About
103
Publications
69,043
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,888
Citations
Introduction
Dr. Maatuk joined Omar Al-Mukhtar University as a lecturer after obtaining his Ph.D. in Computer Science in Nov. 2009. He took up the position of Head of Computer Science Dept in 2011, then he was promoted to Assist. Prof in Nov. 2012. Dr. Maatuk joined the University of Benghazi, in Aug. 2014 at the Faculty of IT, then in 2016 he was promoted as Associate Prof. He was appointed as Vice-Dean of the Faculty of IT from Jul. 2015 to May 2019, when he was appointed as the Dean of the Faculty of IT.
Current institution
Additional affiliations
November 2016 - present
December 2016 - December 2016
June 2015 - October 2016
Education
September 1990 - September 1994
Unversity of Benghazi
Field of study
- Computer Sciences
Publications
Publications (103)
The creation of UML (Unified Modeling Language) class diagrams from textual requirements is a critical task in software development. Traditionally, this process is manual, time-consuming, and prone to errors. In this paper, we explore an innovative approach for automating the generation of UML class diagrams from natural language requirements using...
Abstract— Social media platforms have become an intention
for various people although they can be a double-edged sword,
especially for people suffering from certain health disorders.
Such platforms can provide support and an important source of
useful information for people with disorders such as bipolar
disorder, enabling them to communicate...
Despite the efforts to narrow the gap between software engineering learning and the need for practice in the software industry, beginners often find it difficult to match their academic skills with professional life practices. Therefore, there is an urgent need to know the best ways to provide students with the practical experiences they need to bu...
The healthcare industry generates enormous amounts of complex clinical data that make the prediction of disease detection a complicated process. In medical informatics, making effective and efficient decisions is very important. Data Mining (DM) techniques are mainly used to identify and extract hidden patterns and interesting knowledge to diagnose...
Relational database (RDB) systems are widely used to store traditional data for many organizations despite their challenges when dealing with non-traditional data required by contemporary applications. These systems should be able to handle transactions and domains that require storing large amounts of data. Recently, data has been growing faster t...
Telemedicine technology has witnessed an increasing interest in healthcare institutions to provide health services to patients during outbreaks of epidemics due to the precautionary measures taken by many countries around the world. Many patients received ongoing, regular telemonitoring from their healthcare providers. However, the success of telem...
The primordial part of realizing a computer system is conceptual modelling, which has met with great success in relational database design using an ER model. Unfortunately, with the development of the computer field, relational databases confronted shortcomings in their applications and the object-relational model became used more and more. The too...
Cloud computing is now changing the IT landscape and playing a significant economic role for companies that develop software. Users of educational resources now have more flexibility and access because of cloud computing. Students, faculty members, and support staff all use cloud computing in academic institutions. Internet-based computing, known a...
Significant developments in technology contribute to major transformations in all aspects of life. Information technology is a powerful tool for improving performance in institutions. However, institutions face challenges in implementing suitable information technology to achieve business objectives. There is an argument that the importance of Busi...
The variety and velocity of data are being changed by data growth. More processors, more storage space, and more money are needed to handle a huge amount of data. Big data, as it is known, refers to the growth of data. Big data processing cannot be handled by traditional databases such as relational databases. Relational databases store a considera...
Electronic prescription (E-prescribing) has emerged as an important strategy to reduce medication errors, improve the quality of patient care, and create savings in healthcare costs. The basic documentation functions of e-prescribing systems have the potential to increase patient safety and reduce costs through improved legibility since the misinte...
Problems of excess paperwork, delays in approving
services, arguments, and claims of over-servicing may arise
during healthcare settings. This is perceived as unwanted for
patients and health care professionals and costly to the health
care system. Introducing an Evidence-Based Medicine (EBM)
decision software in health systems could provide a part...
Aspect-oriented software development builds on the concept of separation of concerns. It is concerned with addressing and handling the scattering and tangling issues related to the object-oriented paradigm. The traditional requirements engineering approach cannot address crosscutting concerns properly, which results in the occurrence of the tyranny...
The Internet of Things (IoT) can offer extraordinary innovations in healthcare. During the COVID-19 pandemic, the need to study the different applications of IoT-enabled healthcare has emerged. This paper focuses on extrapolating people’s opinions about the use of IoT technologies in healthcare. A questionnaire was used to obtain and analyze the re...
Organizational loyalty has an active role that contributes considerably to improving the performance of human resources in institutions, whereby administrative leaders must be instructed to take care of it and know its levels among employees. This study aims to know the level of organizational loyalty of administrative staff at the University of Be...
