Mohammad Ali H. Eljinini

Mohammad Ali H. Eljinini
Verified
Mohammad Ali verified their affiliation via an institutional email.
Verified
Mohammad Ali verified their affiliation via an institutional email.
  • Doctor of Philosophy
  • Professor (Associate) at Isra University

About

37
Publications
13,721
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
228
Citations
Introduction
My current research interests are e-Health, e-Learning, ontology, and the semantic web. Currently, I am working on a project with a colleague regarding the generation of collision-free random paths between two points, which has some applications with mobile robots and drones.
Current institution
Isra University
Current position
  • Professor (Associate)
Additional affiliations
September 2014 - present
Isra University
Position
  • Professor (Associate)
Description
  • Teaching Data Structures, Object-Oriented Paradigms, Visual Programming, Algorithm Analysis and Design, and other Computer Science Courses.
February 2013 - August 2016
Isra University
Position
  • Head of Faculty
February 2007 - August 2014
Isra University
Position
  • Professor (Assistant)
Description
  • Teaching Data Structures, Object-Oriented Paradigms, Visual Programming, Algorithm Analysis and Design, and other Computer Science Courses.
Education
January 2003 - January 2007
City, University of London
Field of study
  • Health Informatics

Publications

Publications (37)
Article
Full-text available
The transformer is a Deep Learning (DL) model that revolutionized language processing with its self-attention mechanism, enabling parallel processing and improving model efficiency, which dramatically reshaped the landscape of speech recognition technology, based on the ability to efficiently manage the dynamic and context-rich nature of speech. Th...
Article
Full-text available
Virtual and augmented reality (VR/AR), teleoperation, and telepresence technologies heavily depend on video streaming and playback to enable immersive user experiences. However, the substantial bandwidth requirements and file sizes associated with VR/AR and 360-degree video content present significant challenges for efficient transmission and stora...
Preprint
Full-text available
This paper discusses the increasing demand for energy due to population growth and civilization's rapid development and the negative impacts of using fossil fuels to generate energy, including greenhouse gas emissions and climate change. It highlights the vulnerability of the energy industry to climate change and its negative consequences on people...
Article
Full-text available
We have developed a Smart Classrooms Management System (SCMS) in our research work. The SCMS system provides a comprehensive solution to classroom management by employing smart devices, the Internet, and computer applications. The system has several components: classroom scheduling and access control, student attendance, and lecture management. The...
Article
Full-text available
In this research, we have developed a Smart Classrooms Management System (SCMS). The SCMS provides a comprehensive solution to classroom management through the engagement of smart devices, the Internet, and computer applications. The system consists of several components; these are classroom scheduling and access control, student attendance, and le...
Chapter
Full-text available
In this chapter, we introduce the subject of Linked Lists, their types, and their usages. We show how they are presented in the computer memory through programming examples. We present real applications that enrich our knowledge of linked lists. Linked lists are one of the main ingredients and basic blocks of data structures. We present linked list...
Chapter
Full-text available
This chapter aims to present the subject of arrays in general and arrays of objects in particular. Students and books are such objects that we presented in the second chapter in detail. For example, if we want to develop an application for recording student absences in the data structure course, we need a list that contains information about the st...
Article
Full-text available
This paper proposes a new training algorithm for artificial neural networks based on an enhanced version of the grey wolf optimizer (GWO) algorithm. The proposed model is used for classifying the patients of diabetes disease. The results showed that the proposed training algorithm enhanced the performance of ANNs with a better classification accura...
Article
There is a need for an efficient intrusion detection system (IDS) working over the network to detect the whole possible attacks. Intrusion detection is so much popular in the last two decades, where intruders attempted to break into or misuse the systems. There are many techniques used in intrusion detection for protecting computers and networks fr...
Book
Full-text available
Computers are made to process all sorts of data. Creating good software is an art that involves many steps. One of these steps is the design and implementation of data structures. This book comes to achieve this goal; to design and implement data structures that we can use in applications. The approach used in this book is very practical. Real-life...
Article
Full-text available
This paper proposes a collision-free path planning algorithm based on the generation of random paths between two points. The proposed work applies to many fields such as education, economics, computer science and AI, military, and other fields of applied sciences. Our work has spanned several phases, where in the first phase a novel computer algori...
Chapter
The need for the right information for patients with chronic diseases is elaborated, followed by some scenarios of how the semantic web can be utilized to retrieve useful and precise information by stakeholders. In previous work, the author has demonstrated the automation of knowledge acquisition from the current web is becoming an important step t...
Conference Paper
Full-text available
In modern warfare, swarms of unmanned aircrafts and drones are used to preform various task ranging from taking surveillance data to sensing enemy’s targets to enhance monitoring in disputed territories. In hostile zones, flying drones from one point to another in straight lines are vulnerable to anti-air defense systems and therefore are easy targ...
Article
Full-text available
In the first part of our research, a novel computer algorithm has been proposed to generate a random path between two points in space. A random path consists of finite number of randomly generated adjacent points that satisfy the condition: L(p1pn) < L(pi-1pn). Where L(p1pn) is the length of the path between the two adjacent points p1 and pn. The a...
Article
Full-text available
In the first part of our research, a novel computer algorithm has been proposed to generate random path between two points in space. Random path consists of finite number of randomly generated adjacent points that satisfy the condition: L(pipn) < L(pi-1pn). Where L(p1pn) is the length of the path between the two adjacent points p1 and pn. The algor...
Article
