Ammar Odeh | Princess Sumaya University for Technology (PSUT) (original) (raw)
Papers by Ammar Odeh
Bulletin of Electrical Engineering and Informatics, 2024
The importance of an effective cross-site scripting (XSS) detection systemcannot be overstated in... more The importance of an effective cross-site scripting (XSS) detection systemcannot be overstated in web security. XSS attacks continue to be a prevalentand severe threat to web applications, making the need for robust detectionsystems more crucial than ever. This paper introduced a hybrid model thatleverages deep learning algorithms, combining recurrent neural network(RNN) and convolutional neural network (CNN) architectures. Our hybridRNN-CNN model emerged as the top performer in our evaluation,demonstrating outstanding performance across key metrics. It achieved animpressive accuracy of 96.74%, excelling inaccurate predictions. Notably,the precision score reached an impressive 97.78%, highlighting its precisionin identifying positive instances while minimizing false positives.Furthermore, the model's recall score of 95.65% showcased its ability tocapture a substantial portion of true positive instances. This resulted in anexceptional F1-Score of 96.70, underlining the model's remarkable balancebetween precision and recall. Compared to other models in the evaluation,our proposed model unequivocally demonstrated its leadership, emphasizingits excellence in detecting potential XSS vulnerabilities within web content.
Frontiers in Psychology
This study examines critical factors influencing Omani entrepreneurs’ adoption of the internet of... more This study examines critical factors influencing Omani entrepreneurs’ adoption of the internet of things (IoT) by expanding the constructs at the unified theory of acceptance and use of technology (UTAUT2) with entrepreneurs’ innovativeness, IT knowledge (ITK), and trust. A cross-sectional survey questionnaire was used to collect data from 158 entrepreneurs in Oman. Data were analyzed through the structural equation modeling technique using SmartPLS. The results indicated that performance expectancy, habit, social influence, trust (TR), ITK, and entrepreneurs’ innovativeness (PI) significantly affect Omani entrepreneurs’ intention to adopt IoT. Nonetheless, the results show that there is no significant relationship between hedonic motivation, effort expectancy, price value, and facilitating conditions to adopt IoT. This study contributes to previous literature by incorporating entrepreneurs’ innovativeness, ITK, and trust into UTAUT2. Furthermore, this study was conducted in a Middl...
This article is an open access article distributed under the terms and conditions of the Creative... more This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY
Scholars academic journal of pharmacy, Feb 17, 2023
Cordon, in the year 1767, was the first person to describe the extremely rare form of abnormality... more Cordon, in the year 1767, was the first person to describe the extremely rare form of abnormality known as congenital aplasia of the skin. On the scalp, limbs, or abdomen, it manifests as a single, isolated lesion that affects multiple layers of skin and, on occasion, the bone. This is the most common form in which it presents itself. There has been some speculation that the condition could have a genetic component, a component related to the environment, or a component related to an exogenous factor. As of the end of 2013, there had been a total of approximately 500 cases reported from all over the world. The aim of the present study was to describe a rare case of ACC. An infant was diagnosed with ACC and a scalp lesion. The lesion was followed and described over one year.
International journal of computer applications, Jul 28, 2012
An Ad Hoc network has no infrastructure and it provides flexibility to network's nodes to connect... more An Ad Hoc network has no infrastructure and it provides flexibility to network's nodes to connect and disconnect at any time. A MANET is an Ad Hoc network that provides freedom of movement to the network's nodes. In a MANET, The development of routing protocols is one of the main challenges and much research has been done to evaluate the current protocols to improve them or to develop new protocols. There are several protocols that have been tested in the past and each protocol has its advantages and disadvantages depending on the applications. In this paper, we evaluate Dynamic MANET On-demand routing protocol (DYMO), Ad Hoc On-Demand Distance Vector Routing protocol (AODV) and Dynamic Source Routing protocol (DSR). We evaluate the performance based on throughput, dropped packets and end-to-end delay.
