Akram AbdelQader | AlZaytoonah University of Jordan (original) (raw)
Uploads
Papers by Akram AbdelQader
Indonesian Journal of Electrical Engineering and Computer Science, Sep 1, 2019
The International journal of Multimedia & Its Applications, 2017
International Journal of Software Engineering and Its Applications, 2016
International Journal of Software Engineering & Applications, 2014
This paper propose a new reverse engineering approach to convert a form fill format document into... more This paper propose a new reverse engineering approach to convert a form fill format document into a set of related tables that can be used to generate the entity relationship diagram. A relationship between the set of tables is generated. In addition, the entity relationship diagram will be converted into a UML class diagram. However, this approach will be very helpful for researchers and practitioners in Software Engineering field, since most of the reverse engineering approaches are based on source code. This approach is tested by using several word form fill format documents and the results show a high accuracy rates comparing with the forward engineering.
Indonesian Journal of Electrical Engineering and Computer Science, 2019
Software requirements with its functional and non-functional methods are the first important phas... more Software requirements with its functional and non-functional methods are the first important phase in producing a software system with free errors. The functional requirements are the visual actions that may easily evaluated from the developer and from the user, but non-functional requirements are not visual and need a lot of efforts to be evaluated. One of the main important non-functional requirements is security, which focuses on generating secure systems from strangers. Evaluating the security of the system in earlier steps will help to reduce the efforts of reveals critical system threats. Security threats found because of leaking of security scenarios in requirement phase. In this paper, we purpose an intelligent model to extract and evaluate security features from scenarios based on set of security system goals and a set of security requirements saved on rich story scenarios dataset (RSSD). This model will used a support vector machine (SVM) classifier to classify the securit...
Abstract: Problem statement: Building UML diagrams is a very important and time consuming task fo... more Abstract: Problem statement: Building UML diagrams is a very important and time consuming task for both requirements and design phases. However, some of these diagrams, such as use-case and class diagrams can be considered as a transition between the two phases. Approach: Through this study, the event table will be used to derive the use-case and class diagrams. Results: A new CASE tool to automate the proposed approach will be introduced, that is, the UML diagrams generator (UMLdg). Conclusion: It is clearly noted that the proposed CASE tool (UMLdg) gives an ideal and reasonable methodology to construct the intended use-case and class diagrams from any comprehensive event table. Furthermore, this tool will save the time for the building process of such diagrams.
2012 International Conference for Internet Technology and Secured Transactions, 2012
This paper proposes a multi function solution, based on GSM (Global System for Mobile Communicati... more This paper proposes a multi function solution, based on GSM (Global System for Mobile Communication) networks [1] for control of a motor driving circuit and LCD (Liquid Crystal Display). This system provides ideal solution for controlling the direction of motor driving within a specified range of time, two directions where controlled in addition to activated functionality with 5V. In this system, a real time data can be accessed world wide using the GSM network. The system can also be configured to control an alarm or any other electrical device via a mobile phone using SMS text messaging. The proposed system controls the motor direction from the remote location, determines the time duration the motor is in a specified direction and whenever it crosses the Cellular Shield to the SM5100B Module. The Cellular Shield will send the signal to the output PIN's which are programmed using C language to control the motor operation. The concerned authority can control the system through h...
This paper proposes a mathematical model to verify a reverse engineering approach which converts ... more This paper proposes a mathematical model to verify a reverse engineering approach which converts a form fill format document into a UML class diagram. The proposed approach used to convert a form fill format document into a UML class diagram consists of the following phases. The first phase is the capturing process that scans the form document and identifies the form components into tables; the second step is the normalization process that normalizes the tables in the first phase. The third phase is the mapping process to construct and build the relationship diagram. Finally, the translation process is conducted to construct and build the class diagrams. To verify the correctness of algorithms Interpreted Perti Nets Models will be generated to implement the proposed transformation processes (i.e. Capturing, normalization, mapping, and translation process). This verification is done because the importance of this approach as a helpful algorithm for researchers and practitioners in the Software Engineering field, since most of the reverse engineering approaches are based on source code. This approach is tested by using several word form fill format documents and shows a significant result.
This paper propose a new reverse engineering approach to convert a form fill format document into... more This paper propose a new reverse engineering approach to convert a form fill format document into a set of related tables that can be used to generate the entity relationship diagram. A relationship between the set of tables is generated. In addition, the entity relationship diagram will be converted into a UML class diagram. However, this approach will be very helpful for researchers and practitioners in Software Engineering field, since most of the reverse engineering approaches are based on source code. This approach is tested by using several word form fill format documents and the results show a high accuracy rates comparing with the forward engineering.
This paper propose a new reverse engineering approach to convert a form fill format document into... more This paper propose a new reverse engineering approach to convert a form fill format document into a set of related tables that can be used to generate the entity relationship diagram. A relationship between the set of tables is generated. In addition, the entity relationship diagram will be converted into a UML class diagram. However, this approach will be very helpful for researchers and practitioners in Software Engineering field, since most of the reverse engineering approaches are based on source code. This approach is tested by using several word form fill format documents and the results show a high accuracy rates comparing with the forward engineering.
