
Imad SalahUniversity of Jordan | UJ · Department of Computer Science
Imad Salah
Computer Netwrks and Complex Systems
About
21
Publications
9,767
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
134
Citations
Citations since 2017
Publications
Publications (21)
PSO is a remarkable tool for solving several optimisation problems, like global optimisation and many real-life problems. It generally explores global optimal solution via exploiting the particle-swarm's memory. Its limited properties on objective function's continuity along with the search space and its potentiality in adapting dynamic environment...
Time-series prediction is an important area that inspires numerous research disciplines for various applications, including air quality databases. Developing a robust and accurate model for time-series data becomes a challenging task, because it involves training different models and optimization. In this paper, we proposed and tested three machine...
Time-series is a sequence of observations that are taken sequentially over time. Modelling a system that generates a future value from past observations is considered as time-series forecasting system. Recurrent neural network is a machine learning method that is widely used in the prediction of future values. Due to variant improvements on recurre...
In this paper, we extend a temporal defeasible logic with a modal operator Committed to formalize commitments that agents undertake as a consequence of communicative actions (speech acts) during dialogues. We represent commitments as modal sentences. The defeasible dual of the modal operator Committed is a modal operator called Exempted. The logica...
Accreditation is a process of evaluating business activities based upon a set of pre-determined standards. Hospitals and health care centers seek international and local accreditations to win the confidence of patients and increase a competitive edge in the health services. Hospitals and health care centers do great efforts to achieve international...
Mobility metrics of wireless networks such as link availability, number of neighboring nodes, link duration, link state, and link stability make it difficult to provide a node with quality of services guarantee. In previous research on Quality of Service (QoS) for cellular networks especially for handling handoff connections, the design was based o...
Recent development in sensor technologies makes wireless sensor networks (WSN) very popular in the last few years. A limitation of most popular sensors is that sensor nodes have a limited battery capacity that leads to lower the lifetime of WSN. For that, it raises the need to develop energy efficient solutions to keep WSN functioning for the longe...
PL/SQL is the most common language for ORACLE database application. It allows the developer to create stored pro-gram units (Procedures, Functions, and Packages) to improve software reusability and hide the complexity of the execu-tion of a specific operation behind a name. Also, it acts as an interface between SQL database and DEVELOPER. Therefore...
Recent years have witnessed the movement of many applications from the traditional closed environments into open ones. These applications, which are being accessed via web browsers, usually offer a great amount of information and services. Open environments and content explosion may affect the usability of web applications, where usability measures...
To design a medical decision support system (MDSS) that would accurately predict the rehabilitation protocols prescribed by the physicians for patients with knee osteoarthritis (OA) using only their demographic and clinical characteristics. The demographic and clinical variables for 170 patients receiving one of three treatment protocols for knee O...
In this paper, we will introduce a new method to achieve the fair distribution of data among distributed memories in a distributed system. Some processes consume larger amount of heap spaces [1] in its local memory than the others. So, those processes may use the virtual memory and may cause the thrashing problem [2].At the same time, the rest of h...
Interests in Mobile Agents (MA) are rising because there are several benefits which can be associated with their employment. In this paper we propose a Mobile Agent-based Information Sharing Technique (MA-IST) to help knowledge workers and information seekers to search for and share specific information scattered around a network of nodes. We shall...
In surveillance systems, video cameras record specific scenes for long times. However, by the end of the recording period, such tapes may hold many useless scenes which need to be eliminated In order to reduce the time in reviewing these worthless scenes while seeking for a specific object, an approximation technique must be considered. In this art...
The problem of partitioning a large number of entities into a fixed number of groups on the basis of a set of attributes associated with each entity has required an intensive research work in the literature. We have investigated a previous research related to this problem and proposed a method that is based on fuzzy clustering techniques. Jordan Un...
Finding fast algorithms to detect outliers (as unusual objects) by their distance to neighboring objects is a big desire. Two algorithms were proposed to detect outliers quickly. The first was based on the Partial Distance (PD) algorithm and the second was an improved version of the PD algorithm. It was found that the proposed algorithms reduced th...
The Tree-hypercubes network TH(s, d) is an interconnection network that is recursively defined and has excellent properties for scalable message passing computer systems. In this study we describe the ability of a TH(s, d) to implement algorithms that use the communication pattern of linear array and a ring to formulate a Hamiltonian cycle. We prop...
This paper investigates the improvement of the performance when using Real Time Unit (RTU) in a busbased multiprocessor system through the comparison and analysis of the simulation results of multiprocessor systems, one without RTU and the others with RTU using different scheduling algorithms. Experiments show how these scheduling algorithms affect...
In this paper some of the most common attacks against Rivest, Shamir, and Adleman (RSA)cryptosystem are presented. We describe the integer factoring attacks, attacks on the underlyingmathematical function, as well as attacks that exploit details in implementations of the algorithm.Algorithms for each type of attacks are developed and analyzed by th...
In this paper, we describe the use of the Ada language for programming in modern cluster systems. The results of experimental performance analysis of Ada and Java programs in a real cluster systems based on dual SMP nodes are presented.