• Home
  • Nidhal Kamel Taha El-Omari
Nidhal Kamel Taha El-Omari

Nidhal Kamel Taha El-Omari
The World Islamic Science and Education University (WISE)

Full Prof, B.Sc. in Computer Science, Higher Diploma in Branch Automation Officer, M. Eng. in Computer Engineering–Embedded Systems, PhD - Digital Image Processing using Artificial Neural Network (ANN)

About

56
Publications
1,393,826
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
210
Citations
Introduction
Around 34 years of experience in the software industry, including more than 13 years in teaching university courses for various computer science topics such as object-oriented languages, algorithms, requirements engineering, advanced database management, operations research, and digital logic. I have more than 33 publications on various computer science topics. I worked as a Computer Science lecturer, project manager, team leader, IT consultant, and developer.
Additional affiliations
September 2015 - present
The World Islamic Science and Education University
Position
  • Professor (Associate)
September 2014 - September 2018
The World Islamic Science and Education University
Position
  • Head of Department
May 2009 - September 2014
The World Islamic Science and Education University
Position
  • Head of Department
Education
February 2005 - August 2008
Arab Academy for Banking and Financial Science
Field of study
  • Information Systems and Technology
February 2003 - February 2005
Yarmouk University
Field of study
  • Computer Engineering
October 1982 - February 1986
Yarmouk University
Field of study
  • Computer Science

