
Ahmad Abdel-Aziz ShariehUniversity of Jordan | UJ · Department of Computer Science
Ahmad Abdel-Aziz Sharieh
Doctor of Philosophy in Computer and Information Sciences, BSc in Mathematics, BSc in Computer Science, MS in Computer Science, and High Diploma in Higher Education
About
111
Publications
88,454
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,769
Citations
Introduction
Additional affiliations
Education
August 1987 - June 1991
September 1983 - August 1985
January 1982 - August 1983
Publications
Publications (111)
Cloud computing (CC) has become a hot study area as a result of the rapid development and movement of many services to the cloud environment. In order to minimize makespan, the task scheduling mechanism must allocate tasks to appropriate and obtainable virtual machines (VMs). In this research, a modified Orca optimization algorithm (MOOA) and a tas...
The problem of finding the shortest path between two nodes is a common problem that requires a solution in many applications like games, robotics, and real-life problems. Since its deals with a large number of possibilities. Therefore, parallel algorithms are suitable to solve this optimization problem that has attracted a lot of researchers from b...
Nowadays, people become more connected to the internet using their mobile devices. They tend to use their critical and sensitive data among many applications. These applications provide security via user authentication. Authentication by passwords is a reliable and efficient access control procedure, but it is not sufficient. Additional procedures...
Path-finding problem has several applications in our life and widely used in virtual environments. It has different goals such as shortest path, secure path, or optimal path. Path-finding problem deals with a large amount of data since it considers every point located in 2D or 3D scenes. The number of possibilities in such a problem is huge. Moreov...
Social media platforms allow users to share thoughts, experiences, and beliefs. These platforms represent a rich resource for natural language processing techniques to make inferences in the context of cognitive psychology. Some inaccurate and biased thinking patterns are defined as cognitive distortions. Detecting these distortions helps users res...
This survey is an effort to provide a research repository and a useful reference for researchers to guide them when planning to develop new Nature-inspired Algorithms tailored to solve Feature Selection problems (NIAs-FS). We identified and performed a thorough literature review in three main streams of research lines: Feature selection problem, op...
Due to the widespread of Internet services, all around the world, service providers are facing a major problem defending their systems, especially from new breaches and attacks. Network Intrusion Detection System (NIDS) analyzes network packets and reports low-level security violations to system administrators. In large networks, these reports beco...
In this work, an enhanced moth flame optimization (MFO) algorithm is proposed as a search strategy within a wrapper feature selection (FS) framework. It aims mainly to improve the classification tasks in medical applications. FS is an NP-hard problem because the run time of its procedure grows exponentially. The persistent necessity for a powerful...
As COVID-19 pandemic emerged, quick decisions in response to sudden emergence and rapid spread around the world were required. Strict actions deployed to tackle the COVID-19 pandemic are likely to have prevented millions of additional infections and reduce the number of fatalities during the pandemic. The actions varied from one country or territor...
Purpose
Sea Lion Optimization (SLnO) algorithm involves the ability of exploration and exploitation phases, and it is able to solve combinatorial optimization problems. For these reasons, it is considered a global optimizer. The scheduling operation is completed by imitating the hunting behavior of sea lions.
Design/methodology/approach
Cloud comp...
This paper proposes an effective wrapper approach by integrating the Levy flight and evolutionary selection operators into the Moth Flame Optimization (MFO) algorithm. The main purpose is to solve the Feature Selection (FS) problem in medical applications. FS is used as a preprocessing step in a data mining process to improve the performance of the...
Cloud computing systems are considered complex systems, because of the various classes of services offered for users and the big challenges for providers to meet the increasing demands. Thus, service allocation is a critical issue in cloud computing. Fuzzy modeling is one choice to deal with such complexity. In this paper, the authors introduce a n...
Microarray technology is a major shift in the medical and diagnostic fields. Gene expression data are coded by a large number of genes and a limited number of patient's samples. This causes a challenging problem for the gene selection (GS) methods to specify the most relevant and reliable genes for cancer diagnosis. Recently, meta-heuristic (MH) al...
