Yaser Jararweh

Yaser Jararweh
Jordan University of Science and Technology | Just · Department of Computer Science

PhD.

About

380
Publications
192,167
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
7,645
Citations
Introduction
Yaser Jararweh received his Ph.D. in Computer Engineering from the University of Arizona in 2010. He is currently a professor of computer sciences at Duquesne University. He has co-authored several technical papers in established journals and conferences in fields related to machine learning applications, blockchain, edge-cloud computing, HPC, SDN, security and data intensive computing. He is co-chairing many IEEE events such as FMEC, SDS, IoTSMS, SNAMS, AICCSA and CCSNA.
Additional affiliations
August 2010 - March 2016
Jordan University of Science and Technology
Position
  • Professor (Assistant)

Publications

Publications (380)
Article
Full-text available
The internet of things (IoT) represent the current and future state of the Internet. The large number of things (objects), which are connected to the Internet, produce a huge amount of data that needs a lot of effort and processing operations to transfer it to useful information. Moreover, the organization and control of this large volume of data r...
Article
The cloud computing paradigm provides a shared pool of resources and services with different models delivered to the customers through the Internet via an on-demand dynamically-scalable form charged using a pay-per-use model. The main problem we tackle in this paper is to optimize the resource provisioning task by shortening the completion time for...
Article
Cloud computing is an emerging and fast-growing computing paradigm that has gained great interest from both industry and academia. Consequently, many researchers are actively involved in cloud computing research projects. One major challenge facing cloud computing researchers is the lack of a com- prehensive cloud computing experimental tool to use...
Article
Full-text available
The recent development of the Internet of Things (IoT) devices offers an intelligent concept for integrating massive number of interconnected wireless devices. However, supporting such massive number of IoT connections (hundreds of billions) requires an efficient and dynamic spectrum access strategy. Accordingly, the integration of non‐orthogonal m...
Article
Full-text available
Mutation testing is an effective, yet costly, testing approach, as it requires generating and running large numbers of faulty programs, called mutants. Mutation testing also suffers from a fundamental problem, which is having a large percentage of equivalent mutants. These are mutants that produce the same output as the original program, and theref...
Conference Paper
In the recent years, recommender systems have begun to attract the attention of many online-based companies. While these systems are being developed to provide users with better recommendations, they suffer from the lack of explain-ability. The explainable recommendation systems are developed to solve the problem of why certain products or services...
Article
Full-text available
Nowadays, the economy of countries highly depends on the agriculture productivity which has a great effect on the development of human civilization. Sometimes, plant diseases cause a major reduction in agricultural products. This paper proposes a new approach for the automatic detection and classification of plant leaf diseases based on using the E...
Article
Full-text available
Global urbanization has vastly enhanced the quality of people’s lives in various domains. Nevertheless, the global rise in urban dwellers is often accompanied by additional difficulties and challenges such as traffic jams, air pollution, greenhouse gas emissions, and waste production. The term ‘Smart City’ is introduced to address these challenges...
Article
Cloud-native computing is getting more and more popular in recent years where containerized microservices architectural designs play a central role in building a distributed systems and services. On one hand, they bring convenience and simplicity to build massively scalable distributed cloud-native applications and enable continuous development and...
Article
In this paper, we consider the problem of resource allocation within Beyond 5G (B5G) and the envisioned 6G wireless networks with Cognitive Radio (CR) capability. CR technology allows opportunistic and dynamic access to the unused licensed spectrum bands. Unlike the conventional orthogonal frequency division multiple access (OFDMA) schemes that imp...
Article
Full-text available
Majority of the devices in the Internet of Things (IoT) are deployed in an environment that is susceptible to cyber‐attacks. Due to the resource‐constraint nature of IoT, it is very hard to meet the security challenges that arise due to the deployment of IoT devices in the unsecure environment. In this context, the authentication of IoT devices is...
Article
Full-text available
Location‐based services (LBSs) have drastically changed the way smart cities and smart buildings operate, giving a new dimension to the life of citizens. LBS have various applications ranging from power management, marketing, vehicle to everything communication to social networking, and many other applications. The concept of LBS relies on the esti...
