Muder Almi'ani

Muder Almi'ani
  • PhD
  • Professor (Associate) at Al-Hussein Bin Talal University

About

82
Publications
21,290
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,145
Citations
Current institution
Al-Hussein Bin Talal University
Current position
  • Professor (Associate)
Additional affiliations
August 2010 - July 2013
University of Bridgeport
Position
  • PhD Student
Education
September 2009 - July 2013
University of Bridgeport
Field of study
  • Computer Science and Engineering

Publications

Publications (82)
Article
This study investigates the use of neuromorphic computing, particularly spiking neural networks (SNNs) and advanced neuromorphic hardware, to model and forecast climate patterns. Our neuromorphic system achieves high prediction accuracy, maintaining a Mean Squared Error (MSE) as low as 0.08, even with increasing data volumes. The system operates wi...
Article
Full-text available
Brand advocates, characterized by their enthusiasm for promoting a brand without incentives, play a crucial role in driving positive word-of-mouth (WOM) and influencing potential customers. However, there is a notable lack of intelligent systems capable of accurately identifying online advocates based on their social interactions with brands. Knowl...
Article
Full-text available
Social networks have modernized the way people communicate, share information, and consume content. The widespread use of social media platforms has resulted in the creation of vast amounts of user-generated content, which can be analyzed to gain valuable insights into customer behaviour, emotions, preferences, and trends. Previous studies on onlin...
Article
Full-text available
With the rapid advancement of technology, smart home environments have become increasingly popular, offering convenience and automation to homeowners. However, as these smart homes become more interconnected and integrated into 5G networks, security concerns arise, especially with the potential for unauthorized access and control. To address these...
Article
Full-text available
Improvements in medical imaging have accelerated the rise of computerized healthcare. Namely, Magnetic Resource Imaging (MRI) has been shown to be a reliable method for detecting Mild Cognitive Impairment (MCI), the prenominal stage of Alzheimer’s Disease (AD) (MCI). Complex nonlinear registration and tissue segmentation are needed in order to extr...
Preprint
Full-text available
Improvements in medical imaging have accelerated the rise of computerized healthcare. Namely, Magnetic Resource Imaging (MRI) has been shown to be a reliable method for detecting Mild Cognitive Impairment (MCI), the prenominal stage of Alzheimer's Disease (AD) (MCI). Complex nonlinear registration and tissue segmentation are needed in order to extr...
Article
Full-text available
An imbalanced classification problem is one in which the distribution of instances across defined classes is uneven or biased in one direction or another. In data mining, the probabilistic neural network (PNN) classifier is a well-known technology that has been successfully used to solve a variety of classification difficulties. On the other hand,...
Article
Full-text available
Currently, fraud detection is employed in numerous domains, including banking, finance, insurance, government organizations, law enforcement, and so on. The amount of fraud attempts has recently grown significantly, making fraud detection critical when it comes to protecting your personal information or sensitive data. There are several forms of fr...
Preprint
Full-text available
Sentiment analysis (SA) is the process of assessing the sentiment and attitude of digital audiences toward a range of topics and subjects. The aim of this research is to propose an effective approach for finding good-quality solutions for dialectal Arabic SA problems by addressing inherent challenges in an optimal way. This is achieved by determini...
Article
Full-text available
The vehicle routing problem (VRP) is one of the challenging problems in optimization and can be described as combinatorial optimization and NP-hard problem. Researchers have used many artificial intelligence techniques in order to try to solve this problem. Among these techniques, metaheuristic algorithms that can perform random search are the most...
Article
Cloud-native computing is getting more and more popular in recent years where containerized microservices architectural designs play a central role in building a distributed systems and services. On one hand, they bring convenience and simplicity to build massively scalable distributed cloud-native applications and enable continuous development and...
Article
Full-text available
The use of current data management technologies for the Internet of Things (IoT) is not straightforward due to interface heterogeneity, highly complex and potentially unprotected conditions, and the huge scale of the network. A vast number of devices and sensors around the world are connected to wireless networks, making the data transmitted to and...
Article
Mobile cloud computing (MCC) plays a significant role in obtaining virtualized data stored on cloud servers without additional waiting time. However, the limited battery power of mobile devices limits access to ample data. To address this problem, job scheduling algorithms based on completion time constraints are introduced to reduce energy consump...
Article
Full-text available