Long-Term Evolution (LTE) is a radio access technology. It is a standard cellular network that en... more Long-Term Evolution (LTE) is a radio access technology. It is a standard cellular network that enables mobile transmission of streaming high definition video in real time. This paper analyzes the development and LTE performance in streaming multimedia through an analysis of the video transmission package performance. Furthermore, we examined the influence of LTE in streaming multimedia through the adoption of a simulator.
The Journal of Engineering Research, Apr 11, 2023
One of the major factors that limit the performance of an optical fiber communication system is d... more One of the major factors that limit the performance of an optical fiber communication system is dispersion. In order to get a high transmission range with high data rates, techniques must be in place to compensate for the dispersion caused by fiber nonlinearity. Dispersion Compensating Fiber (DCF) and Fiber Bragg Grating (FBG) are the trending dispersion compensation techniques in optical fiber communication. The use of DCF and FBG as a method of dispersion compensation can notably enhance the overall performance of the system. Broadening is a function of distance as well as the Dispersion parameter (D). The dispersion parameter is given in ps/nm/km and changes from fiber to fiber and also is a function of wavelength. In this paper, we investigate pre-, post-, and symmetrical compensating schemes in three different compensating models: DCF, FBG, and DCF cascaded to FBG. The system performance was evaluated in terms of Q-factor and Bit Error Rate (BER) for one optical channel communication system at 120 Gbps Return to Zero (RZ) signal launched over Single-Mode Fiber (SMF) of 100 km by using OptiSystem 7.0 software.
Sensors, Mar 27, 2023
This article is an open access article distributed under the terms and conditions of the Creative... more This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY
Quantum algorithms have gained a lot of consideration especially for the need of searching unsort... more Quantum algorithms have gained a lot of consideration especially for the need of searching unsorted database in a faster way rather than using the classical search mechanisms. This paper introduces a new quantum sort algorithm by employing the quantum features to expedite the searching process in conventional environments. The proposed efficient sorting algorithm emphasizes entanglement qubits property to sort N positive integers.
This poster presents performance evaluation of adaptive equalizers (LMS, RLS and CMA) using diffe... more This poster presents performance evaluation of adaptive equalizers (LMS, RLS and CMA) using different Quadrature Amplitude Modulation (QAM) techniques (4-QAM, 8-QAM); using Frequency Flat Fading and Frequency Selective Fading. BERTool is used to do comparison under MATLAB software package. For this purpose, two arbitrary channel response are selected. Flat Fading Channel transfer function is [1 0.7 0.5] and Frequency Selective Fading Channel Transfer function is [0.9 0.7 0.5 0.3]. Flat Fading Channel is used to model rural area effect on signal transmission and Frequency Selective Fading is used to model urban area. LMS, RLS use channel estimation techniques to first estimate the behavior of channel by using training symbols and then equalize its effect by creating opposite response to channel; while CMA works on blind estimation i.e. it does not know the behavior of channel it uses general algorithm to equalize channel.
Manhattan Mobility is a model of Vehicular Ad-hoc Network (VANET) where nodes have flexibility to... more Manhattan Mobility is a model of Vehicular Ad-hoc Network (VANET) where nodes have flexibility to connect and disconnect from the network at any time and have also freedom of movement. Manhattan Mobility Model is proposed generally for urban areas that have grid streets topology, this model is organized in a specific way where there are number of vertical and horizontal streets. In Adhoc networks, routing protocols play a vital role in the network's performance because it defines the way of selecting a path from the source node to the destination. In this paper, we are evaluating the performance of three routing protocols namely AODV, DSDV and DSR. The performance evaluation has been done using Network Simulator (NS-2). The comparison was based on the Throughout, Goodput, End-to-End Delay and Network Coverage Area. In our simulation, AODV shows better performance in Throughput and Goodput and DSR performs better in the Network Coverage Area. The performance of the three protocols is comparable with respect to End-to-End Delay.
