Ammar Odeh | Princess Sumaya University for Technology (PSUT) (original) (raw)

Papers by Ammar Odeh

Research paper thumbnail of XSSer: hybrid deep learning for enhanced cross-site scripting  detection

Bulletin of Electrical Engineering and Informatics, 2024

The importance of an effective cross-site scripting (XSS) detection systemcannot be overstated in... more The importance of an effective cross-site scripting (XSS) detection systemcannot be overstated in web security. XSS attacks continue to be a prevalentand severe threat to web applications, making the need for robust detectionsystems more crucial than ever. This paper introduced a hybrid model thatleverages deep learning algorithms, combining recurrent neural network(RNN) and convolutional neural network (CNN) architectures. Our hybridRNN-CNN model emerged as the top performer in our evaluation,demonstrating outstanding performance across key metrics. It achieved animpressive accuracy of 96.74%, excelling inaccurate predictions. Notably,the precision score reached an impressive 97.78%, highlighting its precisionin identifying positive instances while minimizing false positives.Furthermore, the model's recall score of 95.65% showcased its ability tocapture a substantial portion of true positive instances. This resulted in anexceptional F1-Score of 96.70, underlining the model's remarkable balancebetween precision and recall. Compared to other models in the evaluation,our proposed model unequivocally demonstrated its leadership, emphasizingits excellence in detecting potential XSS vulnerabilities within web content.

Research paper thumbnail of The effect of trust, IT knowledge, and entrepreneur’s innovativeness to embrace or shun the internet of things

Frontiers in Psychology

This study examines critical factors influencing Omani entrepreneurs’ adoption of the internet of... more This study examines critical factors influencing Omani entrepreneurs’ adoption of the internet of things (IoT) by expanding the constructs at the unified theory of acceptance and use of technology (UTAUT2) with entrepreneurs’ innovativeness, IT knowledge (ITK), and trust. A cross-sectional survey questionnaire was used to collect data from 158 entrepreneurs in Oman. Data were analyzed through the structural equation modeling technique using SmartPLS. The results indicated that performance expectancy, habit, social influence, trust (TR), ITK, and entrepreneurs’ innovativeness (PI) significantly affect Omani entrepreneurs’ intention to adopt IoT. Nonetheless, the results show that there is no significant relationship between hedonic motivation, effort expectancy, price value, and facilitating conditions to adopt IoT. This study contributes to previous literature by incorporating entrepreneurs’ innovativeness, ITK, and trust into UTAUT2. Furthermore, this study was conducted in a Middl...

Research paper thumbnail of Efficient Mobile Sink Routing in Wireless Sensor Networks using Bipartite Graphs

This article is an open access article distributed under the terms and conditions of the Creative... more This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY

Research paper thumbnail of Aplasia Cuties Congenita: A Case Study and Review of Literature Updates

Scholars academic journal of pharmacy, Feb 17, 2023

Cordon, in the year 1767, was the first person to describe the extremely rare form of abnormality... more Cordon, in the year 1767, was the first person to describe the extremely rare form of abnormality known as congenital aplasia of the skin. On the scalp, limbs, or abdomen, it manifests as a single, isolated lesion that affects multiple layers of skin and, on occasion, the bone. This is the most common form in which it presents itself. There has been some speculation that the condition could have a genetic component, a component related to the environment, or a component related to an exogenous factor. As of the end of 2013, there had been a total of approximately 500 cases reported from all over the world. The aim of the present study was to describe a rare case of ACC. An infant was diagnosed with ACC and a scalp lesion. The lesion was followed and described over one year.

Research paper thumbnail of Performance Evaluation of DYMO, AODV and DSR Routing Protocols in MANET

International journal of computer applications, Jul 28, 2012

An Ad Hoc network has no infrastructure and it provides flexibility to network's nodes to connect... more An Ad Hoc network has no infrastructure and it provides flexibility to network's nodes to connect and disconnect at any time. A MANET is an Ad Hoc network that provides freedom of movement to the network's nodes. In a MANET, The development of routing protocols is one of the main challenges and much research has been done to evaluate the current protocols to improve them or to develop new protocols. There are several protocols that have been tested in the past and each protocol has its advantages and disadvantages depending on the applications. In this paper, we evaluate Dynamic MANET On-demand routing protocol (DYMO), Ad Hoc On-Demand Distance Vector Routing protocol (AODV) and Dynamic Source Routing protocol (DSR). We evaluate the performance based on throughput, dropped packets and end-to-end delay.

