Khulood Abu Maria | Mutah University (original) (raw)
Papers by Khulood Abu Maria
... Emotional Agent Modeling (EMAM). Khulood Abu Maria (Arab Academy of Business and Financial Se... more ... Emotional Agent Modeling (EMAM). Khulood Abu Maria (Arab Academy of Business and Financial Services, Jordan), and Raed Abu Zitar (Philadelphia University, Jordan). Copyright © 2011. 18 pages. ... Sample PDF Cite Chapter. MLA. Abu Maria, Khulood, and Raed Abu Zitar. ...
The evolving necessity of the Internet increases the demand on the bandwidth. Therefore, this dem... more The evolving necessity of the Internet increases the demand on the bandwidth. Therefore, this demand opens the doors for the hackers' community to develop new methods and techniques to gain control over networking systems. Hence, the intrusion detection systems (IDS) are insufficient to prevent/detect unauthorized access the network. Network Intrusion Detection System (NIDS) is one example that still suffers from performance degradation due the increase of the link speed in today's networks. In This paper we proposed a novel algorithm to detect the intruders, who's trying to gain access to the network using the packets header parameters such as; source/destination address, source/destination port, and protocol without the need to inspect each packet content looking for signatures/patterns. However, the "Packet Header Matching" algorithm enhances the overall speed of the matching process between the incoming packet headers against the rule set. We ran the propos...
This paper proposes modeling of artificial emotions through agents based on symbolic approach. Th... more This paper proposes modeling of artificial emotions through agents based on symbolic approach. The symbolic approach utilizes symbolic emotional rule-based systems (rule base that generated emotions) with continuous interactions with environment and an internal ''thinking'' machinery that comes as a result of series of inferences, evaluation, evolution processes, adaptation, learning, and emotions. We build two models for agent based systems; one is supported with artificial emotions and the other one without emotions. We use both in solving a bench mark problem; ''The Orphanage Care Problem''. The two systems are simulated and results are compared. Our study shows that systems with proper model of emotions can perform in many cases better than systems without emotions. We try to shed the light here on how artificial emotions can be modeled in a simple rule-based agent systems and if emotions as they exist in ''real intelligence'' can be helpful for ''artificial intelligence''. Agent architectures are presented as a generic blueprint on which the design of agents can be based. Our focus is on the functional design, including flow of information and control. With this information provided, the generic blueprints of architectures should not be difficult to implement agents, thus putting these theoretical models into practice. We build the agents using this architecture, and many experiments and analysis are shown.
International Journal of Innovative Computing, Information and Control, 2018
Nowadays, the amount of Arabic documents has increased significantly in different domains, such a... more Nowadays, the amount of Arabic documents has increased significantly in different domains, such as news articles, emails, business summary, biomedicine, web sites and social media documents. Some databases have increased in its size to terabyte. Multi-document summarization is the method of creating a summary of a group of interrelated documents. Therefore, the rise of the desire for Arabic multi documents text summarization (at the instant rates possible, coherent, grammatical and meaningful sentences) is increased. Recently, many efforts on multi-document text summarization that is related to the English language have been performed. Arabic multi-document summarization is remained on its early stages. Consequently, the researchers in this paper propose an Arabic Multi-Document Text Summarization (AMD-TS) model based on parallel computing techniques. This model of Arabic text summarization could effectively and rapidly summarize Arabic multi-documents in real time. A conceptual framework is proposed based on published researches dealing with text summarization techniques of different languages. The proposed model creates an accurate, coherent and complete Arabic multi-document text summarization model. The dataset that is used in the investigation stage is derived from different domains, such as education, sports and politics. This dataset contains texts of various sizes. The experiments are then designed to be on specific domain (news articles domain). In order to increase the summarization process efficiency and performance, the researchers in this paper use parallel computing. The model covers the deficiency of Arabic Automatic Summarization Systems (ASS) by enhancing the final summary.
Egyptian Informatics Journal
A conversational agent (chatbot) is a software that communicates with people using natural langua... more A conversational agent (chatbot) is a software that communicates with people using natural language. Natural language processing and artificial intelligence rely heavily on conversation modeling. (AI).Indeed, creating a reliable chatbot system has been one of the most difficult challenges in AI since its inception. Although this system can do a variety of things, it must be able to recognize what users are saying in chat and reply to their questions. As a result, this study proposes a deep learning Arabic chatbot system built on a deep neural network model. The proposed method allows for text chats with others about common topics. The suggested system makes use of a Jordanian dialect derived from the website of Jordan’s Al-Zaytoonah University. The model is also created and tested in the deep learning frameworks Tensorflow and Keras. Furthermore, with no handcrafted rules, a dataset of manually produced pairs of conversations is used. This leads to the development of a chat bot syst...
