
Mohammad Hassan- Zarqa University
Mohammad Hassan
- Zarqa University
About
34
Publications
3,226
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
307
Citations
Current institution
Publications
Publications (34)
Conventional fossil fuel-powered vehicles are gradually being replaced by electric and hydrogen vehicles in the transportation sector. Even with all the recognized benefits and recent advancements in energy efficiency, decrease of noise, and environmental impact reduction, the market of electric and hydrogen mobility is still not up to par. Allocat...
A specific type of virus called Systems and Resources ransomware attacks, which prevents users from accessing these systems and resources until a ransom is paid. This attack is based on file encryption and/or computer locking, it achieves this by denial of service to its user on the system. Malware exploits people's fear of exposing their critical...
Unbalanced data sets represent data sets that contain an unequal number of examples for different classes. This dataset represents a problem faced by machine learning tools; as in datasets with high imbalance ratios, false negative rate percentages will be increased because most classifiers will be affected by the major class. Choosing specific eva...
The vast expansion of the Internet of Things (IoT) exposes it to the threat of massive financial and reputational harm. The imperative to develop an emergency action plan and countermeasures means that current concerns can no longer be put on hold. While many security concerns are present in the layers of IoT, Distributed Denial of Service (DDoS) a...
Associative classification (AC) has been shown to outperform other methods of single-label classification for over 20 years. In order to create rules that are both more precise and simpler to grasp, AC combines the rules of mining associations with the task of classification. However, the current state of knowledge and the views of various speciali...
In the Internet of Things, millions of electronic items, including automobiles, smoke alarms, watches, eyeglasses, webcams, and other devices, are now connected to the Internet (IoT). Aside from the luxury and comfort that the individual obtains in the field of IoT, as well as its ability to communicate and obtain information easily and quickly, th...
A Wireless Sensor Network (WSN) is made up of a large number of nodes that are spread randomly or on a regular basis to detect the surrounding environment and transfer data to a base station (BS) over the Internet to the user. It is widely used in a variety of civil and military concerns. Because the sensor has limited battery capacity, energy effi...
In the Internet of Things, millions of electronic items, including automobiles, smoke alarms, watches, eyeglasses, webcams, and other devices, are now connected to the Internet (IoT). Aside from the luxury and comfort that the individual obtains in the field of IoT, as well as its ability to communicate and obtain information easily and quickly, th...
A Wireless Sensor Network (WSN) is made up of a large number of nodes that are spread randomly or on a regular basis to detect the surrounding environment and transfer data to a base station (BS) over the Internet to the user. It is widely used in a variety of civil and military concerns. Because the sensor has limited battery capacity, energy effi...
Wireless sensor networks (WSNs) has a practical ability to link a set of sensors to build a wireless network that can be accessed remotely; this technology has become increasingly popular in recent years. Wi-Fi-enabled sensor networks (WSNs) are used to gather information from the environment in which the network operates. Many obstacles prevent wi...
Wireless sensor networks (WSNs) has a practical ability to link a set of sensors to build a wireless network that can be accessed remotely; this technology has become increasingly popular in recent years. Wi-Fi-enabled sensor networks (WSNs) are used to gather information from the environment in which the network operates. Many obstacles prevent wi...
Chronic pain is known as ongoing pain that lasts longer than three months with increasing healing time. It is approximated that 20% of adults of different sexes, races, and socioeconomic backgrounds fall victim to chronic pain. It is a result of several factors and can have lifelong effects. Pain is a complex matter to measure; therefore, the physi...
Psoriasis, a widely prevalent chronic disease of the skin and joints, has long been associated with far-reaching systemic ramifications and decreased quality of life. However, psoriasis is largely underdiagnosed and insufficiently treated. Classical risk factors predisposing to cardiovascular diseases, such as hypertension, diabetes, metabolic synd...