Research paper thumbnail of Analysis of video streaming using LTE technology

Long-Term Evolution (LTE) is a radio access technology. It is a standard cellular network that en... more Long-Term Evolution (LTE) is a radio access technology. It is a standard cellular network that enables mobile transmission of streaming high definition video in real time. This paper analyzes the development and LTE performance in streaming multimedia through an analysis of the video transmission package performance. Furthermore, we examined the influence of LTE in streaming multimedia through the adoption of a simulator.

Research paper thumbnail of Comparing Dispersion Compensation Methods for 120 GB/S Optical Transmission: Pre, Post, and Symmetrical Schemes

The Journal of Engineering Research, Apr 11, 2023

One of the major factors that limit the performance of an optical fiber communication system is d... more One of the major factors that limit the performance of an optical fiber communication system is dispersion. In order to get a high transmission range with high data rates, techniques must be in place to compensate for the dispersion caused by fiber nonlinearity. Dispersion Compensating Fiber (DCF) and Fiber Bragg Grating (FBG) are the trending dispersion compensation techniques in optical fiber communication. The use of DCF and FBG as a method of dispersion compensation can notably enhance the overall performance of the system. Broadening is a function of distance as well as the Dispersion parameter (D). The dispersion parameter is given in ps/nm/km and changes from fiber to fiber and also is a function of wavelength. In this paper, we investigate pre-, post-, and symmetrical compensating schemes in three different compensating models: DCF, FBG, and DCF cascaded to FBG. The system performance was evaluated in terms of Q-factor and Bit Error Rate (BER) for one optical channel communication system at 120 Gbps Return to Zero (RZ) signal launched over Single-Mode Fiber (SMF) of 100 km by using OptiSystem 7.0 software.

Research paper thumbnail of A Lightweight Double-Stage Scheme to Identify Malicious DNS over HTTPS Traffic Using a Hybrid Learning Approach

Sensors, Mar 27, 2023

This article is an open access article distributed under the terms and conditions of the Creative... more This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY

Research paper thumbnail of Quantum sort algorithm based on entanglement qubits {00, 11}

Quantum algorithms have gained a lot of consideration especially for the need of searching unsort... more Quantum algorithms have gained a lot of consideration especially for the need of searching unsorted database in a faster way rather than using the classical search mechanisms. This paper introduces a new quantum sort algorithm by employing the quantum features to expedite the searching process in conventional environments. The proposed efficient sorting algorithm emphasizes entanglement qubits property to sort N positive integers.

Research paper thumbnail of Adaptive Equalization: LMS, RLS and CMA

This poster presents performance evaluation of adaptive equalizers (LMS, RLS and CMA) using diffe... more This poster presents performance evaluation of adaptive equalizers (LMS, RLS and CMA) using different Quadrature Amplitude Modulation (QAM) techniques (4-QAM, 8-QAM); using Frequency Flat Fading and Frequency Selective Fading. BERTool is used to do comparison under MATLAB software package. For this purpose, two arbitrary channel response are selected. Flat Fading Channel transfer function is [1 0.7 0.5] and Frequency Selective Fading Channel Transfer function is [0.9 0.7 0.5 0.3]. Flat Fading Channel is used to model rural area effect on signal transmission and Frequency Selective Fading is used to model urban area. LMS, RLS use channel estimation techniques to first estimate the behavior of channel by using training symbols and then equalize its effect by creating opposite response to channel; while CMA works on blind estimation i.e. it does not know the behavior of channel it uses general algorithm to equalize channel.