This paper presents a novel algorithm implemented to works as a GSM modem. This software implemen... more This paper presents a novel algorithm implemented to works as a GSM modem. This software implementation model works in mobile/wireless control system networks. The AT commands where analyzed and processed by the application system to manage a multi-function mobile/wireless control system. To evaluate the application system a full home prototype model were built to be used in a real time control system. In this application system, a real time data can be accessed worldwide using the proposed algorithm. The proposed application system shows significant results when it was used with the proposed algorithm instead of the GSM modem (Global System for Mobile).A multi-function control system were used and tested. The system can also be configured to control an alarm or any other electrical device via a mobile phone using SMS text messaging. The proposed application system can control a home automation from the remote location, and determines the real time actions with a feedback from the s...
Bluetooth technology is offering a very robust way to transfer data in faster rates within a shor... more Bluetooth technology is offering a very robust way to transfer data in faster rates within a short range wireless communication local network. Wireless and radio communication technologies are giving organizations and users many benefits such as portability and flexibility, increased productivity, and lower the installation costs. Register the attendance and absence for students in the classroom of all educational institutions is one of the most intensive daily operations. In this paper, we are interesting to use the free wireless communication via Bluetooth technology that is available in most mobile phones and computer systems to build a computerized wireless clients-server network system. The client side will be a mobile phone that used to fill the list of attendance and absence for students in a classroom of educational institutions in an easy and fast way. Server side will contain the centralized database and monitoring attendance system for the distributing clients connected t...
This paper proposes a multi function solution, based on GSM (Global System for Mobile Communicati... more This paper proposes a multi function solution, based on GSM (Global System for Mobile Communication) networks [1] for control of a motor driving circuit and LCD (Liquid Crystal Display). This system provides ideal solution for controlling the direction of motor driving within a specified range of time, two directions where controlled in addition to activated functionality with 5V. In this system, a real time data can be accessed world wide using the GSM network. The system can also be configured to control an alarm or any other electrical device via a mobile phone using SMS text messaging. The proposed system controls the motor direction from the remote location, determines the time duration the motor is in a specified direction and whenever it crosses the Cellular Shield to the SM5100B Module. The Cellular Shield will send the signal to the output PIN's which are programmed using C language to control the motor operation. The concerned authority can control the system through h...
Distributed Control System Via Wireless Networks (Mobile Networks and WAN) Implemented and applie... more Distributed Control System Via Wireless Networks (Mobile Networks and WAN) Implemented and applied at AL-Zaytoonah University
Indonesian Journal of Electrical Engineering and Computer Science, Sep 1, 2019
The International journal of Multimedia & Its Applications, 2017
International Journal of Software Engineering and Its Applications, 2016
International Journal of Software Engineering & Applications, 2014
This paper propose a new reverse engineering approach to convert a form fill format document into... more This paper propose a new reverse engineering approach to convert a form fill format document into a set of related tables that can be used to generate the entity relationship diagram. A relationship between the set of tables is generated. In addition, the entity relationship diagram will be converted into a UML class diagram. However, this approach will be very helpful for researchers and practitioners in Software Engineering field, since most of the reverse engineering approaches are based on source code. This approach is tested by using several word form fill format documents and the results show a high accuracy rates comparing with the forward engineering.
Indonesian Journal of Electrical Engineering and Computer Science, 2019
Software requirements with its functional and non-functional methods are the first important phas... more Software requirements with its functional and non-functional methods are the first important phase in producing a software system with free errors. The functional requirements are the visual actions that may easily evaluated from the developer and from the user, but non-functional requirements are not visual and need a lot of efforts to be evaluated. One of the main important non-functional requirements is security, which focuses on generating secure systems from strangers. Evaluating the security of the system in earlier steps will help to reduce the efforts of reveals critical system threats. Security threats found because of leaking of security scenarios in requirement phase. In this paper, we purpose an intelligent model to extract and evaluate security features from scenarios based on set of security system goals and a set of security requirements saved on rich story scenarios dataset (RSSD). This model will used a support vector machine (SVM) classifier to classify the securit...
Abstract: Problem statement: Building UML diagrams is a very important and time consuming task fo... more Abstract: Problem statement: Building UML diagrams is a very important and time consuming task for both requirements and design phases. However, some of these diagrams, such as use-case and class diagrams can be considered as a transition between the two phases. Approach: Through this study, the event table will be used to derive the use-case and class diagrams. Results: A new CASE tool to automate the proposed approach will be introduced, that is, the UML diagrams generator (UMLdg). Conclusion: It is clearly noted that the proposed CASE tool (UMLdg) gives an ideal and reasonable methodology to construct the intended use-case and class diagrams from any comprehensive event table. Furthermore, this tool will save the time for the building process of such diagrams.
