Nadim Obeid

Nadim Obeid
Verified
Nadim verified their affiliation via an institutional email.
Verified
Nadim verified their affiliation via an institutional email.
  • BSc, BBA, Postgraduate Diploma, MSc, PhD
  • Professor at University of Jordan

About

154
Publications
72,691
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,419
Citations
Current institution
University of Jordan
Current position
  • Professor
Additional affiliations
January 2004 - December 2025
University of Jordan
Position
  • Previously Vice Dean, then Dean of KASIT, currently CIS Department Chair, Professor (Full)
September 2016 - September 2017
University of Jordan
Position
  • CIS Department Chair, Professor (Full)
September 1996 - September 2002
Princess Sumaya University for Technology
Position
  • Professor (Associate)
Education
November 1984 - May 1987
University of Essex
Field of study
  • Computer Science
October 1982 - September 1983
University of Essex
Field of study
  • Computer Science
October 1981 - June 1982
University of Essex
Field of study
  • Computer Programming and Microprocessor Application

Publications

Publications (154)
Article
Full-text available
Autism spectrum disorder (ASD) is a developmental disorder that encompasses difficulties in communication (both verbal and non-verbal), social skills, and repetitive behaviors. The diagnosis of autism spectrum disorder typically involves specialized procedures and techniques, which can be time-consuming and expensive. The accuracy and efficiency of...
Article
Full-text available
Recently, smart contracts were introduced as a necessity to automatically execute specific operations within blockchain systems. The popularity and diversity of blockchain systems attracted intensive attentions from academia, industry and other sectors. Blockchain systems were implemented using different programming languages that used in defining...
Article
Full-text available
Time-series analysis is a widely used method for studying past data to make future predictions. This paper focuses on utilizing time-series analysis techniques to forecast the resource needs of logistics delivery companies, enabling them to meet their objectives and ensure sustained growth. The study aims to build a model that optimizes the predict...
Article
The recommender system (RS) improves the users’ experience when searching for and buying items by providing recommendations. This paper presents a new hybrid RS called SemCF. SemCF integrates the item’s semantic information and the historical rating data to generate the recommendations. The semantic information is used to determine the users with t...
Chapter
Full-text available
The term “multi-agent systems” (MAS) refers to a mechanism that is used to create goal-oriented autonomous agents in a shared environment and have communication and coordination capabilities. This goal-oriented mechanism supports distributed data mining (DM) to implement various techniques for distributed clustering, classification, and prediction....
Article
Full-text available
Click fraud is a serious problem facing online advertising business. The malicious intent of clicking online ads either committed by humans or by non-humans, forced financial losses on advertisers utilizing pay-per-click advertising. Non-human traffic is usually designed to inflate web traffic for fraudulent purposes. In this paper, we demonstrate...
Article
Full-text available
With the emergence and the movement toward the Internet of Things (IoT), one of the most significant applications that have gained a great deal of concern is smart cities. In smart cities, IoT is leveraged to manage life and services within a minimal, or even no, human intervention. IoT paradigm has created opportunities for a wide variety of cyber...
Article
Full-text available
Distributed Data Mining (DDM) has been proposed as a means to deal with the analysis of distributed data, where DDM discovers patterns and implements prediction based on multiple distributed data sources. However, DDM faces several problems in terms of autonomy, privacy, performance and implementation. DDM requires homogeneity regarding environment...
Article
Full-text available
Exploration and exploitation are the two main concepts of success for searching algorithms. Controlling exploration and exploitation while executing the search algorithm will enhance the overall performance of the searching algorithm. Exploration and exploitation are usually controlled offline by proper settings of parameters that affect the popula...
Article
The recommendation problem involves the prediction of a set of items that maximize the utility for users. Numerous factors, such as the filtering method and similarity measure, affect the prediction accuracy. We propose a novel prediction mechanism that can be applied to collaborative filtering recommender systems. This prediction mechanism consist...
Article
Nowadays, with the increase in chronic diseases and the aging population in all countries, it has become a huge burden on hospitals to accommodate all patients and monitor them. Applying wireless sensors network for the IoT based medical systems enabled medical doctors and families to monitor patients' conditions all the time through the collected...
Preprint
Full-text available
Arabic text recognition is a challenging task because of the cursive nature of Arabic writing system, its joint writing scheme, the large number of ligatures and many other challenges. Deep Learning DL models achieved significant progress in numerous domains including computer vision and sequence modelling. This paper presents a model that can reco...