Examination timetabling is a complicated issue that is part of the larger field of scheduling. Timetabling comes in a variety of forms based on the field, for which it is used. In this paper, we explore the problem of exam timetabling in a university. This problem had been defined as difficult to solve since it is generally done by hand over severa...
Electronic prescription software (e-prescribing) benefits patients and physicians by preventing handwriting errors and giving accurate prescriptions. E-prescribing allows prescriptions to be written and sent to pharmacies electronically instead of using handwritten notes. Significant factors that may affect the adoption of e-prescription systems in...
The development in communications and information technology led to the emergence of electronic payment services (e-payment). However, the use and acceptance rate of such services in Libya is still limited. This paper explores the factors affecting the usability of e-payment services for some Libyan banks through a proposed framework using the Tech...
Crisis management is witnessing rapid changes due to advances in information technology, and the development of information systems in various fields, especially in the field of higher education during the spread of the Corona pandemic, has led to the need to study the relationship between information systems and crisis management. This study aims...
The evaluation of electronic services (e-services) and determining the factors that affect users to adopt these services are needed. This study aims to shed light on the usability of e-services for the General Electricity Company in Libya using the Technology Acceptance Model (TAM). The TAM model was enhanced by adding some external variables that...
E-commerce is considered an important factor in the new economy, as it began to spread in many developing countries and contributed to the implementation of their development plans. It is estimated that e-commerce activities will be a major source of foreign exchange and an indicator of national development. However, there is a dearth of studies re...
Making a design decision in architecture design (AD) is challenging, especially when the system has many components and interactions. The complication is evident in the design phase of agents-based systems that are assigned various responsibilities, according to most works of literature. The study's purpose is to assist system designers in developi...
The outbreak of the coronavirus created a conventional challenge for the global community due to the lack increased a number of COVID-19 positive patients and stretched healthcare systems. Therefore, the global world starts to look for unconventional approaches and technologies to combat the dissemination of the COVID-19 virus, for example, utilizi...
The spread of COVID-19 poses a threat to humanity, as this pandemic has forced many global activities to close, including educational activities. To reduce the spread of the virus, education institutions have been forced to switch to e-learning using available educational platforms, despite the challenges facing this sudden transformation. In order...
The emergence of the Corona pandemic and the consequent closure of many different activities, especially educational activities, to prevent the gathering and crowding of people, made e-learning a savior and a haven for continuing the educational process in the whole world. However, some developing countries, including Libya, which did not previousl...
There is a wide range of available biological databases developed by bioinformatics experts, employing different methods to extract biological data. In this paper, we investigate and evaluate the performance of some of these methods in terms of their ability to efficiently access bioinformatics databases using web-based interfaces. These methods re...
This paper describes a study that compares the results of mobile app usability testing in various environments. The comparison includes two of the most popular platforms among users, Apple's iOS and Google's with five of the eligible participants. Google Drive is the name of the app that was developed for the Google Android platform on the Samsung...
Clustering in data mining is a powerful tool for gaining knowledge. There is tremendous knowledge in the field of clustering as it has recently appeared in several different applications. The density-based method is a successful technique for large datasets (big data). Algorithms such as the well-known DBSCAN algorithm can find clusters of random s...
The process of transformation from informal requirements stated in natural language into a formal specification such as Unified Modeling Language (UML) is an important challenge. User requirements that are expressed in natural language can be very problematic, which makes the requirements analysis a difficult task. In this paper, we propose a metho...
The failure in propagating software changes properly during the maintenance process is one of the main causes of defects and poor software performance. It also increases the time consumed while searching for related changes manually. In addition, incomplete changes increase the cost of the maintenance process, by hiring highly paid senior developer...
New technologies that emerge at the interface of computational and biomedical science could drive new advances in global health. Bioinformatics is one of these new technologies that can be defined as a concept that deals with all applications of information technology in the field of molecular biology. This paper aims to evaluate the knowledge of m...
Requirements engineering is a discipline of software engineering that is concerned with the identification and handling of user and system requirements. Aspect-Oriented Requirements Engineering (AORE) extends the existing requirements engineering approaches to cope with the issue of tangling and scattering resulted from crosscutting concerns. Cross...
Requirements engineering is a discipline of software engineering that is concerned with the identification and handling of user and system requirements. Aspect-Oriented Requirements Engineering (AORE) extends the existing requirements engineering approaches to cope with the issue of tangling and scattering resulted from crosscutting concerns. Cross...
Requirements engineering is a discipline of software engineering that is concerned with the identification and handling of user and system requirements. Aspect-Oriented Requirements Engineering (AORE) extends the existing requirements engineering approaches to cope with the issue of tangling and scattering resulted from crosscutting concerns. Cross...
