Aladdin Ayesh

Aladdin Ayesh
De Montfort University | DMU · Faculty of Computing, Engineering and Media

PhD in Artificial Intelligence, CEng, FBCS, SMIEEE

About

211
Publications
55,485
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,131
Citations

Publications

Publications (211)
Article
In location-based services (LBSs), the service is provided based on the users’ locations through location determination and mobility realization. Most of the current location prediction research is focused on generalized location models, where the geographic extent is divided into regular-shaped cells. These models are not suitable for certain LBSs...
Article
Full-text available
Supervising a student's resolution of an arithmetic word prob- lem is a cumbersome task. Dfferent students may use different lines of reasoning to reach the final solution, and the assistance provided should be consistent with the resolution path that the student has in mind. In addition, further learning gains can be achieved if the previous stude...
Article
Emotions have been subject of research and deliberation in philosophy and psychology mainstream for a long time. In contrast, emotions have only emerged in artificial intelligence research as a serious topic in the last two decades. Year 2000, in particular, experienced a shift in attitude towards emotions and their relationship to human reasoning...
Article
Arabic is a widely spoken language but few mining tools have been developed to process Arabic text. This paper examines the crime domain in the Arabic language (unstructured text) using text mining techniques. The development and application of a Crime Profiling System (CPS) is presented. The system is able to extract meaningful information, in thi...
Article
In this work we are presenting the design of an intelligent hybrid optimization algorithm which is based on Evolutionary Computation and Swarm Intelligence to increase the life time of mobile wireless sensor networks (WSNs). It is composed of two phases; Phase-1 is designed to divide the sensor nodes into independent clusters by using Genetic Algor...
Article
Full-text available
Motivation to engage in learning is essential for learning performance. Learners’ motivation is traditionally assessed using self-reported data, which is time-consuming, subjective, and interruptive to their learning process. To address this issue, this paper proposes a novel framework for multimodal assessment of learners’ motivation in e-learning...
Article
Full-text available
In recent years, data-enabled technologies have intensified the rate and scale at which organisations collect and analyse data. Data mining techniques are applied to realise the full potential of large-scale data analysis. These techniques are highly efficient in sifting through big data to extract hidden knowledge and assist evidence-based decisio...
Article
The development of Brain-Computer Interfaces (BCI) gathers experts and specialists in various fields, such as engineering, computer science, medicine, or cognitive neuroscience. Each of these disciplines has specific terminology, which makes mutual understanding and research collaboration difficult. The IEEE P2731 working group aims to improve comm...
Article
In this paper, we review the gap between high-level principles aimed at responsible uses of AI and the translation of those principles into effective practices. We review six potential explanations for the gap: tensions related to organizational incentives and values, a need to make sense of the complexity of AI's impacts, disciplinary divides in u...
Chapter
Data mining techniques are highly efficient in sifting through big data to extract hidden knowledge and assist evidence-based decisions. However, it poses severe threats to individuals’ privacy because it can be exploited to allow inferences to be made on sensitive data. Researchers have proposed several privacy-preserving data mining techniques to...
Preprint
Full-text available
Companies have considered adoption of various high-level artificial intelligence (AI) principles for responsible AI, but there is less clarity on how to implement these principles as organizational practices. This paper reviews the principles-to-practices gap. We outline five explanations for this gap ranging from a disciplinary divide to an overab...
Preprint
Full-text available
Artificial intelligence (AI) enabled products and services are becoming a staple of everyday life. While governments and businesses are eager to enjoy the benefits of AI innovations, the mixed impact of these autonomous and intelligent systems on human well-being has become a pressing issue. This article introduces one of the first international st...
Preprint
Full-text available
In the last decade, social networks became most popular medium for communication and interaction. As an example, micro-blogging service Twitter has more than 200 million registered users who exchange more than 65 million posts per day. Users express their thoughts, ideas, and even their intentions through these tweets. Most of the tweets are writte...
Chapter
Online Social networks are widely used in current times. In this paper, we investigate twitter posts to identify features that feed in intention mining calculation. The posts features are divided into three sets: tweets textual features, users features, and network contextual features. In this paper, our focus is on tweets analysing textual feature...
Article
This research aims to identify a feasible model to predict a learner’s stress in an online learning platform. It is desirable to produce a cost-effective, unobtrusive and objective method to measure a learner’s emotions. The few signals produced by mouse and keyboard could enable such solution to measure real-world individual’s affective states. It...
Conference Paper
Network Access Control (NAC) systems manage the access of new devices into enterprise networks to prevent unauthorised devices from attacking network services. The main difficulty with this approach is that NAC cannot detect abnormal behaviour of devices connected to an enterprise network. These abnormal devices can be detected using outlier detect...
