Omar Adwan

ORCID: 0000-0003-3967-2456
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Spam and Phishing Detection
  • Network Security and Intrusion Detection
  • Sentiment Analysis and Opinion Mining
  • Advanced Steganography and Watermarking Techniques
  • Data Management and Algorithms
  • Image Retrieval and Classification Techniques
  • Advanced Image and Video Retrieval Techniques
  • Service-Oriented Architecture and Web Services
  • IoT and Edge/Fog Computing
  • Cellular Automata and Applications
  • Advanced Malware Detection Techniques
  • Anomaly Detection Techniques and Applications
  • Software System Performance and Reliability
  • Interactive and Immersive Displays
  • Artificial Intelligence in Games
  • Text and Document Classification Technologies
  • Advanced Machining and Optimization Techniques
  • Evacuation and Crowd Dynamics
  • Software Testing and Debugging Techniques
  • Advanced Data Compression Techniques
  • Digital Media Forensic Detection
  • Mobile Crowdsensing and Crowdsourcing
  • PARP inhibition in cancer therapy
  • Human Mobility and Location-Based Analysis
  • Vehicle License Plate Recognition

University of Jordan
2014-2024

Al-Ahliyya Amman University
2021-2024

This paper aims to design and implement an automatic heart disease diagnosis system using MATLAB. The Cleveland data set for diseases was used as the main database training testing developed system. In order train test set, two systems were developed. first is based on Multilayer Perceptron (MLP) structure Artificial Neural Network (ANN), whereas second Adaptive Neuro-Fuzzy Inference Systems (ANFIS) approach. Each has modules, namely, testing, where 80% 20% of randomly selected purposes...

10.4236/jsea.2014.712093 article EN cc-by Journal of Software Engineering and Applications 2014-01-01

Twitter is one of the most popular microblogging and social networking platforms where massive instant messages (i.e. tweets) are posted every day. sentiment analysis tackles problem analyzing users’ tweets in terms thoughts, interests opinions a variety contexts domains. Such can be valuable for several researchers applications that require understanding people views about particular topic or event. The study carried out this paper provides an overview algorithms approaches have been used...

10.3991/ijet.v15i15.14467 article EN International Journal of Emerging Technologies in Learning (iJET) 2020-08-14

Twitter is a social networking website that has gained lot of popularity around the world in last decade. This made common target for spammers and malicious users to spread unwanted advertisements, viruses phishing attacks. In this article, we review latest research works determine most effective features were investigated spam detection literature. These are collected build comprehensive data set can be used develop more robust accurate spammer models. The new tested using popular...

10.1177/0165551516684296 article EN Journal of Information Science 2017-01-09

Phishing websites are characterized by distinguished visual, address, domain, and embedded features, which identify defend such threats. Yet, phishing website detection is challenged overlapping these features with legitimate websites’ features. As the inter-class variance between becomes low, commonly utilized machine learning algorithms suffer from low performance in feature cases. Alternatively, ensemble that combines multiple predictions intending to address variations classified data...

10.5267/j.ijdns.2023.1.003 article EN cc-by International Journal of Data and Network Science 2023-01-01

The problem of finding the shortest path between two nodes is a common that requires solution in many applications like games, robotics, and real-life problems. Since its deals with large number possibilities. Therefore, parallel algorithms are suitable to solve this optimization has attracted lot researchers from both industry academia find optimal terms runtime, speedup, efficiency, cost compared sequential algorithms. In mountain climbing, start node under reach destination fundamental...

10.1109/access.2022.3233786 article EN cc-by IEEE Access 2023-01-01

Spam is no longer just commercial unsolicited email messages that waste our time, it consumes network traffic and mail servers’ storage. Furthermore, spam has become a major component of several attack vectors including attacks such as phishing, cross-site scripting, request forgery malware infection. Statistics show the amount containing malicious contents increased compared to one advertising legitimate products services. In this paper, issue detection investigated with aim develop an...

10.4236/ijcns.2015.85014 article EN International Journal of Communications Network and System Sciences 2015-01-01

Cloud computing is one of the paradigms that have undertaken to deliver utility concept. It views as a similar water and electricity. We aim in this paper make an investigation two highly efficacious platforms: Microsoft Azure (Azure) Amazon Web Services (AWS) from users’ perspectives point view users. highlight compare depth features AWS perspectives. The which we shall focus on include (1) Pricing, (2) Availability, (3) Confidentiality, (4) Secrecy, (5) Tier Account (6) Service Level...

10.3991/ijet.v14i10.9902 article EN International Journal of Emerging Technologies in Learning (iJET) 2019-05-30

The main objective of software testing is to have the highest likelihood finding most faults with a minimum amount time and effort. Genetic Algorithm (GA) has been successfully used by researchers in automatically generate test data. In this paper, GA applied using branch coverage criterion least possible set data JSC applications. Results show that applying achieves better performance terms average number generations, execution time, percentage coverage.