Covid-19 has been declared by the World Health Organization a pandemic that poses a new hazard to humankind. This has resulted in a global close-down of several operations, including education events. This led universities to migrate their education systems from traditional to online systems using e-learning educational platforms. The goal of this...
In the last years, many methods and tools for generating Unified Modeling Language (UML) class diagrams from natural language (NL) software requirements. These methods and tools deal with the transformation of NL textual requirements to UML diagrams. The transformation process involves analyzing NL requirements and extracting relevant information f...
Clustering is vital and striking in data mining, a powerful tool to analyze an incredible volume of data created by the progress in applications. The DBSCAN clustering is a well-known successful algorithm, which has features that are dependent on the density notion of objects within clusters. It can find clusters of the highest dimensionality as lo...
In recent years, Software Security has gained an important role in the research of information systems as the increasing popularity of hacking and attacking software systems. Therefore, the need for security measures grows and many researchers have put security measures into account from the early stages of software development starting from the re...
In the Internet of Things (IoT) area, the increase of data leads to the "Big data'' problem. The traditional relational database (RDB) is not being able to deal with processing big data. In contrast, the Not only SQL (NoSQL) database was created to deal with big data problems. Therefore, most organizations need to convert their data stored in RDB s...
The use of health information technology has become highly effective in healthcare quality as it enhances personal and public care, broadens diagnostic accuracy, reduces medical costs and errors, and improves the effectiveness of both organizational and clinical processes. This study aims to assess physicians' perceptions of perceived benefits and...
Medical (or patient) records are important as they constitute the documentation of patients' health status. The advances in information technologies are reflected in electronic patient records so that patient data can be stored in databases, which could have a positive impact on patient care. Therefore, identifying the important benefits, and study...
Electronic Health Records (EHRs) is one of many enlargements in health informatics. It is a computerized system to collect, store, and display patient information. Although with the many benefits, many barriers affect the implementation of these systems. Such barriers can be technical, financial, organizational, individual, or even legal. This stud...
The Corona pandemic has become a threat to humanity, as the spread of the coronavirus has led to the closure of many institutions as well as many economic, social, and educational activities. In order not to stop the educational process, various educational institutions, including universities, have moved to remote electronic education methods (e-l...
The process of generating Unified Modeling Language (UML) Diagrams from Natural Language (NL) requirements is considered a complex and challenging task. Software requirements specification is often written in NL format, which causes potential problems. Requirements analysts analyze and process natural language requirements manually to extract the U...
Several tools and approaches have been proposed to generate Unified Modeling Language (UML) diagrams. Researchers focus on automating the process of extracting valuable information from Natural Language (NL) text to generate UML models. The existing approaches show less accurateness because of the ambiguity of NL. In this paper, we present a method...
This paper aims to devise a method for migrating a relational database (RDB) into an XML document. Database migration is concerned with the process of converting schema and data from a source RDB, as a one-time conversion, into a target XML database to be managed and handled in its new environment. The source schema is enriched semantically and tra...
Nowadays, the development of data warehouses shows the importance of data quality in business success. Data warehouse projects fail for many reasons, one of which is the low quality of data. High-quality data achievement in data warehouses is a persistent challenge. Data cleaning aims at finding, correcting data errors and inconsistencies. This pap...
The use of Information Technology (IT) has been growing over decades in many human activities. It has also been accepted in educational institutions for teaching and learning. Several studies have been conducted to evaluate the success and acceptance of E-learning systems and tools by students and teaching staff. In this study, we attempt to acquir...
Due to the large expansion of Electronic Gates (E-Gates) in universities and faculties, and their important role in providing various services for different types of users; it is necessary to measure the quality of the performance of these types of gates in terms of providing the required services optimally. This study aims to evaluate the availabi...
Healthcare workers' training needs in IT skills vary in different contexts and countries. The aim of this study is to identify training priorities as perceived by healthcare experts (> ten-year experience) using an anonymous questionnaire and to compare the resultant priorities with those of the European Union. Participants were asked to evaluate 2...
Aspect-Oriented Requirements Engineering (AORE) extends the existing requirements engineering approaches to support the identification and handling of crosscutting concerns. Crosscutting concerns are considered as potential aspects and can lead to the phenomenal "tyranny of the dominant decomposition". Requirements-level aspects are responsible for...
Organizations often face some challenges, such as the need to keep pace with technological developments to achieve high performance and manage their business efficiently free from time-consuming procedures. This study aims to evaluate the applicability of e-management in government institutions, namely civil registry administrations, to identify th...
