About
154
Publications
72,691
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,419
Citations
Introduction
Current institution
Additional affiliations
Education
November 1984 - May 1987
October 1982 - September 1983
October 1981 - June 1982
Publications
Publications (154)
Autism spectrum disorder (ASD) is a developmental disorder that encompasses difficulties in communication (both verbal and non-verbal), social skills, and repetitive behaviors. The diagnosis of autism spectrum disorder typically involves specialized procedures and techniques, which can be time-consuming and expensive. The accuracy and efficiency of...
Recently, smart contracts were introduced as a necessity to automatically execute specific operations within blockchain systems. The popularity and diversity of blockchain systems attracted intensive attentions from academia, industry and other sectors. Blockchain systems were implemented using different programming languages that used in defining...
Time-series analysis is a widely used method for studying past data to make future predictions. This paper focuses on utilizing time-series analysis techniques to forecast the resource needs of logistics delivery companies, enabling them to meet their objectives and ensure sustained growth. The study aims to build a model that optimizes the predict...
The recommender system (RS) improves the users’ experience when searching for and buying items by providing recommendations. This paper presents a new hybrid RS called SemCF. SemCF integrates the item’s semantic information and the historical rating data to generate the recommendations. The semantic information is used to determine the users with t...
The term “multi-agent systems” (MAS) refers to a mechanism that is used to create goal-oriented autonomous agents in a shared environment and have communication and coordination capabilities. This goal-oriented mechanism supports distributed data mining (DM) to implement various techniques for distributed clustering, classification, and prediction....
Click fraud is a serious problem facing online advertising business. The malicious intent of clicking online ads either committed by humans or by non-humans, forced financial losses on advertisers utilizing pay-per-click advertising. Non-human traffic is usually designed to inflate web traffic for fraudulent purposes. In this paper, we demonstrate...
With the emergence and the movement toward the Internet of Things (IoT), one of the most significant applications that have gained a great deal of concern is smart cities. In smart cities, IoT is leveraged to manage life and services within a minimal, or even no, human intervention. IoT paradigm has created opportunities for a wide variety of cyber...
Distributed Data Mining (DDM) has been proposed as a means to deal with the analysis of distributed data, where DDM discovers patterns and implements prediction based on multiple distributed data sources. However, DDM faces several problems in terms of autonomy, privacy, performance and implementation. DDM requires homogeneity regarding environment...
Exploration and exploitation are the two main concepts of success for searching algorithms. Controlling exploration and exploitation while executing the search algorithm will enhance the overall performance of the searching algorithm. Exploration and exploitation are usually controlled offline by proper settings of parameters that affect the popula...
The recommendation problem involves the prediction of a set of items that maximize the utility for users. Numerous factors, such as the filtering method and similarity measure, affect the prediction accuracy. We propose a novel prediction mechanism that can be applied to collaborative filtering recommender systems. This prediction mechanism consist...
Nowadays, with the increase in chronic diseases and the aging population in all countries, it has become a huge burden on hospitals to accommodate all patients and monitor them. Applying wireless sensors network for the IoT based medical systems enabled medical doctors and families to monitor patients' conditions all the time through the collected...
Arabic text recognition is a challenging task because of the cursive nature of Arabic writing system, its joint writing scheme, the large number of ligatures and many other challenges. Deep Learning DL models achieved significant progress in numerous domains including computer vision and sequence modelling. This paper presents a model that can reco...
Arabic text recognition is a challenging task because of the cursive nature of Arabic writing system, its joint writing scheme, the large number of ligatures and many other challenges. Deep Learning (DL) models achieved significant progress in numerous domains including computer vision and sequence modelling. This paper presents a model that can re...
Extreme Learning Machine (ELM) is a learning algorithm proposed recently to train single hidden layer feed forward networks (SLFN). It has many attractive properties that include better generalization performance and very fast learning. ELM starts by assigning random values to the input weights and hidden biases and then in one step it determines t...
Abstract. Extracting clinical data from medical or clinical reports is a crucial effort. These records contain the most valuable pieces of evidence of treatments in humans. Integration of information extraction (IE) and ontology can produce a great tool for clinical concept extraction. The aim of this paper is to present a quick overview of the res...
Preterm birth, defined as a delivery before 37 weeks' gestation, continues to affect 8-15% of all pregnancies and is associated with significant neonatal morbidity and mortality. Effective prediction of timing of delivery among women identified to be at significant risk for preterm birth would allow proper implementation of prophylactic therapeutic...
This paper, lays down the logical foundations for a personalized medical prescription system. The proposed system employs detailed pharmaceutical and medical knowledge about a medication and its effects or side effects on the patient, which may go beyond what is available in medication leaflets. The ontology was initially built for the proposed sys...