In this paper, a new feature selection (FS) approach is proposed based on the Moth Flame Optimization (MFO) algorithm with time-varying flames number strategies. FS is a data preprocessing technique that is applied to minimize the number of features in a data set to enhance the performance of the learning algorithm (e.g classifier) and reduce the l...
Gene selection (GS) is a challenging problem in medical applications. This is because of the availability of a large number of genes and a limited number of patient's samples in microarray datasets. Selecting the most relevant genes is a necessary pre-processing step for building reliable cancer classification systems. This paper proposes two new f...
Heuristic search is a search process that uses domain knowledge in heuristic rules or procedures to direct the progress of a search algorithm. Hill climbing is a heuristic search technique for solving certain mathematical optimization problems in the field of artificial intelligence. In this technique, starting with a suboptimal solution is compare...
Continuous data transmission in wireless sensor networks (WSNs) is one of the most important characteristics which makes sensors prone to failure. a backup strategy needs to co-exist with the infrastructure of the network to assure that no data is missing. The proposed system relies on a backup strategy of building a history file that stores all co...
Objectives Propose a new wrapper-based FS approach to enhance the diagnosis of diseases.
Feature selection plays a vital role in building machine learning models. Irrelevant features in data affect the accuracy of the model and increase the training time needed to build the model. Feature selection is an important process to build Intrusion Detection System (IDS). In this paper, a wrapper feature selection algorithm for IDS is proposed...
In the last two decades, widespread attention has been paid in parallelizing algorithms, such as sorting and searching, for computationally intensive applications. Several interconnection networks were demonstrated for that purpose; such as hypercube and Hyper Hexa-Cell (HHC). However, the leverage of optical links in Optical Transpose Interconnect...
The limitations in terms of power and processing in IoT (Internet of Things) nodes make nodes an easy prey for malicious attacks, thus threatening business and industry. Detecting malicious nodes before they trigger an attack is highly recommended. The paper introduces a special-purpose IoT crawler that works as an inspector to catch malicious node...
In the scope of evaluation methodologies for Internet of Things (IoT) systems, some approaches concern security, while others latency. However, some methodologies evaluate systems that contain active entities, so-called actuators. In this paper, we propose a novel methodology for evaluating such systems with actuator components using Graph Represen...
Multiple variants of the Binary Moth Flame Optimization Algorithm (BMFO) based on chaotic maps are introduced and compared as search strategies in a wrapper feature selection (FS) framework.
Feature selection is a necessary critical stage in data mining process. There is always an arm race to build frameworks and libraries that ease and automate this process. In this chapter, an EvoloPy-FS framework is proposed, which is a Python open-source optimization framework that includes several well-regarded swarm intelligence (SI) algorithms....
An Efficient Moth Flame Optimization Algorithm using Chaotic Mapsfor Feature Selection in the Medical ApplicationsRuba Abu Khurma, Ibrahim Aljarah and Ahmad ShariehKing Abdullah II School for Information Technology, The University of Jordan, Amman, JordanKeywords:Moth Flame Optimization Algorithm (MFO), Dimensionality Problem, Classification, Optim...
Providing a solution for the link prediction problem attracts several computer science fields and becomes a popular challenge in researches. This challenge is presented by introducing several approaches keen to provide the most precise prediction quality within a short period of time. The difficulty of the link prediction problem comes from the spa...
Nowadays, most users access internet through mobile applications. The common way to authenticate users through websites forms is using passwords; while they are efficient procedures, they are subject to guessed or forgotten and many other problems. Additional multi modal authentication procedures are needed to improve the security. Behavioral authe...
Finding similar or related Android applications is a feature in popular search engines. An app's appearance is usually the first indicator of similarity. In this paper, the impact of GUI similarity for Android applications in measuring their functional similarity is evaluated. Accordingly, a number of Android applications will be analyzed to identi...