دراسة تهدف إلى تسليط الضوء على أهم العوامل المؤثرة على الموظفين من أجل تحقيق المستوى المطلوب
من الأداء الوظيفي. تم التركيز على ثلاثة عوامل وهي التدريب والحالة الاجتماعية والنفسية بالإضافة الى العامل المادي .و يتكون مجتمع الدراسة من موظفي جامعة بنغازي بجميع المستويات الإدارية المختلفة .
وخلصت الدارسة الى بعض النتائج المرضية و التوصيات الهامة
The study described in this paper addresses the measurement of job satisfaction level of the employees of the University of Benghazi in terms of salary, rewards and promotions, work duties and responsibilities, relationship between leadership and their subordinates, and appreciation and self-esteem. It also investigates the extent of the independen...
تهدف هذه الدراسة إلى تسليط الضوء على أهم العوامل المؤثرة على الموظفين من أجل تحقيق المستوى المطلوب والمُرضي من الأداء الوظيفي. تتركز الدراسة على عوامل التدريب والحالة الاجتماعية والنفسية بالإضافة الى العامل المادي. تمت دراسة وتحليل بعض التجارب السابقة ذات العلاقة بمشكلة الدراسة للاستفادة منها في بناء أداة الدراسة. يتكون مجتمع هذه الدراسة من موظفي ج...
Aspect Oriented Software Development (AOSD) builds on the concept of Separation of Concerns (SoC). It improves software modularity by encapsulating crosscutting concerns into new units called aspects. Aspect Oriented Requirements Engineering (AORE) is an early stage of AOSD. It handles the identification and analysis of crosscutting concerns in req...
There is a wide range of available biological databases developed by bioinformatics experts, employing different methods to extract biological data. In this paper, we investigate and evaluate the performance of some of these methods in terms of their ability to efficiently access bioinformatics databases using webbased interfaces. These methods ret...
Copying and pasting program code fragments with minor changes is a common practice in software development. Software systems often have similar segments of code, called code clones. Due to many reasons, unintentional smells may also appear in the source code without awareness of program developers. Code smell may violate the principles of software...
In this paper, an intelligent decision support system has been proposed for skin disease diagnosis using a hybrid model of Case-Based Reasoning and Artificial Neural Network techniques. The proposed model uses nine input variables (attributes) that have a major effect on the skin diagnosing process. The output of the model is the diagnosis and the...
Graphical user interfaces design in software development process focuses on maximizing usability and the
user's experience, in order to make the interaction for users easy, flexible and efficient. In this paper, we
propose an approach for evaluating the usability satisfaction degree of a web-based system. The proposed
method has been accomplished i...
Abstract In this article, a new agent approach has been proposed for recognizing the research trends in wearable systems. In addition, we have formulated a mathematical model to predict the agent development trends in the field of wearable systems. The proposed agent approach converts the raw documents found on the Internet into relevant informatio...
This paper highlights the functionality of object-based database systems by comparing the performance of relational database (RDB) and object-relational database (ORDB) systems. The study focuses on assessing the efficiency of database systems based on query processing and object complexity. We conducted an experiment that includes running the quer...
Augmented reality has been widely recognized due to its dominance and increasing advancement of the technology as an extensive circulation of smart phones. It is a form of human computer interaction that provides an insight with surplus information to users in the form of reality. This has made the use of augmented reality an important concept in s...
One of the most important elements in the system development is the way the system provides an interaction with users through an easy to use graphical user interface. This paper introduces a method for testing and evaluating the degree of usability for web-based systems. The method has been utilized in two phases and applied to the Emirates Airline...
In linear programming, the transportation problem is one of the most important and successful applications of quantitative analysis for solving business problems in products distribution. Basically, the aim is to minimize the cost of shipping goods from one location to another, so that the needs of each arrival area are met and every shipping locat...
There are several methods proposed to extract data from biological databases developed by bioinformatics experts. These methods retrieve bioinformatics information through the use of structured and semi-structured data tools from remote database servers. This paper investigates and evaluates the performance of these methods in terms of their abilit...
Today, it is possible to monitor a gene expression on a genomic scale using hierarchical clustering, DNA micro-arrays and k-means partitioning which are being the most popular methods. Several tools make use of the GO ontologies or the gene associations provided by consortium members or even individuals. While some progress has been made in address...
One of the significantaspects of software quality is usability. It is one of the characteristics that judge by
the success or failure of software applications. The most important risk facing the software applications is
usability which may lead to the existence of a gap between users and systems. This may lead to system
failure because of Poor desi...
This special issue focuses on advanced research in the practical applications and the theoretical foundations of software security, through presentation of the most up-todate advances and new directions of research in the field from various scholarly, professional, and practitioner perspectives. An interdisciplinary look at software
security includ...