ICIC Express Letters, 2018
ICIC Express Letters, 2018
ICIC Express Letters, 2019
Cognitive agents for business and industrial environments are one of the most dominant ideas in m... more Cognitive agents for business and industrial environments are one of the most dominant ideas in multiagent scheme today. We propose a general, flexible, and powerful architecture to build software agents that embed artificial cognitive factors. The propose agent possesses sensible knowledge and reactive abilities, and interacts with the external complex business environment, including other agents. We examine if artificial cognitive states can improve the performance of agents in some business and industrial conditions. Our agent model generates responsive actions in reaction to certain stimuli. Cognitive Agent Model (CAM) is proposed for this purpose. Sales and Production Planning (SPP) (as business and manufacturing application) is chosen to demonstrate the use of our agent. Netlogo is used as an agent programming language. It is the agent-oriented language used to simulate and implement our proposed models.
Nowadays, the amount of Arabic documents has increased significantly in different domains, such a... more Nowadays, the amount of Arabic documents has increased significantly in different domains, such as news articles, emails, business summary, biomedicine, web sites and social media documents. Some databases have increased in its size to terabyte. Multi-document summarization is the method of creating a summary of a group of interrelated documents. Therefore, the rise of the desire for Arabic multi documents text summarization (at the instant rates possible, coherent, grammatical and meaningful sentences) is increased. Recently, many efforts on multi-document text summarization that is related to the English language have been performed. Arabic multi-document summarization is remained on its early stages. Consequently, the researchers in this paper propose an Arabic Multi-Document Text Summarization (AMD-TS) model based on parallel computing techniques. This model of Arabic text summarization could effectively and rapidly summarize Arabic multi-documents in real time. A conceptual fra...
Steganography is defined as the art of hiding secret data in a non-secret digital carrier called ... more Steganography is defined as the art of hiding secret data in a non-secret digital carrier called cover media. Trading delicate data without assurance against intruders that may intrude on this data is a lethal. In this manner, transmitting delicate information and privileged insights must not rely on upon just the current communications channels insurance advancements. Likewise should make more strides towards information insurance. This article proposes an improved approach for video steganography. The improvement made by searching for exact matching between the secret text and the video frames RGB channels and Random Key -Dependent Data, achieving steganography performance criteria, invisibility, payload/ capacity and robustness.
2017 8th International Conference on Information Technology (ICIT), 2017
This paper demonstrates a comparative study of Arabic Multi-Document Summarization System (AMD-SS... more This paper demonstrates a comparative study of Arabic Multi-Document Summarization System (AMD-SS). These methods are compared and analyzed, aiming to detect which method generates a genuine summary and achieves the best results in comparison with the human summarization techniques. The comparative study shows that there is a lack in the area of Arabic Automatic Text Summarization systems. Therefore, we proposed an Arabic Text Summarization model that built in linear algorithms based on parallel computing techniques. The proposed model is built in order to generate an Arabic Document Summary (ADS) that is fully coherent, grammatical and meaningful Arabic sentences, closing to a human summarization. Recent researches have not provided perfect Arabic summary.
KSII Transactions on Internet and Information Systems
Steganography is the art of concealing the existence of a secret data in a non-secret digital car... more Steganography is the art of concealing the existence of a secret data in a non-secret digital carrier called cover media. While the image of steganography methods is extensively researched, studies on other cover files remain limited. Videos are promising research items for steganography primitives. This study presents an improved approach to video steganography. The improvement is achieved by allowing senders and receivers exchanging secret data without embedding the hidden data in the cover file as in traditional steganography methods. The method is based mainly on searching for exact matches between the secret text and the video frames RGB channel pixel values. Accordingly, a random key-dependent data is generated, and Elliptic Curve Public Key Cryptography is used. The proposed method has an unlimited embedding capacity. The results show that the improved method is secure against traditional steganography attacks since the cover file has no embedded data. Compared to other existing Steganography video systems, the proposed system shows that the method proposed is unlimited in its embedding capacity, system invisibility, and robustness. The system achieves high precision for data recovery in the receiver. The performance of the proposed method is found to be acceptable across different sizes of video files.
