- Spam and Phishing Detection
- Network Security and Intrusion Detection
- Sentiment Analysis and Opinion Mining
- Advanced Steganography and Watermarking Techniques
- Data Management and Algorithms
- Image Retrieval and Classification Techniques
- Advanced Image and Video Retrieval Techniques
- Service-Oriented Architecture and Web Services
- IoT and Edge/Fog Computing
- Cellular Automata and Applications
- Advanced Malware Detection Techniques
- Anomaly Detection Techniques and Applications
- Software System Performance and Reliability
- Interactive and Immersive Displays
- Artificial Intelligence in Games
- Text and Document Classification Technologies
- Advanced Machining and Optimization Techniques
- Evacuation and Crowd Dynamics
- Software Testing and Debugging Techniques
- Advanced Data Compression Techniques
- Digital Media Forensic Detection
- Mobile Crowdsensing and Crowdsourcing
- PARP inhibition in cancer therapy
- Human Mobility and Location-Based Analysis
- Vehicle License Plate Recognition
University of Jordan
2014-2024
Al-Ahliyya Amman University
2021-2024
This paper aims to design and implement an automatic heart disease diagnosis system using MATLAB. The Cleveland data set for diseases was used as the main database training testing developed system. In order train test set, two systems were developed. first is based on Multilayer Perceptron (MLP) structure Artificial Neural Network (ANN), whereas second Adaptive Neuro-Fuzzy Inference Systems (ANFIS) approach. Each has modules, namely, testing, where 80% 20% of randomly selected purposes...
Twitter is one of the most popular microblogging and social networking platforms where massive instant messages (i.e. tweets) are posted every day. sentiment analysis tackles problem analyzing users’ tweets in terms thoughts, interests opinions a variety contexts domains. Such can be valuable for several researchers applications that require understanding people views about particular topic or event. The study carried out this paper provides an overview algorithms approaches have been used...
Twitter is a social networking website that has gained lot of popularity around the world in last decade. This made common target for spammers and malicious users to spread unwanted advertisements, viruses phishing attacks. In this article, we review latest research works determine most effective features were investigated spam detection literature. These are collected build comprehensive data set can be used develop more robust accurate spammer models. The new tested using popular...
Phishing websites are characterized by distinguished visual, address, domain, and embedded features, which identify defend such threats. Yet, phishing website detection is challenged overlapping these features with legitimate websites’ features. As the inter-class variance between becomes low, commonly utilized machine learning algorithms suffer from low performance in feature cases. Alternatively, ensemble that combines multiple predictions intending to address variations classified data...
The problem of finding the shortest path between two nodes is a common that requires solution in many applications like games, robotics, and real-life problems. Since its deals with large number possibilities. Therefore, parallel algorithms are suitable to solve this optimization has attracted lot researchers from both industry academia find optimal terms runtime, speedup, efficiency, cost compared sequential algorithms. In mountain climbing, start node under reach destination fundamental...
Spam is no longer just commercial unsolicited email messages that waste our time, it consumes network traffic and mail servers’ storage. Furthermore, spam has become a major component of several attack vectors including attacks such as phishing, cross-site scripting, request forgery malware infection. Statistics show the amount containing malicious contents increased compared to one advertising legitimate products services. In this paper, issue detection investigated with aim develop an...
Cloud computing is one of the paradigms that have undertaken to deliver utility concept. It views as a similar water and electricity. We aim in this paper make an investigation two highly efficacious platforms: Microsoft Azure (Azure) Amazon Web Services (AWS) from users’ perspectives point view users. highlight compare depth features AWS perspectives. The which we shall focus on include (1) Pricing, (2) Availability, (3) Confidentiality, (4) Secrecy, (5) Tier Account (6) Service Level...
The main objective of software testing is to have the highest likelihood finding most faults with a minimum amount time and effort. Genetic Algorithm (GA) has been successfully used by researchers in automatically generate test data. In this paper, GA applied using branch coverage criterion least possible set data JSC applications. Results show that applying achieves better performance terms average number generations, execution time, percentage coverage.