Research paper thumbnail of Deployment of Law Enforcement Department Using Manhattan Mobility Model over Hybrid Network

Manhattan Mobility is a model of Vehicular Ad-hoc Network (VANET) where nodes have flexibility to... more Manhattan Mobility is a model of Vehicular Ad-hoc Network (VANET) where nodes have flexibility to connect and disconnect from the network at any time and have also freedom of movement. Manhattan Mobility Model is proposed generally for urban areas that have grid streets topology, this model is organized in a specific way where there are number of vertical and horizontal streets. In Adhoc networks, routing protocols play a vital role in the network's performance because it defines the way of selecting a path from the source node to the destination. In this paper, we are evaluating the performance of three routing protocols namely AODV, DSDV and DSR. The performance evaluation has been done using Network Simulator (NS-2). The comparison was based on the Throughout, Goodput, End-to-End Delay and Network Coverage Area. In our simulation, AODV shows better performance in Throughput and Goodput and DSR performs better in the Network Coverage Area. The performance of the three protocols is comparable with respect to End-to-End Delay.

Research paper thumbnail of Robust Text Steganography Algorithms for Secure Data Communications

In the era of information technology, a large amount of digital information is distributed over t... more In the era of information technology, a large amount of digital information is distributed over the Internet in the form of videos, images, text, and audio. The main purpose of widespread distribution enables users to share knowledge between one another. As a result, data transmission and information sharing are effected due to malicious activities. Different techniques exist to protect user authentication, data privacy, and copyrights. Two main techniques that improve security and data protection are Cryptography and Steganography. Cryptographic algorithms convert the secret message from plain text into cipher text. Then the message is sent over the communication channel. Steganography hides a secret message inside the carrier media. This proposal will investigate different Steganography algorithms and present novel algorithms employing text file as a carrier file. The proposed model hides secret data in the text file by applying various properties into file font format by inserting special symbols in the text file. In addition, the suggested model can be applied in both Unicode and ASCII code languages, regardless of the text file format. The proposed system achieves a high degree of the main Steganography attributes like hidden ratio, robustness, and transparency. In addition, this proposal provides guidance for other researchers in text Steganography algorithms. v ACKNOWLEDGEMENTS My thanks are wholly devoted to God who has helped me all the way to complete this work successfully. I owe a debt of gratitude to my family for understanding and encouragement.

Research paper thumbnail of Security of Wireless Sensor Networks in Biomedical

JOURNAL OF ADVANCES IN BIOLOGY, Nov 26, 2013

ABSTRACT Wireless sensor networks are rapidly growing as they have many outstanding characteristi... more ABSTRACT Wireless sensor networks are rapidly growing as they have many outstanding characteristics such as the low power consumption, remote location sensing, low cost wirelessly communication and mobility. There has been increase in using wireless sensor networks in the biomedical and healthcare. However, using wireless sensor network introduce new challenges that are related to privacy and security. As well as the information related to the patient besides the other parities in the healthcare facilities. For instance, the information related to the doctors, nurses and the workers. We reviewed the latest approaches that are related to wireless sensor security in the literature and identified the most affective factors in wireless sensor networks that are affecting the privacy and the security when employing these network especially in biomedical field. We discuss the tradeoff between increasing the security and the network performance. Moreover, we provide several solution to increase the security of wireless sensor network while maintaining the required performance. -In this we have covered the security issues that are related to the computing network. However, the risk from using the devices in the human body are not the scope of this paper. The purposed solutions are more effective when taking in consideration the factors the effect the wireless sensors such as the battery life or providing new a valid source of power. This paper provide the challenges of using the wireless sensor network in biomedical field and how to solve most of these issues. Solutions are provided to be implemented with the consideration of the other factors provided to make the wireless sensor network more secure.

Research paper thumbnail of Post COVID-19 Syndrome among Children: Review of the Literature

Scholars academic journal of biosciences, Feb 17, 2023

Review Article Despite the fact that children have a lower risk of contracting COVID-19, a growin... more Review Article Despite the fact that children have a lower risk of contracting COVID-19, a growing number of studies have shown an increase in the incidence of the pandemic among children. Reviewing the previous research on post-COVID-19 syndrome in children was the primary purpose of this study's literature analysis and review. We looked through a large number of research engines, such as PubMed, Google Scholar, ScienceDirect, and ResearchGate. The findings indicated that COVID-19 in children continues to be present for a considerable amount of time after the symptoms have subsided. When considered as a whole, the COVID-19 protocol for children should be adhered to because it does not end when the symptoms are relieved. Following an infection, there is generally a documented potential for the involvement of pathogenesis in multiple organs as a result of the infection.