In the era of information technology, a large amount of digital information is distributed over t... more In the era of information technology, a large amount of digital information is distributed over the Internet in the form of videos, images, text, and audio. The main purpose of widespread distribution enables users to share knowledge between one another. As a result, data transmission and information sharing are effected due to malicious activities. Different techniques exist to protect user authentication, data privacy, and copyrights. Two main techniques that improve security and data protection are Cryptography and Steganography. Cryptographic algorithms convert the secret message from plain text into cipher text. Then the message is sent over the communication channel. Steganography hides a secret message inside the carrier media. This proposal will investigate different Steganography algorithms and present novel algorithms employing text file as a carrier file. The proposed model hides secret data in the text file by applying various properties into file font format by inserting special symbols in the text file. In addition, the suggested model can be applied in both Unicode and ASCII code languages, regardless of the text file format. The proposed system achieves a high degree of the main Steganography attributes like hidden ratio, robustness, and transparency. In addition, this proposal provides guidance for other researchers in text Steganography algorithms. v ACKNOWLEDGEMENTS My thanks are wholly devoted to God who has helped me all the way to complete this work successfully. I owe a debt of gratitude to my family for understanding and encouragement.
JOURNAL OF ADVANCES IN BIOLOGY, Nov 26, 2013
ABSTRACT Wireless sensor networks are rapidly growing as they have many outstanding characteristi... more ABSTRACT Wireless sensor networks are rapidly growing as they have many outstanding characteristics such as the low power consumption, remote location sensing, low cost wirelessly communication and mobility. There has been increase in using wireless sensor networks in the biomedical and healthcare. However, using wireless sensor network introduce new challenges that are related to privacy and security. As well as the information related to the patient besides the other parities in the healthcare facilities. For instance, the information related to the doctors, nurses and the workers. We reviewed the latest approaches that are related to wireless sensor security in the literature and identified the most affective factors in wireless sensor networks that are affecting the privacy and the security when employing these network especially in biomedical field. We discuss the tradeoff between increasing the security and the network performance. Moreover, we provide several solution to increase the security of wireless sensor network while maintaining the required performance. -In this we have covered the security issues that are related to the computing network. However, the risk from using the devices in the human body are not the scope of this paper. The purposed solutions are more effective when taking in consideration the factors the effect the wireless sensors such as the battery life or providing new a valid source of power. This paper provide the challenges of using the wireless sensor network in biomedical field and how to solve most of these issues. Solutions are provided to be implemented with the consideration of the other factors provided to make the wireless sensor network more secure.
Scholars academic journal of biosciences, Feb 17, 2023
Review Article Despite the fact that children have a lower risk of contracting COVID-19, a growin... more Review Article Despite the fact that children have a lower risk of contracting COVID-19, a growing number of studies have shown an increase in the incidence of the pandemic among children. Reviewing the previous research on post-COVID-19 syndrome in children was the primary purpose of this study's literature analysis and review. We looked through a large number of research engines, such as PubMed, Google Scholar, ScienceDirect, and ResearchGate. The findings indicated that COVID-19 in children continues to be present for a considerable amount of time after the symptoms have subsided. When considered as a whole, the COVID-19 protocol for children should be adhered to because it does not end when the symptoms are relieved. Following an infection, there is generally a documented potential for the involvement of pathogenesis in multiple organs as a result of the infection.
International Journal of Innovation and Applied Studies, Jun 15, 2013
2021 International Conference on Engineering and Emerging Technologies (ICEET), Oct 27, 2021
The main objective is to make sure that all the stakeholders understand the issues in the develop... more The main objective is to make sure that all the stakeholders understand the issues in the development of software. Knowing the needs ensures the success of the project. CAMI Level 2, therefore, helps organizations improve processes of software by providing them with important special practices to improve their software. Level 2 (in other words, SP 1.1 “understand requirements”). This practice helps developers to understand the problem and the needs of the domain in full. In this paper, we have visited three companies and conducted three detailed interviews. We have also developed a model of SP 1.1 by taking advantage of the different opinions and experiences of practices on the implementation of SP 1.1. This model comprises four key stages: preparation, analysis, validation, and updating. It will provide practitioners with key advice on how to implement SP 1.1 effectively.
