Rizik M. H, Al-SayyedUniversity of Jordan | UJ · Department of Business Information Systems
Rizik M. H, Al-Sayyed
PhD in Computer Science
About
86
Publications
90,488
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,047
Citations
Publications
Publications (86)
In recent years, the adoption of advanced machine learning techniques has revolutionized approaches to solving complex problems, such as identifying occurrences of forest fires. Among these techniques, the use of Convolutional Neural Networks (CNNs) combined with ensemble methods is particularly promising. To investigate the feasibility of detectin...
Financial investigations in the realm of fraud detection demand rigorous data analysis to identify anomalies and inform decision-making. This paper demonstrates the importance of data visualization as a means of conducting initial assessments of testable datasets to validate their suitability and promptly detect unexpected patterns before delving d...
This study aimed to investigate the perspectives of Jordanian university students toward the pass/fail grading system (PFGS) that was used during the COVID-19 pandemic. To achieve this goal, a questionnaire was prepared, consisting of 37 items in its final form; divided into four subscales: advantages, drawbacks of (PFGS), the reasons for its use b...
Classifying microarray datasets, which usually contains many noise genes that degrade the performance of classifiers and decrease classification accuracy rate, is a competitive research topic. Feature selection (FS) is one of the most practical ways for finding the most optimal subset of genes that increases classification's accuracy for diagnostic...
Clock synchronization in the Mac layer plays a vital role in wireless sensor network communication that maintains time-based channel sharing and offers a uniform timeframe among different network nodes. Most wireless sensor networks are distributed where no common clock exists among them. Therefore, joint actions are realized by exchanging messages...
Dental caries is arguably the most persistent dental condition that affects most people over their lives. Carious lesions are commonly diagnosed by dentists using clinical and visual examination along with oral radiographs. In many circumstances, dental caries is challenging to detect with photography and might be mistaken as shadows for various re...
Technological advancements affect everyday life; they benefited our daily routines, habits, and activities. Underwater diving is one of the most interesting and attractive activities for tourists worldwide but could be risky and challenging. When paths are not clear, diving might take additional time and effort leading to some health problems. Thus...
A critical task and a competitive research area is to secure networks against attacks. One of the most popular security solutions is Intrusion Detection Systems (IDS). Machine learning has been recently used by researchers to develop high performance IDS. One of the main challenges in developing intelligent IDS is Feature Selection (FS). In this ma...
Sentiment analysis (SA) is a useful NLP task. There are hundreds of Arabic sentiments analysis systems.
However, because of the morphological nature of the Arabic languages, there are still many challenges
that need more work. In this paper, two classifiers have been used: Naive Bayes and CNN-LSTM models.
The experiments are conducted on Arabic twe...
Malware is the term used to describe any malicious software or code that is harmful to systems. From day to day, new malicious programs appear. To classify malware according to its characteristics, machine learning is now being used; this is because most new malware contains patterns that are similar to old ones. This paper proposes two feature sel...
Multi-objective algorithms are used to achieve high performance for quality of service (QoS) in wireless sensor networks (WSNs) is an important field for researchers because these algorithms improve two or more conflicting objectives and present the best trade-off between the conflicting objectives to solve multi-objective problems (MOPs). Previous...
Cloud computing is considered one of the most important techniques in the field of distributed computing which contributes to maintain increased scalability and flexibility in computer processing. This is achieved because it, using the Internet, provides different resources and shared services with minimum costs. Cloud service providers (CSPs) offe...
This systematic review provides researchers interested in feature selection (FS) for processing microarray data with comprehensive information about the main research directions for gene expression classification conducted during the recent seven years. A set of 132 researches published by three different publishers is reviewed. The studied papers...
In recent years, Wireless Sensor Networks (WSNs) have benefitted from their integration with Internet of Things (IoT) applications. WSN usage for monitoring and tracing applications shows massive acceleration, whether indoors or outdoors. WSN is constructed from interconnected sensors, limited resource (battery), which requires considerable importa...
p class="0abstract">Today, the influence of the social media on different aspects of our lives is increasing, many scholars from various disciplines and majors looking at the social media networks as the ongoing revolution. In Social media networks, many bonds and connections can be established whether being direct or indirect ties. In fact, Social...
In this research, a new technique to improve the accuracy of the link prediction for most of the networks is proposed; it is based on the prediction ensemble approach using the voting merging technique. The new proposed ensemble called Jaccard, Katz, and Random models Wrapper (JKRW), it scales up the prediction accuracy and provides better predicti...
PSO is a remarkable tool for solving several optimisation problems, like global optimisation and many real-life problems. It generally explores global optimal solution via exploiting the particle-swarm's memory. Its limited properties on objective function's continuity along with the search space and its potentiality in adapting dynamic environment...
