Search Results - "Yassein, Muneer Bani"

Refine Results
  1. 1

    Couvade Syndrome Among Jordanian Expectant Fathers by Mrayan, Lina, Abujilban, Sanaa, Abuidhail, Jamila, Bani Yassein, Muneer, Al-Modallal, Hanan

    Published in American journal of men's health (01-01-2019)
    “…Studies of different cultures have reported that expectant fathers experience physiological and psychological changes during their partner’s pregnancy. These…”
    Get full text
    Journal Article
  2. 2

    Enhanced Detection of Epileptic Seizure Using EEG Signals in Combination With Machine Learning Classifiers by Mardini, Wail, Bani Yassein, Muneer Masadeh, Al-Rawashdeh, Rana, Aljawarneh, Shadi, Khamayseh, Yaser, Meqdadi, Omar

    Published in IEEE access (2020)
    “…Electroencephalogram (EEG) is one of the most powerful tools that offer valuable information related to different abnormalities in the human brain. One of…”
    Get full text
    Journal Article
  3. 3

    A new elastic trickle timer algorithm for Internet of Things by Yassein, Muneer Bani, Aljawarneh, Shadi, Masa’deh, Esra’a

    “…The term IoT emerging services is used to refer to the modern kinds of services that IoT can provide to enhance service and experience quality by reducing…”
    Get full text
    Journal Article
  4. 4

    A multithreaded programming approach for multimedia big data: encryption system by Aljawarneh, Shadi, Yassein, Muneer Bani, Talafha, We’am Adel

    Published in Multimedia tools and applications (01-05-2018)
    “…Multimedia is currently seen to dominate the internet network and the mobile network traffic; hence, it is seen as the largest Big data. Generally, the…”
    Get full text
    Journal Article
  5. 5

    Detecting naturalistic expression of emotions using physiological signals while playing video games by AlZoubi, Omar, AlMakhadmeh, Buthina, Bani Yassein, Muneer, Mardini, Wail

    “…Affective gaming has been an active research field recently. This is due to the importance of the player’s emotions while playing computer games. Emotions can…”
    Get full text
    Journal Article
  6. 6

    Hybrid Real-Time Protection System for Online Social Networks by Bani Yassein, Muneer, Aljawarneh, Shadi, Wahsheh, Yarub

    Published in Foundations of science (01-12-2020)
    “…The impact of Online Social Networks (OSNs) on human lives is foreseen to be very large with unprecedented amount of data and users. OSN users share their…”
    Get full text
    Journal Article
  7. 7

    Advanced security testing using a cyber‐attack forecasting model: A case study of financial institutions by Qasaimeh, Malik, Hammour, Rand Abu, Yassein, Muneer Bani, Al‐Qassas, Raad S., Torralbo, Juan Alfonso Lara, Lizcano, David

    “…As the number of cyber‐attacks on financial institutions has increased over the past few years, an advanced system that is capable of predicting the target of…”
    Get full text
    Journal Article
  8. 8

    Intelligent system for visual web content analytics: A new approach and case study by Abuein, Qusai Q., Shatnawi, Mohammed Q., Yassein, Muneer Bani, Mahafza, Reem

    Published in Multimedia tools and applications (01-07-2018)
    “…The accuracy of searches for visual data elements, as well as other types of information, depends on the terms used by the user in the input query to retrieve…”
    Get full text
    Journal Article
  9. 9

    A new probabilistic broadcasting scheme for mobile ad hoc on-demand distance vector (AODV) routed networks by Yassein, Muneer Bani, Khalaf, Mustafa Bani, Al-Dubai, Ahmed Y

    Published in The Journal of supercomputing (01-07-2010)
    “…Broadcast is a fundamental operation used in Mobile Ad hoc NETworks (MANETs) for many services, such as route discovery and sending information messages. The…”
    Get full text
    Journal Article
  10. 10

    A framework for retrieving Arabic documents based on queries written in Arabic slang language by Shatnawi, Mohammed Q., Yassein, Muneer Bani, Mahafza, Reem

    Published in Journal of information science (01-08-2012)
    “…Due to the widespread use of the internet, there are large amounts of information and documents available in several languages. The Arabic language is one of…”
    Get full text
    Journal Article
  11. 11