Research paper thumbnail of Academic Use of Online Social Networks

International Journal of Innovation and Applied Studies, Jun 15, 2013

Research paper thumbnail of A Model for Understanding Project Requirements based on CMMI Specifications

2021 International Conference on Engineering and Emerging Technologies (ICEET), Oct 27, 2021

The main objective is to make sure that all the stakeholders understand the issues in the develop... more The main objective is to make sure that all the stakeholders understand the issues in the development of software. Knowing the needs ensures the success of the project. CAMI Level 2, therefore, helps organizations improve processes of software by providing them with important special practices to improve their software. Level 2 (in other words, SP 1.1 “understand requirements”). This practice helps developers to understand the problem and the needs of the domain in full. In this paper, we have visited three companies and conducted three detailed interviews. We have also developed a model of SP 1.1 by taking advantage of the different opinions and experiences of practices on the implementation of SP 1.1. This model comprises four key stages: preparation, analysis, validation, and updating. It will provide practitioners with key advice on how to implement SP 1.1 effectively.

Research paper thumbnail of Efficient Detection of Phishing Websites Using Multilayer Perceptron

International journal of interactive mobile technologies, Jul 10, 2020

Phishing is a type of Internet fraud that aims to acquire the credential of users via scamming we... more Phishing is a type of Internet fraud that aims to acquire the credential of users via scamming websites. In this paper, a novel approach is utilized that uses a Neural Network with a multilayer perceptron to detect the scam URL. The proposed system improves the accuracy of the scam detection system as it achieves a high accuracy percentage of 98.5%.

Research paper thumbnail of Comparing Dispersion Compensation Methods for 120 GB/S Optical Transmission: Pre, Post, and Symmetrical Schemes

The Journal of Engineering Research [TJER]

One of the major factors that limit the performance of an optical fiber communication system isdi... more One of the major factors that limit the performance of an optical fiber communication system isdispersion. In order to get a high transmission range with high data rates, techniques must be in place to compensate for the dispersion caused by fiber nonlinearity. Dispersion Compensating Fiber (DCF) and Fiber Bragg Grating (FBG) are the trending dispersion compensation techniques in optical fiber communication. The use of DCF and FBG as a method of dispersion compensation can notably enhance the overall performance of the system. Broadening is a function of distance as well as the Dispersion parameter (D). The dispersion parameter is given in ps/nm/km and changes from fiber to fiber and also is a function of wavelength. In this paper, we investigate pre-, post-, and symmetrical compensating schemes in three different compensating models: DCF, FBG, and DCF cascaded to FBG. The system performance was evaluated in terms of Q-factor and Bit Error Rate (BER) for one optical channel communic...

Research paper thumbnail of Phytochemical and bioactivity evaluation of secondary metabolites and essential oils of Sedum rubens growing wild in Jordan

Arabian Journal of Chemistry

Research paper thumbnail of PDF Malware Detection Based on Optimizable Decision Trees

Portable Document Format (PDF) files are one of the most universally used file types. This has fa... more Portable Document Format (PDF) files are one of the most universally used file types. This has fascinated hackers to develop methods to use these normally innocent PDF files to create security threats via infection vectors PDF files. This is usually realized by hiding embedded malicious code in the victims’ PDF documents to infect their machines. This, of course, results in PDF Malware and requires techniques to identify benign files from malicious files. Research studies indicated that machine-learning methods provide efficient detection techniques against such malware. In this paper, we present a new detection system that can analyze PDF documents in order to identify benign PFD files from malware PFD files. The proposed system makes use of the AdaBoost decision tree with optimal hyperparameters, which is trained and evaluated on a modern-inclusive dataset, viz. Evasive-PDFMal2022. The investigational assessment demonstrates a lightweight-accurate PDF detection system, achieving a...