Preprint
Full-text available
In our connected world, services are expected to be delivered at speed through multiple means with seamless communication. To put it in day to day conversational terms, 'there is an app for it' attitude prevails. Several technologies are needed to meet this growing demand and indeed these technologies are being developed. The first noteworthy is In...
Preprint
Full-text available
This paper aims to question the suitability of the Turing Test, for testing machine intelligence, in the light of advances made in the last 60 years in science, medicine, and philosophy of mind. While the main concept of the test may seem sound and valid, a detailed analysis of what is required to pass the test highlights a significant flow. Once t...
Article
Full-text available
The emergence of the Internet of Things (IoT) has lead to a technological transformation that integrates several technologies to represent the future of computing and communications. IoT is the interconnection of internet of computing devices embedded in objects such as sensors, actuators and networks enabling them to send and receive data. Bring Y...
Article
Full-text available
This paper presents a novel approach to detection of malicious network traffic using artificial neural networks suitable for use in deep packet inspection based intrusion detection systems. Experimental results using a range of typical benign network traffic data (images, dynamic link library files, and a selection of other miscellaneous files such...
Article
Full-text available
This paper investigates the possibility of identifying classes by clustering. This study includes employing Self-Organizing Maps (SOM) in identifying clusters from EEG signals that could then be mapped to emotional classes. Beginning by training varying sizes of SOM with the EEG data provided from the public dataset: DEAP. The produced graphs showi...
Conference Paper
Student's motivation and engagement difficulties are present in higher education. Between many technologies to increase student motivation and engagement, we found that Gamification technique is the most suitable case. This paper presents our experiment of using Gamification in learning process and based on the use of the Agile methodology in-order...
Conference Paper
With the rapid increase in smartphones and tablets, Bring Your Own Devices (BYOD) has simplified computing by introducing the use of personally owned devices. These devices can be utilised in accessing business enterprise contents and networks. The effectiveness of BYOD offers several business benefits like employee job satisfaction, increased job...
Conference Paper
Most previous work in emotion recognition has fixed the available classes in advance, and attempted to classify samples into one of these classes using a supervised learning approach. In this paper, we present preliminary work on combining supervised and unsupervised learning to discover potential latent classes which were not initially considered....
Chapter
Over the past decades, research in affective learning has begun to take emotions into account, which advocates an education system that is sentient of learner’s cognitive and affective states, as learners’ performance could be affected by emotional factors. This exploratory research examines the impacts of mental arithmetic demand and external stim...
Conference Paper
Full-text available
Students with dyslexia often suffer from the lack of academic self-worth and frustration that can even lead to learned helplessness. However, few studies have investigated the impact of incorporating users' motivational factors into user modeling to enhance the learning experience for students with dyslexia. In this paper we attempt to develop a co...
Conference Paper
A modern Intelligent Tutoring System (ITS) should be sentient of learner's cognitive and affective states, as learner's performance could be affected by motivational and emotional factors. It is important to design a low-cost and unobtrusive computational method for ITS to determine learner's states automatically. The automated learner's data sensi...
Article
Full-text available
This paper presents the application of Motivation/Attitude-driven Behavior (MADB) model proposed by Wang (Wang, 2007a) in the e-learning context. The authors' work demonstrates how mathematical models and formal cognitive processes is developed based on menu search task. The effects of menu design on stress perceptions, motivation and attitudes dur...
Conference Paper
Full-text available
ABSTRACT: The purpose of this case study was to explore a new learning strategy that benefits the students of mobile computing modules to engage and understand the mobile computing course through designing computer games which enhance their understandability concept. Games can be used within higher education in various ways to promote student parti...
Article
Learning environments, among other user-centred applications, are excellent candidates to trial Computational Emotions and their algorithms to enhance user experience and to expand the system usability. However, this was not feasible because of the paucity in affordable consumer technologies that support the requirements of systems with advanced co...
Article
Full-text available
This research aims at the development of a framework for designing a proposed admission system in the Saudi universities. This study is based on results of another paper that revealed that the current admission system in the Saudi universities needs to develop. This due to the current system for admission in Saudi universities is not comprehensive,...
Data
Full-text available
This issue (DOI: 10.13140/RG.2.1.1578.1843) includes the following articles; P1120838366 B. S. ANAMI and D. G. SAVAKAR Improved Method for Identification and Classification of Foreign Bodies Mixed Food Grains Image Samples P1120841394 K.Sri Rama Krishna and J.Lakshmi Narayana and L.Pratap Reddy Performance Evaluation of ANN Models for the Analysis...
