Mohammad Hassan

Mohammad Hassan
  • Zarqa University

About

34
Publications
3,226
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
307
Citations
Current institution
Zarqa University

Publications

Publications (34)
Article
Conventional fossil fuel-powered vehicles are gradually being replaced by electric and hydrogen vehicles in the transportation sector. Even with all the recognized benefits and recent advancements in energy efficiency, decrease of noise, and environmental impact reduction, the market of electric and hydrogen mobility is still not up to par. Allocat...
Chapter
A specific type of virus called Systems and Resources ransomware attacks, which prevents users from accessing these systems and resources until a ransom is paid. This attack is based on file encryption and/or computer locking, it achieves this by denial of service to its user on the system. Malware exploits people's fear of exposing their critical...
Article
Unbalanced data sets represent data sets that contain an unequal number of examples for different classes. This dataset represents a problem faced by machine learning tools; as in datasets with high imbalance ratios, false negative rate percentages will be increased because most classifiers will be affected by the major class. Choosing specific eva...
Chapter
The vast expansion of the Internet of Things (IoT) exposes it to the threat of massive financial and reputational harm. The imperative to develop an emergency action plan and countermeasures means that current concerns can no longer be put on hold. While many security concerns are present in the layers of IoT, Distributed Denial of Service (DDoS) a...
Article
Full-text available
Associative classification (AC) has been shown to outperform other methods of single-label classification for over 20 years. In order to create rules that are both more precise and simpler to grasp, AC combines the rules of mining associations with the task of classification. However, the current state of knowledge and the views of various speciali...
Preprint
Full-text available
In the Internet of Things, millions of electronic items, including automobiles, smoke alarms, watches, eyeglasses, webcams, and other devices, are now connected to the Internet (IoT). Aside from the luxury and comfort that the individual obtains in the field of IoT, as well as its ability to communicate and obtain information easily and quickly, th...
Preprint
Full-text available
A Wireless Sensor Network (WSN) is made up of a large number of nodes that are spread randomly or on a regular basis to detect the surrounding environment and transfer data to a base station (BS) over the Internet to the user. It is widely used in a variety of civil and military concerns. Because the sensor has limited battery capacity, energy effi...
Article
Full-text available
In the Internet of Things, millions of electronic items, including automobiles, smoke alarms, watches, eyeglasses, webcams, and other devices, are now connected to the Internet (IoT). Aside from the luxury and comfort that the individual obtains in the field of IoT, as well as its ability to communicate and obtain information easily and quickly, th...
Article
Full-text available
A Wireless Sensor Network (WSN) is made up of a large number of nodes that are spread randomly or on a regular basis to detect the surrounding environment and transfer data to a base station (BS) over the Internet to the user. It is widely used in a variety of civil and military concerns. Because the sensor has limited battery capacity, energy effi...
Article
Full-text available
Wireless sensor networks (WSNs) has a practical ability to link a set of sensors to build a wireless network that can be accessed remotely; this technology has become increasingly popular in recent years. Wi-Fi-enabled sensor networks (WSNs) are used to gather information from the environment in which the network operates. Many obstacles prevent wi...
Preprint
Full-text available
Wireless sensor networks (WSNs) has a practical ability to link a set of sensors to build a wireless network that can be accessed remotely; this technology has become increasingly popular in recent years. Wi-Fi-enabled sensor networks (WSNs) are used to gather information from the environment in which the network operates. Many obstacles prevent wi...
Article
Full-text available
Chronic pain is known as ongoing pain that lasts longer than three months with increasing healing time. It is approximated that 20% of adults of different sexes, races, and socioeconomic backgrounds fall victim to chronic pain. It is a result of several factors and can have lifelong effects. Pain is a complex matter to measure; therefore, the physi...
Article
Full-text available
Psoriasis, a widely prevalent chronic disease of the skin and joints, has long been associated with far-reaching systemic ramifications and decreased quality of life. However, psoriasis is largely underdiagnosed and insufficiently treated. Classical risk factors predisposing to cardiovascular diseases, such as hypertension, diabetes, metabolic synd...
Article
Full-text available
Inguinal hernia repair is one of the most commonly performed surgical procedures worldwide. An inguinal hernia occurs due to a defect in the abdominal wall, which allows the abdominal contents to pass through it. Although the placement of mesh over the defect is the gold standard to close the defect, there are various approaches to achieving it, ou...
Article
Full-text available