Cyber-physical systems (CPSs) have greatly contributed to many applications. A CPS is capable of integrating physical and computational capabilities to interact with individuals through various new modalities. However, there is a need for such a paradigm to focus on the human central nervous system to provide faster data access. This paper introduc...
Article
Full-text available
The fifth-generation (5G) wireless communication systems associating with the high achievable data-transfer speeds will significantly affect the performance of IoT networks. On one hand, the internet goes through a dramatic transaction period that shapes every aspect of our lives, industry, and business where cloud computing, smart cities, and the...
Preprint
Full-text available
The vehicle routing problem (VRP) is one of the challenging problems in optimization and can be described as combinatorial optimization and NP-hard problem. Researchers have used many artificial intelligence techniques in order to try to solve this problem. Among these techniques, metaheuristic algorithms that can perform random search are the most...
Article
Full-text available
The mobile fog-based cloud (MFBC) plays a major role for the Internet of Things (IoT) and is highly suitable for obtaining virtualized data without additional waiting time. However, the limited battery power of mobile devices limits access to abundant data. To address this problem, an energy-efficient and secure algorithm should be introduced to re...
Article
Full-text available
Remote sensing technologies have been widely used in the contexts of land cover and land use. The image classification algorithms used in remote sensing are of paramount importance since the reliability of the result from remote sensing depends heavily on the classification accuracy. Parametric classifiers based on traditional statistics have succe...
Article
Due to the increasing awareness and use of cloud and edge computing, society and industries are beginning to understand the benefits they can provide. Cloud and Edge are the future of information management, and they have transformed the Internet into an innovative and interactive computing platform. The ultimate goal of edge/cloud computing is to...
Article
Full-text available
Organizations share an evolving interest in adopting a cloud computing approach for Internet of Things (IoT) applications. Integrating IoT devices and cloud computing technology is considered as an effective approach to storing and managing the enormous amount of data generated by various devices. However, big data security of these organizations p...
Chapter
Full-text available
One desired aspect of a self-adapting microservices architecture is the ability to continuously monitor the operational environment, detect and observe anomalous behaviour as well as implement a reasonable policy for self-scaling, self-healing, and self-tuning the computational resources in order to dynamically respond to a sudden change in its ope...
Article
One desired aspect of microservice architecture is the ability to self‐adapt its own architecture and behavior in response to changes in the operational environment. To achieve the desired high levels of self‐adaptability, this research implements distributed microservice architecture model running a swarm cluster, as informed by the Monitor, Analy...
Article
As a results of the large scale development of the Internet of Things (IoT), cloud computing capabilities including networking, data storage, management, and analytics are brought very close to the edge of networks forming Fog computing and enhancing transferring and processing of tremendous amount of data. As the Internet becomes more deeply integ...
Article
Full-text available
With the development of information society and network technology, people increasingly depend on information found on the Internet. At the same time, the models of information diffusion on the Internet are changing as well. However, these models experience the problem due to the fast development of network technologies. There is no thorough resear...
Article
Full-text available
Cloud computing (CC) is fast-growing and frequently adopted in information technology (IT) environments due to the benefits it offers. Task scheduling and load balancing are amongst the hot topics in the realm of CC. To overcome the shortcomings of the existing task scheduling and load balancing approaches, we propose a novel approach that uses dom...
Article
Cloud computing (CC) is fast-growing and frequently adopted in information technology (IT) environments due to the benefits it offers. Task scheduling and load balancing are amongst the hot topics in the realm of CC. To overcome the shortcomings of the existing task scheduling and load balancing approaches, we propose a novel approach that uses dom...
Article
Cybercriminal activities over computer network systems are considered one of the preponderant issues that humanity will face in the coming two decades. The development steps in the design of intrusion detection systems must be carried out in analogous manner to sophistication levels of intrusions developed by hackers. This work proposes a layered h...
Article
Full-text available
Significant research has been conducted for maintaining a high standard of communication and good coverage in wireless sensor networks (WSNs), but extra power consumption and mobility issues are not yet fully resolved. This paper introduces a memory-less location mobility-aware Lattice Mobility Model (LMM) for WSNs. LMM is capable of concurrently d...
Article