Article
Mobile cloud computing (MCC) plays a significant role in obtaining virtualized data stored on cloud servers without additional waiting time. However, the limited battery power of mobile devices limits access to ample data. To address this problem, job scheduling algorithms based on completion time constraints are introduced to reduce energy consump...
Article
The interplay between the non-orthogonal multiple access (NOMA) and the opportunistic cognitive radio (CR)-based orthogonal frequency multiple access (OFDMA) has been recently realized as a promising paradigm to support the unprecedented massive connectivity demands of future beyond fifth-generation (B5G) wireless communication systems. In such sys...
Conference Paper
In the last few years, cluster ensembles have emerged as powerful techniques that integrate multiple clustering methods into recommender systems. Such integration leads to improving the performance, quality and the accuracy of the generated recommendations. This paper proposes a novel recommender system based on a cluster ensemble technique for big...
Article
Full-text available
Human activity recognition is concerned with detecting different types of human movements and actions using data gathered from various types of sensors. Deep learning approaches, when applied on time series data, offer promising results over intensive handcrafted feature extraction techniques that are highly reliant on the quality of defined domain...
Article
Full-text available
The fifth-generation (5G) wireless communication systems associating with the high achievable data-transfer speeds will significantly affect the performance of IoT networks. On one hand, the internet goes through a dramatic transaction period that shapes every aspect of our lives, industry, and business where cloud computing, smart cities, and the...
Article
Full-text available
Wireless sensors are considered the key elements in enabling efficient Internet of Things (IoT) networking and services. One of the key objectives in designing a WSN is increasing network lifetime by reducing the overall network energy consumption. To achieve this, several techniques have been proposed to extend the network lifetime, such as cluste...
Article
Full-text available
This paper proposes an adaptive routing and spectrum assignment protocol for heterogeneous Full-duplex (FD) and half-duplex (HD) cognitive radio (CR) networks. The key design goal of the developed protocol is to select a path between a source-destination pair, and to optimally assign channels to each hop along the selected path. One main feature of...
Article
Full-text available
The mobile fog-based cloud (MFBC) plays a major role for the Internet of Things (IoT) and is highly suitable for obtaining virtualized data without additional waiting time. However, the limited battery power of mobile devices limits access to abundant data. To address this problem, an energy-efficient and secure algorithm should be introduced to re...
Article
Visual Question Answering (VQA) in the medical domain has attracted more attention from research communities in the last few years due to its various applications. This paper investigates several deep learning approaches in building a medical VQA system based on ImageCLEF’s VQA-Med dataset, which consists of about 4K images with about 15K question-...
Article
The release of millions of financial documents, which has been known as the ‘WikiLeaks’ of the financial world (a.k.a. ‘Panama Papers’), has dragged global attention in how highly structured means applied by some of the elite to conceal their financial assets. Consequently, significant financial corruption allegations were raised. We concentrate on...
Article
Green Internet of things (GIoT) generally refers to a new generation of Internet of things design concept. It can save energy and reduce emissions, reduce environmental pollution, waste of resources, and harm to human body and environment, in which green smart device (GSD) is a basic unit of GIoT for saving energy. With the access of a large number...
Article
The integration between orthogonal frequency division multiple access (OFDMA), non-orthogonal multiple access (NOMA), and cognitive radio (CR) technology has been recently configured as promising candidate to support the massive high-speed connectivity requirements of beyond fifth generation (B5G) systems. This combination is referred to in the lit...
Conference Paper
Explainable recommendation systems have gained much attention in the last few years. Most of them use textual reviews to provide users with interpretability about why services or products are liked by users or recommended for them. Sentiment analysis has potential advantages to determine the attitudes of users in online communities using websites s...
Article
The detection of text in an image and identification of its language are important tasks in optical character recognition. Such tasks are challenging, particularly in natural scene images. Previous studies have been conducted with a focus on convolutional neural networks for script identification. In other studies, fully convolutional networks (FCN...
Article
The industrial Internet of Things (IIoT) and supply chain systems have become one of the most important technologies to positively impact our daily life activities. Blockchain technology has recently gained popularity and it is increasingly being employed in a large number of applications and industries. The use cases for blockchain are growing rap...