A multiagent system (MAS) is a mechanism for creating goal-oriented autonomous agents in shared environments with communication and coordination facilities. Distributed data mining benefits from this goal-oriented mechanism by implementing various distributed clustering, classification, and prediction techniques. Hence, this study developed a novel...
These days, mobile devices have very sensitive and personal data that needs to be secured. Mobile devices use authentication techniques to protect data from unauthorized access. Consequently, many authentication mechanisms were proposed and many techniques were applied. One of these mechanisms is the analysis of the typing rhythm. It is also known...
The sparsity problem is considered as one of the
main issues facing the collaborative filtering. This paper presents
a new dimensionality reduction mechanism that is applicable to
collaborative filtering. The proposed mechanism is a statisticalbased
method that exploits the user-item rating matrix and itemfeature
matrix to build the User Interest P...
Although learning from data is effective and has achieved significant milestones, it has many challenges and limitations. Learning from data starts from observations then proceeds to broader generalizations. This framework is controversial in science, yet it has achieved remarkable engineering successes. This paper reflects on some epistemological...
Medical diagnosis can be defined as the detection of a disease by examining a patient’s signs, symptoms and history. Diagnostic reasoning can be viewed as a process of testing hypotheses guided by symptoms and signs. Solutions to diagnostic problems can be found by generating a limited number of hypotheses early in the diagnostic process and using...
Extreme learning machine (ELM) is a novel and recent machine learning algorithm which was first proposed by Huang et al. (Proceedings of 2004 IEEE international joint conference on, pp 985–990, 2004). Over the last decade, ELM has
gained a remarkable research interest with tremendous audiences from different domains in a short period of time due to...
Cloud computing is one of the paradigms that have undertaken to deliver the utility computing concept. It views computing as a utility similar to water and electricity. We aim in this paper to make an investigation of two highly efficacious Cloud platforms: Microsoft Azure (Azure) and Amazon Web Services (AWS) from users’ perspectives the point of...
Drug-drug interactions are generally harmful. This is usually manifested when the patient suffers from more than one disease for which drugs are prescribed and/or more than one drug is needed to be prescribed. The problem is made worse by the wide range of available drugs and the complexity which characterizes the variety of possible interactions o...
As most of the cases of diabetic retinopathy can be eliminated if they were properly treated and monitored in the early stages, and as the patients are usually asymptomatic in the initial stages of diabetic retinopathy, it is vital to enhance the accuracy of predicting this disease. Artificial Neural Network (ANN) is an algorithm that is used for c...
Hospital readmissions increase the healthcare costs and negatively influence hospitals’ reputation. Predicting readmissions in early stages allows prompting great attention to patients with high risk of readmission, which leverages the healthcare system and saves healthcare expenditures. Machine learning helps in providing more accurate predictions...
Hospital readmissions increase the healthcare costs and negatively influence hospitals’ reputation. Predicting readmissions in early stages allows prompting great attention to patients with high risk of readmission, which leverages the healthcare system and saves healthcare expenditures. Machine learning helps in providing more accurate predictions...
In this paper, an ensemble of machine learning classifiers approach is used to classify the sentiment polarity of Arabic text. This approach is based on the majority voting algorithm in conjunction with four classifiers, namely Naive Bayes, Support Vector Machines, Decision Trees and K-Nearest Neighbor algorithms. Four combinations of these classif...
Each nationality has their special culinary practice, which was built by many generations that formed the cultural and historical print of the regional cuisine. Furthermore, nearby regional cuisines tend to learn from each other either due to communication or migration. The geographical closure for Syria, Lebanon, Palestine and Jordan made their cu...
As the early diagnoses helps in curing most diseases or in making them more bearable, it increases the need to build a good prediction model. Artificial Neural Network (ANN) is one of the evolutionary computation techniques that can be used as a prediction model for new data records. The ANN training method implemented is backpropagation which can...
Abstract—This paper, provides a novel, simple and efficient reversible data hiding scheme for protecting and verifying the integrity and authenticity of color images. The importance of the proposed scheme raises from the fact that even they are the ones that are really distributed across the vulnerable networks, only few works pay attention to the...
The virtual world is overflowing with digital items which makes user’s experience when searching for, selecting and
buying items harder. The use of a recommender system can help
alleviate this problem and increase the profit of companies by
generating to the user a list of potential favorite items. This
paper proposes a new hybrid algorithm that de...
In this paper, we extend a temporal defeasible logic with a modal operator Committed to formalize commitments that agents undertake as a consequence of communicative actions (speech acts) during dialogues. We represent commitments as modal sentences. The defeasible dual of the modal operator Committed is a modal operator called Exempted. The logica...
