Akram AbdelQader | AlZaytoonah University of Jordan (original) (raw)

Uploads

Papers by Akram AbdelQader

Research paper thumbnail of A novel intelligent model for classify and evaluating non-functional security requirements form scenarios

Indonesian Journal of Electrical Engineering and Computer Science, Sep 1, 2019

Research paper thumbnail of A Model for Manipulating Images on Wireless Network of Clients Satellite

Research paper thumbnail of Three Layers DCT for Gray Image Steganography Based on Linear Support Vector Machine Classifier

Research paper thumbnail of A Novel Image Steganography Approach Using Multi-Layers DCT Features Based on Support Vector Machine Classifier

The International journal of Multimedia & Its Applications, 2017

Research paper thumbnail of A Mathematical Model to Verify a Reverse Engineering Approach Which Convert Form Fill Format into UML Class Diagram

International Journal of Software Engineering and Its Applications, 2016

Research paper thumbnail of Information Technology

Research paper thumbnail of A New Reverse Engineering Approach to Convert Form Fill Format Document into UML Class Diagram

International Journal of Software Engineering & Applications, 2014

This paper propose a new reverse engineering approach to convert a form fill format document into... more This paper propose a new reverse engineering approach to convert a form fill format document into a set of related tables that can be used to generate the entity relationship diagram. A relationship between the set of tables is generated. In addition, the entity relationship diagram will be converted into a UML class diagram. However, this approach will be very helpful for researchers and practitioners in Software Engineering field, since most of the reverse engineering approaches are based on source code. This approach is tested by using several word form fill format documents and the results show a high accuracy rates comparing with the forward engineering.

Research paper thumbnail of A novel intelligent model for classify and evaluating non-functional security requirements form scenarios

Indonesian Journal of Electrical Engineering and Computer Science, 2019

Software requirements with its functional and non-functional methods are the first important phas... more Software requirements with its functional and non-functional methods are the first important phase in producing a software system with free errors. The functional requirements are the visual actions that may easily evaluated from the developer and from the user, but non-functional requirements are not visual and need a lot of efforts to be evaluated. One of the main important non-functional requirements is security, which focuses on generating secure systems from strangers. Evaluating the security of the system in earlier steps will help to reduce the efforts of reveals critical system threats. Security threats found because of leaking of security scenarios in requirement phase. In this paper, we purpose an intelligent model to extract and evaluate security features from scenarios based on set of security system goals and a set of security requirements saved on rich story scenarios dataset (RSSD). This model will used a support vector machine (SVM) classifier to classify the securit...

Research paper thumbnail of UML Diagrams Generator: A New CASE Tool to Construct the Use-Case and Class Diagrams from an Event Table

Abstract: Problem statement: Building UML diagrams is a very important and time consuming task fo... more Abstract: Problem statement: Building UML diagrams is a very important and time consuming task for both requirements and design phases. However, some of these diagrams, such as use-case and class diagrams can be considered as a transition between the two phases. Approach: Through this study, the event table will be used to derive the use-case and class diagrams. Results: A new CASE tool to automate the proposed approach will be introduced, that is, the UML diagrams generator (UMLdg). Conclusion: It is clearly noted that the proposed CASE tool (UMLdg) gives an ideal and reasonable methodology to construct the intended use-case and class diagrams from any comprehensive event table. Furthermore, this tool will save the time for the building process of such diagrams.

Research paper thumbnail of Multi function control system using GSM modem based SM5100B Module

2012 International Conference for Internet Technology and Secured Transactions, 2012

This paper proposes a multi function solution, based on GSM (Global System for Mobile Communicati... more This paper proposes a multi function solution, based on GSM (Global System for Mobile Communication) networks [1] for control of a motor driving circuit and LCD (Liquid Crystal Display). This system provides ideal solution for controlling the direction of motor driving within a specified range of time, two directions where controlled in addition to activated functionality with 5V. In this system, a real time data can be accessed world wide using the GSM network. The system can also be configured to control an alarm or any other electrical device via a mobile phone using SMS text messaging. The proposed system controls the motor direction from the remote location, determines the time duration the motor is in a specified direction and whenever it crosses the Cellular Shield to the SM5100B Module. The Cellular Shield will send the signal to the output PIN's which are programmed using C language to control the motor operation. The concerned authority can control the system through h...