International journal of interactive mobile technologies, Jul 10, 2020
Phishing is a type of Internet fraud that aims to acquire the credential of users via scamming we... more Phishing is a type of Internet fraud that aims to acquire the credential of users via scamming websites. In this paper, a novel approach is utilized that uses a Neural Network with a multilayer perceptron to detect the scam URL. The proposed system improves the accuracy of the scam detection system as it achieves a high accuracy percentage of 98.5%.
The Journal of Engineering Research [TJER]
One of the major factors that limit the performance of an optical fiber communication system isdi... more One of the major factors that limit the performance of an optical fiber communication system isdispersion. In order to get a high transmission range with high data rates, techniques must be in place to compensate for the dispersion caused by fiber nonlinearity. Dispersion Compensating Fiber (DCF) and Fiber Bragg Grating (FBG) are the trending dispersion compensation techniques in optical fiber communication. The use of DCF and FBG as a method of dispersion compensation can notably enhance the overall performance of the system. Broadening is a function of distance as well as the Dispersion parameter (D). The dispersion parameter is given in ps/nm/km and changes from fiber to fiber and also is a function of wavelength. In this paper, we investigate pre-, post-, and symmetrical compensating schemes in three different compensating models: DCF, FBG, and DCF cascaded to FBG. The system performance was evaluated in terms of Q-factor and Bit Error Rate (BER) for one optical channel communic...
Arabian Journal of Chemistry
Portable Document Format (PDF) files are one of the most universally used file types. This has fa... more Portable Document Format (PDF) files are one of the most universally used file types. This has fascinated hackers to develop methods to use these normally innocent PDF files to create security threats via infection vectors PDF files. This is usually realized by hiding embedded malicious code in the victims’ PDF documents to infect their machines. This, of course, results in PDF Malware and requires techniques to identify benign files from malicious files. Research studies indicated that machine-learning methods provide efficient detection techniques against such malware. In this paper, we present a new detection system that can analyze PDF documents in order to identify benign PFD files from malware PFD files. The proposed system makes use of the AdaBoost decision tree with optimal hyperparameters, which is trained and evaluated on a modern-inclusive dataset, viz. Evasive-PDFMal2022. The investigational assessment demonstrates a lightweight-accurate PDF detection system, achieving a...
Bulletin of Electrical Engineering and Informatics, 2024
The importance of an effective cross-site scripting (XSS) detection systemcannot be overstated in... more The importance of an effective cross-site scripting (XSS) detection systemcannot be overstated in web security. XSS attacks continue to be a prevalentand severe threat to web applications, making the need for robust detectionsystems more crucial than ever. This paper introduced a hybrid model thatleverages deep learning algorithms, combining recurrent neural network(RNN) and convolutional neural network (CNN) architectures. Our hybridRNN-CNN model emerged as the top performer in our evaluation,demonstrating outstanding performance across key metrics. It achieved animpressive accuracy of 96.74%, excelling inaccurate predictions. Notably,the precision score reached an impressive 97.78%, highlighting its precisionin identifying positive instances while minimizing false positives.Furthermore, the model's recall score of 95.65% showcased its ability tocapture a substantial portion of true positive instances. This resulted in anexceptional F1-Score of 96.70, underlining the model's remarkable balancebetween precision and recall. Compared to other models in the evaluation,our proposed model unequivocally demonstrated its leadership, emphasizingits excellence in detecting potential XSS vulnerabilities within web content.
Frontiers in Psychology
This study examines critical factors influencing Omani entrepreneurs’ adoption of the internet of... more This study examines critical factors influencing Omani entrepreneurs’ adoption of the internet of things (IoT) by expanding the constructs at the unified theory of acceptance and use of technology (UTAUT2) with entrepreneurs’ innovativeness, IT knowledge (ITK), and trust. A cross-sectional survey questionnaire was used to collect data from 158 entrepreneurs in Oman. Data were analyzed through the structural equation modeling technique using SmartPLS. The results indicated that performance expectancy, habit, social influence, trust (TR), ITK, and entrepreneurs’ innovativeness (PI) significantly affect Omani entrepreneurs’ intention to adopt IoT. Nonetheless, the results show that there is no significant relationship between hedonic motivation, effort expectancy, price value, and facilitating conditions to adopt IoT. This study contributes to previous literature by incorporating entrepreneurs’ innovativeness, ITK, and trust into UTAUT2. Furthermore, this study was conducted in a Middl...