Cloud computing is a trending technology that allows users to use computing resources remotely in a pay-per-use model. One of the main challenges in cloud computing environments is task scheduling, in which tasks should be scheduled efficiently to minimize execution time and cost while maximizing resources’ utilization. Many meta-heuristic algorith...
In recent years, wireless sensor networks (WSNs) topics took advantages as it integrated in internet of things (IoT) applications, there are massive acceleration in using WSNs in monitoring, and tracing applications indoor, and outdoor, such as disaster managing, wildlife tracking, home, health, military, and industry monitoring. Several researcher...
Social media platforms changed from being socialization platforms to serve businesses through advertisements. This research aims at investigating active young users' experience with social media ads by studying the personalization and the usefulness of the ads, and the role of the host architecture of the used platform. The results prove that users...
Jamming attack is one of the most common threats on wireless networks through sending a high-power signal to the network in order to corrupt legitimate packets. To address Jamming attacks problem, the Particle Swarm Optimization (PSO) algorithm is used to describe and simulate the behavior of a large group of entities, with similar characteristics...
Jamming attack is one of the most common threats on wireless networks through sending a high-power signal to the network in order to corrupt legitimate packets. To address Jamming attacks problem, the Particle Swarm Optimization (PSO) algorithm is used to describe and simulate the behavior of a large group of entities, with similar characteristics...
Cyber related crimes are increasing nowadays. Thus digital forensics has been employed in solving cybercrimes. Several researches have been done where they have analysed cyber related attacks, malware types, etc. Researches based on studying and analysing Advanced Persistent Threats (APTs), especially Shamoon attack. This research has been done in...
The hough there are several approaches to detect the malware attacks in cloud, the detection techniques could not be applied in FOG based environment. This is because of its possession of distinct features. As FOG computing has been evolving, it is mandatory to develop detection and mitigation schemes of malware attacks. Thus, in this research, an...
Nowadays, cloud computing became a very important way of processing very large and complicated jobs and services. To serve millions of users with a high satisfaction regarding cost and time requires a powerful way to schedule cloud users' jobs. Job scheduling in a cloud computing environment is an NP-hard problem. Many scheduling algorithms have be...
A Digital forensics has been recently become a significant approach to investigate cybercrimes. Several questions exist about the future of this domain. Many researchers have been done in this field for development, they analyzed the challenges within the domain of cloud computing and an advanced persistent threat (APT) attack. These challenges are...
Nowadays, Cloud computing became a very important way of processing very large and complicated jobs and services. To serve millions of users with a high satisfaction regarding cost and time requires a powerful way to schedule cloud users' jobs. Job scheduling in cloud computing environment is an NP-hard problem. Many scheduling algorithms have been...
Cloud computing is one of the paradigms that have undertaken to deliver the utility computing concept. It views computing as a utility similar to water and electricity. We aim in this paper to make an investigation of two highly efficacious Cloud platforms: Microsoft Azure (Azure) and Amazon Web Services (AWS) from users’ perspectives the point of...
Cloud computing is one of the most important technologies that play a remarkable role in all kind of fields business, eLearning, research or even for personal uses, it is a type of Internet-based computing, where resources, hardware, software and information are shared, there are many factors that affect the use of cloud computing, but the pricing...
A contraindication is included in a medical treatment, it is a prescription that should be avoided for example by performing a different medical procedure or administering one or more medications or medicines or if combined with another medications, which increases the risk of deteriorating the patient's own symptoms or conditions of death. It is a...
The Information Technology system use visualization to represent data in different forms. Some new researches in this field working on extract Knowledge, rapid information retrieval from the graphical diagram. Therefore, data visualization now trends to use ontology approach to build a robust knowledge-based system. The proposed of this paper is to...
Recent years have witnessed a huge revolution in developing automated diagnosis for different diseases such as cancer using medical image processing. Many researchers have been conducted in this field. Analyzing medical microscopic images provide pathology medical track with large information about the status of the patients and the progress of the...
Congestion typically occurs when the number of crowds exceeds the capacity of facilities. In some cases, when buildings have to be evacuated, people might be trapped in congestion and cannot escape from the building early enough which might even lead to stampedes. Crowd Congestion Mapping (CCM) is a system that enables organizations to find informa...
In this paper, we propose a framework to analyze and evaluate social networking pages based on usage data with respect to Arab mainstream news media. The paper introduces new metrics such as: Page Penetration and Ranking Index, as well as new evaluation methods. The framework considers the twenty-two Arab countries in addition to seven Facebook pag...