Diabetes mellitus (DM) is a chronic metabolic disorder with a multi-systemic involvement, the gastrointestinal (GI) system being one of them. In this study, we have compiled and analyzed findings from various studies to conclude that peripheral insulin resistance and hyperglycemia are the two key factors that play a role in the pathogenesis of the...
Article
Full-text available
With the enormous growth in information and data that are produced by various resources such as organization, companies' phones, health records, social media, and the Internet of Tings (IoT), their analysis becomes a challenge and even more complex due to the increased volume of structured and unstructured data. Knowledge Discovery in Database (KDD...
Article
Full-text available
Electronic exam's' non-reliability is one of the most critical gaps in this type of exam, whereas any electronic exam is considered entirely unreliable. In addition to that, it is not protected and free from cheat. The continuous validation that the examinee is the one who solves the questions of the electronic exam permanently and continuously is...
Article
Full-text available
Arabic language has a complex morphological structure, which makes it hard to select index terms for an IR system. The complexity of the Arabic morphology caused by multimode terms, using diacritics, letters have different forms according to its location in the word and affixes can be added at all locations in a word. Several methods were proposed...
Article
Full-text available
This paper presents a graph-based technique for searching structured or relational databases using keyword queries in a similar wayto search text files using search engines. Our approach depends on identifying first the data within a database that are most likely to provide the useful result to the raised query and then search only the identified d...
Article
This paper presents a tool that enables non-technical end-users to use free-form queries in exploring a large scale datasets with simple and interactive direct technique. The proposed approach is based on effective integration of different techniques, such as data mining, visualization and Human-Computer Interaction (HCI). The proposed model has be...
Article
Full-text available
This paper proposes a new autonomous self-organizing content-based node clustering peer to peer information retrieval (P2PIR) model. This model uses incremental transitive document-to-document similarity technique to build Local Equivalence Classes (LECes) of documents on a source node. Locality Sensitive Hashing scheme is applied to map a represen...
Article
Full-text available
This paper presents a tool that enables non-technical end-users to use free-form queries in exploring relational databases with simple and direct technique, in a fashion similar to using search engines to search text files on the web. This allows web designers and database developers specially in small business sectors to publish their databases fo...
Article
With the evolution of digital technology, there has been a significant increase in the number of images stored in electronic format. These range from personal collections to medical and scientific images that are currently collected in large databases. Many users and organizations now can acquire large numbers of images and it has been very importa...
Article
Several approaches have been proposed for bridging the gap between structured relational databases and keyword search. However, it has not been clearly shown how both features can be combined. In this paper, we describe a tool that provides a simple and direct technique for freeword search to query relational databases. Our approach allows a unifor...
Article
Full-text available
This paper proposes an efficient and effective "Locality Preserving Mapping" scheme that allows text databases representatives to be mapped onto a global information retrieval system such as Peer-to-Peer Information Retrieval Systems (P2PIR). The proposed approach depends on using Locality Sensitive Hash functions (LSH), and approximate min-wise in...
Article
Full-text available
Many problems have emerged while building accurate and efficient clusters of documents; such as the inherent problems of the similarity measure, and document logical view modeling. This research is an attempt to minimize the effect of these problems by using a new definition of transitive relevance between documents; i.e., adding more conditions on...
Conference Paper
Full-text available
This paper presents a tool that enables non-technical (naive) end-users to use free-form queries in exploring distributed relational databases with simple and direct technique, in a fashion similar to using search engines to search text files on the web. This allows web designers and database developers to publish their databases for web browsers e...
Conference Paper
The main target of the work described in this paper is to provide a powerful approach for naive users to search structured databases. Such a study is necessary especially to satisfy Web users who expect the ability to access all Web contents in a unified way, regardless of the structure of the available information. Given a set of distributed struc...
Article
Full-text available
Cluster retrieval was proposed to improve retrieval efficiency, since user needs are compared with a cluster representative; or centroid, instead of all documents. It is important to select the centroid in a way that strongly represents the semantics of the cluster members. In this paper we proposed a method to form the centroid in case of hierarch...

Network

Cited By