Abdullah Issa Alzaqebah

Abdullah Issa Alzaqebah
World Islamic Sciences and Education University · Computer Science Department

Doctor of Philosophy - Computer Science
Assistant Professor & Computerization specialist

About

38
Publications
66,318
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
537
Citations
Additional affiliations
September 2013 - September 2015
World Islamic Sciences and Education University
Position
  • Instructor
Description
  • Computer skills
October 2020 - February 2023
World Islamic Sciences and Education University
Position
  • Full time lecturer
November 2008 - present
World Islamic Sciences and Education University
Position
  • Analyst
Education
September 2016 - May 2022
University of Jordan
Field of study
  • Computer science
February 2011 - June 2014
Al-Balqa Applied University
Field of study
  • Computer science
September 2004 - August 2008
Jordan University of Science and Technology
Field of study
  • Computer information systems

Publications

Publications (38)
Article
Full-text available
A recently developed algorithm inspired by natural processes, known as the Artificial Gorilla Troops Optimizer (GTO), boasts a straightforward structure, unique stabilizing features, and notably high effectiveness. Its primary objective is to efficiently find solutions for a wide array of challenges, whether they involve constraints or not. The GTO...
Article
Full-text available
The article introduces an innovative approach to global optimization and feature selection (FS) using the RIME algorithm, inspired by RIME-ice formation. The RIME algorithm employs a soft-RIME search strategy and a hard-RIME puncture mechanism, along with an improved positive greedy selection mechanism, to resist getting trapped in local optima and...
Article
Full-text available
Eliminating security threats on the Internet of Things (IoT) requires recognizing threat attacks. IoT and its implementations are currently the most common scientific field. When it comes to real-world implementations, IoT's attributes, on the one hand, make it simple to apply, but on the other hand, they expose it to cyber-attacks. Denial of Servi...
Article
Full-text available
Source code authorship attribution is the task of identifying who develops the code based on learning based on the programmer style. It is one of the critical activities which used extensively in different aspects such as computer security, computer law, and plagiarism. This paper attempts to investigate source code authorship attribution by captur...
Conference Paper
Low Power Networks are spreading worldwide, seeking to enable small devices to join wireless networks. This requires a routing mechanism that makes it possible and seamless. This research aims to create a Low Power and Lossy Networks (RPL) routing protocol that balances power usage and node dependability. The main emphasis of the algorithm presente...
Article
Full-text available
A population-based optimizer called Beluga Whale Optimization (BWO) depicts behavioral patterns of water aerobics, foraging, and diving whales. BWO runs effectively, nevertheless, it retains numerous of deficiencies that has to be strengthened. Premature convergence and a disparity between exploitation and exploration are some of these challenges....
Article
The growth of data creates more analysis and mining challenges related to speed and accuracy. Feature selection (FS) is an optimization problem used as a preprocessing phase to reduce the data dimensionality while obtaining the best classification accuracy. FS removes redundant and irrelevant features and preserves the best informative features. Va...
Article
Feature Selection (FS) techniques extract the most recognizable features for improving the performance of classification methods for medical applications. In this paper, two intelligent wrapper FS approaches based on a new metaheuristic algorithm named the Snake Optimizer (SO) are introduced. The binary SO, called BSO, is built based on an S-shape...
Article
Full-text available
The surge in cyber-attacks has driven demand for robust Intrusion detection systems (IDSs) to protect underlying data and sustain availability of network services. Detecting and classifying multiple type of attacks requires robust machine learning approaches that can analyze network traffic and take appropriate measures. Traffic data usually consis...
Article
Cyber-attacks and unauthorized application usage have increased due to the extensive use of Internet services and applications over computer networks, posing a threat to the service’s availability and consumers’ privacy. A network Intrusion Detection System (IDS) aims to detect aberrant traffic behavior that firewalls cannot detect. In IDSs, dimens...
Chapter
Full-text available
As COVID-19 pandemic emerged, quick decisions in response to sudden emergence and rapid spread around the world were required. Strict actions deployed to tackle the COVID-19 pandemic are likely to have prevented millions of additional infections and reduce the number of fatalities during the pandemic. The actions varied from one country or territor...
Article
The surge in cyber-attacks has driven demand for robust Intrusion detection systems (IDSs) to protect underlying data and sustain availability of network services. Detecting and classifying multiple type of attacks requires robust machine learning approaches that can analyze network traffic and take appropriate measures. Traffic data usually consis...
Conference Paper
Social media has played a significant role in marketing and advertising. Monitoring the attitude of customers and analyzing their written sentiments to evaluate their opinions toward a particular product, topic or situation becomes essential to improve the product quality and customer services. Due to the importance of sentiment analysis (SA), a pl...