This study aims to identify the attitudes of the sample individuals from students and teaching staff that have used the electronic examinations at Isra University in Jordan. These Attutudes describe the relationship between the availability of the requirements for electronic examination applications and the success of its implementation. Analytical...
Research
Full-text available
The research has two folds; firstly, it aims to compare the different views of trends between two sample groups of professors and students who used assessments system at the University, and secondly it aims to investigate the uses of e-assessments systems in other universities in the region. The Personal trends are about the relationship between th...
Article
Full-text available
The research aims to identify the personal trends of the research sample which consists of professors who use computer systems for students' assessments at the University. The Personal tends are about the relationship between the availability of supplies needed to carry out e-exams and to what extent it has been implemented successfully. The Resear...
Article
Full-text available
The Moodle e-learning system has been adopted by several universities and organizations for the large accessible set of e-learning tools. Isra University has adopted and utilized the Moodle e-learning system in many classes throughout all of its colleges. Moodle has solved many course management problems such as finding the appropriate time that su...
Article
The Moodle e-learning system has been adopted by several universities and organizations for the large accessible set of e-learning tools. Isra University has adopted and utilized the Moodle e-learning system in many classes throughout all of its colleges. Moodle has solved many course management problems such as finding the appropriate time that su...
Chapter
Full-text available
In this paper, the need for the right information for patients with chronic diseases is elaborated, followed by some scenarios of how the semantic web can be utilised to retrieve useful and precise information by stakeholders. In previous work, the author has demonstrated the automation of knowledge acquisition from the current web is becoming an i...
Article
Full-text available
This study aims to identify the attitudes of the sample individuals from students that have used the electronic assessments (e-assessments) system at Isra University in Jordan. These attitudes describe the relationship between the availability of the requirements for e-assessments applications and the success of its implementation. Analytical descr...
Book
Full-text available
The current web contains a wealth of information in the form of natural text. In the medical domain, the number of documents related to healthcare continues to grow at exponential rate. Todays desktops can retrieve millions of web documents but can understand none. HTML documents are made to be read and understood by humans and not by machines. Ann...
Article
Full-text available
The aim of the information technology group of e-learning research (TIGER) is to study and analyze the use of Moodle e-learning system at Isra University. TIGER manages and coordinates the educational material of the e-learning system for educators who choose to utilize this resource. The e-learning system is made available, with the support of TIG...
Article
Full-text available
Moodle is introduced as an e-learn system in many courses at the Information Technology faculty in Isra University. Prior to using Moodle at the university, there had been many obstacles relating to course management such as the finding an appropriate time that suits all students to carry out tests and quizzes; marking and providing feedback to the...
Conference Paper
The World Wide Web has become an important medium for the dissemination of information related to a wide range of topics. The majority of human information is becoming available on the web very rapidly. In the medical domain, the number of documents related to healthcare is already large and continues to grow at an exponential rate. Most informatio...
Article
In this paper, the need for the right information for patients with chronic diseases is elaborated, followed by some scenarios of how the semantic web can be utilised to retrieve useful and precise information by stakeholders. In previous work, the author has demonstrated the automation of knowledge acquisition from the current web is becoming an i...
Conference Paper
Full-text available
Text classification is a supervised learning technique that uses labeled training data to derive a classification system (classifier) and then automatically classifies unlabelled text data using the derived classifier. In this paper, we investigate K-Nearest Neighbor method (KNN) and Support Vector Machine algorithm (SVM) on different Arabic data s...
Article
Full-text available
To describe the clinical findings and mutations in affected members of two families with an autosomal recessive retinal dystrophy associated with mutations in the protocadherin-21 (PCDH21) gene. A full genome scan of members of two consanguineous families segregating an autosomal recessive retinal dystrophy was performed and regions identical by de...
Article
Full-text available
Text classification is a supervised learning technique that uses labeled training data to derive a classification system (classifier) and then automatically classifies unlabelled text data using the derived classifier. In this paper, we investigate K-Nearest Neighbor method (KNN) and Support Vector Machine algorithm (SVM) on different Arabic data s...
Article
Full-text available
Text classification is a supervised learning technique that uses labelled training data to derive a classification system (classifier) and then automatically classifies unlabelled text data using the derived classifier. This paper investigates Naïve Bayesian method (NB) and Support Vector Machine (SVM) on different Arabic data sets. The bases of ou...
Article
Full-text available
The World Wide Web has become an important medium for the dissemination ofinformation related to a wide range of topics. The majority of human information isbecoming available on the web very rapidly. In the medical domain, the number ofdocuments related to healthcare is already large and continues to grow at an exponentialrate. Most information on...
Article
Full-text available
Text classification is a supervised technique that uses labelled training data to learn the classification system and then automatically classifies the remaining text using the learned system. This paper investigates Naïve Bayesian algorithm based on Chi Square features selection method. The base of our comparisons are macro F1, macro recall and ma...
Conference Paper
Full-text available
Internet technologies are now increasingly being adopted in the healthcare sector, both in support of existing modes of healthcare delivery as well as providing opportunities for new ways of working. This paper reviews some of the major opportunities and the issues that need to be addressed.

Network

Cited By