Ayman Al-Dmour

Ayman Al-Dmour
Applied Science University · Computer Science

Professor

About

41
Publications
11,430
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
154
Citations
Introduction
Ayman Al-Dmour is a Professor of Computer Information Systems at Applied Science University (ASU) in Bahrain. His research interests are in the areas of Arabic language processing, data compression and computer education. At AHU, he led the Department of Computer Information Systems, the Computer and Information Technology Center and the College of Information Technology.
Additional affiliations
September 2016 - present
Al-Hussein Bin Talal University
Position
  • Professor (Full)
June 2014 - present
Al-Hussein Bin Talal University
Position
  • Professor (Associate)
September 2012 - June 2014
Taif University
Position
  • Professor (Associate)
Education
September 2003 - September 2006
Arab Academy for Banking and Financial Science
Field of study
  • Computer Information Systems
September 2001 - September 2003
Arab Academy for Banking and Financial Science
Field of study
  • Computer Information Systems
September 1988 - September 1993
Jordan University of Science and Technology
Field of study
  • Electronic/ Communication Engineering

Publications

Publications (41)
Article
Full-text available
Many techniques have been reported for handwriting-based writer identification. None of these techniques assume that the written text is in Arabic. In this paper we present a new technique for feature extraction based on hybrid spectral–statistical measures (SSMs) of texture. We show its effectiveness compared with multiple-channel (Gabor) filters...
Article
Full-text available
In Arabic, word extraction is particularly challenging because words are often divided into sub-words, and a few letters do not connect to the following letter. In this paper, we present an efficient method for extracting words from Arabic handwritten documents. The proposed method is based on two groups of spatial measures (the lengths of connecte...
Article
Full-text available
In this paper, we present a method for segmenting Arabic handwritten documents into text lines and words. Text line segmentation is addressed by a well-known technique, the horizontal projection profile, in which auto-correlation is used to enhance the self similarity of this profile. This technique promotes the estimation of text line spacing. Wor...
Article
Full-text available
Human writing is highly variable and inconsistent, and this makes the offline recognition of handwritten words extremely challenging. This paper describes a novel approach that can be employed for the offline recognition of handwritten Arabic words. Through conceptualizing each word as single, inseparable objects, the proposed approach aims to reco...
Article
Full-text available
This study presented a new Arabic text compression technique in which an input file is preprocessed to produce a new binary file. The preprocessing maps a codeword to each character based on its occurrences in the input file. The binary file is then compressed using a bit-wise Lempel-Ziv algorithm. The new technique has been implemented and examine...
Book
This book serves the need for developing an insight and understanding of the cutting-edge innovation in Cloud technology. It provides an understanding of cutting-edge innovations, paradigms, and security by using real-life applications, case studies, and examples. This book provides a holistic view of cloud technology theories, practices, and futu...
Article
Coronavirus disease 2019 (COVID 19) has adversely affected millions of people across the globe. Though, it is too early to predict the economic consequences of the pandemic. Within seven months of the first case detected in China, more than 600 thousand people have already lost their lives, more than 14.5 million people are directly affected by the...
Article
Full-text available
Line extraction is a critical step from one of the main sub-tasks of Document Image Analysis, which is layout analysis. This paper presents a new method for curvilinear text line extraction and straightening in Arabic handwritten documents. The proposed method is based on a strategy that consists of two distinct steps. First, text line is extracted...
Article
Security is one of the biggest challenges for secure data communication. As the need of mobile phones increased, people started using several mobile applications to handle the internet of things. On the other hand, the frequent use of mobile phones in business caught the attention of researchers to protect the manufacturers and customers. Handling...
Article
Full-text available
Given their importance in assessing the objectives of computing programs, capstone projects have been included in the present curriculum. Through these projects, the issues in software development practice are directly experienced by the students. This paper provided students with a full picture of these issues by using concept maps. To present a c...
Article
Full-text available
Background: Due to the wide spread of the smart phones around the world, a special demand occurs in the mobile marketing. Real time advertising is still challenging due to its hard requirements: Tracking of customer location, knowledge of customer interests, knowledge of advertisers data and the ability to efficiently provide the customer with avai...
Article
Full-text available
This study investigated university students’ preferences when the principles of constructivism are applied in their learning of programming languages with the use of information and communication technologies (ICTs) and the factors which influence these preferences.‎ The respondents for this study were 193 students from three courses teaching progr...
Article
Games are a standard and popular part of everyday life. Education experts are trying to connect learning strategies with computer games that students are familiar with. Educational computer games studies that tap into students’ love of games, in particular, those they play on computers and online, can be very effective. This paper introduces a comp...
Article
Full-text available
With dramatic increase in the mobile technology, the mobile cellular phones have played a significant role in the several fields particularly, education, military, business and health. The deployment of mobile phone in the Government has been of high interest of research community to improve fundamental functions, efficient information provision an...
Article
Full-text available
Image compression is an essential technique for saving time and storage space for the gigantic amount of data generated by images. This paper introduces an adaptive source-mapping scheme that greatly improves bit-level lossless grayscale image compression. In the proposed mapping scheme, the frequency of occurrence of each symbol in the original im...