Research paper thumbnail of Software Application to Monitor and Control Distributed System Based On Mobile / Bluetooth Networks", Dr. Afif J. Almghawish, Akram Abdel Qader, Mohammad AbuMahfouz Computer Science department Al-Zaytoonah University of Jordan Amman, Jordan

Research paper thumbnail of Evaluating Scenarios Based on Security Requirements" Khaled Musa, Akram Abdel Qader, Faculty of Science and Information Technology, Al-Zaytoonah University of Jordan Dr.khalid@zuj.edu.jo, Akrama@zuj.edu.jo The 6th International Conference on Information Technology 2013, IEEE Jordan Chapter ISSN 2...

Research paper thumbnail of A Mathematical Model to Verify a Reverse Engineering Approach Which Convert Form Fill Format into UML Class Diagram

This paper proposes a mathematical model to verify a reverse engineering approach which converts ... more This paper proposes a mathematical model to verify a reverse engineering approach which converts a form fill format document into a UML class diagram. The proposed approach used to convert a form fill format document into a UML class diagram consists of the following phases. The first phase is the capturing process that scans the form document and identifies the form components into tables; the second step is the normalization process that normalizes the tables in the first phase. The third phase is the mapping process to construct and build the relationship diagram. Finally, the translation process is conducted to construct and build the class diagrams. To verify the correctness of algorithms Interpreted Perti Nets Models will be generated to implement the proposed transformation processes (i.e. Capturing, normalization, mapping, and translation process). This verification is done because the importance of this approach as a helpful algorithm for researchers and practitioners in the Software Engineering field, since most of the reverse engineering approaches are based on source code. This approach is tested by using several word form fill format documents and shows a significant result.

Research paper thumbnail of A NEW REVERSE ENGINEERING APPROACH TO CONVERT FORM FILL FORMAT DOCUMENT INTO UML CLASS DIAGRAM

This paper propose a new reverse engineering approach to convert a form fill format document into... more This paper propose a new reverse engineering approach to convert a form fill format document into a set of related tables that can be used to generate the entity relationship diagram. A relationship between the set of tables is generated. In addition, the entity relationship diagram will be converted into a UML class diagram. However, this approach will be very helpful for researchers and practitioners in Software Engineering field, since most of the reverse engineering approaches are based on source code. This approach is tested by using several word form fill format documents and the results show a high accuracy rates comparing with the forward engineering.

Research paper thumbnail of A NEW REVERSE ENGINEERING APPROACH TO CONVERT FORM FILL FORMAT DOCUMENT INTO UML CLASS DIAGRAM

This paper propose a new reverse engineering approach to convert a form fill format document into... more This paper propose a new reverse engineering approach to convert a form fill format document into a set of related tables that can be used to generate the entity relationship diagram. A relationship between the set of tables is generated. In addition, the entity relationship diagram will be converted into a UML class diagram. However, this approach will be very helpful for researchers and practitioners in Software Engineering field, since most of the reverse engineering approaches are based on source code. This approach is tested by using several word form fill format documents and the results show a high accuracy rates comparing with the forward engineering.

Research paper thumbnail of NEW SOFTWARE MODEL FOR DYNAMIC MOBILE MULTI FUNCTION MONITORING SYSTEM" European Scientific Journal July 2013 edition vol.9, No.21 ISSN: 1857 – 7881 (Print) e - ISSN 1857- 7431 Authors: Afif Mghawish, Akram A. AbdelQader, and Mohammad AbuMahfouz

This paper presents a novel algorithm implemented to works as a GSM modem. This software implemen... more This paper presents a novel algorithm implemented to works as a GSM modem. This software implementation model works in mobile/wireless control system networks. The AT commands where analyzed and processed by the application system to manage a multi-function mobile/wireless control system. To evaluate the application system a full home prototype model were built to be used in a real time control system. In this application system, a real time data can be accessed worldwide using the proposed algorithm. The proposed application system shows significant results when it was used with the proposed algorithm instead of the GSM modem (Global System for Mobile).A multi-function control system were used and tested. The system can also be configured to control an alarm or any other electrical device via a mobile phone using SMS text messaging. The proposed application system can control a home automation from the remote location, and determines the real time actions with a feedback from the s...

