• Home
  • Yazan A. Alsariera
Yazan A. Alsariera

Yazan A. Alsariera
Northern Border University · Computer Science

Doctor of Philosophy

About

39
Publications
17,018
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
504
Citations
Citations since 2017
29 Research Items
498 Citations
2017201820192020202120222023050100150
2017201820192020202120222023050100150
2017201820192020202120222023050100150
2017201820192020202120222023050100150
Introduction
Yazan A. Alsariera currently do research work at the Faculty of Computer Systems and Software Engineering, Universiti Malaysia Pahang. Yazan does research in Artificial Intelligence, Programming Languages and Software Engineering. Their current project is 'Bat-inspired t-way Strategy (BTS).'
Additional affiliations
September 2014 - February 2017
Universiti Malaysia Pahang
Position
  • Research and Teaching Assistant
February 2012 - August 2013
Universiti Putra Malaysia
Position
  • Research Assistant
Education
February 2014 - January 2018
Universiti Malaysia Pahang
Field of study
  • Software Engineering
February 2012 - August 2013
Universiti Putra Malaysia
Field of study
  • Computer Science
September 2011 - January 2012
ELS Language Centers
ELS Language Centers
Field of study
  • Certificate of intincive English Program (CIEP)

Publications

Publications (39)
Conference Paper
Full-text available
Optimization problem relates to finding the best solution from all feasible solutions. Over the last 30 years, many meta-heuristic algorithms have been developed in the literature including that of Simulated Annealing (SA), Genetic Algorithm (GA), Ant Colony Optimization (ACO), Particle Swarm Optimization (PSO), Harmony Search Algorithm (HS) to nam...
Article
Full-text available
Facilitating the navigation of visually impaired people in indoor environments requires detecting indicating signs and informing them. In this paper, we proposed an indoor sign detection based on a lightweight anchor-free object detection model called FAM-centerNet. The baseline model of this work is the centerNet, which is an anchor-free object de...
Article
Full-text available
Notable progress was achieved by recent technologies. As the main goal of technology is to make daily life easier, we will investigate the development of an intelligent system for the assistance of impaired people in their navigation. For visually impaired people, navigating is a very complex task that requires assistance. To reduce the complexity...
Article
Full-text available
Extensive research on fault diagnosis is essential to detect various faults that occur to different photovoltaic (PV) panels to keep PV systems operating at peak performance. Here, we present an impact analysis of potential induced degradation (PID) on the current–voltage (I-V) characteristics of crystalline silicon (c-Si) solar cells. The impact o...
Chapter
In software testing, test case generation is the most challenging activities and expensive tasks. Where has a considerable impact on the ability to produce a desired or intended result (i.e., quality and efficacy) of software testing. As a result, several researchers have developed a number of t-way test case generation strategies (where t points t...
Article
Full-text available
Student performance is crucial to the success of tertiary institutions. Especially, academic achievement is one of the metrics used in rating top-quality universities. Despite the large volume of educational data, accurately predicting student performance becomes more challenging. e main reason for this is the limited research in various machine le...
Article
Full-text available
Cryptography facilitates selective communication through encryption of messages and or data. Block-cipher processing is one of the prominent methods for modern cryptographic symmetric encryption schemes. The rise in attacks on block-ciphers led to the development of more difficult encryption schemes. However, attackers decrypt block-ciphers through...
Article
Full-text available
Voice over Internet Protocol (VoIP) has grown in popularity as a low-cost, flexible alternative to the classic public switched telephone network (PSTN) that offers advanced digital features. However, additional security vulnerabilities are introduced by the VoIP system's flexibility and the convergence of voice and data networks. These additional c...
Article
Full-text available
The adverse effects of phishing attacks on unsuspecting victims are damaging and nefarious. Stealing of information from unsuspecting users surges on the internet and various solutions have been proposed to curb this menace. Apparently, the evasiveness of phishing attacks through dynamic processes renders these solutions ineffective. To curb this p...
Article
Full-text available
Student performance is related to complex and correlated factors. The implementation of a new advancement of technologies in educational displacement has unlimited potentials. One of these advances is the use of analytics and data mining to predict student academic accomplishment and performance. Given the existing literature, machine learning (ML)...
Article