This paper suggests a new nature inspired metaheuristic optimization algorithm which is called Sea Lion Optimization (SLnO) algorithm. The SLnO algorithm imitates the hunting behavior of sea lions in nature. Moreover, it is inspired by sea lions' whiskers that are used in order to detect the prey. SLnO algorithm is tested with 23 well-known test fu...
Independent task scheduling is considered one of the most popular issues in cloud computing environment. This study proposes a new metaheuristic optimization algorithm, which is called vocalization of humpback whale optimization algorithm (VWOA). The VWOA mimics the vocalization behavior of humpback whales, and it is employed to improve task schedu...
Fingerprints are considered as the oldest and most widely used in the world for biometric identification. Every person has unique and permanent fingerprints. Most automatic fingerprint recognition systems are based on features formed from lines known as minutiae. Building a database of unique minutiae is very important in the security systems becau...
Heuristic local search algorithms have achieved good results in tackling combinatorial optimization problems, such as Travelling Salesman Problem (TSP). One of the well-known local search algorithms is the 2-opt algorithm. As a local search algorithm, 2-opt has achieved approximate optimal solutions for TSP within a reasonable time, especially for...
Several algorithms were introduced in data encryption and decryptionsto protect threats and intruders from stealing and destroying data. A DNA cryptography is a new concept that has attracted great interest in the information security.In this paper, we propose a new enhanced polyalphabetic cipher algorithm (EPCA) as enhanced algorithm for the Vigen...
This study presents a solution to a problem commonly known as link prediction problem. Link prediction problem interests in predicting
the possibility of appearing a connection between two nodes of a network, while there is no connection between these nodes in the present state of the network. Finding a solution to link prediction problem attracts...
Moth Flame Optimization (MFO) is one of the meta-heuristic algorithms that recently proposed. MFO is inspired from the method of moths' navigation in natural world which is called transverse orientation. This paper presents an improvement of MFO algorithm based on Golden Section Search method (GSS), namely GMFO. GSS is a search method aims at locat...
Several algorithms were introduced in data encryption and decryptionsto protect threats and intruders from stealing and destroying data. A DNA cryptography is a new concept that has attracted great interest in the information security.In this paper, we propose a new enhanced polyalphabetic cipher algorithm (EPCA) as enhanced algorithm for the Vigen...
Abstract- Several algorithms were introduced in data encryption and decryptionsto protect threats and intruders from stealing and destroying data. ADNA cryptography is a new concept that has attracted great interest in the information security.In this paper, we proposea new enhanced polyalphabetic cipher algorithm (EPCA) as enhancedalgorithm for th...
Cloud computing offers opportunities to access remote physical and virtual resources. Due to the continuing development of cloud computing, many challenges face this technology. One of these challenges is tasks scheduling. It refers to the process of allocating users’ tasks to virtual machines (VMs) with a goal of minimizing the turnaround time and...
The chapter provides a concerted framework in which SUC has achieved its mission on promoting research culture among faculty members and students. The chapter provides the chronological portrayal of a SUC developed effective strategic plan with different components, how it has been successfully executed, and how it has achieved the defined results...
Maximum Flow Problem (MFP) is deemed as one of several well-known basic problems in weighted direct graphs [9]. Moreover, it can be applied to many applications in computer engineering and computer science. This problem is solved by many techniques. Thus, this study presents a possible solution to the max flow problem (MFP) using a Whale Optimizati...
Maximum Flow Problem (MFP) is deemed as one of several well-known basic problems in weighted direct graphs [9]. Moreover, it can be applied to many applications in computer engineering and computer science. This problem is solved by many techniques. Thus, this study presents a possible solution to the max flow problem (MFP) using a Whale Optimizati...
DNA sequence approximate matching is one of the main challenges in Bioinformatics. Despite the evolution of new technology, there is still a need for new algorithms that accommodate the huge amount of Bioinformatics data. In this paper, a parallel n-gram approach is proposed with a method that is taking in mind the variety of DNA sequence lengths f...
With the widespread deployment of mobile networks, wireless communications are increasingly preferred both by ordinary users and researchers working on mobile applications communication. Securing a wireless connection is essential since an eavesdropper might interrupt a connection to collect data illegitimately, or interfere with the transmission b...