Research paper thumbnail of XSSer: hybrid deep learning for enhanced cross-site scripting  detection

Bulletin of Electrical Engineering and Informatics, 2024

The importance of an effective cross-site scripting (XSS) detection systemcannot be overstated in... more The importance of an effective cross-site scripting (XSS) detection systemcannot be overstated in web security. XSS attacks continue to be a prevalentand severe threat to web applications, making the need for robust detectionsystems more crucial than ever. This paper introduced a hybrid model thatleverages deep learning algorithms, combining recurrent neural network(RNN) and convolutional neural network (CNN) architectures. Our hybridRNN-CNN model emerged as the top performer in our evaluation,demonstrating outstanding performance across key metrics. It achieved animpressive accuracy of 96.74%, excelling inaccurate predictions. Notably,the precision score reached an impressive 97.78%, highlighting its precisionin identifying positive instances while minimizing false positives.Furthermore, the model's recall score of 95.65% showcased its ability tocapture a substantial portion of true positive instances. This resulted in anexceptional F1-Score of 96.70, underlining the model's remarkable balancebetween precision and recall. Compared to other models in the evaluation,our proposed model unequivocally demonstrated its leadership, emphasizingits excellence in detecting potential XSS vulnerabilities within web content.

Research paper thumbnail of The effect of trust, IT knowledge, and entrepreneur’s innovativeness to embrace or shun the internet of things

Frontiers in Psychology

This study examines critical factors influencing Omani entrepreneurs’ adoption of the internet of... more This study examines critical factors influencing Omani entrepreneurs’ adoption of the internet of things (IoT) by expanding the constructs at the unified theory of acceptance and use of technology (UTAUT2) with entrepreneurs’ innovativeness, IT knowledge (ITK), and trust. A cross-sectional survey questionnaire was used to collect data from 158 entrepreneurs in Oman. Data were analyzed through the structural equation modeling technique using SmartPLS. The results indicated that performance expectancy, habit, social influence, trust (TR), ITK, and entrepreneurs’ innovativeness (PI) significantly affect Omani entrepreneurs’ intention to adopt IoT. Nonetheless, the results show that there is no significant relationship between hedonic motivation, effort expectancy, price value, and facilitating conditions to adopt IoT. This study contributes to previous literature by incorporating entrepreneurs’ innovativeness, ITK, and trust into UTAUT2. Furthermore, this study was conducted in a Middl...

Research paper thumbnail of Efficient Mobile Sink Routing in Wireless Sensor Networks using Bipartite Graphs

This article is an open access article distributed under the terms and conditions of the Creative... more This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY

Research paper thumbnail of Aplasia Cuties Congenita: A Case Study and Review of Literature Updates

Scholars academic journal of pharmacy, Feb 17, 2023

Cordon, in the year 1767, was the first person to describe the extremely rare form of abnormality... more Cordon, in the year 1767, was the first person to describe the extremely rare form of abnormality known as congenital aplasia of the skin. On the scalp, limbs, or abdomen, it manifests as a single, isolated lesion that affects multiple layers of skin and, on occasion, the bone. This is the most common form in which it presents itself. There has been some speculation that the condition could have a genetic component, a component related to the environment, or a component related to an exogenous factor. As of the end of 2013, there had been a total of approximately 500 cases reported from all over the world. The aim of the present study was to describe a rare case of ACC. An infant was diagnosed with ACC and a scalp lesion. The lesion was followed and described over one year.

Research paper thumbnail of Performance Evaluation of DYMO, AODV and DSR Routing Protocols in MANET

International journal of computer applications, Jul 28, 2012

An Ad Hoc network has no infrastructure and it provides flexibility to network's nodes to connect... more An Ad Hoc network has no infrastructure and it provides flexibility to network's nodes to connect and disconnect at any time. A MANET is an Ad Hoc network that provides freedom of movement to the network's nodes. In a MANET, The development of routing protocols is one of the main challenges and much research has been done to evaluate the current protocols to improve them or to develop new protocols. There are several protocols that have been tested in the past and each protocol has its advantages and disadvantages depending on the applications. In this paper, we evaluate Dynamic MANET On-demand routing protocol (DYMO), Ad Hoc On-Demand Distance Vector Routing protocol (AODV) and Dynamic Source Routing protocol (DSR). We evaluate the performance based on throughput, dropped packets and end-to-end delay.