Security is one of the biggest challenges for secure data communication. As the need of mobile phones increased, people started using several mobile applications to handle the internet of things. On the other hand, the frequent use of mobile phones in business caught the attention of researchers to protect the manufacturers and customers. Handling...
Article
Full-text available
Given their importance in assessing the objectives of computing programs, capstone projects have been included in the present curriculum. Through these projects, the issues in software development practice are directly experienced by the students. This paper provided students with a full picture of these issues by using concept maps. To present a c...
Article
Given their importance in assessing the objectives of computing programs, capstone projects have been included in the present curriculum. Through these projects, the issues in software development practice are directly experienced by the students. This paper provided students with a full picture of these issues by using concept maps. To present a c...
Conference Paper
A wireless modem is a device which is used to transmit and receive data over a network. Power consumption for wireless devices becomes a challenge for researchers, causing the entire research environment to shift their focus to the power usage of wireless devices. Presently, by using a class A power amplifier, a power efficient wireless modem can b...
Conference Paper
Full-text available
With emergence of the latest technology, need for digital documents, images and medias has greatly increased. On the other hand, there has been great demand of protecting those documents. The researchers proposed several approaches to protect those valuable documents. The two most exciting available approaches are to remove the devices and online s...
Article
Full-text available
With dramatic increase in the mobile technology, the mobile cellular phones have played a significant role in the several fields particularly, education, military, business and health. The deployment of mobile phone in the Government has been of high interest of research community to improve fundamental functions, efficient information provision an...
Conference Paper
Full-text available
Cloud computing is a model for delivering information technology services, wherein resources are retrieved from the Internet through web-based tools and applications instead of a direct connection to a server. The capability to provision and release cloud computing resources with minimal management effort or service provider interaction led to the...
Conference Paper
E-government plays an increasingly significant role in our day-to-day lives. Mobile government (m-Government) is a subset and extension of electronic government e-Government comprising of an alternative channel for governments to improve governments' fundamental functions and providing information and services. This paper introduces an interactive...
Article
The progress of medical imaging instrumentation has stirred the development of new computer-aided methods of image processing and analysis for better understanding and interpretation of medical images for differential diagnosis, intervention, and treatment monitoring. Image processing and analysis methods have been used to help physicians to make i...
Conference Paper
Using mobile gateway as mechanical data carrier has emerged as a promising approach to prolong the network lifetime and relaying information in partition networks. This mobile gateway periodically travels the network to gather the sensor data, where the gateway tour start and end at the sink. The gateway’s tour length must be bounded by pre-defined...
Conference Paper
In this paper, we investigate the problem of designing the minimum number of required mobile elements tours such that each sensor node is either on the tour or one hop away from the tour, and the length of the tour to be bounded by pre-determined value L. To address this problem, we propose heuristic-based solution. This solution works by direct...
Article
Full-text available
In this paper, we investigate the problem of designing the mobile elements tours such that the length of each tour is below a per-determined length and the distance between nodes not included in the tour and the tour is minimized. The path of the mobile element is designed to visit subset of the nodes (caching points). These caching points store ot...
Conference Paper
A modified region growing algorithm is proposed to extract cerebral vessels using a magnetic resonance angiography (MRA) database. To improve the performance of the image segmentation method, as a pre-processing step, image enhancement methods are applied by the gamma correction technique and spatial operations. This step improves the detection of...
Article
In this work, we have developed an automatic segmentation algorithm for brain Magnetic Resonance Angiography (MRA) images to extract the vascular structure based on region-growing method. Intensity information is used as a criterion of homogeneity. MRA was introduced into clinical practice about two decades ago and it provides a variety of signific...
Article
Full-text available
Wireless Sensor Networks, referred to as WSNs, are made up of various types of sensor nodes. Recentdevelopments in micro electro-mechanical technology have given rise to new integrated circuitry,microprocessor hardware and nano technology, wireless technology, and advanced networking routingprotocols. Hospitals and health service facilities, the ar...

Network

Cited By