Over the past years, researchers drew their attention to propose optoelectronic architectures, including optical transpose interconnection system (OTIS) networks. On the other hand, there are limited attempts devoted to design parallel algorithms for applications that could be mapped on such optoelectronic architectures. Thus, exploiting the attrac...
Cloud computing systems are considered complex systems, because of the various classes of services offered for users and the big challenges for providers to meet the increasing demands. Thus, service allocation is a critical issue in cloud computing. Fuzzy modeling is one choice to deal with such complexity. In this paper, the authors introduce a n...
Phishing is stealing users' confidential information by uploading a fake website that claims to be of another. Such a web site contains special features that aid an automatic classification of it as phishing one. However, there is no single feature that to be used to identify the phishing web-sites. Subsequently, the properties of phishing website...
The problem of getting the maximum flow from source to destination in networks is investigated in this paper. A proposed algorithm is presented in order to solve Maximum Flow problem by using Grey Wolf Optimization
(GWO). The GWO is a recently established meta-heuristics for optimization, inspired by grey wolves (Canis Lupus). In addition; in this...
Cloud Computing can be considered a type of internet based service provider, where resources can be shared among users. Transparency, for example, is a key issue in Cloud Computing, where the clients are unaware of the source of the service requested. Cloud Computing services can be in the form of computing, storage and other applications, and othe...
The efficiency of matrix multiplication is a popular research topic given that matrices compromise large data in computer applications and other fields of study. The proposed schemes utilize data blocks to balance processing overhead results from a small mapper set and I/O overhead results from a large mapper set. Balancing between the two processi...
Mutual exclusion in distributed systems is a critical feature required to coordinate access to shared resources. It is highly needed to be employed in distributed systems including mobile computing environments. Dynamic Resource Synchronizer algorithm (DRS) works on decreasing the amount of messages that transferred in the system by minimizing the...
Mutual exclusion in distributed systems is a critical
feature required to coordinate access to shared resources. It is
highly needed to be employed in distributed systems including
mobile computing environments. Dynamic Resource
Synchronizer algorithm (DRS) works on decreasing the amount
of messages that transferred in the system by minimizing the...
Phishing web-sites can cause the loss of thousands of dollars and leads to the damage of the brand image of organizations. Thus, automatic filtering of phishing web-site becomes a necessity. This paper presents a phishing detection technique based on Fuzzy Inference Process. The proposed phishing detection has rules for converting the input feature...
Urban sprawl on agricultural lands is considered as one of the major problems that agricultural sector can face, especially in Irbid city. Irbid city, which is located at the north of Jordan, is one of the most important provinces in Jordan for the fertility of its soil. Most of its lands have clay soil which is suitable for cultivation of several...
Cloud Computing is a type of internet based service provider, where resources can be shared among users. Transparency is a key issue in CC, where clients are unaware of the source of the service requested. CC services can be in a form of applications, storage, and others. Services provided by different clouds differ in many criteria such as cost an...
Recently, most of people have their own profiles in different social networks. Usually, their profiles have some brief description about their personnel picture, family members, home town, career, date of birth etc. which indicate other people know some general information about others. In social networks, usually friends recommendation is done by...
This study presents an algorithm for MaxFlow
problem using "Chemical Reaction Optimization algorithm
(CRO)". CRO is a recently established meta-heuristics algorithm
for optimization, inspired by the nature of chemical reactions.
The main concern is to find the best maximum flow value at
which the flow can be shipped from the source node to the sink...
Computational models are one of the very powerful
tools for expressing everyday situations that are derived from
human interactions. In this paper, an investigation of the
problem of forming beneficial groups based on the members'
preferences and the coordinator's own strategy is presented . It is
assumed that a coordinator has a good intention beh...
Recently, most of people have their own profiles in different social networks. Usually, their profiles have some brief description about their personnel picture, family members, home town, career, date of birth etc. which indicate other people know some general information about others. In social networks, usually friends recommendation is done by...