for training and testing models. Different metaheuristic algorithms, including MVO, GA, PSO, GOA, SSA, are used optimize SVM generate five dataset converted into word representation through various...
Meteorological metrics have been used for weather forecasting and climate prediction. Remote sensing images proved to be a valuable resource represent the terrain of earth's surface. Recently, there has extensive research model changes on landscape including water bodies using remote images. Meanwhile, meteorological data mainly changes. This tries leverage both resources achieve enhanced monitoring Dead Sea shrinkage: first, an attempt relation between several variables shrinkage machine...
Detection of malware and security attacks is a complex process that can vary in its details analysis activities. As part the detection process, scanners try to categorize once it detected under one known categories (e.g. worms, spywares, viruses, etc.). However, many studies researches indicate problems with categorizing or identifying particular more than category. This paper, several others, show machine learning be used for especially ensemble base prediction methods. In this we evaluated...
Inter-requirements traceability refers to finding the relationships between requirements.Several approaches have been identified cooperative, conflicting, and irrelevant requirements.However, current solutions a lack of capturing syntactic semantic aspects requirements, less attention has paid relating security requirements with functional requirements.To overcome these limitations, we propose use domain ontology based approach, in which can be used as knowledge discover requirements.Our...
Source code authorship attribution is the task of identifying who develops based on learning programmer style. It one critical activities which used extensively in different aspects such as computer security, law, and plagiarism. This paper attempts to investigate source by capturing natural language rather than only using minimal set syntactic stylistic features explored previous literature. proposes an evolutionary feature selection model improve accuracy implementing two models (uni-gram...
Detection of malwares and security attacks is a complex process that can vary in its details, analysis activities, etc. As part the detection process, malware scanners try to categorize once it detected under one known categories (e.g. worms, spywares, viruses, etc.). However, many studies researches indicate problems with categorizing or identifying particular different categories. There are reasons for such challenges where scanners, sometime same scanner, will times instances. In this...
It is essential to the software engineering instructors monitor students' performance in their course projects. Detecting key measures of project helps get a better assessment for performance, resolve difficulties low expectation-team's, and consequently improves overall learning outcomes. Several studies attempted present important but they only captured early phases whole time period. This paper introduces hybrid approach classification feature selection techniques, which aims...
The coronavirus (COVID-19) as in the study of which had a starting point China 2019, has spread rapidly every single country and millions cases. pandemic attracts lots attentions due to major impacts not only on human health but many other aspects including, social political ones. This paper presents robust data-driven machine learning analysis COVID19 from data collection final step knowledge extraction based selected research topics. proposed approach evaluates impact distancing COVID19....