Omar Tarawneh

Omar Tarawneh
Amman Arab University · Department of Software Engineering

Doctor of Philosophy
Looking for new position and collaborator's

About

34
Publications
31,827
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
123
Citations
Introduction
Currently, Omar holds the esteemed position of Associate Professor at Amman Arab University in Amman, Jordan. His research interests span a diverse range of subjects, including Quantum Computation, Software Quality and Certification, Fuzzy Logic, Software Development, Multi-Criteria Decision Making, and Quality Assurance. With over 30 technical publications to his name.

Publications

Publications (34)
Chapter
Full-text available
Wireless sensor networks (WSN) have become widely used as technology in various industries, including the military, healthcare, and automation. regardless of their usefulness, WSNs are vulnerable to various cyber threats, such as denial of service (DoS), node replication attacks, and physical tempering. Due to the nature of WSNs being resource-cons...
Conference Paper
Full-text available
The increase of smart devices and a vast amount of telecommunication growth raises the tendency to convert convolution cities into emerging smart cities. This paper synthesizes key findings and insights from a comprehensive presentation, addressing critical aspects of smart city security. It underscores the pivotal role of robust security strategie...
Conference Paper
Full-text available
Heart Disease is one of the diseases that cause deaths in large numbers, so predicting these diseases is one of the most necessary tasks in the field of heart to reduce the number of deaths by providing health care to patients, so the process of forecasting these diseases aids in reducing disease-related risks and alerting patients to them. In this...
Preprint
Full-text available
The study discusses the importance of summarization in dealing with a large amount of data available on the internet. The study used a deep-learning algorithm based on functions from the spacy library in Python to summarize news articles and evaluated the impact of named entity recognition on the summarization process. The study assessed different...
Article
Full-text available
Software certification involves assessing and certifying the quality of the software process based on multiple evaluation criteria where each criterion has different importance values on the quality of the software. However, the different importance values of the evaluation criteria have not been addressed in the existing software process certifica...
Preprint
Full-text available
Performance, usability, and security are the focus of software systems development. Confidentiality, availability and integrity are the main goals of these systems security. One common software system that needs to be secured is exams, which is an assessment method to measure student performance in education. Sharing exams between faculty members i...
Article
Full-text available
COVID-19 is the common name of the disease caused by the novel coronavirus (2019-nCoV) that appeared in Wuhan, China in 2019. Discovering the infected people is the most important factor in the fight against the disease. The gold-standard test to diagnose COVID-19 is polymerase chain reaction (PCR), but it takes 5–6 h and, in the early stages of in...
Conference Paper
Full-text available
Mushroom is one of the important ingredient in our food that has good nutrients. Most types of mushroom are poisonous (inedible), and because of its importance, we need to identify poisonous from eatable mushrooms. Machine learning (ML) techniques such as naïve Bayes, decision tree, SVM, and more applied on mushroom features to classify it into edi...
Article
Full-text available
The adverse effects of phishing attacks on unsuspecting victims are damaging and nefarious. Stealing of information from unsuspecting users surges on the internet and various solutions have been proposed to curb this menace. Apparently, the evasiveness of phishing attacks through dynamic processes renders these solutions ineffective. To curb this p...
Article
Full-text available
Cancer is a major health issue that affects individuals all over the world. This disease has claimed the lives of many people, and will continue to do so in the future. Breast cancer has recently surpassed cervical cancer as the most frequent cancer among women in both industrialized and developing countries and it is now the second leading cause o...
Article
Full-text available
The stability, electronic and optical properties of possible two-dimensional (2D) Li2S monolayer with orthorhombic atomic configuration denoted as O-Li2S monolayer is theoretically investigated. It is shown that the proposed 2D O-Li2S monolayer shows exhibits the space group of 59_Pmmn and is energetically and kinetically stable. Our electronic pro...
Article
Full-text available
The application of the development and measurement practices is very essential to acquire a high quality final product. This paper examines the extent of performing these practices in Jordanian small software firms (JSSF) as there is a lack of studies that conducted in the field. The results of this study were attained by8 performing three stages:...
Article
Full-text available