Article
Full-text available
FEEDB is a multimodal database that contains recordings of people expressing different emotions, captured by using a Microsoft Kinect sensor. Data were originally provided in the device’s proprietary format (XED), requiring both the Microsoft Kinect Studio application and a Kinect sensor attached to the system to use the files. In this paper, we pr...
Conference Paper
Full-text available
This paper describes a case study of how Agent Oriented Agile Based (AOAB) development methodology was implemented in mobile computing module to create game as a part of the module assessment requirements. Games can be used in higher education in many ways to increase students participation, enable variation in how lectures are taught and to increa...
Article
Emotions have been subject of research and deliberation in philosophy and psychology mainstream for a long time. In contrast, emotions have only emerged in artificial intelligence research as a serious topic in the last two decades. Year 2000, in particular, experienced a shift in attitude towards emotions and their relationship to human reasoning...
Article
Utilising association rule discovery to learn classifiers in data mining is known as Associative Classification (AC). In the last decade, AC algorithms proved to be effective in devising high accurate classification systems from various types of supervised data sets. Yet, there are new emerging trends and that can further enhance the performance of...
Article
To build a personalized e-learning system that can deliver adaptive learning content based on student’s cognitive effort and efficiency, it is important to develop a construct that can help measuring perceived mental state, such as stress and cognitive load. The construct must be able to be quantified, computerized and automated. Our research inves...
Article
Past research found that cognitive effort is related to emotion, which negative emotion may influence task performance. To enhance learning experience, it is important to have an effective technique to measure user’s emotional and motivational affects for designing an adaptive e-learning system, rather than using a subjective method that is less re...
Conference Paper
This research aims at the development of a framework for designing a proposed admission system in the Saudi universities. This study is based on results of another paper that revealed that the current admission system in the Saudi universities needs to develop. This due to the current system for admission in Saudi universities is not comprehensive,...
Article
One should not ignore the fact that affect (or emotion) plays an important role in cognition and learning. For instance, badly designed interface brings negative impact on user's performance if the user does not find enjoyment in his or her overall experience with the system. Automatic analyses of user behaviour in adaptive e-learning system develo...
Conference Paper
Full-text available
Game development is very complex and the success of the game is based on the game development methods. The purpose of this paper is to investigate on the existing game development methods and provide an upcoming game development method that is based on predictive and adaptive development models. A critical analysis to Agile method which are mostly...
Article
Website phishing is considered one of the crucial security challenges for the online community due to the massive numbers of online transactions performed on a daily basis. Website phishing can be described as mimicking a trusted website to obtain sensitive information from online users such as usernames and passwords. Black lists, white lists and...
Conference Paper
The development of Microsoft Kinect opened up the research field of computational emotions to a wide range of applications, such as learning environments, which are excellent candidates to trial computational emotions based algorithms but were never feasible for given consumer technologies. Whilst Kinect is accessible and affordable technology it c...
Conference Paper
Automated stress detection is important in developing adaptive e-learning systems. Empirical evidence suggests that mouse dynamics and keyboard dynamics analyses can be both effective in user behaviour modelling as well as emotion detection compared to physiological measures and facial expression recognitions, and yet they are far less expensive an...
Conference Paper
Much research has been done to detect human emotion using various computational methods, such as physiological measures and facial expression recognition. These methods are effective but they could be expensive or intrusive as special setups of equipments are needed. Some researchers have utilized non-intrusive methods by using mouse or keyboard an...
Conference Paper
Full-text available
In general the evaluation phase serves as a cat-alyst in software development and particularly within games development. Hence, it plays a vital role in the formulation of an effective a game development methodology. This paper has investigated the evaluation phase and has focused on the provision of general heuristics sets to facilitate the evalua...
Article
Full-text available
Current associative classification (AC) algorithms generate only the most obvious class linked with a rule in the training data set and ignore all other classes. We handle this problem by proposing a learning algorithm based on AC called Multi-label Classifiers based Associative Classification (MCAC) that learns rules associated with multiple class...
Article
Full-text available
The more embedded and ubiquitous computing devices are introduced in everyday domestic applications, the more important the aesthetics of interfaces become. In this paper, our interest is the aesthetics of domestic robots as an example of buddy-ing physical devices. We report on observations of using Sony AIBO dogs in outreach programs to new and u...
Article
Aladdin Ayesh, CEng, FBCS, reader in artificial intelligence at De Montfort University, examines the subject of socially augmented environments and immersive simulators.
