
Yazan A. AlsarieraNorthern Border University · Computer Science
Yazan A. Alsariera
Doctor of Philosophy
About
39
Publications
17,018
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
504
Citations
Citations since 2017
Introduction
Yazan A. Alsariera currently do research work at the Faculty of Computer Systems and Software Engineering, Universiti Malaysia Pahang. Yazan does research in Artificial Intelligence, Programming Languages and Software Engineering. Their current project is 'Bat-inspired t-way Strategy (BTS).'
Additional affiliations
September 2014 - February 2017
February 2012 - August 2013
Education
February 2014 - January 2018
February 2012 - August 2013
September 2011 - January 2012
ELS Language Centers
Field of study
- Certificate of intincive English Program (CIEP)
Publications
Publications (39)
Optimization problem relates to finding the best solution from all feasible solutions. Over the last 30 years, many meta-heuristic algorithms have been developed in the literature including that of Simulated Annealing (SA), Genetic Algorithm (GA), Ant Colony Optimization (ACO), Particle Swarm Optimization (PSO), Harmony Search Algorithm (HS) to nam...
Facilitating the navigation of visually impaired people in indoor environments requires detecting indicating signs and informing them. In this paper, we proposed an indoor sign detection based on a lightweight anchor-free object detection model called FAM-centerNet. The baseline model of this work is the centerNet, which is an anchor-free object de...
Notable progress was achieved by recent technologies. As the main goal of technology is to make daily life easier, we will investigate the development of an intelligent system for the assistance of impaired people in their navigation. For visually impaired people, navigating is a very complex task that requires assistance. To reduce the complexity...
Extensive research on fault diagnosis is essential to detect various faults that occur to different photovoltaic (PV) panels to keep PV systems operating at peak performance. Here, we present an impact analysis of potential induced degradation (PID) on the current–voltage (I-V) characteristics of crystalline silicon (c-Si) solar cells. The impact o...
In software testing, test case generation is the most challenging activities and expensive tasks. Where has a considerable impact on the ability to produce a desired or intended result (i.e., quality and efficacy) of software testing. As a result, several researchers have developed a number of t-way test case generation strategies (where t points t...
Student performance is crucial to the success of tertiary institutions. Especially, academic achievement is one of the metrics used in rating top-quality universities. Despite the large volume of educational data, accurately predicting student performance becomes more challenging. e main reason for this is the limited research in various machine le...
Cryptography facilitates selective communication through encryption of messages and or data. Block-cipher processing is one of the prominent methods for modern cryptographic symmetric encryption schemes. The rise in attacks on block-ciphers led to the development of more difficult encryption schemes. However, attackers decrypt block-ciphers through...
Voice over Internet Protocol (VoIP) has grown in popularity as a low-cost, flexible alternative to the classic public switched telephone network (PSTN) that offers advanced digital features. However, additional security vulnerabilities are introduced by the VoIP system's flexibility and the convergence of voice and data networks. These additional c...
The adverse effects of phishing attacks on unsuspecting victims are damaging and nefarious. Stealing of information from unsuspecting users surges on the internet and various solutions have been proposed to curb this menace. Apparently, the evasiveness of phishing attacks through dynamic processes renders these solutions ineffective. To curb this p...
Student performance is related to complex and correlated factors. The implementation of a new advancement of technologies in educational displacement has unlimited potentials. One of these advances is the use of analytics and data mining to predict student academic accomplishment and performance. Given the existing literature, machine learning (ML)...
Recognizing vehicle plate numbers is a key step towards implementing the legislation on traffic and reducing the number of daily traffic accidents. Although machine learning has advanced considerably, the recognition of license plates remains an obstacle, particularly in countries whose plate numbers are written in different languages or blended wi...
Software testing is an essential part of the software development life cycle. However, due to limited time and resources, extensive testing of highly configurable software is impractical. In addition, extensive testing can lead to combinatorial explosion problems, where test cases grow exponentially with the increase in software input. Because of t...
Search-based software engineering that involves the deployment of meta-heuristics in applicable software processes has been gaining wide attention. Recently, researchers have been advocating the adoption of meta-heuristic algorithms for t-way testing strategies (where t points the interaction strength among parameters). Although helpful, no single...
Search-based software engineering that involves the deployment of meta-heuristics in applicable software processes has been gaining wide attention. Recently, researchers have been advocating the adoption of meta-heuristic algorithms for t-way testing strategies (where t points the interaction strength among parameters). Although helpful, no single...
The surge in generic attacks execution against cipher text on the computer network has led to the continuous advancement of the mechanisms to protect information integrity and confidentiality. The implementation of explicit decision tree machine learning algorithm is reported to accurately classifier generic attacks better than some multi-classific...
The development Intrusion Detection System (IDS) has a solid impact in mitigating against internal and external cyber threats among other cybersecurity methods. The machine learning-based method for IDS has proven to be an effective approach to detecting either anomaly or multiple classes of intrusion. For the detection of various types of intrusio...
Phishing is a type of social web-engineering attack in cyberspace where criminals steal valuable data or information from insensitive or uninformed users of the internet. Existing countermeasures in the form of anti-phishing software and computational methods for detecting phishing activities have proven to be effective. However, new methods are de...