Publications

Publications (56)
Article
Full-text available
Intrusion detection is a serious and complex problem. Undoubtedly due to a large number of attacks around the world, the concept of intrusion detection has become very important. This research proposes amultilayer bioinspired feature selection model for intrusion detection using an optimized genetic algorithm. Furthermore, the proposed multilayer m...
Article
Full-text available
Machine learning algorithms have been deployed in numerous optimization, prediction and classification problems. This has endeared them for application in fields such as computer networks and medical diagnosis. Although these machine learning algorithms achieve convincing results in these fields, they face numerous challenges when deployed on imbal...
Article
Full-text available
Commonly, the technology of information scales by an order of magnitude and with high probability reinvents itself every five years or so. However, the long-standing dream has definitely become a reality today that saying you need merely a credit card to get on-demand instant accesses to a large pool of thousands, if not millions of computers found...
Article
Full-text available
There is a shred of ample evidence that optimization is an enormous field that pervades essentially every aspect of our day-to-day life ranging from academic and engineering fields, going to industrial and agricultural segments, passing through social domains, and ending with commercial and business sectors. Evidently, the philosophy of optimizatio...
Article
Full-text available
Image data compression algorithms are essential for getting storage space reduction and, perhaps more importantly, to increase their transfer rates, in terms of space-time complexity. Considering that there isn't any encoder that gives good results across all image types and contents, this paper proposed an evolvable lossless statistical block-base...
Chapter
The initial signaling and data exchanges over open wireless transmission channels in vehicular ad hoc networks (VANETs) renders these networks susceptible to security and privacy violation attacks such as impersonation and packet replays. To curb this, a number of protocols have been proposed such as Public Key Infrastructure (PKI) based schemes, i...
Conference Paper
Full-text available
The initial signaling and data exchanges over open wireless transmission channels in vehicular ad hoc networks (VANETs) renders these networks susceptible to security and privacy violation attacks such as impersonation and packet replays. To curb this, a number of protocols have been proposed such as Public Key Infrastructure (PKI) based schemes, i...
Article
A research implementation of enterprise resource planning (ERP) systems by medium and large industries is one of the alternatives available to consolidate their competitive position by integrating their activities. Deep learning techniques have been used extensively in the ERP systems for identifying the critical factors making an impact on the usa...
Poster
Full-text available
Journal of Basic and Applied Research International (ISSN: 2395-3438 (Print), 2395-3446 (Online)) aims to publish high quality papers in all disciplines of science and technology. Scope of this journal includes (but not limited to): physics, chemistry, biology, environmental sciences, geology, medicine, engineering, agriculture, biotechnology, nan...
Presentation
Full-text available
Many theoretical and practical aspects of heuristic and metaheuristic approaches, from classical to novel approaches, are discussed and covered.
Presentation
Full-text available
Cloud Computing, Big Data, and Internet of Things
Presentation
Full-text available
Image data compression algorithms are essential for getting storage space reduction and, perhaps more importantly, to increase their transfer rates, in terms of space-time complexity. Considering that there isn't any encoder that gives good results across all image types and contents, this paper proposed an evolvable lossless statistical block-base...
Poster
Full-text available
Global Navigation Satellite System (GNSS), Remote Sensing (RS), and Geographic Information System (GIS) Intensive Training Course, Regional Centre for Space Science Technology Education for Western Asia/ United Nations (RCSSTEWA), Amman-Jordan, 2020.
Presentation
Full-text available
Cloud Computing, Big Data & Internet of Things
Poster
Full-text available
Invited Speaker about Big Data, Cloud Computing (CC), and Internet-of-Things (IoT), World Space Week, Sponsored by The World Space Week Association (WSWA), Hosted by The Regional Center for Space Science and Technology Education for Western Asia / United Nations (RCSSTEWA), and Arab Union for Astronomy and Space Sciences (AUASS), it will be held on...
Presentation
Full-text available
This is the CV of Prof. Nidhal Kamel Taha El-Omari
Article
Nowadays, unifying heterogeneous databases has received a lot of attention. This paper presents a new object-oriented model to unify heterogeneous databases into one highly versatile database based on three phases: preprocessing phase in which the ‘materialised view’ (MV), is adopted to collect the data from multiple resources. The ‘OODB-constructi...
Presentation
Full-text available
Life and Death of Objects in Java: How and Why
Poster
Full-text available
(java.awt) vs (javax.swing)
Article
Full-text available
This paper proposes and implements an efficient real-time vehicle counting (RT-VC) approach. This approach is based on the most efficient action detection and tracking methods in computer vision. YOLO is used for object detection, whereas Kalman filter with Hungarian algorithm are used for tracking. The road is divided into two zones of interest by...
Article
Full-text available
As a matter of fact, text classification is one of the hottest topics for many researchers and practitioners. It is an important topic to be taken especially that there are a large ever-growing number of electronic documents. There are many efficient researches related to English text classification, though that is not the case for Arabic. The numb...
Article
Full-text available
With the exponential growth in computing and microprocessor technology, it is natural to expect that secondary storage technology must also take steps to keep up in improving performance and enhancing reliability with the fundamental need. Redundant array of independent disks (RAID), based on the magnetic disk technology, is a widely used tactic fo...
Article
Full-text available
Images and scanned text documents are gradually more used in a vast range of applications. To reduce the needed storage or to accelerate their move through the computers networks, the document images have to be compressed. Traditional compression mechanisms, which are generally developed with a particular image type and purpose, are facing many cha...