software process, which can deal with many challenges facing the mobile app development process. These challenges include: volatility of requirements, strong user involvement, development time tightness, process simplicity, and production of valuable software in low cost. This research study investigates the current mobile app development approache...
Article
Full-text available
Capability Maturity Model Integration for Development Version 1.2 (CMMI-Dev1.2) is a common and popular model for controlling project development process, improving quality, and capacity evaluation. On the other side, eXtreme Programming (XP) is the one of the most popular and effective agile development method to be used for Small Software Develop...
Article
Landauer's principle is a fundamental link between thermodynamics and information theory, which implies that the erasure of information comes at an energetic price. In the present contribution we analyze to what extend the usual molecular dynamics (MD) simulation formalism can handle the Landauer's bound kBT ln 2 in the simplest case of one particl...
Article
We study the nonlocality dynamics for two models of atoms in cavity quantum electrodynamics (QED); the first model contains atoms in a single cavity undergoing nearest-neighbor interactions with no initial correlation, and the second contains atoms confined in n different and noninteracting cavities, all of which were initially prepared in a maxima...
Chapter
Over the last half century, the components of computers have become smaller by a factor of two every 18 months, a phenomenon known as Moore’s law. In state-of-the-art computers, the smallest wires and transistors are approaching 100 nm feature size, which is approximately 1000x the diameter of an atom. Quantum mechanics is the theory of physics tha...
Chapter
Most existing realizations of quantum key distribution (QKD) are point-to-point systems with one source transferring to only one destination. Growth of these single-receiver systems has now achieved a reasonably sophisticated point. However, many communication systems operate in a point-to-multi-point (Multicast) configuration rather than in point-...
Chapter
In this chapter the principles of quantum computing and communications has been proposed.
Chapter
Full-text available
Neural network and quantum computer have the same conceptual structure similar to Huygens sources in the wave field generation. Any point of the space is a source with different intensity of waves that transport information in all the space where are superposed in a complex way to generate the wave field. In wave theory this sources are denoted Huy...
Chapter
Full-text available
In this chapter, securing the transmitted multicast information can be achieved through IPsec multicast architecture. The process of IPsec involves the sender and destinations to agree on IPsec keys. These keys are used for protection transmitted information among communicated peers over IPsec network. IPsec depends on classical algorithm for key g...
Chapter
In this chapter, a generalized architecture of quantum secure direct communication for N disjoint users with partial and full cooperation of quantum server is proposed. So, \( N - 1 \) disjointed users \( u_{1},\, u_{2},\, \ldots,\, u_{N - 1} \) can transmit a secret message of classical bits to a remote user \( u_{N} \) by utilizing the property o...
Chapter
Full-text available
Most existing realizations of quantum key distribution (QKD) are point-to-point systems with one source transferring to only one destination. Growth of these single-receiver systems has now achieved a reasonably sophisticated point. However, many communication systems operate in a point-to-multi-point (Multicast) configuration rather than in point-...
Chapter
Full-text available
Neural network and quantum computer have the same conceptual structure similar to Huygens sources in the wave field generation. Any point of the space is a source with different intensity of waves that transport information in all the space where are superposed in a complex way to generate the wave field. In wave theory this sources are denoted Huy...
Article
Full-text available
The automatic prediction and detection of breast cancer disease is an imperative, challenging problem in medical applications. In this paper, a proposed model to improve the accuracy of classification algorithms is presented. A new approach for designing effective pre-processing stage is introduced. Such approach integrates K-means clustering algor...
Article
Full-text available
Multipartite entanglement and the maximum violation of Bell inequalities are studied in finite clusters of spins in an extended J1–J2 Heisenberg model at zero temperature. The ensuing highly frustrated states will unveil a rich structure for different values of the corresponding spin–spin interaction strengths. The interplay between nearest-neighbo...
Article
Full-text available
A NoSQL injection attack targets interactive Web applications that employ NoSQL database services. These applications accept user inputs and use them to form query statements at runtime. During NoSQL injection attack, an attacker might provide malicious query segments as user input which could result in a different database request. In this paper,...

Network

Cited By