The damaging effect of phishing is traumatizing as attackers or hackers execute theft of sensitive information from users subtly for inappropriate or unauthorized usage. In the light of curbing phishing, blacklisting of websites proved ineffective as the deployment of phishing websites are rampantly increasing and often short-lived. Hence, machine...
t-way interaction testing is a systematic approach for exhaustive test set generation. It is a vital test planning method in software testing, which generates test sets based on interaction between parameters to cover every possible test sets combinations. t-way strategy clarifies the interaction strength between the number of parameters. However,...
The stability, electronic and optical properties of possible two-dimensional (2D) Li2S monolayer with orthorhombic atomic configuration denoted as O-Li2S monolayer is theoretically investigated. It is shown that the proposed 2D O-Li2S monolayer shows exhibits the space group of 59_Pmmn and is energetically and kinetically stable. Our electronic pro...
Software testing becoming significant part of our daily life due to a software-development process that led to increase the components number and the associated time. Due to the financial resources and time constraints, practically exhaustive testing is hopeless. For this reason, numerous researchers have adopted pairwise testing to decrease the ex...
A combinatorial testing (CT) is an important technique usually employed in the generation of test cases. The
generation of an optimal sized test case is a Non-Deterministic Polynomial hard problem (NP). In recent times, many
researchers had developed the various strategies based on the search-based approach to address the combinatorial testing
issu...
The unforeseeable demand for secure paradigm cannot be fulfilled by the arbitrary sequence generated by the linear feedback shift register, which means the generated sequence can't meet satisfy the unpredictable demand for secure paradigm. Tent chaotic equation combined with the linear property of Linear Feedback Shift Register (LFSR) has resulted...
Although desirable, exhaustive testing is practically impossible. In the last 30 years, many sampling strategies have been introduced to systematically minimize the test data for consideration. Complementing existing sampling strategies (i.e. in terms of dealing with interaction faults), pairwise testing has been extensively exploited resulting int...
Computer software is in high demand everywhere in the world. The high dependence on software makes software requirements more complicated. As a result, software testing tasks get costlier and challenging due to a large number of test cases, coupled with the vast number of the system requirements. This challenge presents the need for reduction of th...
Failures of software systems are often caused due to unexpected interactions among system components. The number of tests that needs to be performed in order to test all possible combinations of interactions can be exorbitant even for medium sized software systems. To bring a balance between exhaustive testing and lack of testing, we have adopted t...
The Internet of Things (IoT) is growing so fast than ever. It's going to have a huge impact on just about every market around the world within few years from now. So, it's certainly possible to overlook some of the most important elements needed to effectively take advantage of this trend. Because the Internet of Things will be involved in many par...
Cloud computing has been an attention in the new era of the IT technologies as there is an increase demand in the services or utility computing all over the wide world web. Security risk resulting from resource sharing throughout the cloud computing becomes one of the most challenging concerns in providing powerful processing and storage as on-dema...
Although desirable, exhaustive testing of the software system is impractical because of the significant growth of the search space of systems features (large search space).Several sampling strategies have been introduced to systematically reduce the test data for consideration. Complementing existing sampling strategies (i.e. in terms of dealing wi...
Exhaustive testing is extremely difficult to perform owing to the large number of combinations. Thus, sampling and finding the optimal test suite from a set of feasible test cases becomes a central concern. Addressing this issue, the adoption of t-way testing (where t indicates the interaction strength) has come into the limelight. In order to summ...
Testing has an essential influence on the efficiency and effectiveness in software quality. For ensuring software quality, there is a need to test all possible input combinations. Owing to time and resource constraints, testing all input combinations is hardly feasible. Here, testing of pairwise is a promising strategy so as to ensure the required...
Owing to exponential growth of software lines of codes (LOC)s, testing becomes painstakingly difficult activities. Test engineers are often under pressure to test more and more LOCs yet within the same targeted deadline. For this reason, efficient testing strategy is required. Pairwise testing is amongst the most common strategies for minimizing an...
Combinatorial interaction testing is a practical approach aims to detect defects due to unwanted and faulty interactions. Here, a set of sampled test cases is generated based on t-way covering problem (where t indicates the interaction strength). Often, the generation process is based on a particular t-way strategy ensuring that each t-way interact...
Owing to exponential growth of software lines of codes (LOC)s, testing becomes painstakingly difficult activities. Test engineers are often under pressure to test more and more LOCs yet within the same targeted deadline. For this reason, adopting effective combinatorial automated testing methods is required to ensure quality. T-way combinatorial te...
Software product lines (SPLs) represent an engineering method for creating a portfolio of similar software systems for a shared set of software product assets. Owing to the significant growth of SPLs, there is a need for systematic approach for ensuring the quality of the resulting product derivatives. Combinatorial t-way testing (where t indicates...
Combinatorial Interaction testing (or termed t-way testing) is a useful g strategy aimed at sampling a set of test cases from a large search space. As part of the strategy implementation, researchers have started to turn into meta-heuristic algorithms in line with the emergence of the new field called Search based Software Engineering. Complementin...
This paper describes the generation of t-way test suit using the Late Acceptance Hill Climbing based strategy (LAHC) in the present of constraints. Our benchmarking results have been promising as LAHC gives competitive results in all constraints configurations considered.