Research paper thumbnail of Electronic Student Attendance Recording System",Dr.AkramAbedelKarim Ahmad AbdelQader,Dr.Mohammed Abbas Fadhil Al-Husainy, Department of Multimedia Systems, Faculty of Sciences and Information Technology, Al-Zaytoonah University of Jordan

Bluetooth technology is offering a very robust way to transfer data in faster rates within a shor... more Bluetooth technology is offering a very robust way to transfer data in faster rates within a short range wireless communication local network. Wireless and radio communication technologies are giving organizations and users many benefits such as portability and flexibility, increased productivity, and lower the installation costs. Register the attendance and absence for students in the classroom of all educational institutions is one of the most intensive daily operations. In this paper, we are interesting to use the free wireless communication via Bluetooth technology that is available in most mobile phones and computer systems to build a computerized wireless clients-server network system. The client side will be a mobile phone that used to fill the list of attendance and absence for students in a classroom of educational institutions in an easy and fast way. Server side will contain the centralized database and monitoring attendance system for the distributing clients connected t...

Research paper thumbnail of Multi Function Control System using GSM modem Based SM5100B Module" The 7th International Conference for Internet Technology and Secured Transactions (ICITST-2012) in London, UK. 12 2012 Authors: Afif Mghawish, Akram A. AbdelQader, Mahmoud A. Al-Jezawi and Mohammad AbuMahfouz

This paper proposes a multi function solution, based on GSM (Global System for Mobile Communicati... more This paper proposes a multi function solution, based on GSM (Global System for Mobile Communication) networks [1] for control of a motor driving circuit and LCD (Liquid Crystal Display). This system provides ideal solution for controlling the direction of motor driving within a specified range of time, two directions where controlled in addition to activated functionality with 5V. In this system, a real time data can be accessed world wide using the GSM network. The system can also be configured to control an alarm or any other electrical device via a mobile phone using SMS text messaging. The proposed system controls the motor direction from the remote location, determines the time duration the motor is in a specified direction and whenever it crosses the Cellular Shield to the SM5100B Module. The Cellular Shield will send the signal to the output PIN's which are programmed using C language to control the motor operation. The concerned authority can control the system through h...

Research paper thumbnail of Information Technology

Research paper thumbnail of Distributed Control System Via Wireless Networks (Mobile Networks and WAN)

Distributed Control System Via Wireless Networks (Mobile Networks and WAN) Implemented and applie... more Distributed Control System Via Wireless Networks (Mobile Networks and WAN) Implemented and applied at AL-Zaytoonah University

Research paper thumbnail of A novel intelligent model for classify and evaluating non-functional security requirements form scenarios

Indonesian Journal of Electrical Engineering and Computer Science, Sep 1, 2019

Research paper thumbnail of A Model for Manipulating Images on Wireless Network of Clients Satellite

Research paper thumbnail of Three Layers DCT for Gray Image Steganography Based on Linear Support Vector Machine Classifier

Research paper thumbnail of A Novel Image Steganography Approach Using Multi-Layers DCT Features Based on Support Vector Machine Classifier

The International journal of Multimedia & Its Applications, 2017

Research paper thumbnail of A Mathematical Model to Verify a Reverse Engineering Approach Which Convert Form Fill Format into UML Class Diagram

International Journal of Software Engineering and Its Applications, 2016

Research paper thumbnail of Information Technology

Research paper thumbnail of A New Reverse Engineering Approach to Convert Form Fill Format Document into UML Class Diagram

International Journal of Software Engineering & Applications, 2014

This paper propose a new reverse engineering approach to convert a form fill format document into... more This paper propose a new reverse engineering approach to convert a form fill format document into a set of related tables that can be used to generate the entity relationship diagram. A relationship between the set of tables is generated. In addition, the entity relationship diagram will be converted into a UML class diagram. However, this approach will be very helpful for researchers and practitioners in Software Engineering field, since most of the reverse engineering approaches are based on source code. This approach is tested by using several word form fill format documents and the results show a high accuracy rates comparing with the forward engineering.

Research paper thumbnail of A novel intelligent model for classify and evaluating non-functional security requirements form scenarios

Indonesian Journal of Electrical Engineering and Computer Science, 2019

Software requirements with its functional and non-functional methods are the first important phas... more Software requirements with its functional and non-functional methods are the first important phase in producing a software system with free errors. The functional requirements are the visual actions that may easily evaluated from the developer and from the user, but non-functional requirements are not visual and need a lot of efforts to be evaluated. One of the main important non-functional requirements is security, which focuses on generating secure systems from strangers. Evaluating the security of the system in earlier steps will help to reduce the efforts of reveals critical system threats. Security threats found because of leaking of security scenarios in requirement phase. In this paper, we purpose an intelligent model to extract and evaluate security features from scenarios based on set of security system goals and a set of security requirements saved on rich story scenarios dataset (RSSD). This model will used a support vector machine (SVM) classifier to classify the securit...