This article is an open access article distributed under the terms and conditions of the Creative... more This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY
Scholars academic journal of pharmacy, Feb 17, 2023
Cordon, in the year 1767, was the first person to describe the extremely rare form of abnormality... more Cordon, in the year 1767, was the first person to describe the extremely rare form of abnormality known as congenital aplasia of the skin. On the scalp, limbs, or abdomen, it manifests as a single, isolated lesion that affects multiple layers of skin and, on occasion, the bone. This is the most common form in which it presents itself. There has been some speculation that the condition could have a genetic component, a component related to the environment, or a component related to an exogenous factor. As of the end of 2013, there had been a total of approximately 500 cases reported from all over the world. The aim of the present study was to describe a rare case of ACC. An infant was diagnosed with ACC and a scalp lesion. The lesion was followed and described over one year.
International journal of computer applications, Jul 28, 2012
An Ad Hoc network has no infrastructure and it provides flexibility to network's nodes to connect... more An Ad Hoc network has no infrastructure and it provides flexibility to network's nodes to connect and disconnect at any time. A MANET is an Ad Hoc network that provides freedom of movement to the network's nodes. In a MANET, The development of routing protocols is one of the main challenges and much research has been done to evaluate the current protocols to improve them or to develop new protocols. There are several protocols that have been tested in the past and each protocol has its advantages and disadvantages depending on the applications. In this paper, we evaluate Dynamic MANET On-demand routing protocol (DYMO), Ad Hoc On-Demand Distance Vector Routing protocol (AODV) and Dynamic Source Routing protocol (DSR). We evaluate the performance based on throughput, dropped packets and end-to-end delay.
Long-Term Evolution (LTE) is a radio access technology. It is a standard cellular network that en... more Long-Term Evolution (LTE) is a radio access technology. It is a standard cellular network that enables mobile transmission of streaming high definition video in real time. This paper analyzes the development and LTE performance in streaming multimedia through an analysis of the video transmission package performance. Furthermore, we examined the influence of LTE in streaming multimedia through the adoption of a simulator.
The Journal of Engineering Research, Apr 11, 2023
One of the major factors that limit the performance of an optical fiber communication system is d... more One of the major factors that limit the performance of an optical fiber communication system is dispersion. In order to get a high transmission range with high data rates, techniques must be in place to compensate for the dispersion caused by fiber nonlinearity. Dispersion Compensating Fiber (DCF) and Fiber Bragg Grating (FBG) are the trending dispersion compensation techniques in optical fiber communication. The use of DCF and FBG as a method of dispersion compensation can notably enhance the overall performance of the system. Broadening is a function of distance as well as the Dispersion parameter (D). The dispersion parameter is given in ps/nm/km and changes from fiber to fiber and also is a function of wavelength. In this paper, we investigate pre-, post-, and symmetrical compensating schemes in three different compensating models: DCF, FBG, and DCF cascaded to FBG. The system performance was evaluated in terms of Q-factor and Bit Error Rate (BER) for one optical channel communication system at 120 Gbps Return to Zero (RZ) signal launched over Single-Mode Fiber (SMF) of 100 km by using OptiSystem 7.0 software.
Sensors, Mar 27, 2023
This article is an open access article distributed under the terms and conditions of the Creative... more This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY
Quantum algorithms have gained a lot of consideration especially for the need of searching unsort... more Quantum algorithms have gained a lot of consideration especially for the need of searching unsorted database in a faster way rather than using the classical search mechanisms. This paper introduces a new quantum sort algorithm by employing the quantum features to expedite the searching process in conventional environments. The proposed efficient sorting algorithm emphasizes entanglement qubits property to sort N positive integers.