Steganography is defined as the art of hiding secret information. It is used to guarantee informa... more Steganography is defined as the art of hiding secret information. It is used to guarantee information accessibility only by authorized parties. The least-significant bit (LSB) approach is one of the most important scenarios in steganography. However, the existing LSB approaches apply some changing in the image’s pixels values, which make the image suspected by intruders and hackers. This paper proposed an image steganography system based on the exact matching between the image’s pixel values and the secret data. As well as, a random key-dependent data (RKDD) is generated without performing any changes on the image’s pixel values. Moreover, the proposed system has been tested successfully on many images giving promising results. These significant results can be perceived in terms of fast searching time, great number of matches, reduced key size, achieving steganography performance criteria, invisibility, payload/ capacity and robustness.
2021 International Conference on Information Technology (ICIT)
Recent Advances in Computer Science and Communications
Introduction: Stemming is an important preprocessing step in text classification, and could contr... more Introduction: Stemming is an important preprocessing step in text classification, and could contribute in increasing text classification accuracy. Although many works proposed stemmers for English language, few stemmers were proposed for Arabic text. Arabic language has gained increasing attention in the previous decades and the need is vital to further improve Arabic text classification. Method: This work combined the use of the recently proposed P-Stemmer with various classifiers to find the optimal classifier for the P-stemmer in term of Arabic text classification. As part of this work, a synthesized dataset was collected. Result: The previous experiments show that the use of P-Stemmer has a positive effect on classification. The degree of improvement was classifier-dependent, which is reasonable as classifiers vary in their methodologies. Moreover, the experiments show that the best classifier with the P-Stemmer was NB. This is an interesting result as this classifier is wellkno...
Concepts, Methodologies, Tools and Applications, 2011
... Emotional Agent Modeling (EMAM). Khulood Abu Maria (Arab Academy of Business and Financial Se... more ... Emotional Agent Modeling (EMAM). Khulood Abu Maria (Arab Academy of Business and Financial Services, Jordan), and Raed Abu Zitar (Philadelphia University, Jordan). Copyright © 2011. 18 pages. ... Sample PDF Cite Chapter. MLA. Abu Maria, Khulood, and Raed Abu Zitar. ...
Environmental Management, Sustainable Development and Human Health, 2008
Modeling of Artificial Emotions and its Application Towards a Healthy Environment Khulood Abu Mar... more Modeling of Artificial Emotions and its Application Towards a Healthy Environment Khulood Abu Maria College of Information Technology, Arab Academy of Business and Financial Sciences, Amman, Jordan Raed Abu Zitar Faculty of Engineering and Computer Science ...
... Emotional Agent Modeling (EMAM). Khulood Abu Maria (Arab Academy of Business and Financial Se... more ... Emotional Agent Modeling (EMAM). Khulood Abu Maria (Arab Academy of Business and Financial Services, Jordan), and Raed Abu Zitar (Philadelphia University, Jordan). Copyright © 2011. 18 pages. ... Sample PDF Cite Chapter. MLA. Abu Maria, Khulood, and Raed Abu Zitar. ...
The evolving necessity of the Internet increases the demand on the bandwidth. Therefore, this dem... more The evolving necessity of the Internet increases the demand on the bandwidth. Therefore, this demand opens the doors for the hackers' community to develop new methods and techniques to gain control over networking systems. Hence, the intrusion detection systems (IDS) are insufficient to prevent/detect unauthorized access the network. Network Intrusion Detection System (NIDS) is one example that still suffers from performance degradation due the increase of the link speed in today's networks. In This paper we proposed a novel algorithm to detect the intruders, who's trying to gain access to the network using the packets header parameters such as; source/destination address, source/destination port, and protocol without the need to inspect each packet content looking for signatures/patterns. However, the "Packet Header Matching" algorithm enhances the overall speed of the matching process between the incoming packet headers against the rule set. We ran the propos...
This paper proposes modeling of artificial emotions through agents based on symbolic approach. Th... more This paper proposes modeling of artificial emotions through agents based on symbolic approach. The symbolic approach utilizes symbolic emotional rule-based systems (rule base that generated emotions) with continuous interactions with environment and an internal ''thinking'' machinery that comes as a result of series of inferences, evaluation, evolution processes, adaptation, learning, and emotions. We build two models for agent based systems; one is supported with artificial emotions and the other one without emotions. We use both in solving a bench mark problem; ''The Orphanage Care Problem''. The two systems are simulated and results are compared. Our study shows that systems with proper model of emotions can perform in many cases better than systems without emotions. We try to shed the light here on how artificial emotions can be modeled in a simple rule-based agent systems and if emotions as they exist in ''real intelligence'' can be helpful for ''artificial intelligence''. Agent architectures are presented as a generic blueprint on which the design of agents can be based. Our focus is on the functional design, including flow of information and control. With this information provided, the generic blueprints of architectures should not be difficult to implement agents, thus putting these theoretical models into practice. We build the agents using this architecture, and many experiments and analysis are shown.