Article
Full-text available
Maximum Flow Problem (MFP) is considered as one of several famous problems in directed graphs. Many researchers studied MFP and its applications to solve problems using different techniques. One of the most popular algorithms that are employed to solve MFP is Ford-Fulkerson algorithm. However, this algorithm has long run time when it comes to appli...
Research Proposal
Full-text available
The 0/1 Knapsack (KP) is a combinatorial optimization problem that can be solved using various optimization algorithms. Ant Colony System (ACS) is one of these algorithms that is operated iteratively and converged emphatically to a matured solution. The convergence of the ACS depends mainly on the heuristic patterns that are used to update the pher...
Article
Requirement engineering is the base phase of any software project, since this phase is concerned about requirements identification, processing and manipulation. The main source of these requirements is the project stakeholders with considering the project constraints and limitation. Number of requirement is varying for each project, so the requirem...
Preprint
Full-text available
Maximum Flow Problem (MFP) is deemed as one of several well-known basic problems in weighted direct graphs [9]. Moreover, it can be applied to many applications in computer engineering and computer science. This problem is solved by many techniques. Thus, this study presents a possible solution to the max flow problem (MFP) using a Whale Optimizati...
Preprint
In software projects, the requirement engineering phase is the base of any project and this phase is concerned in software requirements processes. Stakeholders are the main source of these requirements with respect of constraints and regulations. Requirements prioritization is considered as one of the most significant approach in the requirement en...
Conference Paper
Full-text available
In software projects, the requirement engineering phase is the base of any project and this phase is concerned in software requirements processes. Stakeholders are the main source of these requirements with respect of constraints and regulations. Requirements prioritization is considered as one of the most significant approach in the requirement en...
Article
Full-text available
Maximum Flow Problem (MFP) is deemed as one of several well-known basic problems in weighted direct graphs [9]. Moreover, it can be applied to many applications in computer engineering and computer science. This problem is solved by many techniques. Thus, this study presents a possible solution to the max flow problem (MFP) using a Whale Optimizati...
Article
A huge amount of useful information exists in web pages (internet). Day by day, Web information grows continuously and significantly. Many approaches for extracting information from the Web have been designed to solve a specific problem depending on web information. Web crawler is an approach to collect information from the internet. However, the w...
Article
Full-text available
Requirement prioritization is one of the most important approach in the process of requirement engineering due to use it in order to prioritize the execution sort of requirements with taking into account the viewpoints of stakeholders. Thus, in this study, grey wolf optimization (GWO) algorithm is applied in order to prioritize the requirements of...
Article
Full-text available
Requirement prioritization is one of the most important approach in the process of requirement engineering due to use it in order to prioritize the execution sort of requirements with taking into account the viewpoints of stakeholders. Thus, in this study, grey wolf optimization (GWO) algorithm is applied in order to prioritize the requirements of...
Article
Full-text available
Requirements prioritization is considered as one of the most important approaches in the requirement engineering process. Requirements prioritization is used to define the ordering or schedule for executing requirement based on their priority or importance with respect to stakeholders’ viewpoints. Many prioritization techniques for requirement have...
Article
Full-text available
The knapsack problem (KP01) in networks is investigated in this paper. A proposed algorithm is presented in order to find the best solution that maximizes the total carried value without exceeding a known capacity using Grey Wolf Optimization (GWO) and K-means clustering algorithms. GWO is a recently established meta-heuristics for optimization, in...

Questions

Questions (6)
Question
Dear Researchers,
I am working on a classification problem using metaheuristic algorithms.
the dataset is large contains about 3.6 million records.
what is the best technique that should I follow to use in Matlab and make a one-pass over all of it, for learning purposes?
Question
hello everyone
is it correct when I pre-process a dataset to replace NaN and Infinity values with assumed numbers, with considered the assumed numbers do not exist in the dataset?
example:
replace NaN with -10
and Infinity with 1000000000
or better to remove instances that contain these values?
Question
hello every one.
anyone can provide me a python code for employing evolutionary algorithms in extract features from Arabic text and how to use it in sentiment analysis?
Question
i want to view prioritization results applied to AHP technique for different size data sets
Question
I need the chain code for extract the shape of handgun inside black and white image.

Network

Cited By