Article
Full-text available
In e-commerce, user reviews can play a significant role in determining the revenue of an organisation. Online users rely on reviews before making decisions about any product and service. As such, the credibility of online reviews is crucial for businesses and can directly affect companies’ reputation and profitability. That is why some businesses a...
Article
With the advancement in the development of the Internet of Things (IoT) technology, as well as the industrial IoT, various applications and services are benefiting from this emerging technology such as smart healthcare systems, virtual realities applications, connected and autonomous vehicles, to name a few. However, IoT devices are known for being...
Article
Full-text available
The Internet of underwater things (IoUT) has become a promising and vibrant paradigm which mainly relies on the underwater acoustic wireless sensor networks (UASN). IoUT was first proposed to facilitate offshore real‐time monitoring and exploration of underwater environments. It is now becoming a key component for building and connecting the futuri...
Article
Full-text available
The emerging advances in personal devices and privacy concerns have given the rise to the concept of Federated Learning. Federated Learning proves its effectiveness and privacy preservation through collaborative local training and updating a shared machine learning model while protecting the individual data-sets. This article investigates a new typ...
Article
The Fifth Generation (5G) communication technology has paved the way for intelligent and diversified Internet of Connected Vehicles (IoCV) services that meet stringent Quality of Service (QoS) requirements. Both Artificial Intelligence (AI) and Blockchain are playing and will continue to play an imperative role in providing secure and decentralized...
Article
Data-driven modeling for wastewater treatment process (WWTP) under hybrid cloud environment, has been widely regarded as a promising solution. Existing methods managed to learn a forward mapping for WWTP, and were highly reliable on rich intermediate process parameters (IPP) such as dissolved oxygen amount. However, they cannot well handle scenes w...
Article
With the development of 5G(5th generation mobile networks) technology, smart cities are an inevitable trend in modern city development. Among them, smart city services are the foundation of 5G-enabled smart cities. As an emerging and informational city service model, crowdsourcing has been widely used in our daily life. However, in the existing cro...
Article
Due to the increasing awareness and use of cloud and edge computing, society and industries are beginning to understand the benefits they can provide. Cloud and Edge are the future of information management, and they have transformed the Internet into an innovative and interactive computing platform. The ultimate goal of edge/cloud computing is to...
Article
The Industrial Internet of things (IIoT) supports recent developments in data management and information services, as well as services for smart factories. Nowadays, many mature IIoT cloud platforms are available to serve smart factories. However, due to the semi-credibility nature of the IIoT cloud platforms, how to achieve secure storage, access...
Article
Cognitive Radio (CR) technology was introduced to effectively exploit the under-utilization portions of the licensed spectrum. A primary challenge in enabling CR networking is how to coordinate the CR communications, in which CR users need to exchange their control information before data exchange can take place. Providing a reliable coordination m...
Article
Blockchain technologies have grown in prominence in recent years, with many experts citing the potential applications of the technology in regard to different aspects of any industry, market, agency, or governmental organizations. In the brief history of blockchain, an incredible number of achievements have been made regarding how blockchain can be...
Conference Paper
Recent advances in information filtering have resulted in effective recommender systems that are able to provide online personalized recommendations to millions of users from all over the world. However, most of these systems ignore the explanation purpose while producing recommendations with high-quality results. Moreover, the classification of re...
Article
Full-text available
Bioinformatics is an interdisciplinary field that applies trending techniques in information technology, mathematics, and statistics in studying large biological data. Bioinformatics involves several computational techniques such as sequence and structural alignment, data mining, macromolecular geometry, prediction of protein structure and gene fin...
Article
Energy cloud systems continue to shape the future of the energy sector. The complexity of energy cloud systems stems from their widespread and distributed aspects such as renewable energy sources, energy storage, customers engagement, social media and the advancements in communication and computing technologies. The unprecedented large-scale growth...
Article
With the countless advantages gained from the free, open, and ubiquitous nature of online social networks, they do come with their own set of problems and challenges. E.g., they represent a fertile ground for fake accounts and autonomous bots to spread fake news. Revealing whether some text content is written by a bot or a human would be of great v...