Research paper thumbnail of UML Diagrams Generator: A New CASE Tool to Construct the Use-Case and Class Diagrams from an Event Table

Abstract: Problem statement: Building UML diagrams is a very important and time consuming task fo... more Abstract: Problem statement: Building UML diagrams is a very important and time consuming task for both requirements and design phases. However, some of these diagrams, such as use-case and class diagrams can be considered as a transition between the two phases. Approach: Through this study, the event table will be used to derive the use-case and class diagrams. Results: A new CASE tool to automate the proposed approach will be introduced, that is, the UML diagrams generator (UMLdg). Conclusion: It is clearly noted that the proposed CASE tool (UMLdg) gives an ideal and reasonable methodology to construct the intended use-case and class diagrams from any comprehensive event table. Furthermore, this tool will save the time for the building process of such diagrams.

Research paper thumbnail of Multi function control system using GSM modem based SM5100B Module

2012 International Conference for Internet Technology and Secured Transactions, 2012

This paper proposes a multi function solution, based on GSM (Global System for Mobile Communicati... more This paper proposes a multi function solution, based on GSM (Global System for Mobile Communication) networks [1] for control of a motor driving circuit and LCD (Liquid Crystal Display). This system provides ideal solution for controlling the direction of motor driving within a specified range of time, two directions where controlled in addition to activated functionality with 5V. In this system, a real time data can be accessed world wide using the GSM network. The system can also be configured to control an alarm or any other electrical device via a mobile phone using SMS text messaging. The proposed system controls the motor direction from the remote location, determines the time duration the motor is in a specified direction and whenever it crosses the Cellular Shield to the SM5100B Module. The Cellular Shield will send the signal to the output PIN's which are programmed using C language to control the motor operation. The concerned authority can control the system through h...

Research paper thumbnail of Software Application to Monitor and Control Distributed System Based On Mobile / Bluetooth Networks", Dr. Afif J. Almghawish, Akram Abdel Qader, Mohammad AbuMahfouz Computer Science department Al-Zaytoonah University of Jordan Amman, Jordan

Research paper thumbnail of Evaluating Scenarios Based on Security Requirements" Khaled Musa, Akram Abdel Qader, Faculty of Science and Information Technology, Al-Zaytoonah University of Jordan Dr.khalid@zuj.edu.jo, Akrama@zuj.edu.jo The 6th International Conference on Information Technology 2013, IEEE Jordan Chapter ISSN 2...

Research paper thumbnail of A Mathematical Model to Verify a Reverse Engineering Approach Which Convert Form Fill Format into UML Class Diagram

This paper proposes a mathematical model to verify a reverse engineering approach which converts ... more This paper proposes a mathematical model to verify a reverse engineering approach which converts a form fill format document into a UML class diagram. The proposed approach used to convert a form fill format document into a UML class diagram consists of the following phases. The first phase is the capturing process that scans the form document and identifies the form components into tables; the second step is the normalization process that normalizes the tables in the first phase. The third phase is the mapping process to construct and build the relationship diagram. Finally, the translation process is conducted to construct and build the class diagrams. To verify the correctness of algorithms Interpreted Perti Nets Models will be generated to implement the proposed transformation processes (i.e. Capturing, normalization, mapping, and translation process). This verification is done because the importance of this approach as a helpful algorithm for researchers and practitioners in the Software Engineering field, since most of the reverse engineering approaches are based on source code. This approach is tested by using several word form fill format documents and shows a significant result.

Research paper thumbnail of A NEW REVERSE ENGINEERING APPROACH TO CONVERT FORM FILL FORMAT DOCUMENT INTO UML CLASS DIAGRAM

This paper propose a new reverse engineering approach to convert a form fill format document into... more This paper propose a new reverse engineering approach to convert a form fill format document into a set of related tables that can be used to generate the entity relationship diagram. A relationship between the set of tables is generated. In addition, the entity relationship diagram will be converted into a UML class diagram. However, this approach will be very helpful for researchers and practitioners in Software Engineering field, since most of the reverse engineering approaches are based on source code. This approach is tested by using several word form fill format documents and the results show a high accuracy rates comparing with the forward engineering.