Research paper thumbnail of Analysis of video streaming using LTE technology

Long-Term Evolution (LTE) is a radio access technology. It is a standard cellular network that en... more Long-Term Evolution (LTE) is a radio access technology. It is a standard cellular network that enables mobile transmission of streaming high definition video in real time. This paper analyzes the development and LTE performance in streaming multimedia through an analysis of the video transmission package performance. Furthermore, we examined the influence of LTE in streaming multimedia through the adoption of a simulator.

Research paper thumbnail of Comparing Dispersion Compensation Methods for 120 GB/S Optical Transmission: Pre, Post, and Symmetrical Schemes

The Journal of Engineering Research, Apr 11, 2023

One of the major factors that limit the performance of an optical fiber communication system is d... more One of the major factors that limit the performance of an optical fiber communication system is dispersion. In order to get a high transmission range with high data rates, techniques must be in place to compensate for the dispersion caused by fiber nonlinearity. Dispersion Compensating Fiber (DCF) and Fiber Bragg Grating (FBG) are the trending dispersion compensation techniques in optical fiber communication. The use of DCF and FBG as a method of dispersion compensation can notably enhance the overall performance of the system. Broadening is a function of distance as well as the Dispersion parameter (D). The dispersion parameter is given in ps/nm/km and changes from fiber to fiber and also is a function of wavelength. In this paper, we investigate pre-, post-, and symmetrical compensating schemes in three different compensating models: DCF, FBG, and DCF cascaded to FBG. The system performance was evaluated in terms of Q-factor and Bit Error Rate (BER) for one optical channel communication system at 120 Gbps Return to Zero (RZ) signal launched over Single-Mode Fiber (SMF) of 100 km by using OptiSystem 7.0 software.

Research paper thumbnail of A Lightweight Double-Stage Scheme to Identify Malicious DNS over HTTPS Traffic Using a Hybrid Learning Approach

Sensors, Mar 27, 2023

This article is an open access article distributed under the terms and conditions of the Creative... more This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY

Research paper thumbnail of Quantum sort algorithm based on entanglement qubits {00, 11}

Quantum algorithms have gained a lot of consideration especially for the need of searching unsort... more Quantum algorithms have gained a lot of consideration especially for the need of searching unsorted database in a faster way rather than using the classical search mechanisms. This paper introduces a new quantum sort algorithm by employing the quantum features to expedite the searching process in conventional environments. The proposed efficient sorting algorithm emphasizes entanglement qubits property to sort N positive integers.

Research paper thumbnail of Adaptive Equalization: LMS, RLS and CMA

This poster presents performance evaluation of adaptive equalizers (LMS, RLS and CMA) using diffe... more This poster presents performance evaluation of adaptive equalizers (LMS, RLS and CMA) using different Quadrature Amplitude Modulation (QAM) techniques (4-QAM, 8-QAM); using Frequency Flat Fading and Frequency Selective Fading. BERTool is used to do comparison under MATLAB software package. For this purpose, two arbitrary channel response are selected. Flat Fading Channel transfer function is [1 0.7 0.5] and Frequency Selective Fading Channel Transfer function is [0.9 0.7 0.5 0.3]. Flat Fading Channel is used to model rural area effect on signal transmission and Frequency Selective Fading is used to model urban area. LMS, RLS use channel estimation techniques to first estimate the behavior of channel by using training symbols and then equalize its effect by creating opposite response to channel; while CMA works on blind estimation i.e. it does not know the behavior of channel it uses general algorithm to equalize channel.

