Anas Alsobeh

ORCID: 0000-0002-1506-7924
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Service-Oriented Architecture and Web Services
  • Advanced Software Engineering Methodologies
  • Cloud Computing and Resource Management
  • Network Security and Intrusion Detection
  • Software Engineering Research
  • Software System Performance and Reliability
  • Software Engineering Techniques and Practices
  • IoT and Edge/Fog Computing
  • Information and Cyber Security
  • Migration, Health and Trauma
  • Sentiment Analysis and Opinion Mining
  • Advanced Malware Detection Techniques
  • Blockchain Technology Applications and Security
  • Digital and Cyber Forensics
  • Business Process Modeling and Analysis
  • Topic Modeling
  • IoT-based Smart Home Systems
  • Scientific Computing and Data Management
  • Data Quality and Management
  • Water Quality Monitoring Technologies
  • Water Systems and Optimization
  • Web visibility and informetrics
  • Web Data Mining and Analysis
  • Information Retrieval and Search Behavior
  • Big Data and Business Intelligence

Southern Illinois University Carbondale
2023-2024

Yarmouk University
2012-2024

Al Yarmouk University College
2024

Kingdom University
2023

The prevalence of stress-related disorders has increased significantly in recent years, necessitating scalable methods to identify affected individuals. This paper proposes a novel approach utilizing large language models (LLMs), with focus on OpenAI's generative pre-trained transformer (GPT-3) embeddings and machine learning (ML) algorithms classify social media posts as indicative or not stress disorders. aim is create preliminary screening tool leveraging online textual data. GPT-3...

10.4018/ijwsr.338222 article EN International Journal of Web Services Research 2024-02-14

Recently given the rise of types social media networks, analysis sentiment and opinions in textual data has gained significant importance. However, informal Arabic text presents challenges due to morphological complexities dialectal variances. This research aims develop an Emoji Sentiment Lexicon (Emo-SL) tailored Arabic-language tweets demonstrate performance improvements by combining emoji-based features with machine learning (ML) for classification. We constructed Emo-SL using a corpus...

10.1109/access.2024.3382836 article EN cc-by IEEE Access 2024-01-01

Cybersecurity for Jordanians’ adolescents/teens has become a complicated phenomenon representing complex socio-technical concerns the personalities of adolescents in Jordanian society. Recent cyberattacks have had significant impact on teens Jordan, both personally and terms their quality life. As such, it is important to develop strategies increase cybersecurity awareness among Jordan. This research was conducted planned random areas with aim understanding differences risk-aware cultures...

10.30935/ojcmt/12942 article EN Online Journal of Communication and Media Technologies 2023-02-07

As social media platforms continue their exponential growth, so do the threats targeting security. Detecting disguised spam messages poses an immense challenge owing to constant evolution of tactics. This research investigates advanced artificial intelligence techniques significantly enhance multiplatform classification on Twitter and YouTube. The deep neural networks we use are state-of-the-art. They recurrent network architectures with long- short-term memory cells that powered by both...

10.3390/app14062254 article EN cc-by Applied Sciences 2024-03-07

Blockchain systems are lauded for their security and reliability. Security is a cornerstone, as they employ cryptographic techniques to ensure the immutability of data, making it extremely resistant tampering. With decentralized networks, also reduce risk single point failure, enhancing Model checking plays vital role in ensuring reliability blockchain systems. However, traditional model-checking approaches face challenges handling inherent dynamism exhibited To overcome this challenge,...

10.1109/access.2023.3325060 article EN cc-by IEEE Access 2023-01-01

Education has a much to gain from the rapid development in recent years of technologies like artificial intelligence (AI), machine learning (ML), and natural language processing (NLP). However, there is lack data showing that incorporating these into classrooms improves students' outcomes motivation learn. Moreover, harness full potential AI higher education (HE), it essential address challenges opportunities this technology present for diversity, equity, inclusion (DEI) teaching learning....

