Imad Salah

Imad Salah
University of Jordan | UJ · Department of Computer Science

Computer Netwrks and Complex Systems

About

21
Publications
9,767
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
134
Citations
Citations since 2017
4 Research Items
76 Citations
2017201820192020202120222023051015
2017201820192020202120222023051015
2017201820192020202120222023051015
2017201820192020202120222023051015

Publications

Publications (21)
Article
PSO is a remarkable tool for solving several optimisation problems, like global optimisation and many real-life problems. It generally explores global optimal solution via exploiting the particle-swarm's memory. Its limited properties on objective function's continuity along with the search space and its potentiality in adapting dynamic environment...
Article
Full-text available
Time-series prediction is an important area that inspires numerous research disciplines for various applications, including air quality databases. Developing a robust and accurate model for time-series data becomes a challenging task, because it involves training different models and optimization. In this paper, we proposed and tested three machine...
Article
Time-series is a sequence of observations that are taken sequentially over time. Modelling a system that generates a future value from past observations is considered as time-series forecasting system. Recurrent neural network is a machine learning method that is widely used in the prediction of future values. Due to variant improvements on recurre...
Article
Full-text available
In this paper, we extend a temporal defeasible logic with a modal operator Committed to formalize commitments that agents undertake as a consequence of communicative actions (speech acts) during dialogues. We represent commitments as modal sentences. The defeasible dual of the modal operator Committed is a modal operator called Exempted. The logica...
Data
Full-text available
Accreditation is a process of evaluating business activities based upon a set of pre-determined standards. Hospitals and health care centers seek international and local accreditations to win the confidence of patients and increase a competitive edge in the health services. Hospitals and health care centers do great efforts to achieve international...
Data
Full-text available
Mobility metrics of wireless networks such as link availability, number of neighboring nodes, link duration, link state, and link stability make it difficult to provide a node with quality of services guarantee. In previous research on Quality of Service (QoS) for cellular networks especially for handling handoff connections, the design was based o...
Data
Full-text available
Recent development in sensor technologies makes wireless sensor networks (WSN) very popular in the last few years. A limitation of most popular sensors is that sensor nodes have a limited battery capacity that leads to lower the lifetime of WSN. For that, it raises the need to develop energy efficient solutions to keep WSN functioning for the longe...
Data
Full-text available
PL/SQL is the most common language for ORACLE database application. It allows the developer to create stored pro-gram units (Procedures, Functions, and Packages) to improve software reusability and hide the complexity of the execu-tion of a specific operation behind a name. Also, it acts as an interface between SQL database and DEVELOPER. Therefore...
Conference Paper
Full-text available
Recent years have witnessed the movement of many applications from the traditional closed environments into open ones. These applications, which are being accessed via web browsers, usually offer a great amount of information and services. Open environments and content explosion may affect the usability of web applications, where usability measures...
Article
Full-text available
To design a medical decision support system (MDSS) that would accurately predict the rehabilitation protocols prescribed by the physicians for patients with knee osteoarthritis (OA) using only their demographic and clinical characteristics. The demographic and clinical variables for 170 patients receiving one of three treatment protocols for knee O...
Conference Paper
In this paper, we will introduce a new method to achieve the fair distribution of data among distributed memories in a distributed system. Some processes consume larger amount of heap spaces [1] in its local memory than the others. So, those processes may use the virtual memory and may cause the thrashing problem [2].At the same time, the rest of h...
Article
Full-text available
Interests in Mobile Agents (MA) are rising because there are several benefits which can be associated with their employment. In this paper we propose a Mobile Agent-based Information Sharing Technique (MA-IST) to help knowledge workers and information seekers to search for and share specific information scattered around a network of nodes. We shall...
Conference Paper
Full-text available
In surveillance systems, video cameras record specific scenes for long times. However, by the end of the recording period, such tapes may hold many useless scenes which need to be eliminated In order to reduce the time in reviewing these worthless scenes while seeking for a specific object, an approximation technique must be considered. In this art...
Article
Full-text available
The problem of partitioning a large number of entities into a fixed number of groups on the basis of a set of attributes associated with each entity has required an intensive research work in the literature. We have investigated a previous research related to this problem and proposed a method that is based on fuzzy clustering techniques. Jordan Un...
Article
Finding fast algorithms to detect outliers (as unusual objects) by their distance to neighboring objects is a big desire. Two algorithms were proposed to detect outliers quickly. The first was based on the Partial Distance (PD) algorithm and the second was an improved version of the PD algorithm. It was found that the proposed algorithms reduced th...
Article
Full-text available
The Tree-hypercubes network TH(s, d) is an interconnection network that is recursively defined and has excellent properties for scalable message passing computer systems. In this study we describe the ability of a TH(s, d) to implement algorithms that use the communication pattern of linear array and a ring to formulate a Hamiltonian cycle. We prop...
Article
This paper investigates the improvement of the performance when using Real Time Unit (RTU) in a busbased multiprocessor system through the comparison and analysis of the simulation results of multiprocessor systems, one without RTU and the others with RTU using different scheduling algorithms. Experiments show how these scheduling algorithms affect...
Article
Full-text available
In this paper some of the most common attacks against Rivest, Shamir, and Adleman (RSA)cryptosystem are presented. We describe the integer factoring attacks, attacks on the underlyingmathematical function, as well as attacks that exploit details in implementations of the algorithm.Algorithms for each type of attacks are developed and analyzed by th...
Conference Paper
Full-text available
In this paper, we describe the use of the Ada language for programming in modern cluster systems. The results of experimental performance analysis of Ada and Java programs in a real cluster systems based on dual SMP nodes are presented.

Network

Cited By