An important application of multi-agent systems is task negotiation. The existing protocols for controlling negotiation in multi-agent systems are either centralized or decentralized. The centralized protocols suffer from dependency on the central agent. If any problem occurs at the central agent, such as shutting down or becoming slow, the whole s...
Drug-drug and drug-disease interactions are generally harmful. Some of these interactions could result from improper drug doses prescribed for a particular disease or from the unawareness the patient suffers from another disease. We aim in this paper to make a first step towards developing a knowledge based system that supports the decision making...
Breast cancer is the second most frequent human neoplasm that accounts for one quarter of all cancers in females. Among the other types of cancers, it is considered to be the main cause of death in women in most countries. An efficient classifier for accurately helping physicians to predict this chronic disease is in high demand. One approach for s...
This paper presents a proposed a model for extraction information from Arabic-based controlled text domains. We define controlled text domains as the text domains that are not restricted in terms of their linguistic features or their knowledge types yet they are not totally undetermined in these respects. A two-phase Information Extraction (IE) sch...
In this chapter, we make a first step toward developing a defeasible description logic system that can represent a flexible publication ontology which can support intelligent queries. It involves using the description logic system ALC to build the ontology. We extend an ALC knowledge base with defeasible rules to yield a defeasible description logi...
We aim in this paper to integrate a non-monotonic rule system (defeasible logic) with description logic-based
ontologies. This can help us in building defeasible medical ontologies using vocabulary defined in description logic. We shall use defeasible reasoning to function on top of description logic. The process involves using the description logi...
Association Classification (AC) technique is a predictive approach that has been investigated widely in the last two decades. Many researchers attempted to use AC in real-world applications such as: text classification, medical diagnoses, fraud detection and website phishing. However, there are a few concerns about using this technique and they are...
We aim in this paper to integrate a nonmonotonic rule system (defeasible logic) with description logic-based ontologies. This can help us in building defeasible medical ontologies using vocabulary defined in description logic. We shall use defeasible reasoning to function on top of description logic. The process involves using the description logic...
Access control policies are specified within systems to ensure confidentiality of their information. Available knowledge about policies is usually incomplete and uncertain. An essential goal in reasoning is to reach conclusions which can be justified. However, since justification does not necessarily guarantee truth, the best we can do is to derive...
Text visualization has become a significant tool that facilitates knowledge discovery and insightful presentation of large amounts of data. This paper presents a visualization system for exploring Arabic text called ViStA. We report about the design, the implementation and some of the experiments we conducted on the system. The development of such...
In this paper, we present an Arabic dialogue
system (also referred to as a conversational agent)
intended to interact with hotel customers and generate
responses about reserving a hotel room and other
services. The system uses text-based natural language
dialogue to navigate customers to the desired answers.
We describe the two main modules used in...
In this paper, we present an Arabic dialogue
system (also referred to as a conversational agent)
intended to interact with hotel customers and generate
responses about reserving a hotel room and other
services. The system uses text-based natural language
dialogue to navigate customers to the desired answers.
We describe the two main modules used in...
The research focus in our paper is twofold: (a) to examine the extent to which simple Arabic sentence structures comply with the Government and Binding Theory (GB), and (b) to implement a simple Arabic Context Free Grammar (CFG) parser to analyze input sentence structures to improve some Arabic Natural Language Processing (ANLP) Applications. Here...
The research focus in our paper is twofold: (a) to examine the extent to which simple Arabic sentence structures comply with the Government and Binding Theory (GB), and (b) to implement a simple Arabic Context Free Grammar (CFG) parser to analyze input sentence structures to improve some Arabic Natural Language Processing (ANLP) Applications. Here...
In this paper, we take the view that any formalization of commitments has to come together with a formalization of time, events/actions and change. We enrich a suitable formalism for reasoning about time, event/action and change in order to represent and reason about commitments. We employ a three-valued based temporal first-order non-monotonic log...
In this paper, we emphasize the role of agents in the development of e-learning systems. We make
a first step towards a learner's centric approach. We present a Content Preparation and Flexible
Delivery System. We show how agents can help in facilitating the design of appropriate educational
material and its delivery in a personalized way. The agen...
In this paper, we employ the Government and Binding theory (GB) to present a system that analyzes the syntactic structure of some simple Arabic sentences structures. We consider different word orders in Arabic and show how they are derived. We include an analysis of Subject-Verb-Object (SVO), Verb-Object-Subject (VOS), Verb-Subject-Object (VSO), no...
The amount of unstructured textual data on the Internet has been increased dramatically. Text visualization becomes a significant tool that facilitates knowledge discovery and insightful presentation of large amounts of data. In this paper we present a technique of the visual exploration of Arabic text documents. We apply Latent Semantic Indexing (...