Article
Full-text available
Arabic text recognition is a challenging task because of the cursive nature of Arabic writing system, its joint writing scheme, the large number of ligatures and many other challenges. Deep Learning (DL) models achieved significant progress in numerous domains including computer vision and sequence modelling. This paper presents a model that can re...
Article
Full-text available
Extreme Learning Machine (ELM) is a learning algorithm proposed recently to train single hidden layer feed forward networks (SLFN). It has many attractive properties that include better generalization performance and very fast learning. ELM starts by assigning random values to the input weights and hidden biases and then in one step it determines t...
Article
Full-text available
Abstract. Extracting clinical data from medical or clinical reports is a crucial effort. These records contain the most valuable pieces of evidence of treatments in humans. Integration of information extraction (IE) and ontology can produce a great tool for clinical concept extraction. The aim of this paper is to present a quick overview of the res...
Article
Preterm birth, defined as a delivery before 37 weeks' gestation, continues to affect 8-15% of all pregnancies and is associated with significant neonatal morbidity and mortality. Effective prediction of timing of delivery among women identified to be at significant risk for preterm birth would allow proper implementation of prophylactic therapeutic...
Article
Full-text available
This paper, lays down the logical foundations for a personalized medical prescription system. The proposed system employs detailed pharmaceutical and medical knowledge about a medication and its effects or side effects on the patient, which may go beyond what is available in medication leaflets. The ontology was initially built for the proposed sys...
Article
Full-text available
A multiagent system (MAS) is a mechanism for creating goal-oriented autonomous agents in shared environments with communication and coordination facilities. Distributed data mining benefits from this goal-oriented mechanism by implementing various distributed clustering, classification, and prediction techniques. Hence, this study developed a novel...
Conference Paper
These days, mobile devices have very sensitive and personal data that needs to be secured. Mobile devices use authentication techniques to protect data from unauthorized access. Consequently, many authentication mechanisms were proposed and many techniques were applied. One of these mechanisms is the analysis of the typing rhythm. It is also known...
Conference Paper
The sparsity problem is considered as one of the main issues facing the collaborative filtering. This paper presents a new dimensionality reduction mechanism that is applicable to collaborative filtering. The proposed mechanism is a statisticalbased method that exploits the user-item rating matrix and itemfeature matrix to build the User Interest P...
Preprint
Full-text available
Although learning from data is effective and has achieved significant milestones, it has many challenges and limitations. Learning from data starts from observations then proceeds to broader generalizations. This framework is controversial in science, yet it has achieved remarkable engineering successes. This paper reflects on some epistemological...
Chapter
Medical diagnosis can be defined as the detection of a disease by examining a patient’s signs, symptoms and history. Diagnostic reasoning can be viewed as a process of testing hypotheses guided by symptoms and signs. Solutions to diagnostic problems can be found by generating a limited number of hypotheses early in the diagnostic process and using...
Article
Full-text available
Extreme learning machine (ELM) is a novel and recent machine learning algorithm which was first proposed by Huang et al. (Proceedings of 2004 IEEE international joint conference on, pp 985–990, 2004). Over the last decade, ELM has gained a remarkable research interest with tremendous audiences from different domains in a short period of time due to...
Article
Full-text available
Cloud computing is one of the paradigms that have undertaken to deliver the utility computing concept. It views computing as a utility similar to water and electricity. We aim in this paper to make an investigation of two highly efficacious Cloud platforms: Microsoft Azure (Azure) and Amazon Web Services (AWS) from users’ perspectives the point of...
Conference Paper
Full-text available
Drug-drug interactions are generally harmful. This is usually manifested when the patient suffers from more than one disease for which drugs are prescribed and/or more than one drug is needed to be prescribed. The problem is made worse by the wide range of available drugs and the complexity which characterizes the variety of possible interactions o...
Preprint
Full-text available
As most of the cases of diabetic retinopathy can be eliminated if they were properly treated and monitored in the early stages, and as the patients are usually asymptomatic in the initial stages of diabetic retinopathy, it is vital to enhance the accuracy of predicting this disease. Artificial Neural Network (ANN) is an algorithm that is used for c...
Conference Paper
Full-text available