2012 International Conference for Internet Technology and Secured Transactions, 2012
This paper proposes a multi function solution, based on GSM (Global System for Mobile Communicati... more This paper proposes a multi function solution, based on GSM (Global System for Mobile Communication) networks [1] for control of a motor driving circuit and LCD (Liquid Crystal Display). This system provides ideal solution for controlling the direction of motor driving within a specified range of time, two directions where controlled in addition to activated functionality with 5V. In this system, a real time data can be accessed world wide using the GSM network. The system can also be configured to control an alarm or any other electrical device via a mobile phone using SMS text messaging. The proposed system controls the motor direction from the remote location, determines the time duration the motor is in a specified direction and whenever it crosses the Cellular Shield to the SM5100B Module. The Cellular Shield will send the signal to the output PIN's which are programmed using C language to control the motor operation. The concerned authority can control the system through h...
This paper proposes a mathematical model to verify a reverse engineering approach which converts ... more This paper proposes a mathematical model to verify a reverse engineering approach which converts a form fill format document into a UML class diagram. The proposed approach used to convert a form fill format document into a UML class diagram consists of the following phases. The first phase is the capturing process that scans the form document and identifies the form components into tables; the second step is the normalization process that normalizes the tables in the first phase. The third phase is the mapping process to construct and build the relationship diagram. Finally, the translation process is conducted to construct and build the class diagrams. To verify the correctness of algorithms Interpreted Perti Nets Models will be generated to implement the proposed transformation processes (i.e. Capturing, normalization, mapping, and translation process). This verification is done because the importance of this approach as a helpful algorithm for researchers and practitioners in the Software Engineering field, since most of the reverse engineering approaches are based on source code. This approach is tested by using several word form fill format documents and shows a significant result.
This paper propose a new reverse engineering approach to convert a form fill format document into... more This paper propose a new reverse engineering approach to convert a form fill format document into a set of related tables that can be used to generate the entity relationship diagram. A relationship between the set of tables is generated. In addition, the entity relationship diagram will be converted into a UML class diagram. However, this approach will be very helpful for researchers and practitioners in Software Engineering field, since most of the reverse engineering approaches are based on source code. This approach is tested by using several word form fill format documents and the results show a high accuracy rates comparing with the forward engineering.
This paper propose a new reverse engineering approach to convert a form fill format document into... more This paper propose a new reverse engineering approach to convert a form fill format document into a set of related tables that can be used to generate the entity relationship diagram. A relationship between the set of tables is generated. In addition, the entity relationship diagram will be converted into a UML class diagram. However, this approach will be very helpful for researchers and practitioners in Software Engineering field, since most of the reverse engineering approaches are based on source code. This approach is tested by using several word form fill format documents and the results show a high accuracy rates comparing with the forward engineering.
This paper presents a novel algorithm implemented to works as a GSM modem. This software implemen... more This paper presents a novel algorithm implemented to works as a GSM modem. This software implementation model works in mobile/wireless control system networks. The AT commands where analyzed and processed by the application system to manage a multi-function mobile/wireless control system. To evaluate the application system a full home prototype model were built to be used in a real time control system. In this application system, a real time data can be accessed worldwide using the proposed algorithm. The proposed application system shows significant results when it was used with the proposed algorithm instead of the GSM modem (Global System for Mobile).A multi-function control system were used and tested. The system can also be configured to control an alarm or any other electrical device via a mobile phone using SMS text messaging. The proposed application system can control a home automation from the remote location, and determines the real time actions with a feedback from the s...
Bluetooth technology is offering a very robust way to transfer data in faster rates within a shor... more Bluetooth technology is offering a very robust way to transfer data in faster rates within a short range wireless communication local network. Wireless and radio communication technologies are giving organizations and users many benefits such as portability and flexibility, increased productivity, and lower the installation costs. Register the attendance and absence for students in the classroom of all educational institutions is one of the most intensive daily operations. In this paper, we are interesting to use the free wireless communication via Bluetooth technology that is available in most mobile phones and computer systems to build a computerized wireless clients-server network system. The client side will be a mobile phone that used to fill the list of attendance and absence for students in a classroom of educational institutions in an easy and fast way. Server side will contain the centralized database and monitoring attendance system for the distributing clients connected t...
This paper proposes a multi function solution, based on GSM (Global System for Mobile Communicati... more This paper proposes a multi function solution, based on GSM (Global System for Mobile Communication) networks [1] for control of a motor driving circuit and LCD (Liquid Crystal Display). This system provides ideal solution for controlling the direction of motor driving within a specified range of time, two directions where controlled in addition to activated functionality with 5V. In this system, a real time data can be accessed world wide using the GSM network. The system can also be configured to control an alarm or any other electrical device via a mobile phone using SMS text messaging. The proposed system controls the motor direction from the remote location, determines the time duration the motor is in a specified direction and whenever it crosses the Cellular Shield to the SM5100B Module. The Cellular Shield will send the signal to the output PIN's which are programmed using C language to control the motor operation. The concerned authority can control the system through h...
Distributed Control System Via Wireless Networks (Mobile Networks and WAN) Implemented and applie... more Distributed Control System Via Wireless Networks (Mobile Networks and WAN) Implemented and applied at AL-Zaytoonah University