Full-text available
Recognizing vehicle plate numbers is a key step towards implementing the legislation on traffic and reducing the number of daily traffic accidents. Although machine learning has advanced considerably, the recognition of license plates remains an obstacle, particularly in countries whose plate numbers are written in different languages or blended wi...
Article
Full-text available
Software testing is an essential part of the software development life cycle. However, due to limited time and resources, extensive testing of highly configurable software is impractical. In addition, extensive testing can lead to combinatorial explosion problems, where test cases grow exponentially with the increase in software input. Because of t...
Preprint
Full-text available
Search-based software engineering that involves the deployment of meta-heuristics in applicable software processes has been gaining wide attention. Recently, researchers have been advocating the adoption of meta-heuristic algorithms for t-way testing strategies (where t points the interaction strength among parameters). Although helpful, no single...
Article
Full-text available
Search-based software engineering that involves the deployment of meta-heuristics in applicable software processes has been gaining wide attention. Recently, researchers have been advocating the adoption of meta-heuristic algorithms for t-way testing strategies (where t points the interaction strength among parameters). Although helpful, no single...
Article
Full-text available
The surge in generic attacks execution against cipher text on the computer network has led to the continuous advancement of the mechanisms to protect information integrity and confidentiality. The implementation of explicit decision tree machine learning algorithm is reported to accurately classifier generic attacks better than some multi-classific...
Article
Full-text available
The development Intrusion Detection System (IDS) has a solid impact in mitigating against internal and external cyber threats among other cybersecurity methods. The machine learning-based method for IDS has proven to be an effective approach to detecting either anomaly or multiple classes of intrusion. For the detection of various types of intrusio...
Article
Full-text available
Phishing is a type of social web-engineering attack in cyberspace where criminals steal valuable data or information from insensitive or uninformed users of the internet. Existing countermeasures in the form of anti-phishing software and computational methods for detecting phishing activities have proven to be effective. However, new methods are de...
Article
Full-text available
The damaging effect of phishing is traumatizing as attackers or hackers execute theft of sensitive information from users subtly for inappropriate or unauthorized usage. In the light of curbing phishing, blacklisting of websites proved ineffective as the deployment of phishing websites are rampantly increasing and often short-lived. Hence, machine...
Article
Full-text available
t-way interaction testing is a systematic approach for exhaustive test set generation. It is a vital test planning method in software testing, which generates test sets based on interaction between parameters to cover every possible test sets combinations. t-way strategy clarifies the interaction strength between the number of parameters. However,...
Article
Full-text available
The stability, electronic and optical properties of possible two-dimensional (2D) Li2S monolayer with orthorhombic atomic configuration denoted as O-Li2S monolayer is theoretically investigated. It is shown that the proposed 2D O-Li2S monolayer shows exhibits the space group of 59_Pmmn and is energetically and kinetically stable. Our electronic pro...
Conference Paper
Full-text available
Software testing becoming significant part of our daily life due to a software-development process that led to increase the components number and the associated time. Due to the financial resources and time constraints, practically exhaustive testing is hopeless. For this reason, numerous researchers have adopted pairwise testing to decrease the ex...
Article
Full-text available
A combinatorial testing (CT) is an important technique usually employed in the generation of test cases. The generation of an optimal sized test case is a Non-Deterministic Polynomial hard problem (NP). In recent times, many researchers had developed the various strategies based on the search-based approach to address the combinatorial testing issu...
Article
Full-text available
The unforeseeable demand for secure paradigm cannot be fulfilled by the arbitrary sequence generated by the linear feedback shift register, which means the generated sequence can't meet satisfy the unpredictable demand for secure paradigm. Tent chaotic equation combined with the linear property of Linear Feedback Shift Register (LFSR) has resulted...
Article
Full-text available
