Nidhal Kamel Taha El-OmariThe World Islamic Science and Education University (WISE)
Nidhal Kamel Taha El-Omari
Full Prof, B.Sc. in Computer Science, Higher Diploma in Branch Automation Officer, M. Eng. in Computer Engineering–Embedded Systems, PhD - Ph.D. in Artificial Intelligence and Digital Image Processing & Encryption,
About
58
Publications
2,310,732
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
318
Citations
Introduction
Around 34 years of experience in the software industry, including more than 13 years in teaching university courses for various computer science topics such as object-oriented languages, algorithms, requirements engineering, advanced database management, operations research, and digital logic. I have more than 33 publications on various computer science topics. I worked as a Computer Science lecturer, project manager, team leader, IT consultant, and developer.
Additional affiliations
September 2014 - September 2018
September 2015 - present
May 2009 - September 2010
Publications
Publications (58)
Human-robot interaction (HRI) which has become the fundamental need of the hour is born out of the necessity for studying the relation between humans and robots. This cutting-edge discipline is a multidisciplinary field that draws from computer science, robotics along with human-computer interaction and psychology. It focuses mainly on designing an...
There is a shred of ample evidence that optimization is an enormous field that pervades essentially every aspect of our day-to-day life ranging from academic and engineering fields, going to industrial and agricultural segments, passing through social domains, and ending with commercial and business sectors. Evidently, the philosophy of optimizatio...
Commonly, the technology of information scales by an order of magnitude and with high probability reinvents itself every five years or so. However, the long-standing dream has definitely become a reality today that saying you need merely a credit card to get on-demand instant accesses to a large pool of thousands, if not millions of computers found...
Intrusion detection is a serious and complex problem. Undoubtedly due to a large number of attacks around the world, the concept of intrusion detection has become very important. This research proposes amultilayer bioinspired feature selection model for intrusion detection using an optimized genetic algorithm. Furthermore, the proposed multilayer m...
Machine learning algorithms have been deployed in numerous optimization, prediction and classification problems. This has endeared them for application in fields such as computer networks and medical diagnosis. Although these machine learning algorithms achieve convincing results in these fields, they face numerous challenges when deployed on imbal...
Image data compression algorithms are essential for getting storage space reduction and, perhaps more importantly, to increase their transfer rates, in terms of space-time complexity. Considering that there isn't any encoder that gives good results across all image types and contents, this paper proposed an evolvable lossless statistical block-base...
The initial signaling and data exchanges over open wireless transmission channels in vehicular ad hoc networks (VANETs) renders these networks susceptible to security and privacy violation attacks such as impersonation and packet replays. To curb this, a number of protocols have been proposed such as Public Key Infrastructure (PKI) based schemes, i...
The initial signaling and data exchanges over open wireless transmission channels in vehicular ad hoc networks (VANETs) renders these networks susceptible to security and privacy violation attacks such as impersonation and packet replays. To curb this, a number of protocols have been proposed such as Public Key Infrastructure (PKI) based schemes, i...
A research implementation of enterprise resource planning (ERP)
systems by medium and large industries is one of the alternatives available to consolidate their competitive position by integrating their activities. Deep learning techniques have been used extensively in the ERP systems for identifying the critical factors making an impact on the usa...
Journal of Basic and Applied Research International (ISSN: 2395-3438 (Print), 2395-3446 (Online)) aims to publish high quality papers in all disciplines of science and technology.
Scope of this journal includes (but not limited to): physics, chemistry, biology, environmental sciences, geology, medicine, engineering, agriculture, biotechnology, nan...
Many theoretical and practical aspects of heuristic and metaheuristic approaches, from classical to novel approaches, are discussed and covered.
Cloud Computing, Big Data, and Internet of Things
Image data compression algorithms are essential for getting storage space reduction and, perhaps more importantly, to increase their transfer rates, in terms of space-time complexity. Considering that there isn't any encoder that gives good results across all image types and contents, this paper proposed an evolvable lossless statistical block-base...
Global Navigation Satellite System (GNSS), Remote Sensing (RS), and Geographic Information System (GIS) Intensive Training Course, Regional Centre for Space Science Technology Education for Western Asia/ United Nations (RCSSTEWA), Amman-Jordan, 2020.
Cloud Computing,
Big Data
&
Internet of Things
Invited Speaker about Big Data, Cloud Computing (CC), and Internet-of-Things (IoT), World Space Week, Sponsored by The World Space Week Association (WSWA), Hosted by The Regional Center for Space Science and Technology Education for Western Asia / United Nations (RCSSTEWA), and Arab Union for Astronomy and Space Sciences (AUASS), it will be held on...
Nowadays, unifying heterogeneous databases has received a lot of attention. This paper presents a new object-oriented model to unify heterogeneous databases into one highly versatile database based on three phases: preprocessing phase in which the 'materialised view' (MV), is adopted to collect the data from multiple resources. The 'OODB-constructi...