10.1145/3585059.3611405 article EN 2023-10-09

In the intricate domain of software systems verification, dynamically model checking multifaceted system characteristics remains paramount, yet challenging. This research proposes advanced observe-based statistical model-checking (OSM) framework, devised to craft executable formal models directly from foundational code. Leveraging predicates, framework melds seamlessly with aspect-oriented programming paradigms, yielding a potent method for analytical verification varied behavioral...

10.30935/ojcmt/13771 article EN Online Journal of Communication and Media Technologies 2023-10-10

Coherent Signal-Subspace (CSS) is a technique to separate the wide frequency band into narrowband components which can be applied in many applications such as smart antennas for wireless communications and radar. However, CSS computationally intensive may not achieve real-time requirement. Therefore, this work aims propose an efficient implementation of method on Field-Programmable Gate Array (FPGA) desired performance. Different parallelization optimization techniques loop unrolling,...

10.1142/s0218126621501966 article EN Journal of Circuits Systems and Computers 2021-04-14

Change Detection (CD) of aerial images refers to identifying and analyzing changes between two or more the same location taken at different times. The CD is a highly challenging task due need distinguish relevant changes, such as urban expansion, deforestation, post-disaster damage assessment, from irrelevant ones, light conditions, shadows, seasonal variations. Many papers have recently been published, where most that proposed new model contained comparison their state-of-the-art (SOTA)...

10.20944/preprints202403.1106.v1 preprint EN 2024-03-20

<title>Abstract</title> CCovert timing channels (CTC) enable surreptitious information leakage through manipulated data transmission timing, posing a severe cybersecurity risk. This research introduces framework, called LinguTimeX, which utilizes explainable artificial intelligence approach that synergizes linguistic analysis with detection of irregularities to pinpoint CTC activities high accuracy. The LinguTimeX extracts multidimensional features integrating statistical properties textual...

10.21203/rs.3.rs-4372354/v1 preprint EN cc-by Research Square (Research Square) 2024-05-10

Cloud computing technology has opened an avenue to meet the critical need securely share distributed resources and web services, especially those that belong clients who have sensitive data applications. However, implementing crosscutting concerns for cloud-based applications is a challenge. This challenge stems from nature of Web-based architecture infrastructure. One key security logic, which scattered tangled across all cloud service layers. In addition, maintenance modification aspect...

10.4018/ijwsr.2018010104 article EN International Journal of Web Services Research 2017-11-30

This paper proposes a health data collection and integration framework for the Jordanian sector. It aims to strengthen quality of Health Systems (JHS) ensure provision sustainable high e-health services populations. The is developed prepare strategy involving current practices based-on DLL V-Model. We studied critical features associated with processes through concentrating on analysing set actual (cancer diabetes in Jordan). result analysis demonstrates needs optimum process directs all...

10.1504/ijcat.2019.097118 article EN International Journal of Computer Applications in Technology 2018-12-22

Healthcare providers in a heterogeneous distributed environment depend on many non-functional requirements or cross-cutting concerns that could affect the entire Information System (HIS). The implementation of crosscutting potentially lead to significant impact integrity Electronic Health Records (EHRs), as well code quality. Aspect-Oriented Programming (AOP) encapsulates improve overall quality software development by reducing required implement collection modules. In this paper, we propose...

10.1504/ijcat.2019.101181 article EN International Journal of Computer Applications in Technology 2019-01-01

This study aims to reveal the most important challenges and difficulties that refugee students faced in Jordanian universities (e.g., Yarmouk University, AL Al-Bayt, Private Zarqa University) due COVID-19 pandemic through measuring a different of indicators are related, addition, identify some independent variables on e-educational challenges. In study, analytical description approach was used. The data collection tool is questionnaire, which distributed random sample electronically. Results...

10.35516/hum.v49i5.2770 article EN cc-by-nc Dirasat Human and Social Sciences 2022-10-17

In the past 10 years, research community has produced a significant number of design notations to represent security properties and concepts in artifact.The need improve software become key issue for developers.The function needs be incorporated into development process at requirement, analysis, design, implementation stages as doing so may help smooth integration protect systems from attack.Security affects all aspects ofa program, which makes incorporation features crosscutting...

10.5121/ijsea.2018.9605 article EN International Journal of Software Engineering & Applications 2018-11-30
Coming Soon ...