Although desirable, exhaustive testing is practically impossible. In the last 30 years, many sampling strategies have been introduced to systematically minimize the test data for consideration. Complementing existing sampling strategies (i.e. in terms of dealing with interaction faults), pairwise testing has been extensively exploited resulting int...
Article
Full-text available
Computer software is in high demand everywhere in the world. The high dependence on software makes software requirements more complicated. As a result, software testing tasks get costlier and challenging due to a large number of test cases, coupled with the vast number of the system requirements. This challenge presents the need for reduction of th...
Conference Paper
Full-text available
Failures of software systems are often caused due to unexpected interactions among system components. The number of tests that needs to be performed in order to test all possible combinations of interactions can be exorbitant even for medium sized software systems. To bring a balance between exhaustive testing and lack of testing, we have adopted t...
Conference Paper
Full-text available
The Internet of Things (IoT) is growing so fast than ever. It's going to have a huge impact on just about every market around the world within few years from now. So, it's certainly possible to overlook some of the most important elements needed to effectively take advantage of this trend. Because the Internet of Things will be involved in many par...
Article
Full-text available
Cloud computing has been an attention in the new era of the IT technologies as there is an increase demand in the services or utility computing all over the wide world web. Security risk resulting from resource sharing throughout the cloud computing becomes one of the most challenging concerns in providing powerful processing and storage as on-dema...
Article
Full-text available
Although desirable, exhaustive testing of the software system is impractical because of the significant growth of the search space of systems features (large search space).Several sampling strategies have been introduced to systematically reduce the test data for consideration. Complementing existing sampling strategies (i.e. in terms of dealing wi...
Conference Paper
Exhaustive testing is extremely difficult to perform owing to the large number of combinations. Thus, sampling and finding the optimal test suite from a set of feasible test cases becomes a central concern. Addressing this issue, the adoption of t-way testing (where t indicates the interaction strength) has come into the limelight. In order to summ...
Article
Full-text available
Testing has an essential influence on the efficiency and effectiveness in software quality. For ensuring software quality, there is a need to test all possible input combinations. Owing to time and resource constraints, testing all input combinations is hardly feasible. Here, testing of pairwise is a promising strategy so as to ensure the required...
Article
Full-text available
Owing to exponential growth of software lines of codes (LOC)s, testing becomes painstakingly difficult activities. Test engineers are often under pressure to test more and more LOCs yet within the same targeted deadline. For this reason, efficient testing strategy is required. Pairwise testing is amongst the most common strategies for minimizing an...
Article
Full-text available
Combinatorial interaction testing is a practical approach aims to detect defects due to unwanted and faulty interactions. Here, a set of sampled test cases is generated based on t-way covering problem (where t indicates the interaction strength). Often, the generation process is based on a particular t-way strategy ensuring that each t-way interact...
Conference Paper
Full-text available
Owing to exponential growth of software lines of codes (LOC)s, testing becomes painstakingly difficult activities. Test engineers are often under pressure to test more and more LOCs yet within the same targeted deadline. For this reason, adopting effective combinatorial automated testing methods is required to ensure quality. T-way combinatorial te...
Conference Paper
Full-text available
Software product lines (SPLs) represent an engineering method for creating a portfolio of similar software systems for a shared set of software product assets. Owing to the significant growth of SPLs, there is a need for systematic approach for ensuring the quality of the resulting product derivatives. Combinatorial t-way testing (where t indicates...
Article
Full-text available
Combinatorial Interaction testing (or termed t-way testing) is a useful g strategy aimed at sampling a set of test cases from a large search space. As part of the strategy implementation, researchers have started to turn into meta-heuristic algorithms in line with the emergence of the new field called Search based Software Engineering. Complementin...
Conference Paper
Full-text available
This paper describes the generation of t-way test suit using the Late Acceptance Hill Climbing based strategy (LAHC) in the present of constraints. Our benchmarking results have been promising as LAHC gives competitive results in all constraints configurations considered.

Network

Cited By