This is the CV of Prof. Nidhal Kamel Taha El-Omari
Life and Death of Objects in Java: How and Why
As a matter of fact, text classification is one of the hottest topics for many researchers and practitioners. It is an important topic to be taken especially that there are a large ever-growing number of electronic documents. There are many efficient researches related to English text classification, though that is not the case for Arabic. The numb...
With the exponential growth in computing and microprocessor technology, it is natural to expect that secondary storage technology must also take steps to keep up in improving performance and enhancing reliability with the fundamental need. Redundant array of independent disks (RAID), based on the magnetic disk technology, is a widely used tactic fo...
Images and scanned text documents are gradually more used in a vast range of applications. To reduce the needed storage or to accelerate their move through the computers networks, the document images have to be compressed. Traditional compression mechanisms, which are generally developed with a particular image type and purpose, are facing many cha...
Information systems designed and developed in house to fit a specific or small set of functions. It’s typically much smaller than enterprise system, however most of these developments also required more time, high cost to develop, not integrated, unclear customer requirements, and the most importantly working version is available during the impleme...
Volunteering plays an essential role in the context of development of any society. In Jordan, the volunteerism concept started to have a considerable role in both economic and social security development. An Emergency volunteering system is the first line of defense against emergencies of all kinds before the intervention of the central government....
Text classification is one of the most important tasks in data mining. This paper investigates different variations of vector space models (VSMs) using KNN algorithm. The bases of our comparison are the most popular text evaluation measures. The Experimental results against the Saudi data sets reveal that Cosine outperformed Dice and Jaccard coeffi...
Literature search show that information retrieval (IR) systems on Arabic are little compared with English language. Additionally, IR systems face many problems when used with Arabic language, including, complexity and ambiguity. The performance and effectiveness of interactive query expansion (IQE) and automatic query expansion (AQE) represent a ke...
This paper presents the main findings of a survey conducted to evaluate the e-business readiness of small and medium enterprises in Jordan. A questionnaire was administered in the late 2011 to 200 SME operating in different economical sectors in the country. The survey aimed at analyzing the e-business readiness of these organizations by exploring...
In the past few decades wireless networks have become increasingly popular, due to the wide availability and rapid introduction of wireless transceivers into a variety of computing devices such as PDAs, laptop and desktop computers. Global Positioning System (GPS) is used to determine position and speed of objects by using the satellite technology....
The environmental structure is notable in the stability among its elements and it can acclimate,
Data compression algorithms aim for getting size reduction, equals to the minimum
storage requirements, and maximum speed transmission. The main problem of the most
existing methods of text compression is that they are sensitive to text color, size, font, and
background clutter. Depending on a prior segmentation process, that defines a segment as a...
In multicast routing the scalability issue
should be considered, this issue comes
because the increasing in the size of the
Multicast Forwarding Table (MFT) because
of the increase in multicast group members
or the increase in the number of multicast
groups. SReM[1] is a multicast routing
protocol that addressed this issue by
explicitly encode the...
As future becomes more and more knowledge-driven, Information and Communication Technology (ICT), backed by modern wireless technologies, plays a critical important role in developing countries. Jordanian government is focusing on Internet access to connect cities and to make Jordan as a leading knowledge society. In remote areas with no infrastruc...
Document images are composed of graphics, pictures, text, and background with varying number of colors. Based on the detected number of colors contained in a document image, a new approach for document image segmentation and classification using an Artificial Neural Network (ANN) technique is proposed. The ANN is designed to learn how to recognize...
Worldwide Interoperability for Microwave Access (WiMAX) may provide connectivity for the First Responders Community (FRC) in the field responding to a disaster to be used as a public safety network. This study proposes WiMAX as a network for Amman-Jordan based on a business model that utilizes government assets along with private sector participati...
Municipal WiFi network is a concept of providing Wireless Fidelity (WiFi) connectivity for the residents in the area of a certain municipality with minimum charge for them. Several business models could be adopted by the municipality to deploy the network with or without the participation of the private sector. This study proposes Amm-Fi™ as a prop...
More recently, computer scientists have found in the study of social insect's behavior a source of inspiration for the design and implementation of optimization algorithms. Particularly, the study of bee colonies behavior turned out to be very attractive to develop problem solving algorithms. However, this paper introduces a new algorithm that are...
This paper describes a statistical Block-based technique for document image segmentation and compression. Based on the number of detected colors in each region of the image, this approach creates a new representation of the image that can produce very highly-compressed document files that nonetheless retain excellent image quality. Firstly, the pro...
The objective of document analysis systems is to recognize and extract the various image components in the usually scanned images as a human would. Segmentation is the formation of separated regions by decomposition of an image into smaller parts that are meaningful with respect to a particular application.
The goal of this dissertation is to prov...
Vehicle tracking or any a mobile entity has been designed by installing and fitting a device into any vehicle or any a mobile entity, either self-powered with a battery or wired into the vehicle's power system. The device board contained two processors that were programmed using assembly language.
The device captures and tracks the GPS location inf...
This paper presents all the required software modules for the user interface of the framework model for the automation of product design processes. The proposed framework model is based on the behavior of human product designer during the design processes of a product and the philosophy of virtual engineering. This paper is a continuation of previo...
Questions
Questions (97)