Omar TarawnehAmman Arab University · Department of Software Engineering
Omar Tarawneh
Doctor of Philosophy
Looking for new position and collaborator's
About
34
Publications
31,827
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
123
Citations
Introduction
Currently, Omar holds the esteemed position of Associate Professor at Amman Arab University in Amman, Jordan. His research interests span a diverse range of subjects, including Quantum Computation, Software Quality and Certification, Fuzzy Logic, Software Development, Multi-Criteria Decision Making, and Quality Assurance. With over 30 technical publications to his name.
Publications
Publications (34)
Wireless sensor networks (WSN) have become widely used as technology in various industries, including the military, healthcare, and automation. regardless of their usefulness, WSNs are vulnerable to various cyber threats, such as denial of service (DoS), node replication attacks, and physical tempering. Due to the nature of WSNs being resource-cons...
The increase of smart devices and a vast amount of telecommunication growth raises the tendency to convert convolution cities into emerging smart cities. This paper synthesizes key findings and insights from a comprehensive presentation, addressing critical aspects of smart city security. It underscores the pivotal role of robust security strategie...
Heart Disease is one of the diseases that cause deaths in large numbers, so predicting these diseases is one of the most necessary tasks in the field of heart to reduce the number of deaths by providing health care to patients, so the process of forecasting these diseases aids in reducing disease-related risks and alerting patients to them. In this...
The study discusses the importance of summarization in dealing with a large amount of data available on the internet. The study used a deep-learning algorithm based on functions from the spacy library in Python to summarize news articles and evaluated the impact of named entity recognition on the summarization process. The study assessed different...
Software certification involves assessing and certifying the quality of the software process based on multiple evaluation criteria where each criterion has different importance values on the quality of the software. However, the different importance values of the evaluation criteria have not been addressed in the existing software process certifica...
Performance, usability, and security are the focus of software systems development. Confidentiality, availability and integrity are the main goals of these systems security. One common software system that needs to be secured is exams, which is an assessment method to measure student performance in education. Sharing exams between faculty members i...
COVID-19 is the common name of the disease caused by the novel coronavirus (2019-nCoV) that appeared in Wuhan, China in 2019. Discovering the infected people is the most important factor in the fight against the disease. The gold-standard test to diagnose COVID-19 is polymerase chain reaction (PCR), but it takes 5–6 h and, in the early stages of in...
Mushroom is one of the important ingredient in our food that has good nutrients. Most types of mushroom are poisonous (inedible), and because of its importance, we need to identify poisonous from eatable mushrooms. Machine learning (ML) techniques such as naïve Bayes, decision tree, SVM, and more applied on mushroom features to classify it into edi...
The adverse effects of phishing attacks on unsuspecting victims are damaging and nefarious. Stealing of information from unsuspecting users surges on the internet and various solutions have been proposed to curb this menace. Apparently, the evasiveness of phishing attacks through dynamic processes renders these solutions ineffective. To curb this p...
Cancer is a major health issue that affects individuals all over the world. This disease has claimed the lives of many people, and will continue to do so in the future. Breast cancer has recently surpassed cervical cancer as the most frequent cancer among women in both industrialized and developing countries and it is now the second leading cause o...
The stability, electronic and optical properties of possible two-dimensional (2D) Li2S monolayer with orthorhombic atomic configuration denoted as O-Li2S monolayer is theoretically investigated. It is shown that the proposed 2D O-Li2S monolayer shows exhibits the space group of 59_Pmmn and is energetically and kinetically stable. Our electronic pro...
The application of the development and measurement
practices is very essential to acquire a high quality final
product. This paper examines the extent of performing these
practices in Jordanian small software firms (JSSF) as there is
a lack of studies that conducted in the field. The results of this
study were attained by8 performing three stages:...
software process, which can deal with many challenges facing the mobile app development process. These challenges include: volatility of requirements, strong user involvement, development time tightness, process simplicity, and production of valuable software in low cost. This research study investigates the current mobile app development approache...
Capability Maturity Model Integration for Development
Version 1.2 (CMMI-Dev1.2) is a common and popular model
for controlling project development process, improving
quality, and capacity evaluation. On the other side, eXtreme
Programming (XP) is the one of the most popular and
effective agile development method to be used for Small
Software Develop...
Landauer's principle is a fundamental link between thermodynamics and information theory, which implies that the erasure of information comes at an energetic price. In the present contribution we analyze to what extend the usual molecular dynamics (MD) simulation formalism can handle the Landauer's bound kBT ln 2 in the simplest case of one particl...
We study the nonlocality dynamics for two models of atoms in cavity quantum electrodynamics (QED); the first model contains atoms in a single cavity undergoing nearest-neighbor interactions with no initial correlation, and the second contains atoms confined in n different and noninteracting cavities, all of which were initially prepared in a maxima...
Over the last half century, the components of computers have become smaller by a factor of two every 18 months, a phenomenon known as Moore’s law. In state-of-the-art computers, the smallest wires and transistors are approaching 100 nm feature size, which is approximately 1000x the diameter of an atom. Quantum mechanics is the theory of physics tha...
Most existing realizations of quantum key distribution (QKD) are point-to-point systems with one source transferring to only one destination. Growth of these single-receiver systems has now achieved a reasonably sophisticated point. However, many communication systems operate in a point-to-multi-point (Multicast) configuration rather than in point-...
In this chapter the principles of quantum computing and communications has been proposed.
Neural network and quantum computer have the same conceptual structure similar to Huygens sources in the wave field generation. Any point of the space is a source with different intensity of waves that transport information in all the space where are superposed in a complex way to generate the wave field. In wave theory this sources are denoted Huy...
In this chapter, securing the transmitted multicast information can be achieved through IPsec multicast architecture. The process of IPsec involves the sender and destinations to agree on IPsec keys. These keys are used for protection transmitted information among communicated peers over IPsec network. IPsec depends on classical algorithm for key g...
In this chapter, a generalized architecture of quantum secure direct communication for N disjoint users with partial and full cooperation of quantum server is proposed. So, \( N - 1 \) disjointed users \( u_{1},\, u_{2},\, \ldots,\, u_{N - 1} \) can transmit a secret message of classical bits to a remote user \( u_{N} \) by utilizing the property o...
Most existing realizations of quantum key distribution (QKD) are point-to-point systems with one source transferring to only one destination. Growth of these single-receiver systems has now achieved a reasonably sophisticated point. However, many communication systems operate in a point-to-multi-point (Multicast) configuration rather than in point-...
Neural network and quantum computer have the same conceptual structure similar to Huygens sources in the wave field generation. Any point of the space is a source with different intensity of waves that transport information in all the space where are superposed in a complex way to generate the wave field. In wave theory this sources are denoted Huy...
The automatic prediction and detection of breast cancer disease is an imperative, challenging problem in medical applications. In this paper, a proposed model to improve the accuracy of classification algorithms is presented. A new approach for designing effective pre-processing stage is introduced. Such approach integrates K-means clustering algor...
Multipartite entanglement and the maximum violation of Bell inequalities are studied in finite clusters of spins in an extended J1–J2 Heisenberg model at zero temperature. The ensuing highly frustrated states will unveil a rich structure for different values of the corresponding spin–spin interaction strengths. The interplay between nearest-neighbo...
A NoSQL injection attack targets interactive Web applications that employ NoSQL database services. These applications accept user inputs and use them to form query statements at runtime. During NoSQL injection attack, an attacker might provide malicious query segments as user input which could result in a different database request. In this paper,...