In this paper, we propose a framework to analyze and evaluate social networking pages based on usage data with respect to Arab mainstream news media. The paper introduces new metrics such as: Page Penetration and Ranking Index, as well as new evaluation methods. The framework considers the twenty-two Arab countries in addition to seven Facebook pag...
Particle Swarm Optimization (PSO) has proved to be a common meta-heuristic algorithm for determining the minimum value among a set of values but it is known to suffer from the local minima problem. In this paper, we propose a novel optimization algorithm called POLARPSO that enhances the behavior of PSO and avoids the local minima problem by using...
http://www.springer.com/gp/book/9783319553535
This research paper shows how Social Media Networks (SNS) used by university students, positively or negatively has influenced the access and availability of e-content. It presents the results of a detailed study conducted at The University of Jordan (UoJ) that comprised students from 19 faculties. A set of 1,015 students were asked about their opi...
In this paper we propose a framework to analyze and evaluate social networking pages based on their usage data and apply it to a number of Arab mainstream news media Facebook pages. Two well-known metrics are used, these are namely: Internet Penetration and Facebook Penetration. The paper also introduces new metrics such as: Page Penetration and Ra...
A list of well-known Online Social Networks extend to hundreds of available sites with hundreds of thousands, millions, and even billions of registered accounts; for instance, Facebook as of April 2016 has around two billion active users. Online Social Networks made a difference in many people’s lives and helped in opening avenues that were not pos...
This book presents the current state of the art in the field of e-publishing and social media. The book discusses trends and challenges in the field of e-publishing, along with their implications for academic publishing, information services, e-learning and other areas where electronic publishing is essential. In particular, it addresses (1) Applic...
Introduction:
Leydig cell tumor constitutes only about 1-3% of testicular neoplasms. There is apparently increased incidence in the last few years; one possible explanation for this phenomenon is the widespread use of ultrasound technology and the subsequent increased early detection of smaller lesions that have not been found in historical series...
Visual Analysis is one participatory tool for mapping out main domains like ontology; along with their causes and effects, it supports domain planners to identify clear and manageable communications between the components of the domain and the strategy aimed at achieving them. Presenting computer system is a good area of employing visualization eff...
This work proposes the adoption of Autonomic Computing System (ACS) in Cloud environment. ACS was first introduced by IBM to create systems capable of managing automatic self-configuration, self-healing, self-optimization and self-protection. These systems detect errors that cause failure, and then recover and reconfigure itself. The concept is wil...
The fast growing market of mobile device adoption and cloud computing has led to exploitation of mobile devices utilizing cloud services. One major challenge facing the usage of mobile devices in the cloud environment is mobile synchronization to the cloud, e.g., synchronizing contacts, text messages, images, and videos. Owing to the expected high...
Software development effort estimation is considered a fundamental task for software development life cycle as well as for managing project cost, time and quality. Therefore, accurate estimation is a substantial factor in projects success and reducing the risks. In recent years, software effort estimation has received a considerable amount of atten...
The efficiency and performance of Distributed Database Management Systems (DDBMS) is mainly measured by its proper design and by network communication cost between sites. Fragmentation and distribution of data are the major design issues of the DDBMS. In this paper, we propose new approach that integrates both fragmentation and data allocation in o...
This research paper describes the design and implementation of the Consultative Committee for Space Data Systems (CCSDS) standards REF _Ref401069962 \r \h \* MERGEFORMAT [1] for Space Data Link Layer Protocol (SDLP). The primer focus is the telecommand (TC) part of the standard. The implementation of the standard was in the form of DLL functions us...
Road traffic density has always been a concern in large cities around the world, and many approaches were developed to assist in solving congestions related to slow traffic flow. This work proposes a congestion rate estimation approach that relies on real-time video scenes of road traffic, and was implemented and evaluated on eight different hotspo...
In this paper, we investigate the effects of the free minutes offered by mobile line service providers on the mobiles customers (users) in Jordan; we analyzed the data collected from 298 users. Each user completed a survey (questionnaire) with 22 questions. For the purpose of analysis, the survey questions are grouped into three categories; the neg...
Online advertisement is one of the major incomes for many companies; it has a role in the overall business flow and affects the consumer behavior directly. Unfortunately most users tend to block their ads or ignore them. MyAds is a social adaptive hypermedia system for online advertising and its main goal is to explore how to make online ads more a...
One of the major problems that face people daily is the increased number of vehicles in cities. This increase greatly leads to the presence of traffic jams and the depletion of drivers' important time. It also adds pressure on people who are in charge of managing traffic and controlling the flow of cars from one place to another. The source of pres...
Advances in Web technologies have brought about a massive increase in online businesses, but security has significantly lagged behind. We and others argue that governments can and should play a major role in providing a reliable and secure environment for online businesses because they have a major stake in growing the economy. Our finding from pre...