The high volume of data available in many domains and the need to analyze the data to extract useful information from it has lead to the need of visualization techniques to get information about the data at a glance. Visual inspection is useful in providing fast and abstract information about datasets to direct the researchers in choosing the suita...
This paper investigates the current automatic methods used to generate efficient and accurate signatures to create countermeasures against attacks by polymorphic worms. These strategies include autograph, polygraph and Simplified Regular Expression (SRE). They rely on network-based signature detection and filtering content network traffic, as the s...
Object-relational technology provides a significant increase in scalability and flexibility over the traditional relational databases. The additional object-relational features are particularly satisfying for advanced database applications that relational database systems have experienced difficulties. The key factor to the success of object-relati...
Software defects are categorized into two main types: Syntax and Semantic defects. Syntax defects are easily to capture using compliers (or interpreters) that programming languages have. However, compliers are incapable to detect semantic defects, and this makes programmers re-read the source code a number of times to figure out where the defects l...
With the proliferation of the internet among casual users as well as businesses, the range and frequency of security threats have increased dramatically. One of these threats is a particular type of malware known as a polymorphic worm. This is a program that can mutate its appearance with each infection and spreads through the network via semantics...
With the emergence of new data acquisition technologies, large amounts of data are available in many domains. While a significant amount of computational research is dedicated to the analysis of such data, it is needed to be visualized in a way that is easy to analyze and understand. Recently, there have been significant advances in visualizing gra...
The aim of this paper is to present a solution to automatically generate an XML schema from an existing relational database (RDB). The important goal of this translation is to enriching the source schema using semantics that might have not been clearly expressed in it, by acquiring as much information as possible about objects and relationships tha...
This paper presents a novel approach to recognize research trends in a particular domain of research (i.e. Agent development) that is based on the number of data extracted from search engines. Several well-known mathematical and statistical theories have been used, from which a mathematical model has been derived to predict the agent development. T...
This paper presents a novel approach to recognize research trends in a particular domain of research (i.e. Agent development) that is based on the number of data extracted from search engines. Several well-known mathematical and statistical theories have been used, from which a mathematical model has been derived to predict the agent development. T...
In this paper, we present a solution for translating an existing relational database (RDB) schema into relatively newer database (i.e., object-oriented and object-relational database) schemas, based on available standards. The solution is more beneficial compared to the existing approaches as it generates two different and equivalent target schemas...
Owing to information security concerns, most Arab small and medium enterprises depend on traditional interactions and have not moved their operations online. The insufficient preparation for the information and communication technologies revolution led to few offering online transaction platforms, information security features and credit facilities...
This paper presents a study of the applicability of e-government technology to the ministries of Justice and Interior in Libya. The theoretical part of the study focuses on taking samples from the study society to identify the technical and physical capabilities in the security organizations in Libya, for the purpose of knowing the possibility of a...
The Cloud has become a significant topic in computing; however, the trend has established a new range of security issues that need to be addressed. For example, the owners of data might be worried because the data and associated software are not under their control but rather possessed by the Cloud. In addition, the data owner may not be aware of w...
The Cloud has become a significant topic in computing; however, the trend has established a new range of security issues that need to be addressed. For example, the owners of data might be worried because the data and associated software are not under their control but rather possessed by the Cloud. In addition, the data owner may not be aware of w...
This paper surveys the recent literature about various research trends relevant to Relational DataBase (RDB) reengineering. The paper presents an analysis of approaches and techniques used in this context, including construction of object views on top of RDBs, database integration and database migration. A categorisation is presented of the selecte...
This paper proposes an approach for migrating existing Relational DataBases (RDBs) into Object-Relational DataBases (ORDBs). The approach is superior to existing proposals as it can generate not only the target schema but also the data instances. The solution takes an existing RDB as input, enriches its metadata representation with required semanti...
Rapid changes in information technology, the emergence of object-based and WWW applications, and the interest of organisations in securing benefits from new technologies have made information systems re-engineering in general and database migration in particular an active research area. In order to improve the functionality and performance of exist...
Semantic enrichment is a process of analyzing and examining a database to capture its structure and definitions at a higher level of meaning. This is done by enhancing a representation of an existing database’s structure in order to make hidden semantics explicit. In contrast to other approaches, we present an approach that takes an existing relati...
This paper presents an investigation into approaches and techniques used for database conversion. Constructing object views
on top of a Relational DataBase (RDB), simple database integration and database migration are among these approaches. We present
a categorisation of selected works proposed in the literature and translation techniques used for...