Conference Paper
In this work, we provide a Genetic-based algorithm that is used to quickly find a placement for a set of objects within a given layout such that access to these objects is optimized. The given layout describes the free locations of the objects and the object handles and the access is done through a corpus of object requests. The proposed algorithm...
Preprint
Full-text available
The rise of fast communication media both at the core and at the edge has resulted in unprecedented numbers of sophisticated and intelligent wireless IoT devices. Tactile Internet has enabled the interaction between humans and machines within their environment to achieve revolutionized solutions both on the move and in real-time. Many applications...
Article
Full-text available
Mobile applications are advancing toward higher network and compute requirements, which are similar to the requirements of server applications. Users prefer to perform their tasks on the go from mobile devices instead of stationary desktop and server systems. Modern mobile applications limit mobile battery times as charging is lost quickly due to h...
Article
Cognitive radio (CR) technology has been proposed to solve the inefficient spectrum utilization resulted from the traditional fixed spectrum allocation strategy used in wireless systems. Through dynamic and opportunistic spectrum access, CR users can significantly improve spectrum utilization. Most of existing spectrum access schemes designed for C...
Article
Full-text available
As Bitcoin and other cryptocurrencies become widely popular recently, the underlying concept—Blockchain—gets unprecedented attentions. One popular usage of Blockchain is a distributed replicated database. In this paper, we present initial studies on the challenges and opportunities of using Blockchain as a database for Internet-of-Things (IoT) appl...
Preprint
E-commerce dominates a large part of the world's economy with many websites dedicated to online selling products. The vast majority of e-commerce websites provide their customers with the ability to express their opinions about the products/services they purchase. These feedback in the form of reviews represent a rich source of information about th...
Article
Graph‐based database engines have been developed by different researchers and companies. Many optimization methods have been integrated within these engines to enable fast and efficient data processing. However, many small‐ and medium‐size organizations have not changed their database infrastructures and still rely on a relational management modeli...
Article
The proliferation of smart city and Internet of Things (IoT) applications has introduced numerous challenges related to network performance, reliability, and security. Moreover, the distributed nature of the smart city and IoT infrastructure hs led to issues in regards to service availability, reliability, sustainability and security. Edge computin...
Article
Full-text available
Organizations share an evolving interest in adopting a cloud computing approach for Internet of Things (IoT) applications. Integrating IoT devices and cloud computing technology is considered as an effective approach to storing and managing the enormous amount of data generated by various devices. However, big data security of these organizations p...
Conference Paper
Full-text available
Technically Co-Sponsored by IEEE France Section FMEC 2020 CFP: Cloud computing provides large range of services and virtually unlimited available resources for users. New applications, such as virtual reality and smart building control, have emerged due to the large number of resources and services brought by cloud computing. However, the delay-sen...
Conference Paper
Full-text available
Next generation cloud systems will require a paradigm shift in how they are constructed and managed. Conventional control and management platforms are facing considerable challenges regarding flexibility, dependability and security that next generation systems will require. The cloud computing paradigm has gone part of the way towards alleviating s...
Article
Security of cloud computing is a major concern for both organisations and individuals. The cloud users want to make sure that their private data will be safe from disclosure of both outsiders of the cloud as well as from (probably malicious) insiders (cloud agents) of the cloud. Hence, insiders' threats of the cloud computing is a major issue that...
Conference Paper
Due to the growing quantity of information available on the Web, recommender systems have become crucial component for the success of online shopping stores. However, most of the existing recommender systems were only designed to improve the recommendation results and ignore the explainable recommendation aspect. Therefore, in this paper we propose...
Conference Paper
E-commerce dominates a large part of the world’s economy with many websites dedicated to selling products online. The vast majority of e-commerce websites provide their customers with the ability to express their opinions about the products/services they purchase. These reviews represent a rich source of information about the users’ experiences, wh...
Conference Paper
Full-text available
Nowadays, many companies through the world wide web like YouTube, Netflix, Aliexpress and Amazon, provide personalized services as recommendations. Recommender systems use the related information about products or services to suggest the most relevant of them to particular users. The recommendation is usually made based on the prediction of the use...