    Internet of Things: Survey and open issues of MQTT protocol by Yassein, Muneer Bani, Shatnawi, Mohammed Q., Aljwarneh, Shadi, Al-Hatmi, Razan

    “…Internet of Things (IoT) is based on a wireless network that connects a huge number of smart objects, products, smart devices, and people. It has another name…”
    Get full text
    Conference Proceeding
  12. 12

    Novel and Secure Blockchain Framework for Health Applications in IoT by Bataineh, Marah R., Mardini, Wail, Khamayseh, Yaser M., Yassein, Muneer Masadeh Bani

    Published in IEEE access (2022)
    “…Internet of Things (IoT) has grown increasingly in the past decade. This growth brings up several challenging issues for a successful continuous operation of…”
    Get full text
    Journal Article
  13. 13

    Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model by Aljawarneh, Shadi, Aldwairi, Monther, Yassein, Muneer Bani

    Published in Journal of computational science (01-03-2018)
    “…•Utilise the NSL-KDD data set and the binary and multiclass problem with a 20% training dataset.•This paper studied a new model that can be used to estimate…”
    Get full text
    Journal Article
  14. 14

    Sentiment Analysis of COV19 Impact on Education and Economy Sectors using Arabic Tweets by Al Zoubi, Omar, Alaiad, Ahmad, Migdady, Aya, Yassein, Muneer Bani

    “…The coronavirus (COVID-19) infected millions of people around the world. Due to the disease's rapid spread, all governments have decided to implement…”
    Get full text
    Conference Proceeding
  15. 15

    On the Mobility Scenario Implementation Using a Graphical P2P Discrete Event Simulator for the Bittorrent Protocol by Charalambous, Marios, Mavromoustakis, Constandinos X., Violaris, George C., Yassein, Muneer Bani

    “…Peer-to-Peer computing is nowadays the application platform which utilizes a novel distributed computing paradigm. It allows any number of participants to…”
    Get full text
    Journal Article
  16. 16

    A Deep Learning Approach for Varicocele Detection from Ultrasound Images by Awad, Mohammad Abu, Samrraie, Laaly, Abdalla, Ayman M., AlZoubi, Omar, Migdady, Aya, Yassein, Muneer Bani

    “…Varicocele is a disease characterized by abnormal dilatation of the scrotal venous plexus pampiniformis. It is a common cause of infertility and may cause pain…”
    Get full text
    Conference Proceeding
  17. 17

    Ovarian Cancer Detection in CT Scan Images Using Transfer Learning by Awad, Mohammad Abu, Samrraie, Laaly, Abdalla, Ayman M., AlZoubi, Omar, Migdady, Aya, Yassein, Muneer Bani

    “…This research paper presents a system for classifying and detecting ovarian CT scan images using transfer learning and examines the effects of different tools…”
    Get full text
    Conference Proceeding
  18. 18

    Predicting Bug Severity Using Machine Learning and Ensemble Learning Techniques by Hamouri, Sujood K., Shatnawi, Raed A., AlZoubi, Omar, Migdady, Aya, Yassein, Muneer Bani

    “…Software quality can be adversely affected by various bugs in the system. Bug identification and fixing are part of every software development life cycle…”
    Get full text
    Conference Proceeding
  19. 19

    An enhanced J48 classification algorithm for the anomaly intrusion detection systems by Aljawarneh, Shadi, Yassein, Muneer Bani, Aljundi, Mohammed

    Published in Cluster computing (01-09-2019)
    “…In this paper, we have developed an enhanced J48 algorithm, which uses the J48 algorithm for improving the detection accuracy and the performance of the novel…”
    Get full text
    Journal Article
  20. 20

    A resource-efficient encryption algorithm for multimedia big data by Aljawarneh, Shadi, Yassein, Muneer Bani, Talafha, We’am Adel

    Published in Multimedia tools and applications (01-11-2017)
    “…Nowadays, multimedia is considered to be the biggest big data as it dominates the traffic in the Internet and mobile phones. Currently symmetric encryption…”
    Get full text
    Journal Article