This poster presents performance evaluation of adaptive equalizers (LMS, RLS and CMA) using diffe... more This poster presents performance evaluation of adaptive equalizers (LMS, RLS and CMA) using different Quadrature Amplitude Modulation (QAM) techniques (4-QAM, 8-QAM); using Frequency Flat Fading and Frequency Selective Fading. BERTool is used to do comparison under MATLAB software package. For this purpose, two arbitrary channel response are selected. Flat Fading Channel transfer function is [1 0.7 0.5] and Frequency Selective Fading Channel Transfer function is [0.9 0.7 0.5 0.3]. Flat Fading Channel is used to model rural area effect on signal transmission and Frequency Selective Fading is used to model urban area. LMS, RLS use channel estimation techniques to first estimate the behavior of channel by using training symbols and then equalize its effect by creating opposite response to channel; while CMA works on blind estimation i.e. it does not know the behavior of channel it uses general algorithm to equalize channel.
Manhattan Mobility is a model of Vehicular Ad-hoc Network (VANET) where nodes have flexibility to... more Manhattan Mobility is a model of Vehicular Ad-hoc Network (VANET) where nodes have flexibility to connect and disconnect from the network at any time and have also freedom of movement. Manhattan Mobility Model is proposed generally for urban areas that have grid streets topology, this model is organized in a specific way where there are number of vertical and horizontal streets. In Adhoc networks, routing protocols play a vital role in the network's performance because it defines the way of selecting a path from the source node to the destination. In this paper, we are evaluating the performance of three routing protocols namely AODV, DSDV and DSR. The performance evaluation has been done using Network Simulator (NS-2). The comparison was based on the Throughout, Goodput, End-to-End Delay and Network Coverage Area. In our simulation, AODV shows better performance in Throughput and Goodput and DSR performs better in the Network Coverage Area. The performance of the three protocols is comparable with respect to End-to-End Delay.
In the era of information technology, a large amount of digital information is distributed over t... more In the era of information technology, a large amount of digital information is distributed over the Internet in the form of videos, images, text, and audio. The main purpose of widespread distribution enables users to share knowledge between one another. As a result, data transmission and information sharing are effected due to malicious activities. Different techniques exist to protect user authentication, data privacy, and copyrights. Two main techniques that improve security and data protection are Cryptography and Steganography. Cryptographic algorithms convert the secret message from plain text into cipher text. Then the message is sent over the communication channel. Steganography hides a secret message inside the carrier media. This proposal will investigate different Steganography algorithms and present novel algorithms employing text file as a carrier file. The proposed model hides secret data in the text file by applying various properties into file font format by inserting special symbols in the text file. In addition, the suggested model can be applied in both Unicode and ASCII code languages, regardless of the text file format. The proposed system achieves a high degree of the main Steganography attributes like hidden ratio, robustness, and transparency. In addition, this proposal provides guidance for other researchers in text Steganography algorithms. v ACKNOWLEDGEMENTS My thanks are wholly devoted to God who has helped me all the way to complete this work successfully. I owe a debt of gratitude to my family for understanding and encouragement.
JOURNAL OF ADVANCES IN BIOLOGY, Nov 26, 2013
ABSTRACT Wireless sensor networks are rapidly growing as they have many outstanding characteristi... more ABSTRACT Wireless sensor networks are rapidly growing as they have many outstanding characteristics such as the low power consumption, remote location sensing, low cost wirelessly communication and mobility. There has been increase in using wireless sensor networks in the biomedical and healthcare. However, using wireless sensor network introduce new challenges that are related to privacy and security. As well as the information related to the patient besides the other parities in the healthcare facilities. For instance, the information related to the doctors, nurses and the workers. We reviewed the latest approaches that are related to wireless sensor security in the literature and identified the most affective factors in wireless sensor networks that are affecting the privacy and the security when employing these network especially in biomedical field. We discuss the tradeoff between increasing the security and the network performance. Moreover, we provide several solution to increase the security of wireless sensor network while maintaining the required performance. -In this we have covered the security issues that are related to the computing network. However, the risk from using the devices in the human body are not the scope of this paper. The purposed solutions are more effective when taking in consideration the factors the effect the wireless sensors such as the battery life or providing new a valid source of power. This paper provide the challenges of using the wireless sensor network in biomedical field and how to solve most of these issues. Solutions are provided to be implemented with the consideration of the other factors provided to make the wireless sensor network more secure.