Availability is one of the important criteria that affect the usefulness and efficiency of a distributed system. It mainly depends on how the components are deployed on the available hosts. In this paper, we present a generic agent-based monitor approach that supports the dynamic component redeployment and replication mechanisms which were presente...
In this paper, we propose an agent-based framework for collaborative problem-solving. We emphasize the knowledge representation and knowledge sharing issues. We employ a three-valued based Temporal First-Order Nonmonotonic Logic that allows an explicit representation of events/actions and can handle dialogue game protocols and temporal aspects expl...
Recent years have witnessed the movement of many applications from the traditional closed environments into open ones. These applications, which are being accessed via web browsers, usually offer a great amount of information and services. Open environments and content explosion may affect the usability of web applications, where usability measures...
Interdisciplinary Collaboration is essential for successful interdisciplinary activities such as large research projects and interdisciplinary problem solving. An Interdisciplinary Collaboration Support System should assist in providing experts in different disciplines (discipline-based knowledge workers) with (some of) the knowledge, experiences a...
In this paper, we propose a knowledge management system that employs agents and case-based reasoning to extract tacit knowledge
and support organizational learning and decision making at the level of individual workers, group workers and the whole organization.
Agents will perform the tasks of inquiry, investigation, sharing and updating of knowle...
One of the important criteria that affect the usefulness and efficiency of a distributed system is availability, which mainly
depends on how the components of the system are deployed on the available hosts. If the components that need lots of interaction
are on the same host, the availability will definitely be higher given that all the components...
We develop, in this paper, a representation of time and events that supports a range of reasoning tasks such as monitoring
and detection of event patterns which may facilitate the explanation of root cause(s) of faults. We shall compare two approaches
to event definition: the active database approach in which events are defined in terms of the cond...
Knowledge sharing between various components of a system is a prerequisite for a successful knowledge management system. A knowledge sharing model includes providing knowledge workers with the knowledge, experiences and insights which they need to perform their tasks. We propose a multi-agent system that assists in the process of knowledge sharing...
Knowledge sharing between various components of a system is a prerequisite for a successful knowledge management system. A
knowledge sharing model includes providing knowledge workers with the knowledge, experiences and insights which they need
to perform their tasks. We propose a multi-agent system that assists in the process of knowledge sharing...
This paper presents a new parallel implementation algorithm for solving pair DNA sequence alignment. The algorithm is based on Needleman-Wunsch algorithm using threads. The proposed algorithm fills the similarity matrix, of the DNA sequences, Row Column, and Diagonal wise (RCD) using threads. Several algorithms for filling the similarity matrix suc...
Interests in Mobile Agents (MA) are rising because there are several benefits which can be associated with their employment. In this paper we propose a Mobile Agent-based Information Sharing Technique (MA-IST) to help knowledge workers and information seekers to search for and share specific information scattered around a network of nodes. We shall...
We propose a partial information state-based framework for collaborative dialogue and argument between agents. We employ a three-valued based nonmonotonic logic, NML3, for representing and reasoning about Partial Information States (PIS). NML3 formalizes some aspects of revisable reasoning and it is sound and complete. Within the framework of NML3,...
In this paper, we make a first step towards a formal model of dialogue and argumentation for a multi-agent problem solving. We shall present a multi-agent system for problem solving. We shall the notion of collaborative problem solving and discuss some of the related communication issues. we propose a partial information state based framework for d...
The problem of partitioning a large number of entities into a fixed number of groups on the basis of a set of attributes associated with each entity has required an intensive research work in the literature. We have investigated a previous research related to this problem and proposed a method that is based on fuzzy clustering techniques. Jordan Un...
In this paper, we make a first step towards a formal model of dialogue and argumentation for a multi-agent (model-based) diagnostic system. We shall discuss some of the issues in multi-agent cooperative fault diagnosis, the theories of communicating agents and their reasoning capabilities. We propose a Partial Information State (PIS)-based framewor...
We make the assumptions that deep knowledge based
reasoning and analytical capability are necessary to
effectively deal with various ongoing issues related to
complex systems operations that transcend the boundary
of a single discipline. Furthermore, Knowledge
communication between disciplines is a prerequisite for
successful interdisciplinary rese...
A fast distance-based algorithm for outlier detection will be proposed. It was found that the proposed algorithm reduced the number of distance calculations compared to the nestedloop algorithm. Test results were performed on different well-known data sets. The results showed that the proposed algorithm gave a reasonable amount of CPU time saving.
We aim, in this paper, to make a a first step towards developing a model of knowledge acquisition/learning via cooperative dialogue. A key idea in the model is the concept of integrating exchanged information, via dialogue, within an agent's theory. The process is nonmonotonic. Dialogue is a structured process and the structure is relative to what...
Questions
Question (1)