- Service-Oriented Architecture and Web Services
- Advanced Software Engineering Methodologies
- Cloud Computing and Resource Management
- Network Security and Intrusion Detection
- Software Engineering Research
- Software System Performance and Reliability
- Software Engineering Techniques and Practices
- IoT and Edge/Fog Computing
- Information and Cyber Security
- Migration, Health and Trauma
- Sentiment Analysis and Opinion Mining
- Advanced Malware Detection Techniques
- Blockchain Technology Applications and Security
- Digital and Cyber Forensics
- Business Process Modeling and Analysis
- Topic Modeling
- IoT-based Smart Home Systems
- Scientific Computing and Data Management
- Data Quality and Management
- Water Quality Monitoring Technologies
- Water Systems and Optimization
- Web visibility and informetrics
- Web Data Mining and Analysis
- Information Retrieval and Search Behavior
- Big Data and Business Intelligence
Southern Illinois University Carbondale
2023-2024
Yarmouk University
2012-2024
Al Yarmouk University College
2024
Kingdom University
2023
The prevalence of stress-related disorders has increased significantly in recent years, necessitating scalable methods to identify affected individuals. This paper proposes a novel approach utilizing large language models (LLMs), with focus on OpenAI's generative pre-trained transformer (GPT-3) embeddings and machine learning (ML) algorithms classify social media posts as indicative or not stress disorders. aim is create preliminary screening tool leveraging online textual data. GPT-3...
Recently given the rise of types social media networks, analysis sentiment and opinions in textual data has gained significant importance. However, informal Arabic text presents challenges due to morphological complexities dialectal variances. This research aims develop an Emoji Sentiment Lexicon (Emo-SL) tailored Arabic-language tweets demonstrate performance improvements by combining emoji-based features with machine learning (ML) for classification. We constructed Emo-SL using a corpus...
Cybersecurity for Jordanians’ adolescents/teens has become a complicated phenomenon representing complex socio-technical concerns the personalities of adolescents in Jordanian society. Recent cyberattacks have had significant impact on teens Jordan, both personally and terms their quality life. As such, it is important to develop strategies increase cybersecurity awareness among Jordan. This research was conducted planned random areas with aim understanding differences risk-aware cultures...
As social media platforms continue their exponential growth, so do the threats targeting security. Detecting disguised spam messages poses an immense challenge owing to constant evolution of tactics. This research investigates advanced artificial intelligence techniques significantly enhance multiplatform classification on Twitter and YouTube. The deep neural networks we use are state-of-the-art. They recurrent network architectures with long- short-term memory cells that powered by both...
Blockchain systems are lauded for their security and reliability. Security is a cornerstone, as they employ cryptographic techniques to ensure the immutability of data, making it extremely resistant tampering. With decentralized networks, also reduce risk single point failure, enhancing Model checking plays vital role in ensuring reliability blockchain systems. However, traditional model-checking approaches face challenges handling inherent dynamism exhibited To overcome this challenge,...
Education has a much to gain from the rapid development in recent years of technologies like artificial intelligence (AI), machine learning (ML), and natural language processing (NLP). However, there is lack data showing that incorporating these into classrooms improves students' outcomes motivation learn. Moreover, harness full potential AI higher education (HE), it essential address challenges opportunities this technology present for diversity, equity, inclusion (DEI) teaching learning....
In the intricate domain of software systems verification, dynamically model checking multifaceted system characteristics remains paramount, yet challenging. This research proposes advanced observe-based statistical model-checking (OSM) framework, devised to craft executable formal models directly from foundational code. Leveraging predicates, framework melds seamlessly with aspect-oriented programming paradigms, yielding a potent method for analytical verification varied behavioral...
Coherent Signal-Subspace (CSS) is a technique to separate the wide frequency band into narrowband components which can be applied in many applications such as smart antennas for wireless communications and radar. However, CSS computationally intensive may not achieve real-time requirement. Therefore, this work aims propose an efficient implementation of method on Field-Programmable Gate Array (FPGA) desired performance. Different parallelization optimization techniques loop unrolling,...
Change Detection (CD) of aerial images refers to identifying and analyzing changes between two or more the same location taken at different times. The CD is a highly challenging task due need distinguish relevant changes, such as urban expansion, deforestation, post-disaster damage assessment, from irrelevant ones, light conditions, shadows, seasonal variations. Many papers have recently been published, where most that proposed new model contained comparison their state-of-the-art (SOTA)...
<title>Abstract</title> CCovert timing channels (CTC) enable surreptitious information leakage through manipulated data transmission timing, posing a severe cybersecurity risk. This research introduces framework, called LinguTimeX, which utilizes explainable artificial intelligence approach that synergizes linguistic analysis with detection of irregularities to pinpoint CTC activities high accuracy. The LinguTimeX extracts multidimensional features integrating statistical properties textual...
Cloud computing technology has opened an avenue to meet the critical need securely share distributed resources and web services, especially those that belong clients who have sensitive data applications. However, implementing crosscutting concerns for cloud-based applications is a challenge. This challenge stems from nature of Web-based architecture infrastructure. One key security logic, which scattered tangled across all cloud service layers. In addition, maintenance modification aspect...
This paper proposes a health data collection and integration framework for the Jordanian sector. It aims to strengthen quality of Health Systems (JHS) ensure provision sustainable high e-health services populations. The is developed prepare strategy involving current practices based-on DLL V-Model. We studied critical features associated with processes through concentrating on analysing set actual (cancer diabetes in Jordan). result analysis demonstrates needs optimum process directs all...
Healthcare providers in a heterogeneous distributed environment depend on many non-functional requirements or cross-cutting concerns that could affect the entire Information System (HIS). The implementation of crosscutting potentially lead to significant impact integrity Electronic Health Records (EHRs), as well code quality. Aspect-Oriented Programming (AOP) encapsulates improve overall quality software development by reducing required implement collection modules. In this paper, we propose...
This study aims to reveal the most important challenges and difficulties that refugee students faced in Jordanian universities (e.g., Yarmouk University, AL Al-Bayt, Private Zarqa University) due COVID-19 pandemic through measuring a different of indicators are related, addition, identify some independent variables on e-educational challenges. In study, analytical description approach was used. The data collection tool is questionnaire, which distributed random sample electronically. Results...
In the past 10 years, research community has produced a significant number of design notations to represent security properties and concepts in artifact.The need improve software become key issue for developers.The function needs be incorporated into development process at requirement, analysis, design, implementation stages as doing so may help smooth integration protect systems from attack.Security affects all aspects ofa program, which makes incorporation features crosscutting...