Abstract Electronic commerce has been growing gradually over the last decade as a new driver of retail industry. In fact, growth e-Commerce caused significant rise in number choices products and services offered on Internet. This is where recommender systems come into play by providing meaningful recommendations to consumers based their needs interests effectively. However, are still vulnerable scenarios sparse rating data cold start users items. To develop an effective system that addresses...
This paper presents the development of a new mobile phone dialler application which is designed to help blind and visually impaired people make calls. The developed as windows facilitate entering information touch screen phones by people. advantageous through its innovative concept, simplicity availability at an affordable cost. Feedback from users showed that this easy use solves many problems voice recognition applications such inaccuracy, slowness interpretation unusual voices. In...
Abstract A critical task and a competitive research area is to secure networks against attacks. One of the most popular security solutions Intrusion Detection Systems (IDS). Machine learning has been recently used by researchers develop high performance IDS. main challenges in developing intelligent IDS Feature Selection (FS). In this manuscript, hybrid FS for network proposed based on an ensemble filter, improved Intelligent Water Drop (IWD) wrapper. The Improved version from IWD algorithm...
This paper reports results from an original research project studying the use of medical scribes in emergency departments (EDs) including analysis more than one full year archival data as well observations and interviews ED that were conducted over a one-half period. also additional studies have been completed since this project. Ultimately, revealed there can be significant impact on overall number patients seen, i.e. 10.3% increase seen per hour. appears to direct opposition non-medical...
Developments in service oriented architecture (SOA) have taken us near to the once fictional dream of forming and running an online business, such commercial activity which most or all its roles are outsourced services. The novel concept cloud computing gives a understanding SOA Information Technology assets provided as services that extra flexible, inexpensive striking activities. In this paper, we concisely study developments computing, debate advantages using for activities trade-offs...
The understanding of DNA damage intensity – concentration-level is critical for biological and biomedical research, such as cellular homeostasis, tumor suppression, immunity, gametogenesis. Therefore, recognizing quantifying levels a substantial issue, which requires further robust effective approaches. has several levels. These in malignant cells other unhealthy are significant the assessment lesion stages located normal cells. There need to get more insight from available data predict,...
The tree-hypercube (TH) interconnection network is relatively a new network, which constructed from tree and hypercube topologies. TH developed to support parallel algorithms for solving computation communication intensive problems. In this paper, we propose multiplication algorithm on present broadcast operation using store-and-forward technique, namely, one-to-all allows message be transmitted through the shortest path source node all other nodes. proposed implemented evaluated in terms of...
Abstract Learning Vector Quantization (LVQ) is one of the most widely used classification approaches. LVQ faces a problem as when size data grows large it becomes slower. In this paper, modified version LVQ, which called PDLVQ proposed to accelerate traditional version. The scheme aims avoid unnecessary computations by applying an efficient Partial Distance (PD) computation strategy. Three different benchmark datasets are in experiments. comparisons have been done between and terms runtime...
Ad Hoc networks are a set of wireless mobile communication nodes (stations, users) that exchange information between different in dynamic environment. The infrastructure help to form the network structure. Nodes communicate and send each other with centralized access points without interference. Each node acts both as router or an end user receive sent information. Information dissemination may face lake security due accidental unauthorized message forward illegal third party. This paper...
Flocking is a behaviour in which objects move or work together as group.This very common nature think of flock flying geese school fish the sea.Flocking behaviours have been simulated different areas such computer animation, graphics and games.However, simulation flocking large number real time computationally intensive task.This intensity due to n-squared complexity nearest neighbour (NN) algorithm used separate objects, where n objects.This paper proposes an efficient NN method based on...
Data mining deals with clustering and classifying large amounts of data, in order to discover new knowledge from the existent data by identifying correlations relationships between various data-sets. Cellular automata have been used before for classification purposes. This paper presents a cellular enhanced algorithm mining. Experimental results show that proposed enhancement gives better performance terms accuracy execution time than previous work using automata.