Research paper thumbnail of Deployment of Law Enforcement Department Using Manhattan Mobility Model over Hybrid Network

Manhattan Mobility is a model of Vehicular Ad-hoc Network (VANET) where nodes have flexibility to... more Manhattan Mobility is a model of Vehicular Ad-hoc Network (VANET) where nodes have flexibility to connect and disconnect from the network at any time and have also freedom of movement. Manhattan Mobility Model is proposed generally for urban areas that have grid streets topology, this model is organized in a specific way where there are number of vertical and horizontal streets. In Adhoc networks, routing protocols play a vital role in the network's performance because it defines the way of selecting a path from the source node to the destination. In this paper, we are evaluating the performance of three routing protocols namely AODV, DSDV and DSR. The performance evaluation has been done using Network Simulator (NS-2). The comparison was based on the Throughout, Goodput, End-to-End Delay and Network Coverage Area. In our simulation, AODV shows better performance in Throughput and Goodput and DSR performs better in the Network Coverage Area. The performance of the three protocols is comparable with respect to End-to-End Delay.

Research paper thumbnail of Robust Text Steganography Algorithms for Secure Data Communications

In the era of information technology, a large amount of digital information is distributed over t... more In the era of information technology, a large amount of digital information is distributed over the Internet in the form of videos, images, text, and audio. The main purpose of widespread distribution enables users to share knowledge between one another. As a result, data transmission and information sharing are effected due to malicious activities. Different techniques exist to protect user authentication, data privacy, and copyrights. Two main techniques that improve security and data protection are Cryptography and Steganography. Cryptographic algorithms convert the secret message from plain text into cipher text. Then the message is sent over the communication channel. Steganography hides a secret message inside the carrier media. This proposal will investigate different Steganography algorithms and present novel algorithms employing text file as a carrier file. The proposed model hides secret data in the text file by applying various properties into file font format by inserting special symbols in the text file. In addition, the suggested model can be applied in both Unicode and ASCII code languages, regardless of the text file format. The proposed system achieves a high degree of the main Steganography attributes like hidden ratio, robustness, and transparency. In addition, this proposal provides guidance for other researchers in text Steganography algorithms. v ACKNOWLEDGEMENTS My thanks are wholly devoted to God who has helped me all the way to complete this work successfully. I owe a debt of gratitude to my family for understanding and encouragement.

Research paper thumbnail of Security of Wireless Sensor Networks in Biomedical

JOURNAL OF ADVANCES IN BIOLOGY, Nov 26, 2013

ABSTRACT Wireless sensor networks are rapidly growing as they have many outstanding characteristi... more ABSTRACT Wireless sensor networks are rapidly growing as they have many outstanding characteristics such as the low power consumption, remote location sensing, low cost wirelessly communication and mobility. There has been increase in using wireless sensor networks in the biomedical and healthcare. However, using wireless sensor network introduce new challenges that are related to privacy and security. As well as the information related to the patient besides the other parities in the healthcare facilities. For instance, the information related to the doctors, nurses and the workers. We reviewed the latest approaches that are related to wireless sensor security in the literature and identified the most affective factors in wireless sensor networks that are affecting the privacy and the security when employing these network especially in biomedical field. We discuss the tradeoff between increasing the security and the network performance. Moreover, we provide several solution to increase the security of wireless sensor network while maintaining the required performance. -In this we have covered the security issues that are related to the computing network. However, the risk from using the devices in the human body are not the scope of this paper. The purposed solutions are more effective when taking in consideration the factors the effect the wireless sensors such as the battery life or providing new a valid source of power. This paper provide the challenges of using the wireless sensor network in biomedical field and how to solve most of these issues. Solutions are provided to be implemented with the consideration of the other factors provided to make the wireless sensor network more secure.

Research paper thumbnail of Post COVID-19 Syndrome among Children: Review of the Literature

Scholars academic journal of biosciences, Feb 17, 2023

Review Article Despite the fact that children have a lower risk of contracting COVID-19, a growin... more Review Article Despite the fact that children have a lower risk of contracting COVID-19, a growing number of studies have shown an increase in the incidence of the pandemic among children. Reviewing the previous research on post-COVID-19 syndrome in children was the primary purpose of this study's literature analysis and review. We looked through a large number of research engines, such as PubMed, Google Scholar, ScienceDirect, and ResearchGate. The findings indicated that COVID-19 in children continues to be present for a considerable amount of time after the symptoms have subsided. When considered as a whole, the COVID-19 protocol for children should be adhered to because it does not end when the symptoms are relieved. Following an infection, there is generally a documented potential for the involvement of pathogenesis in multiple organs as a result of the infection.