10.4236/jsea.2015.812057 article EN cc-by Journal of Software Engineering and Applications 2015-01-01

Abstract Electronic commerce has been growing gradually over the last decade as a new driver of retail industry. In fact, growth e-Commerce caused significant rise in number choices products and services offered on Internet. This is where recommender systems come into play by providing meaningful recommendations to consumers based their needs interests effectively. However, are still vulnerable scenarios sparse rating data cold start users items. To develop an effective system that addresses...

10.2478/cait-2021-0008 article EN cc-by-nc-nd Cybernetics and Information Technologies 2021-03-01

This paper presents the development of a new mobile phone dialler application which is designed to help blind and visually impaired people make calls. The developed as windows facilitate entering information touch screen phones by people. advantageous through its innovative concept, simplicity availability at an affordable cost. Feedback from users showed that this easy use solves many problems voice recognition applications such inaccuracy, slowness interpretation unusual voices. In...

10.14419/ijet.v2i4.1101 article EN International Journal of Engineering & Technology 2013-11-14

Abstract A critical task and a competitive research area is to secure networks against attacks. One of the most popular security solutions Intrusion Detection Systems (IDS). Machine learning has been recently used by researchers develop high performance IDS. main challenges in developing intelligent IDS Feature Selection (FS). In this manuscript, hybrid FS for network proposed based on an ensemble filter, improved Intelligent Water Drop (IWD) wrapper. The Improved version from IWD algorithm...

10.2478/cait-2022-0040 article EN cc-by-nc-nd Cybernetics and Information Technologies 2022-11-01

This paper reports results from an original research project studying the use of medical scribes in emergency departments (EDs) including analysis more than one full year archival data as well observations and interviews ED that were conducted over a one-half period. also additional studies have been completed since this project. Ultimately, revealed there can be significant impact on overall number patients seen, i.e. 10.3% increase seen per hour. appears to direct opposition non-medical...

10.1016/j.procs.2017.11.146 article EN Procedia Computer Science 2017-01-01

Developments in service oriented architecture (SOA) have taken us near to the once fictional dream of forming and running an online business, such commercial activity which most or all its roles are outsourced services. The novel concept cloud computing gives a understanding SOA Information Technology assets provided as services that extra flexible, inexpensive striking activities. In this paper, we concisely study developments computing, debate advantages using for activities trade-offs...

10.4236/cn.2014.61001 article EN Communications and Network 2014-01-01

The understanding of DNA damage intensity – concentration-level is critical for biological and biomedical research, such as cellular homeostasis, tumor suppression, immunity, gametogenesis. Therefore, recognizing quantifying levels a substantial issue, which requires further robust effective approaches. has several levels. These in malignant cells other unhealthy are significant the assessment lesion stages located normal cells. There need to get more insight from available data predict,...

10.14569/ijacsa.2022.0130911 article EN International Journal of Advanced Computer Science and Applications 2022-01-01

The tree-hypercube (TH) interconnection network is relatively a new network, which constructed from tree and hypercube topologies. TH developed to support parallel algorithms for solving computation communication intensive problems. In this paper, we propose multiplication algorithm on present broadcast operation using store-and-forward technique, namely, one-to-all allows message be transmitted through the shortest path source node all other nodes. proposed implemented evaluated in terms of...

10.14569/ijacsa.2017.081225 article EN cc-by International Journal of Advanced Computer Science and Applications 2017-01-01

Abstract Learning Vector Quantization (LVQ) is one of the most widely used classification approaches. LVQ faces a problem as when size data grows large it becomes slower. In this paper, modified version LVQ, which called PDLVQ proposed to accelerate traditional version. The scheme aims avoid unnecessary computations by applying an efficient Partial Distance (PD) computation strategy. Three different benchmark datasets are in experiments. comparisons have been done between and terms runtime...

10.2478/cait-2022-0015 article EN cc-by-nc-nd Cybernetics and Information Technologies 2022-06-01

Ad Hoc networks are a set of wireless mobile communication nodes (stations, users) that exchange information between different in dynamic environment. The infrastructure help to form the network structure. Nodes communicate and send each other with centralized access points without interference. Each node acts both as router or an end user receive sent information. Information dissemination may face lake security due accidental unauthorized message forward illegal third party. This paper...

10.5539/mas.v12n5p22 article EN Modern Applied Science 2018-04-24

Flocking is a behaviour in which objects move or work together as group.This very common nature think of flock flying geese school fish the sea.Flocking behaviours have been simulated different areas such computer animation, graphics and games.However, simulation flocking large number real time computationally intensive task.This intensity due to n-squared complexity nearest neighbour (NN) algorithm used separate objects, where n objects.This paper proposes an efficient NN method based on...

10.5121/sipij.2019.10601 article EN Signal & Image Processing An International Journal 2019-12-31

Data mining deals with clustering and classifying large amounts of data, in order to discover new knowledge from the existent data by identifying correlations relationships between various data-sets. Cellular automata have been used before for classification purposes. This paper presents a cellular enhanced algorithm mining. Experimental results show that proposed enhancement gives better performance terms accuracy execution time than previous work using automata.

10.15866/irecos.v8i2.2813 article EN 2013-02-28
Coming Soon ...