Inguinal hernia repair is one of the most commonly performed surgical procedures worldwide. An inguinal hernia occurs due to a defect in the abdominal wall, which allows the abdominal contents to pass through it. Although the placement of mesh over the defect is the gold standard to close the defect, there are various approaches to achieving it, ou...
Diabetes mellitus (DM) is a chronic metabolic disorder with a multi-systemic involvement, the gastrointestinal (GI) system being one of them. In this study, we have compiled and analyzed findings from various studies to conclude that peripheral insulin resistance and hyperglycemia are the two key factors that play a role in the pathogenesis of the...
With the enormous growth in information and data that are produced by various resources such as organization, companies' phones, health records, social media, and the Internet of Tings (IoT), their analysis becomes a challenge and even more complex due to the increased volume of structured and unstructured data. Knowledge Discovery in Database (KDD...
Electronic exam's' non-reliability is one of the most critical gaps in this type of exam, whereas any electronic exam is considered entirely unreliable. In addition to that, it is not protected and free from cheat. The continuous validation that the examinee is the one who solves the questions of the electronic exam permanently and continuously is...
Arabic language has a complex morphological structure, which makes it hard to select index terms for an IR system. The complexity of the Arabic morphology caused by multimode terms, using diacritics, letters have different forms according to its location in the word and affixes can be added at all locations in a word. Several methods were proposed...
This paper presents a graph-based technique for searching structured or relational databases using keyword queries in a similar wayto search text files using search engines. Our approach depends on identifying first the data within a database that are most likely to provide the useful result to the raised query and then search only the identified d...
This paper presents a tool that enables non-technical end-users to use free-form queries in exploring a large scale datasets with simple and interactive direct technique. The proposed approach is based on effective integration of different techniques, such as data mining, visualization and Human-Computer Interaction (HCI). The proposed model has be...
This paper proposes a new autonomous self-organizing content-based node clustering peer to peer information retrieval (P2PIR) model. This model uses incremental transitive document-to-document similarity technique to build Local Equivalence Classes (LECes) of documents on a source node. Locality Sensitive Hashing scheme is applied to map a represen...
This paper presents a tool that enables non-technical end-users to use free-form queries in exploring relational databases with simple and direct technique, in a fashion similar to using search engines to search text files on the web. This allows web designers and database developers specially in small business sectors to publish their databases fo...
With the evolution of digital technology, there has been a significant increase in the number of images stored in electronic format. These range from personal collections to medical and scientific images that are currently collected in large databases. Many users and organizations now can acquire large numbers of images and it has been very importa...
Several approaches have been proposed for bridging the gap between structured relational databases and keyword search. However, it has not been clearly shown how both features can be combined. In this paper, we describe a tool that provides a simple and direct technique for freeword search to query relational databases. Our approach allows a unifor...
This paper proposes an efficient and effective "Locality Preserving Mapping" scheme that allows text databases representatives to be mapped onto a global information retrieval system such as Peer-to-Peer Information Retrieval Systems (P2PIR). The proposed approach depends on using Locality Sensitive Hash functions (LSH), and approximate min-wise in...
Many problems have emerged while building accurate and efficient clusters of documents; such as the inherent problems of the similarity measure, and document logical view modeling. This research is an attempt to minimize the effect of these problems by using a new definition of transitive relevance between documents; i.e., adding more conditions on...
This paper presents a tool that enables non-technical (naive) end-users to use free-form queries in exploring distributed relational databases with simple and direct technique, in a fashion similar to using search engines to search text files on the web. This allows web designers and database developers to publish their databases for web browsers e...
The main target of the work described in this paper is to provide a powerful approach for naive users to search structured databases. Such a study is necessary especially to satisfy Web users who expect the ability to access all Web contents in a unified way, regardless of the structure of the available information. Given a set of distributed struc...
Cluster retrieval was proposed to improve retrieval efficiency, since user needs are compared with a cluster representative; or centroid, instead of all documents. It is important to select the centroid in a way that strongly represents the semantics of the cluster members. In this paper we proposed a method to form the centroid in case of hierarch...