Research paper thumbnail of Academic Use of Online Social Networks

International Journal of Innovation and Applied Studies, Jun 15, 2013

Research paper thumbnail of A Model for Understanding Project Requirements based on CMMI Specifications

2021 International Conference on Engineering and Emerging Technologies (ICEET), Oct 27, 2021

The main objective is to make sure that all the stakeholders understand the issues in the develop... more The main objective is to make sure that all the stakeholders understand the issues in the development of software. Knowing the needs ensures the success of the project. CAMI Level 2, therefore, helps organizations improve processes of software by providing them with important special practices to improve their software. Level 2 (in other words, SP 1.1 “understand requirements”). This practice helps developers to understand the problem and the needs of the domain in full. In this paper, we have visited three companies and conducted three detailed interviews. We have also developed a model of SP 1.1 by taking advantage of the different opinions and experiences of practices on the implementation of SP 1.1. This model comprises four key stages: preparation, analysis, validation, and updating. It will provide practitioners with key advice on how to implement SP 1.1 effectively.

Research paper thumbnail of Efficient Detection of Phishing Websites Using Multilayer Perceptron

International journal of interactive mobile technologies, Jul 10, 2020

Phishing is a type of Internet fraud that aims to acquire the credential of users via scamming we... more Phishing is a type of Internet fraud that aims to acquire the credential of users via scamming websites. In this paper, a novel approach is utilized that uses a Neural Network with a multilayer perceptron to detect the scam URL. The proposed system improves the accuracy of the scam detection system as it achieves a high accuracy percentage of 98.5%.

Research paper thumbnail of Comparing Dispersion Compensation Methods for 120 GB/S Optical Transmission: Pre, Post, and Symmetrical Schemes

The Journal of Engineering Research [TJER]

One of the major factors that limit the performance of an optical fiber communication system isdi... more One of the major factors that limit the performance of an optical fiber communication system isdispersion. In order to get a high transmission range with high data rates, techniques must be in place to compensate for the dispersion caused by fiber nonlinearity. Dispersion Compensating Fiber (DCF) and Fiber Bragg Grating (FBG) are the trending dispersion compensation techniques in optical fiber communication. The use of DCF and FBG as a method of dispersion compensation can notably enhance the overall performance of the system. Broadening is a function of distance as well as the Dispersion parameter (D). The dispersion parameter is given in ps/nm/km and changes from fiber to fiber and also is a function of wavelength. In this paper, we investigate pre-, post-, and symmetrical compensating schemes in three different compensating models: DCF, FBG, and DCF cascaded to FBG. The system performance was evaluated in terms of Q-factor and Bit Error Rate (BER) for one optical channel communic...

Research paper thumbnail of Phytochemical and bioactivity evaluation of secondary metabolites and essential oils of Sedum rubens growing wild in Jordan

Arabian Journal of Chemistry

Research paper thumbnail of PDF Malware Detection Based on Optimizable Decision Trees

Portable Document Format (PDF) files are one of the most universally used file types. This has fa... more Portable Document Format (PDF) files are one of the most universally used file types. This has fascinated hackers to develop methods to use these normally innocent PDF files to create security threats via infection vectors PDF files. This is usually realized by hiding embedded malicious code in the victims’ PDF documents to infect their machines. This, of course, results in PDF Malware and requires techniques to identify benign files from malicious files. Research studies indicated that machine-learning methods provide efficient detection techniques against such malware. In this paper, we present a new detection system that can analyze PDF documents in order to identify benign PFD files from malware PFD files. The proposed system makes use of the AdaBoost decision tree with optimal hyperparameters, which is trained and evaluated on a modern-inclusive dataset, viz. Evasive-PDFMal2022. The investigational assessment demonstrates a lightweight-accurate PDF detection system, achieving a...