Article
Full-text available
Information systems designed and developed in house to fit a specific or small set of functions. It’s typically much smaller than enterprise system, however most of these developments also required more time, high cost to develop, not integrated, unclear customer requirements, and the most importantly working version is available during the impleme...
Article
Full-text available
Volunteering plays an essential role in the context of development of any society. In Jordan, the volunteerism concept started to have a considerable role in both economic and social security development. An Emergency volunteering system is the first line of defense against emergencies of all kinds before the intervention of the central government....
Article
Full-text available
Text classification is one of the most important tasks in data mining. This paper investigates different variations of vector space models (VSMs) using KNN algorithm. The bases of our comparison are the most popular text evaluation measures. The Experimental results against the Saudi data sets reveal that Cosine outperformed Dice and Jaccard coeffi...
Article
Full-text available
Literature search show that information retrieval (IR) systems on Arabic are little compared with English language. Additionally, IR systems face many problems when used with Arabic language, including, complexity and ambiguity. The performance and effectiveness of interactive query expansion (IQE) and automatic query expansion (AQE) represent a ke...
Article
Full-text available
This paper presents the main findings of a survey conducted to evaluate the e-business readiness of small and medium enterprises in Jordan. A questionnaire was administered in the late 2011 to 200 SME operating in different economical sectors in the country. The survey aimed at analyzing the e-business readiness of these organizations by exploring...
Article
Full-text available
In the past few decades wireless networks have become increasingly popular, due to the wide availability and rapid introduction of wireless transceivers into a variety of computing devices such as PDAs, laptop and desktop computers. Global Positioning System (GPS) is used to determine position and speed of objects by using the satellite technology....
Conference Paper
Full-text available
The environmental structure is notable in the stability among its elements and it can acclimate,
Article
Full-text available
Data compression algorithms aim for getting size reduction, equals to the minimum storage requirements, and maximum speed transmission. The main problem of the most existing methods of text compression is that they are sensitive to text color, size, font, and background clutter. Depending on a prior segmentation process, that defines a segment as a...
Article
Full-text available
In multicast routing the scalability issue should be considered, this issue comes because the increasing in the size of the Multicast Forwarding Table (MFT) because of the increase in multicast group members or the increase in the number of multicast groups. SReM[1] is a multicast routing protocol that addressed this issue by explicitly encode the...
Article
Full-text available
As future becomes more and more knowledge-driven, Information and Communication Technology (ICT), backed by modern wireless technologies, plays a critical important role in developing countries. Jordanian government is focusing on Internet access to connect cities and to make Jordan as a leading knowledge society. In remote areas with no infrastruc...
Article
Full-text available
Document images are composed of graphics, pictures, text, and background with varying number of colors. Based on the detected number of colors contained in a document image, a new approach for document image segmentation and classification using an Artificial Neural Network (ANN) technique is proposed. The ANN is designed to learn how to recognize...
Conference Paper
Full-text available
Worldwide Interoperability for Microwave Access (WiMAX) may provide connectivity for the First Responders Community (FRC) in the field responding to a disaster to be used as a public safety network. This study proposes WiMAX as a network for Amman-Jordan based on a business model that utilizes government assets along with private sector participati...
Conference Paper
Full-text available
Municipal WiFi network is a concept of providing Wireless Fidelity (WiFi) connectivity for the residents in the area of a certain municipality with minimum charge for them. Several business models could be adopted by the municipality to deploy the network with or without the participation of the private sector. This study proposes Amm-Fi™ as a prop...
Article
Full-text available
More recently, computer scientists have found in the study of social insect's behavior a source of inspiration for the design and implementation of optimization algorithms. Particularly, the study of bee colonies behavior turned out to be very attractive to develop problem solving algorithms. However, this paper introduces a new algorithm that are...
Conference Paper
Full-text available
This paper describes a statistical Block-based technique for document image segmentation and compression. Based on the number of detected colors in each region of the image, this approach creates a new representation of the image that can produce very highly-compressed document files that nonetheless retain excellent image quality. Firstly, the pro...
Thesis
Full-text available
The objective of document analysis systems is to recognize and extract the various image components in the usually scanned images as a human would. Segmentation is the formation of separated regions by decomposition of an image into smaller parts that are meaningful with respect to a particular application. The goal of this dissertation is to prov...
Thesis
Full-text available
Vehicle tracking or any a mobile entity has been designed by installing and fitting a device into any vehicle or any a mobile entity, either self-powered with a battery or wired into the vehicle's power system. The device board contained two processors that were programmed using assembly language. The device captures and tracks the GPS location inf...
Article
Full-text available
This paper presents all the required software modules for the user interface of the framework model for the automation of product design processes. The proposed framework model is based on the behavior of human product designer during the design processes of a product and the philosophy of virtual engineering. This paper is a continuation of previo...

Questions

Questions (90)

Network

Cited By

Projects

Projects (6)
Project
To develop ML algorithms for efficient and accurate disease classification.
Project
This project is related to the official peer-review certificates.
Archived project
To shed the light on my experiences.