Hospital readmissions increase the healthcare costs and negatively influence hospitals’ reputation. Predicting readmissions in early stages allows prompting great attention to patients with high risk of readmission, which leverages the healthcare system and saves healthcare expenditures. Machine learning helps in providing more accurate predictions...
Article
Full-text available
Hospital readmissions increase the healthcare costs and negatively influence hospitals’ reputation. Predicting readmissions in early stages allows prompting great attention to patients with high risk of readmission, which leverages the healthcare system and saves healthcare expenditures. Machine learning helps in providing more accurate predictions...
Conference Paper
Full-text available
In this paper, an ensemble of machine learning classifiers approach is used to classify the sentiment polarity of Arabic text. This approach is based on the majority voting algorithm in conjunction with four classifiers, namely Naive Bayes, Support Vector Machines, Decision Trees and K-Nearest Neighbor algorithms. Four combinations of these classif...
Conference Paper
Full-text available
Each nationality has their special culinary practice, which was built by many generations that formed the cultural and historical print of the regional cuisine. Furthermore, nearby regional cuisines tend to learn from each other either due to communication or migration. The geographical closure for Syria, Lebanon, Palestine and Jordan made their cu...
Conference Paper
Full-text available
As the early diagnoses helps in curing most diseases or in making them more bearable, it increases the need to build a good prediction model. Artificial Neural Network (ANN) is one of the evolutionary computation techniques that can be used as a prediction model for new data records. The ANN training method implemented is backpropagation which can...
Conference Paper
Full-text available
Abstract—This paper, provides a novel, simple and efficient reversible data hiding scheme for protecting and verifying the integrity and authenticity of color images. The importance of the proposed scheme raises from the fact that even they are the ones that are really distributed across the vulnerable networks, only few works pay attention to the...
Conference Paper
The virtual world is overflowing with digital items which makes user’s experience when searching for, selecting and buying items harder. The use of a recommender system can help alleviate this problem and increase the profit of companies by generating to the user a list of potential favorite items. This paper proposes a new hybrid algorithm that de...
Article
Full-text available
In this paper, we extend a temporal defeasible logic with a modal operator Committed to formalize commitments that agents undertake as a consequence of communicative actions (speech acts) during dialogues. We represent commitments as modal sentences. The defeasible dual of the modal operator Committed is a modal operator called Exempted. The logica...
Chapter
Full-text available
An important application of multi-agent systems is task negotiation. The existing protocols for controlling negotiation in multi-agent systems are either centralized or decentralized. The centralized protocols suffer from dependency on the central agent. If any problem occurs at the central agent, such as shutting down or becoming slow, the whole s...
Conference Paper
Drug-drug and drug-disease interactions are generally harmful. Some of these interactions could result from improper drug doses prescribed for a particular disease or from the unawareness the patient suffers from another disease. We aim in this paper to make a first step towards developing a knowledge based system that supports the decision making...
Article
Breast cancer is the second most frequent human neoplasm that accounts for one quarter of all cancers in females. Among the other types of cancers, it is considered to be the main cause of death in women in most countries. An efficient classifier for accurately helping physicians to predict this chronic disease is in high demand. One approach for s...
Conference Paper
Full-text available
This paper presents a proposed a model for extraction information from Arabic-based controlled text domains. We define controlled text domains as the text domains that are not restricted in terms of their linguistic features or their knowledge types yet they are not totally undetermined in these respects. A two-phase Information Extraction (IE) sch...
Chapter
In this chapter, we make a first step toward developing a defeasible description logic system that can represent a flexible publication ontology which can support intelligent queries. It involves using the description logic system ALC to build the ontology. We extend an ALC knowledge base with defeasible rules to yield a defeasible description logi...
Conference Paper
We aim in this paper to integrate a non-monotonic rule system (defeasible logic) with description logic-based ontologies. This can help us in building defeasible medical ontologies using vocabulary defined in description logic. We shall use defeasible reasoning to function on top of description logic. The process involves using the description logi...
Conference Paper
Full-text available
Association Classification (AC) technique is a predictive approach that has been investigated widely in the last two decades. Many researchers attempted to use AC in real-world applications such as: text classification, medical diagnoses, fraud detection and website phishing. However, there are a few concerns about using this technique and they are...
Conference Paper