Scholars academic journal of biosciences, Feb 17, 2023
Review Article Despite the fact that children have a lower risk of contracting COVID-19, a growin... more Review Article Despite the fact that children have a lower risk of contracting COVID-19, a growing number of studies have shown an increase in the incidence of the pandemic among children. Reviewing the previous research on post-COVID-19 syndrome in children was the primary purpose of this study's literature analysis and review. We looked through a large number of research engines, such as PubMed, Google Scholar, ScienceDirect, and ResearchGate. The findings indicated that COVID-19 in children continues to be present for a considerable amount of time after the symptoms have subsided. When considered as a whole, the COVID-19 protocol for children should be adhered to because it does not end when the symptoms are relieved. Following an infection, there is generally a documented potential for the involvement of pathogenesis in multiple organs as a result of the infection.
International Journal of Innovation and Applied Studies, Jun 15, 2013
2021 International Conference on Engineering and Emerging Technologies (ICEET), Oct 27, 2021
The main objective is to make sure that all the stakeholders understand the issues in the develop... more The main objective is to make sure that all the stakeholders understand the issues in the development of software. Knowing the needs ensures the success of the project. CAMI Level 2, therefore, helps organizations improve processes of software by providing them with important special practices to improve their software. Level 2 (in other words, SP 1.1 “understand requirements”). This practice helps developers to understand the problem and the needs of the domain in full. In this paper, we have visited three companies and conducted three detailed interviews. We have also developed a model of SP 1.1 by taking advantage of the different opinions and experiences of practices on the implementation of SP 1.1. This model comprises four key stages: preparation, analysis, validation, and updating. It will provide practitioners with key advice on how to implement SP 1.1 effectively.
International journal of interactive mobile technologies, Jul 10, 2020
Phishing is a type of Internet fraud that aims to acquire the credential of users via scamming we... more Phishing is a type of Internet fraud that aims to acquire the credential of users via scamming websites. In this paper, a novel approach is utilized that uses a Neural Network with a multilayer perceptron to detect the scam URL. The proposed system improves the accuracy of the scam detection system as it achieves a high accuracy percentage of 98.5%.
The Journal of Engineering Research [TJER]
One of the major factors that limit the performance of an optical fiber communication system isdi... more One of the major factors that limit the performance of an optical fiber communication system isdispersion. In order to get a high transmission range with high data rates, techniques must be in place to compensate for the dispersion caused by fiber nonlinearity. Dispersion Compensating Fiber (DCF) and Fiber Bragg Grating (FBG) are the trending dispersion compensation techniques in optical fiber communication. The use of DCF and FBG as a method of dispersion compensation can notably enhance the overall performance of the system. Broadening is a function of distance as well as the Dispersion parameter (D). The dispersion parameter is given in ps/nm/km and changes from fiber to fiber and also is a function of wavelength. In this paper, we investigate pre-, post-, and symmetrical compensating schemes in three different compensating models: DCF, FBG, and DCF cascaded to FBG. The system performance was evaluated in terms of Q-factor and Bit Error Rate (BER) for one optical channel communic...
Arabian Journal of Chemistry
Portable Document Format (PDF) files are one of the most universally used file types. This has fa... more Portable Document Format (PDF) files are one of the most universally used file types. This has fascinated hackers to develop methods to use these normally innocent PDF files to create security threats via infection vectors PDF files. This is usually realized by hiding embedded malicious code in the victims’ PDF documents to infect their machines. This, of course, results in PDF Malware and requires techniques to identify benign files from malicious files. Research studies indicated that machine-learning methods provide efficient detection techniques against such malware. In this paper, we present a new detection system that can analyze PDF documents in order to identify benign PFD files from malware PFD files. The proposed system makes use of the AdaBoost decision tree with optimal hyperparameters, which is trained and evaluated on a modern-inclusive dataset, viz. Evasive-PDFMal2022. The investigational assessment demonstrates a lightweight-accurate PDF detection system, achieving a...