International Journal of Innovative Computing, Information and Control, 2018
Nowadays, the amount of Arabic documents has increased significantly in different domains, such a... more Nowadays, the amount of Arabic documents has increased significantly in different domains, such as news articles, emails, business summary, biomedicine, web sites and social media documents. Some databases have increased in its size to terabyte. Multi-document summarization is the method of creating a summary of a group of interrelated documents. Therefore, the rise of the desire for Arabic multi documents text summarization (at the instant rates possible, coherent, grammatical and meaningful sentences) is increased. Recently, many efforts on multi-document text summarization that is related to the English language have been performed. Arabic multi-document summarization is remained on its early stages. Consequently, the researchers in this paper propose an Arabic Multi-Document Text Summarization (AMD-TS) model based on parallel computing techniques. This model of Arabic text summarization could effectively and rapidly summarize Arabic multi-documents in real time. A conceptual framework is proposed based on published researches dealing with text summarization techniques of different languages. The proposed model creates an accurate, coherent and complete Arabic multi-document text summarization model. The dataset that is used in the investigation stage is derived from different domains, such as education, sports and politics. This dataset contains texts of various sizes. The experiments are then designed to be on specific domain (news articles domain). In order to increase the summarization process efficiency and performance, the researchers in this paper use parallel computing. The model covers the deficiency of Arabic Automatic Summarization Systems (ASS) by enhancing the final summary.
Egyptian Informatics Journal
A conversational agent (chatbot) is a software that communicates with people using natural langua... more A conversational agent (chatbot) is a software that communicates with people using natural language. Natural language processing and artificial intelligence rely heavily on conversation modeling. (AI).Indeed, creating a reliable chatbot system has been one of the most difficult challenges in AI since its inception. Although this system can do a variety of things, it must be able to recognize what users are saying in chat and reply to their questions. As a result, this study proposes a deep learning Arabic chatbot system built on a deep neural network model. The proposed method allows for text chats with others about common topics. The suggested system makes use of a Jordanian dialect derived from the website of Jordan’s Al-Zaytoonah University. The model is also created and tested in the deep learning frameworks Tensorflow and Keras. Furthermore, with no handcrafted rules, a dataset of manually produced pairs of conversations is used. This leads to the development of a chat bot syst...
ICIC Express Letters, 2018
ICIC Express Letters, 2018
ICIC Express Letters, 2019
Cognitive agents for business and industrial environments are one of the most dominant ideas in m... more Cognitive agents for business and industrial environments are one of the most dominant ideas in multiagent scheme today. We propose a general, flexible, and powerful architecture to build software agents that embed artificial cognitive factors. The propose agent possesses sensible knowledge and reactive abilities, and interacts with the external complex business environment, including other agents. We examine if artificial cognitive states can improve the performance of agents in some business and industrial conditions. Our agent model generates responsive actions in reaction to certain stimuli. Cognitive Agent Model (CAM) is proposed for this purpose. Sales and Production Planning (SPP) (as business and manufacturing application) is chosen to demonstrate the use of our agent. Netlogo is used as an agent programming language. It is the agent-oriented language used to simulate and implement our proposed models.
Nowadays, the amount of Arabic documents has increased significantly in different domains, such a... more Nowadays, the amount of Arabic documents has increased significantly in different domains, such as news articles, emails, business summary, biomedicine, web sites and social media documents. Some databases have increased in its size to terabyte. Multi-document summarization is the method of creating a summary of a group of interrelated documents. Therefore, the rise of the desire for Arabic multi documents text summarization (at the instant rates possible, coherent, grammatical and meaningful sentences) is increased. Recently, many efforts on multi-document text summarization that is related to the English language have been performed. Arabic multi-document summarization is remained on its early stages. Consequently, the researchers in this paper propose an Arabic Multi-Document Text Summarization (AMD-TS) model based on parallel computing techniques. This model of Arabic text summarization could effectively and rapidly summarize Arabic multi-documents in real time. A conceptual fra...
Steganography is defined as the art of hiding secret data in a non-secret digital carrier called ... more Steganography is defined as the art of hiding secret data in a non-secret digital carrier called cover media. Trading delicate data without assurance against intruders that may intrude on this data is a lethal. In this manner, transmitting delicate information and privileged insights must not rely on upon just the current communications channels insurance advancements. Likewise should make more strides towards information insurance. This article proposes an improved approach for video steganography. The improvement made by searching for exact matching between the secret text and the video frames RGB channels and Random Key -Dependent Data, achieving steganography performance criteria, invisibility, payload/ capacity and robustness.