We aim in this paper to integrate a nonmonotonic rule system (defeasible logic) with description logic-based ontologies. This can help us in building defeasible medical ontologies using vocabulary defined in description logic. We shall use defeasible reasoning to function on top of description logic. The process involves using the description logic...
Article
Access control policies are specified within systems to ensure confidentiality of their information. Available knowledge about policies is usually incomplete and uncertain. An essential goal in reasoning is to reach conclusions which can be justified. However, since justification does not necessarily guarantee truth, the best we can do is to derive...
Article
Full-text available
Text visualization has become a significant tool that facilitates knowledge discovery and insightful presentation of large amounts of data. This paper presents a visualization system for exploring Arabic text called ViStA. We report about the design, the implementation and some of the experiments we conducted on the system. The development of such...
Article
Full-text available
In this paper, we present an Arabic dialogue system (also referred to as a conversational agent) intended to interact with hotel customers and generate responses about reserving a hotel room and other services. The system uses text-based natural language dialogue to navigate customers to the desired answers. We describe the two main modules used in...
Article
Full-text available
In this paper, we present an Arabic dialogue system (also referred to as a conversational agent) intended to interact with hotel customers and generate responses about reserving a hotel room and other services. The system uses text-based natural language dialogue to navigate customers to the desired answers. We describe the two main modules used in...
Article
Full-text available
The research focus in our paper is twofold: (a) to examine the extent to which simple Arabic sentence structures comply with the Government and Binding Theory (GB), and (b) to implement a simple Arabic Context Free Grammar (CFG) parser to analyze input sentence structures to improve some Arabic Natural Language Processing (ANLP) Applications. Here...
Article
Full-text available
The research focus in our paper is twofold: (a) to examine the extent to which simple Arabic sentence structures comply with the Government and Binding Theory (GB), and (b) to implement a simple Arabic Context Free Grammar (CFG) parser to analyze input sentence structures to improve some Arabic Natural Language Processing (ANLP) Applications. Here...
Article
Full-text available
In this paper, we take the view that any formalization of commitments has to come together with a formalization of time, events/actions and change. We enrich a suitable formalism for reasoning about time, event/action and change in order to represent and reason about commitments. We employ a three-valued based temporal first-order non-monotonic log...
Article
Full-text available
In this paper, we emphasize the role of agents in the development of e-learning systems. We make a first step towards a learner's centric approach. We present a Content Preparation and Flexible Delivery System. We show how agents can help in facilitating the design of appropriate educational material and its delivery in a personalized way. The agen...
Conference Paper
Full-text available
In this paper, we employ the Government and Binding theory (GB) to present a system that analyzes the syntactic structure of some simple Arabic sentences structures. We consider different word orders in Arabic and show how they are derived. We include an analysis of Subject-Verb-Object (SVO), Verb-Object-Subject (VOS), Verb-Subject-Object (VSO), no...
Conference Paper
Full-text available
The amount of unstructured textual data on the Internet has been increased dramatically. Text visualization becomes a significant tool that facilitates knowledge discovery and insightful presentation of large amounts of data. In this paper we present a technique of the visual exploration of Arabic text documents. We apply Latent Semantic Indexing (...
Article
Full-text available
Availability is one of the important criteria that affect the usefulness and efficiency of a distributed system. It mainly depends on how the components are deployed on the available hosts. In this paper, we present a generic agent-based monitor approach that supports the dynamic component redeployment and replication mechanisms which were presente...
Article
Full-text available
In this paper, we propose an agent-based framework for collaborative problem-solving. We emphasize the knowledge representation and knowledge sharing issues. We employ a three-valued based Temporal First-Order Nonmonotonic Logic that allows an explicit representation of events/actions and can handle dialogue game protocols and temporal aspects expl...
Conference Paper
Full-text available
Recent years have witnessed the movement of many applications from the traditional closed environments into open ones. These applications, which are being accessed via web browsers, usually offer a great amount of information and services. Open environments and content explosion may affect the usability of web applications, where usability measures...
Chapter
Full-text available
Interdisciplinary Collaboration is essential for successful interdisciplinary activities such as large research projects and interdisciplinary problem solving. An Interdisciplinary Collaboration Support System should assist in providing experts in different disciplines (discipline-based knowledge workers) with (some of) the knowledge, experiences a...