Conference Paper
Full-text available
Agile software development methodologies has become very common in game development methodologies. However, such methodologies must be adapted to different game genres. The purpose of this paper is to investigate the existing game development methodologies and provide a new game development methodology suitable for different game genres. Furthermor...
Conference Paper
Supervising a student's resolution of an arithmetic word problem is a cumbersome task. Di�erent students may use di�erent lines of reasoning to reach the nal solution, and the assistance provided should be consistent with the resolution path that the student has in mind. In addition, further learning gains can be achieved if the previous student's...
Conference Paper
Full-text available
Evaluation phase plays an important role in soft-ware development in general and in game development in partic-ular, thus it is an important part in designing a game development methodology. In the research presented here, evaluation phase has been investigated the user and expert evaluation in details. This paper focuses on providing general heuri...
Article
Full-text available
Learner centred design (LCD) focuses on creating an e-learning system that can fulfil individual needs through personalization,nevertheless there are still many technical challenges. Besides, losing balanced focus on both of the learners and the instructors does not help to create a successful e-learning system.User-centred design helps to improve...
Conference Paper
Full-text available
In general the evaluation phase serves as a catalyst in software development and particularly within games development. Hence, it plays a vital role in the formulation of an effective a game development methodology. This paper has investigated the evaluation phase and has focused on the provision of general heuristics sets to facilitate the evaluat...
Chapter
Full-text available
Over the last decade, many methodologies for developing agent based systems have been developed, however no complete evaluation frameworks have been provided. Agent Oriented Software Engineering (AOSE) methodologies enhance the ability of software engineering to develop complex applications such as games; whilst it can be difficult for researchers...
Chapter
Full-text available
The design and automation of a steel making process is getting more complex as a result of the advances in manufacturing and becoming more demanding in quality requirements. It is essential to have an intelligent business process model which brings consistent and outstanding product quality thus keeping the trust with the business stakeholders. Hen...
Conference Paper
Cellular communication networks have become medium to provide various services. Most of the services provided are based on the users’ locations, as in location-based services (LBSs); these services include both common voice services as well as multimedia and integrated data services. Used techniques mostly suffered from complex computation, accurac...
Conference Paper
Full-text available
Evaluation phase plays an important role in software development in general and in game development in particular, thus it is an important part in designing a game development methodology. In the research presented here, evaluation phase has been investigated the user and expert evaluation in details. This paper focuses on providing general heurist...
Book
During the 21st century business environments have become more complex and dynamic than ever before. Companies operate in a world of change influenced by globalisation, volatile markets, legal changes and technical progress. As a result, they have to handle growing volumes of data and therefore require fast storage, reliable data access, intelligen...
Conference Paper
Translation of word problems into symbolic notation is one of the most challenging steps in learning the algebraic method. This paper describes a domain-specific knowledge representation mechanism to support Intelligent Tutoring Systems (ITS) which focus on this stage of the problem solving process. The description language proposed is based on the...
Article
Full-text available
Associative classi ̄cation (AC) is a data mining approach that uses association rule discovery methods to build classi ̄cation systems (classi ̄ers). Several research studies reveal that AC normally generates higher accurate classi ̄ers than classic classi ̄cation data mining approaches such as rule in- duction, probabilistic and decision trees. Th...
Conference Paper
Associative classification (AC) is a combination of classification and association rule in data mining that has attracted several scholars due to its models simplicity and its effectiveness in predicting test cases. This paper investigates the impact of rule ranking before constructing the classifier in AC mining. We would like to experimentally co...
Book
Full-text available
Proceedings of the papers presented at the Symposium on "Revisiting Turing and his Test: Comprehensiveness, Qualia, and the Real World" at the 2012 AISB and IACAP Symposium that was held in the Turing year 2012, 2–6 July at the University of Birmingham, UK. Ten papers. - http://www.pt-ai.org/turing-test --- Daniel Devatman Hromada: From Taxonomy of...
Article
Many Artificial Intelligence (AI) techniques used in the new generation of games. This paper presents the most popular techniques such as finite state machine, fuzzy logic, neural networks, genetic algorithms, agent and machine learning. It, explains the most important AI requirement criterion needs to appear in games and how AI techniques could be...
Conference Paper
Full-text available
In location-based services (LBSs), the service is provided based on the users' locations through location determination and mobility realization. Several location prediction models have been proposed to enhance and increase the relevance of the information retrieved by users of mobile information systems, but none of them studied the relationship b...
Conference Paper
As integration processes have been intensified in the area of higher education, they should be supported by information technologies. A Combined Course Programmes (CCP) generation mechanism based on HTN planning was developed for a multi-agent system, managing the distributed e-Learning environment. The limitations of HTN planning were overcome by...