- Cloud Data Security Solutions
- Blockchain Technology Applications and Security
- Topic Modeling
- Privacy-Preserving Technologies in Data
- Mobile Agent-Based Network Management
- Distributed and Parallel Computing Systems
- Data Quality and Management
- Imbalanced Data Classification Techniques
- Natural Language Processing Techniques
- Advanced Data Compression Techniques
- Advanced Text Analysis Techniques
- Microgrid Control and Optimization
- Service-Oriented Architecture and Web Services
- Information and Cyber Security
- Smart Grid Security and Resilience
- Algorithms and Data Compression
- Organizational and Employee Performance
- Peer-to-Peer Network Technologies
- Parallel Computing and Optimization Techniques
- Software-Defined Networks and 5G
- Infrared Thermography in Medicine
- Technology Adoption and User Behaviour
- Advanced Data Storage Technologies
- Advanced Optical Network Technologies
- Digital and Cyber Forensics
Higher Colleges of Technology
2023-2024
Al-Balqa Applied University
2012-2023
Breast cancer is very popular between females all over the world. However, detecting this in its first stages helps saving lives. Radiologists can predict if mammography images have or not, but they may miss about 15% of them. In paper, we propose a new method to detect breast with high accuracy. This consists two main parts, part image processing techniques are used prepare for feature and pattern extraction process. The second presented by utilizing extracted features as an input types...
The development of multimedia and digital imaging has led to high quantity data required represent modern imagery. This requires large disk space for storage, long time transmission over computer networks, these two are relatively expensive. These factors prove the need images compression. Image compression addresses problem reducing amount a image yielding compact representation an image, thereby storage/transmission requirements. key idea here is remove redundancy presented within reduce...
The aim of this study is to build a tool for Part Speech (POS) tagging and Name Entity Recognition Arabic Language, the approach used rule base technique. POS Tagger contains two phases:The first phase pass word into lexicon phase, second level morphological tagset are (Noun, Verb Determine). Named-Entity detector will apply rules on text give correct Labels each word, labels Person(PERS), Location (LOC) Organization (ORG)
There has been a great deal of discussion the challenges on privacy, data interoperability and quality Educational Professional Personal Record (EPPR).Therefore, there is need to reassess current models, in which various parties generate, exchange observe huge amount personal with regard EPPR.Ethereum blockchain shown that trusted, auditable transactions detectible using decentralized network nodes accompanied by general ledger.Thus, due fast-moving development educational professional...
There have been recent, marked increases in the challenges of privacy, data interoperability and quality Educational Professional Personal Record (EPPR). This calls into question current model, which different parties generate, exchange monitor massive amounts personal related to EPPR. Ethereum blockchain has demonstrated that trusted, auditable transactions is visible using a decentralized network nodes accompanied by general ledger. Thus, rapid development educational professional...
Grid Computing refers to systems and applications that incorporate control distributed services resources resolve systematic or industrial issues. Over the past few years, developers have realized need for an automatic mechanism can be used in employing grid power, improving its operating enhancing production. Multi-Agents Systems are generally employed solve problems by using decentralized techniques a set of agents collaborate challenge. Hence, it is considered suitable solutions open...
The common feature of transaction datasets is that it very huge in size, so important to develop a technique for dataset reduction. process reduction must not change the features original dataset; this will increase effectiveness and efficiency extracting association rules from these without affecting data. Disjoint clusters have different number transactions be introduced order minimize search space, turn decrease time required mine desired by dealing with each cluster individually. support...
The process of converting the repeated daily operations at work in organization from manual method to computerized considered one most important reasons for success and progress because its strong influence on by saving time effort addition reducing many other sources, such as human resources.In this paper, we will examine impact computerization Hajj fund system, which was a developed system savings operations, management Sukuks growth Islamic capital investment accordance with rulings...
A grid is a system that can manage and organize services resources spread amongst different control domains, employ interfaces protocols, offer high quality of services.The integration Multi-Agent Systems (MAS) with environment significantly affects performance.MAS considered suitable solution for open systems modify frequently.Grid offers wide range its users, some these might not be used or utilized time before any new jobs come to the processing.Usually, are accumulated in massive data...
In this study we Introduce a three dimensional algorithm for ontology matching problem by comparing ontologies concepts from dimensions (i) based on name similarity (ii) content (iii) relationship similarity. By can trust our result since; the same may be named different labels or they have names but differ in their attribute relations. these cases if rely one dimension process; will not discover similarities. On contrary, when process relies dimensions, can't other do.
Digital media triage is a main challenge that faces digital investigator. Knowing what might be useful during crime investigation could greatly save the investigator's time and enhance outcomes. Memory can get potential benefit from process because of its scattered diverse contents. The Operating System's paging scheme map contents file into non-consecutive page frames in physical memory, making file-type classification identification harder. This paper tackles memory content problem at...
There has been a great deal of discussion the challenges on privacy Educational Professional Personal Record (EPPR). Therefore, it is required to reassess current models, in which various parties generate, exchange and observe huge amount personal data with regard EPPR. Ethereum blockchain shown that trusted, auditable transactions are detectible using decentralised network nodes. In this paper, we propose novel framework manage EPPR blockchain. The provides owner comprehensive immutable log...