Article
Full-text available
Falls are a major risk of injury for elderly aged 65 or over, blind people, people with balance disorder and leg weakness. In this regard, assistive technology which aims to identify fall events at real time can reduce the rate of impairments and mortality. This study offer a literature research reference value for bioengineers for further research...
Article
Educational experts are trying to connect learning strategies with computer games that students are familiar with. This paper introduces a comprehensive work for designing, developing and evaluation of an educational computer game that supports the learner in acquiring the skills necessary to construct entity relationship diagram (ERD). This topic...
Article
Full-text available
Use case analysis is a common technique used to ascertain the functional requirements of a software system. A use case diagram is a kind of Unified Modeling Language (UML) diagram created for use case analysis. Creating effective use cases can be a determining factor in building a system that meets users' needs. However, writing use cases is a diff...
Conference Paper
E-government plays an increasingly significant role in our day-to-day lives. Mobile government (m-Government) is a subset and extension of electronic government e-Government comprising of an alternative channel for governments to improve governments' fundamental functions and providing information and services. This paper introduces an interactive...
Article
Full-text available
Text compression methods where the original texts are directly mapped into binary domain are attractive to compress English text files. This paper proposes an intermediate mapping scheme in which the original English text is transformed firstly to decimal domain and then to binary domain. Each two-decimal-digit value in the resulting intermediate d...
Article
The purpose of this study is to examine the impact of visual-based instruction in teaching properties of relations for university's students. The research was conducted on a sample of 58 students. The students were divided evenly into two groups, experimental group and control group. The students in the control group were taught the properties usin...
Article
This article presents a recommender framework to provide personalised suggestions for learners taking introductory undergraduate courses. The framework utilises memory-based collaborative filtering algorithm combined with an imbedded web crawler to update learning material. The process of providing recommendation is divided into four steps: learner...
Article
Full-text available
Image compression is a key technology in the development of various multimedia and communication applications. In this paper, we have proposed a new algorithm of the image compression using byte compression technique. The encoding processes starts by implementing a modified decimal Run Length Encode (RLE). The RLE counts the occurrences of the pixe...
Article
Full-text available
This paper presents a new compression technique based on Run-Length Encoding scheme (RLE). The technique is semi-lossless and utilizes pixel value rather than bit value. The encoding process starts by mapping the colors of an image to a vector where each value of the vector is decimal ranging from 0 to 255. To maximize the efficiency of the decimal...
Article
Full-text available
Educators have a twofold challenge in teaching relational database design concepts: to deliver the theory of relational database and to provide students with practical skills to perform effectively in real life. This paper introduces a pedagogical approach based on Cognitive apprenticeship for teaching an undergraduate relational database course. T...
Article
Full-text available
This paper presents an efficient data compression technique based on using Lempel-Ziv coding algorithms such as the LZ-78 algorithm. The conventional LZ-78 algorithm was applied directly to a non-binary information source (i.e., original source) with a large number of alphabets (such as 256 characters in English text). However, this modified techni...
Article
Full-text available
Educational institutions face financial challenges in maintaining and upgrading traditional physical laboratories. Moreover, university students have challenges in understanding the theoretical issues involved in communication and networking courses. This paper presents a new computer-aided laboratory to help the students to enhance the practical v...
Article
Full-text available
This paper proposes an efficient text compression technique based on dynamic source encoding scheme using Lempel-Ziv algorithms. A statistical analysis is performed to count the occurrence of each character in the original source. Accordingly, each character is replaced by a weighted fixed-length code in lieu of arbitrary codes such as ASCII. This...
Conference Paper
Arabic texture letters usually have multi-orientations compare to Latin ones. Thus, identifying the writers of Arabic handwriting (AH) texture is a challenge. This study presents an effective technique for AH descriptor. This technique has been implemented based on Steerable filters which are powerful in directional edge detection. A high identific...
Article
This paper presents an efficient numerical technique to find exact solutions to the linear Fredholm second kind integral equations. The proposed technique enhances the fixed-point iterative method by utilizing the Aitken acceleration one. Aitken method is known to rapidly converge to an exact solution, for such computation intensive equations, in f...
Chapter
In this introductory chapter, we present an evolutionary-based technique for designing one-dimensional and two-dimensional Finite Impulse Response (FIR) filters. Typically, the required filter has a given set of specifications to be met. The specifications may include cut-off frequency, band-stop region, band-pass region and ripple factors. The evo...
Conference Paper
Full-text available
This paper presents some recent initiatives in implementing e-services to meet administrative and academic needs at Al-Hussein Bin Talal University in Jordan. The university is facing a set of challenges while empowered with a set of opportunities. The crucial challenge is the limited fund and capital investments. While the availability of highly-s...

Network

Cited By

Projects

Projects (3)
Project
building a light weight solution for transmitting video contents via wireless networks to fit real-time advertising applications. The solution should provide some level of security and should have an ability to visualize the video contents.
Project
Classification of medical plant leaves based on texture features.