Search Results - "Yassein, Muneer Bani"
-
1
Couvade Syndrome Among Jordanian Expectant Fathers
Published in American journal of men's health (01-01-2019)“…Studies of different cultures have reported that expectant fathers experience physiological and psychological changes during their partner’s pregnancy. These…”
Get full text
Journal Article -
2
Enhanced Detection of Epileptic Seizure Using EEG Signals in Combination With Machine Learning Classifiers
Published in IEEE access (2020)“…Electroencephalogram (EEG) is one of the most powerful tools that offer valuable information related to different abnormalities in the human brain. One of…”
Get full text
Journal Article -
3
A new elastic trickle timer algorithm for Internet of Things
Published in Journal of network and computer applications (01-07-2017)“…The term IoT emerging services is used to refer to the modern kinds of services that IoT can provide to enhance service and experience quality by reducing…”
Get full text
Journal Article -
4
A multithreaded programming approach for multimedia big data: encryption system
Published in Multimedia tools and applications (01-05-2018)“…Multimedia is currently seen to dominate the internet network and the mobile network traffic; hence, it is seen as the largest Big data. Generally, the…”
Get full text
Journal Article -
5
Detecting naturalistic expression of emotions using physiological signals while playing video games
Published in Journal of ambient intelligence and humanized computing (01-02-2023)“…Affective gaming has been an active research field recently. This is due to the importance of the player’s emotions while playing computer games. Emotions can…”
Get full text
Journal Article -
6
Hybrid Real-Time Protection System for Online Social Networks
Published in Foundations of science (01-12-2020)“…The impact of Online Social Networks (OSNs) on human lives is foreseen to be very large with unprecedented amount of data and users. OSN users share their…”
Get full text
Journal Article -
7
Advanced security testing using a cyber‐attack forecasting model: A case study of financial institutions
Published in Journal of software : evolution and process (01-11-2022)“…As the number of cyber‐attacks on financial institutions has increased over the past few years, an advanced system that is capable of predicting the target of…”
Get full text
Journal Article -
8
Intelligent system for visual web content analytics: A new approach and case study
Published in Multimedia tools and applications (01-07-2018)“…The accuracy of searches for visual data elements, as well as other types of information, depends on the terms used by the user in the input query to retrieve…”
Get full text
Journal Article -
9
A new probabilistic broadcasting scheme for mobile ad hoc on-demand distance vector (AODV) routed networks
Published in The Journal of supercomputing (01-07-2010)“…Broadcast is a fundamental operation used in Mobile Ad hoc NETworks (MANETs) for many services, such as route discovery and sending information messages. The…”
Get full text
Journal Article -
10
A framework for retrieving Arabic documents based on queries written in Arabic slang language
Published in Journal of information science (01-08-2012)“…Due to the widespread use of the internet, there are large amounts of information and documents available in several languages. The Arabic language is one of…”
Get full text
Journal Article -
11
Internet of Things: Survey and open issues of MQTT protocol
Published in 2017 International Conference on Engineering & MIS (ICEMIS) (01-05-2017)“…Internet of Things (IoT) is based on a wireless network that connects a huge number of smart objects, products, smart devices, and people. It has another name…”
Get full text
Conference Proceeding -
12
Novel and Secure Blockchain Framework for Health Applications in IoT
Published in IEEE access (2022)“…Internet of Things (IoT) has grown increasingly in the past decade. This growth brings up several challenging issues for a successful continuous operation of…”
Get full text
Journal Article -
13
Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model
Published in Journal of computational science (01-03-2018)“…•Utilise the NSL-KDD data set and the binary and multiclass problem with a 20% training dataset.•This paper studied a new model that can be used to estimate…”
Get full text
Journal Article -
14
Sentiment Analysis of COV19 Impact on Education and Economy Sectors using Arabic Tweets
Published in 2023 14th International Conference on Information and Communication Systems (ICICS) (21-11-2023)“…The coronavirus (COVID-19) infected millions of people around the world. Due to the disease's rapid spread, all governments have decided to implement…”
Get full text
Conference Proceeding -
15
On the Mobility Scenario Implementation Using a Graphical P2P Discrete Event Simulator for the Bittorrent Protocol
Published in Journal of algorithms & computational technology (01-12-2013)“…Peer-to-Peer computing is nowadays the application platform which utilizes a novel distributed computing paradigm. It allows any number of participants to…”
Get full text
Journal Article -
16
A Deep Learning Approach for Varicocele Detection from Ultrasound Images
Published in 2023 14th International Conference on Information and Communication Systems (ICICS) (21-11-2023)“…Varicocele is a disease characterized by abnormal dilatation of the scrotal venous plexus pampiniformis. It is a common cause of infertility and may cause pain…”
Get full text
Conference Proceeding -
17
Ovarian Cancer Detection in CT Scan Images Using Transfer Learning
Published in 2023 14th International Conference on Information and Communication Systems (ICICS) (21-11-2023)“…This research paper presents a system for classifying and detecting ovarian CT scan images using transfer learning and examines the effects of different tools…”
Get full text
Conference Proceeding -
18
Predicting Bug Severity Using Machine Learning and Ensemble Learning Techniques
Published in 2023 14th International Conference on Information and Communication Systems (ICICS) (21-11-2023)“…Software quality can be adversely affected by various bugs in the system. Bug identification and fixing are part of every software development life cycle…”
Get full text
Conference Proceeding -
19
An enhanced J48 classification algorithm for the anomaly intrusion detection systems
Published in Cluster computing (01-09-2019)“…In this paper, we have developed an enhanced J48 algorithm, which uses the J48 algorithm for improving the detection accuracy and the performance of the novel…”
Get full text
Journal Article -
20
A resource-efficient encryption algorithm for multimedia big data
Published in Multimedia tools and applications (01-11-2017)“…Nowadays, multimedia is considered to be the biggest big data as it dominates the traffic in the Internet and mobile phones. Currently symmetric encryption…”
Get full text
Journal Article