About
23
Publications
17,648
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
114
Citations
Citations since 2017
Introduction
Skills and Expertise
Publications
Publications (23)
Nowadays, people become more connected to the internet using their mobile devices. They tend to use their critical and sensitive data among many applications. These applications provide security via user authentication. Authentication by passwords is a reliable and efficient access control procedure, but it is not sufficient. Additional procedures...
Social media platforms allow users to share thoughts, experiences, and beliefs. These platforms represent a rich resource for natural language processing techniques to make inferences in the context of cognitive psychology. Some inaccurate and biased thinking patterns are defined as cognitive distortions. Detecting these distortions helps users res...
Multicore processors that support multithreading techniques have many advantages, including processors’ utilization, responsiveness, resource sharing, and economical usage of threads. Thus, to have these advantages, programming languages must support multithreading programming. Unfortunately, this technique is not compatible with old programs since...
Over the past several decades, scheduling has emerged as an area of critical research, thereby constituting a
requisite process for myriad applications in real life. In this regard, many researchers have experimented
and utilized various optimization algorithms to obtain optimized schedules. It is also noteworthy that the
concepts of some optimizat...
There are many graph abstraction methods that are existed as solutions for problems of graphs visualization. Visualization problems include edge crossings and node occlusions that hide the potential existed patterns. The aim of this research is to abstract graphs using one of network analysis metrics which is node betweenness centrality. Betweennes...
Nowadays, most users access internet through mobile applications. The common way to authenticate users through websites forms is using passwords; while they are efficient procedures, they are subject to guessed or forgotten and many other problems. Additional multi modal authentication procedures are needed to improve the security. Behavioral authe...
The growth of web Applications have increased rapidly due to the huge development of technology with very short turnaround time and with this development the protection from vulnerabilities became very difficult. There is a continuous demand for developing new methods that is able to prevent the fast growth of attacking methods and vulnerabilities....
The limited lifetime period of wireless nodes of Ad hoc networks due to their battery power, has been forming a significant issue and concern for researchers. To solve this previous related research has ignored low energy nodes regardless of its total residual energy without ignoring the importance of hop count value for selecting paths in forwardi...
Drug-drug and drug-disease interactions are generally harmful. Some of these interactions could result from improper drug doses prescribed for a particular disease or from the unawareness the patient suffers from another disease. We aim in this paper to make a first step towards developing a knowledge based system that supports the decision making...
Phishing is stealing users' confidential information by uploading a fake website that claims to be of another. Such a web site contains special features that aid an automatic classification of it as phishing one. However, there is no single feature that to be used to identify the phishing web-sites. Subsequently, the properties of phishing website...
Phishing web-sites can cause the loss of thousands of dollars and leads to the damage of the brand image of organizations. Thus, automatic filtering of phishing web-site becomes a necessity. This paper presents a phishing detection technique based on Fuzzy Inference Process. The proposed phishing detection has rules for converting the input feature...
Phishing is a significant security threat to the Internet; it is an electronic online identity theft in which the attackers use spoofing techniques like fake websites that mimic legal websites to trick users into revealing their private information. Many of successful phishing attacks do exist and subsequently a considerable number of anti-phishing...
Steganography and cryptography are used to maintain privacy and security over communication channels. Due to their complexity and diversity, there is a need for their continuous improvements. In this paper, we consider such improvements and propose a new bilingual information hiding system. The proposed system is based on a formal approach that inc...
In this paper, we propose a twofold generic tool for compiler construction. First, it facilitates teaching compilers. Second, it constitutes a new approach for compiler construction. In addition, it enables a smooth transition from theory to practice and introduces a unified approach for the implementation of the different compiler phases. Such uni...
In this paper, we propose a two fold generic parser. First, it simulates the behavior of multiple parsing automata. Second, it parses strings drawn from either a context free grammar, a regular tree grammar, or from both. The proposed parser is based on an approach that defines an extended version of an automaton, called position-parsing automaton...
Despite all advances in parsing, parser size, conflict resolution and error recovery are still of important consideration.
In this research, we propose a predictive bottom-up parser. The parser is implemented in two versions. Both versions constitute
an algorithm that simulates the run of a shift–reduce automaton, defined and constructed in a way t...
Problem statement: Privacy and security over communication channels are of primary concerns. Due to their complexity and diversity, there is a need for continuous improvements of the adopted solutions. In this study, we consider two of the adopted ones, namely, steganogrphy and cryptography and propose a new information hiding system. Approach: The...
The main challenge of e-learning systems is to provide courses tailored to different students with different learning rate and knowledge degree. Such systems must be also efficient, as well as adaptive. However, the most recent researches can be classified in to two major groups. The first group emphasizes the need for E-learning to be adaptive. Wh...
The main challenge of e-learning systems is to provide courses tailored to different students with different learning rate and knowledge degree. Such systems must be also efficient, as well as adaptive. However, the most recent researches can be classified in to two major groups. The first group emphasizes the need for E-learning to be adaptive. Wh...
The object of this paper is to introduce a λ-type calculus which is easier to handle than the known λ-calculus. We were able to represent conditional functions and Booleans, in the λ-type calculus, in a form that is easy to understand and easy to compute.