Research paper thumbnail of A NEW REVERSE ENGINEERING APPROACH TO CONVERT FORM FILL FORMAT DOCUMENT INTO UML CLASS DIAGRAM

This paper propose a new reverse engineering approach to convert a form fill format document into... more This paper propose a new reverse engineering approach to convert a form fill format document into a set of related tables that can be used to generate the entity relationship diagram. A relationship between the set of tables is generated. In addition, the entity relationship diagram will be converted into a UML class diagram. However, this approach will be very helpful for researchers and practitioners in Software Engineering field, since most of the reverse engineering approaches are based on source code. This approach is tested by using several word form fill format documents and the results show a high accuracy rates comparing with the forward engineering.

Research paper thumbnail of NEW SOFTWARE MODEL FOR DYNAMIC MOBILE MULTI FUNCTION MONITORING SYSTEM" European Scientific Journal July 2013 edition vol.9, No.21 ISSN: 1857 – 7881 (Print) e - ISSN 1857- 7431 Authors: Afif Mghawish, Akram A. AbdelQader, and Mohammad AbuMahfouz

This paper presents a novel algorithm implemented to works as a GSM modem. This software implemen... more This paper presents a novel algorithm implemented to works as a GSM modem. This software implementation model works in mobile/wireless control system networks. The AT commands where analyzed and processed by the application system to manage a multi-function mobile/wireless control system. To evaluate the application system a full home prototype model were built to be used in a real time control system. In this application system, a real time data can be accessed worldwide using the proposed algorithm. The proposed application system shows significant results when it was used with the proposed algorithm instead of the GSM modem (Global System for Mobile).A multi-function control system were used and tested. The system can also be configured to control an alarm or any other electrical device via a mobile phone using SMS text messaging. The proposed application system can control a home automation from the remote location, and determines the real time actions with a feedback from the s...

Research paper thumbnail of Electronic Student Attendance Recording System",Dr.AkramAbedelKarim Ahmad AbdelQader,Dr.Mohammed Abbas Fadhil Al-Husainy, Department of Multimedia Systems, Faculty of Sciences and Information Technology, Al-Zaytoonah University of Jordan

Bluetooth technology is offering a very robust way to transfer data in faster rates within a shor... more Bluetooth technology is offering a very robust way to transfer data in faster rates within a short range wireless communication local network. Wireless and radio communication technologies are giving organizations and users many benefits such as portability and flexibility, increased productivity, and lower the installation costs. Register the attendance and absence for students in the classroom of all educational institutions is one of the most intensive daily operations. In this paper, we are interesting to use the free wireless communication via Bluetooth technology that is available in most mobile phones and computer systems to build a computerized wireless clients-server network system. The client side will be a mobile phone that used to fill the list of attendance and absence for students in a classroom of educational institutions in an easy and fast way. Server side will contain the centralized database and monitoring attendance system for the distributing clients connected t...

Research paper thumbnail of Multi Function Control System using GSM modem Based SM5100B Module" The 7th International Conference for Internet Technology and Secured Transactions (ICITST-2012) in London, UK. 12 2012 Authors: Afif Mghawish, Akram A. AbdelQader, Mahmoud A. Al-Jezawi and Mohammad AbuMahfouz

This paper proposes a multi function solution, based on GSM (Global System for Mobile Communicati... more This paper proposes a multi function solution, based on GSM (Global System for Mobile Communication) networks [1] for control of a motor driving circuit and LCD (Liquid Crystal Display). This system provides ideal solution for controlling the direction of motor driving within a specified range of time, two directions where controlled in addition to activated functionality with 5V. In this system, a real time data can be accessed world wide using the GSM network. The system can also be configured to control an alarm or any other electrical device via a mobile phone using SMS text messaging. The proposed system controls the motor direction from the remote location, determines the time duration the motor is in a specified direction and whenever it crosses the Cellular Shield to the SM5100B Module. The Cellular Shield will send the signal to the output PIN's which are programmed using C language to control the motor operation. The concerned authority can control the system through h...

Research paper thumbnail of Information Technology

Research paper thumbnail of Distributed Control System Via Wireless Networks (Mobile Networks and WAN)

Distributed Control System Via Wireless Networks (Mobile Networks and WAN) Implemented and applie... more Distributed Control System Via Wireless Networks (Mobile Networks and WAN) Implemented and applied at AL-Zaytoonah University