Article
Full-text available
In this paper, we propose a knowledge management system that employs agents and case-based reasoning to extract tacit knowledge and support organizational learning and decision making at the level of individual workers, group workers and the whole organization. Agents will perform the tasks of inquiry, investigation, sharing and updating of knowle...
Article
Full-text available
One of the important criteria that affect the usefulness and efficiency of a distributed system is availability, which mainly depends on how the components of the system are deployed on the available hosts. If the components that need lots of interaction are on the same host, the availability will definitely be higher given that all the components...
Article
Full-text available
We develop, in this paper, a representation of time and events that supports a range of reasoning tasks such as monitoring and detection of event patterns which may facilitate the explanation of root cause(s) of faults. We shall compare two approaches to event definition: the active database approach in which events are defined in terms of the cond...
Article
Full-text available
Knowledge sharing between various components of a system is a prerequisite for a successful knowledge management system. A knowledge sharing model includes providing knowledge workers with the knowledge, experiences and insights which they need to perform their tasks. We propose a multi-agent system that assists in the process of knowledge sharing...
Chapter
Full-text available
Knowledge sharing between various components of a system is a prerequisite for a successful knowledge management system. A knowledge sharing model includes providing knowledge workers with the knowledge, experiences and insights which they need to perform their tasks. We propose a multi-agent system that assists in the process of knowledge sharing...
Article
Full-text available
This paper presents a new parallel implementation algorithm for solving pair DNA sequence alignment. The algorithm is based on Needleman-Wunsch algorithm using threads. The proposed algorithm fills the similarity matrix, of the DNA sequences, Row Column, and Diagonal wise (RCD) using threads. Several algorithms for filling the similarity matrix suc...
Article
Full-text available
Interests in Mobile Agents (MA) are rising because there are several benefits which can be associated with their employment. In this paper we propose a Mobile Agent-based Information Sharing Technique (MA-IST) to help knowledge workers and information seekers to search for and share specific information scattered around a network of nodes. We shall...
Article
Full-text available
We propose a partial information state-based framework for collaborative dialogue and argument between agents. We employ a three-valued based nonmonotonic logic, NML3, for representing and reasoning about Partial Information States (PIS). NML3 formalizes some aspects of revisable reasoning and it is sound and complete. Within the framework of NML3,...
Conference Paper
Full-text available
In this paper, we make a first step towards a formal model of dialogue and argumentation for a multi-agent problem solving. We shall present a multi-agent system for problem solving. We shall the notion of collaborative problem solving and discuss some of the related communication issues. we propose a partial information state based framework for d...
Article
Full-text available
The problem of partitioning a large number of entities into a fixed number of groups on the basis of a set of attributes associated with each entity has required an intensive research work in the literature. We have investigated a previous research related to this problem and proposed a method that is based on fuzzy clustering techniques. Jordan Un...
Article
Full-text available
In this paper, we make a first step towards a formal model of dialogue and argumentation for a multi-agent (model-based) diagnostic system. We shall discuss some of the issues in multi-agent cooperative fault diagnosis, the theories of communicating agents and their reasoning capabilities. We propose a Partial Information State (PIS)-based framewor...
Conference Paper
Full-text available
We make the assumptions that deep knowledge based reasoning and analytical capability are necessary to effectively deal with various ongoing issues related to complex systems operations that transcend the boundary of a single discipline. Furthermore, Knowledge communication between disciplines is a prerequisite for successful interdisciplinary rese...
Article
Full-text available
A fast distance-based algorithm for outlier detection will be proposed. It was found that the proposed algorithm reduced the number of distance calculations compared to the nestedloop algorithm. Test results were performed on different well-known data sets. The results showed that the proposed algorithm gave a reasonable amount of CPU time saving.
Conference Paper
Full-text available
We aim, in this paper, to make a a first step towards developing a model of knowledge acquisition/learning via cooperative dialogue. A key idea in the model is the concept of integrating exchanged information, via dialogue, within an agent's theory. The process is nonmonotonic. Dialogue is a structured process and the structure is relative to what...

Questions

Question (1)
Question
Situation calculus and event calculus.

Network

Cited By