2017 8th International Conference on Information Technology (ICIT), 2017
This paper demonstrates a comparative study of Arabic Multi-Document Summarization System (AMD-SS... more This paper demonstrates a comparative study of Arabic Multi-Document Summarization System (AMD-SS). These methods are compared and analyzed, aiming to detect which method generates a genuine summary and achieves the best results in comparison with the human summarization techniques. The comparative study shows that there is a lack in the area of Arabic Automatic Text Summarization systems. Therefore, we proposed an Arabic Text Summarization model that built in linear algorithms based on parallel computing techniques. The proposed model is built in order to generate an Arabic Document Summary (ADS) that is fully coherent, grammatical and meaningful Arabic sentences, closing to a human summarization. Recent researches have not provided perfect Arabic summary.
KSII Transactions on Internet and Information Systems
Steganography is the art of concealing the existence of a secret data in a non-secret digital car... more Steganography is the art of concealing the existence of a secret data in a non-secret digital carrier called cover media. While the image of steganography methods is extensively researched, studies on other cover files remain limited. Videos are promising research items for steganography primitives. This study presents an improved approach to video steganography. The improvement is achieved by allowing senders and receivers exchanging secret data without embedding the hidden data in the cover file as in traditional steganography methods. The method is based mainly on searching for exact matches between the secret text and the video frames RGB channel pixel values. Accordingly, a random key-dependent data is generated, and Elliptic Curve Public Key Cryptography is used. The proposed method has an unlimited embedding capacity. The results show that the improved method is secure against traditional steganography attacks since the cover file has no embedded data. Compared to other existing Steganography video systems, the proposed system shows that the method proposed is unlimited in its embedding capacity, system invisibility, and robustness. The system achieves high precision for data recovery in the receiver. The performance of the proposed method is found to be acceptable across different sizes of video files.
Steganography is defined as the art of hiding secret information. It is used to guarantee informa... more Steganography is defined as the art of hiding secret information. It is used to guarantee information accessibility only by authorized parties. The least-significant bit (LSB) approach is one of the most important scenarios in steganography. However, the existing LSB approaches apply some changing in the image’s pixels values, which make the image suspected by intruders and hackers. This paper proposed an image steganography system based on the exact matching between the image’s pixel values and the secret data. As well as, a random key-dependent data (RKDD) is generated without performing any changes on the image’s pixel values. Moreover, the proposed system has been tested successfully on many images giving promising results. These significant results can be perceived in terms of fast searching time, great number of matches, reduced key size, achieving steganography performance criteria, invisibility, payload/ capacity and robustness.
2021 International Conference on Information Technology (ICIT)
Recent Advances in Computer Science and Communications
Introduction: Stemming is an important preprocessing step in text classification, and could contr... more Introduction: Stemming is an important preprocessing step in text classification, and could contribute in increasing text classification accuracy. Although many works proposed stemmers for English language, few stemmers were proposed for Arabic text. Arabic language has gained increasing attention in the previous decades and the need is vital to further improve Arabic text classification. Method: This work combined the use of the recently proposed P-Stemmer with various classifiers to find the optimal classifier for the P-stemmer in term of Arabic text classification. As part of this work, a synthesized dataset was collected. Result: The previous experiments show that the use of P-Stemmer has a positive effect on classification. The degree of improvement was classifier-dependent, which is reasonable as classifiers vary in their methodologies. Moreover, the experiments show that the best classifier with the P-Stemmer was NB. This is an interesting result as this classifier is wellkno...
Concepts, Methodologies, Tools and Applications, 2011
... Emotional Agent Modeling (EMAM). Khulood Abu Maria (Arab Academy of Business and Financial Se... more ... Emotional Agent Modeling (EMAM). Khulood Abu Maria (Arab Academy of Business and Financial Services, Jordan), and Raed Abu Zitar (Philadelphia University, Jordan). Copyright © 2011. 18 pages. ... Sample PDF Cite Chapter. MLA. Abu Maria, Khulood, and Raed Abu Zitar. ...
Environmental Management, Sustainable Development and Human Health, 2008
Modeling of Artificial Emotions and its Application Towards a Healthy Environment Khulood Abu Mar... more Modeling of Artificial Emotions and its Application Towards a Healthy Environment Khulood Abu Maria College of Information Technology, Arab Academy of Business and Financial Sciences, Amman, Jordan Raed Abu Zitar Faculty of Engineering and Computer Science ...