期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
Smart Shoes Safety System for the Blind People Based on (IoT) Technology
1
作者 ammar almomani Mohammad Alauthman +4 位作者 Amal Malkawi Hadeel Shwaihet Batool Aldigide Donia Aldabeek Karmen Abu Hamoodeh 《Computers, Materials & Continua》 SCIE EI 2023年第7期415-436,共22页
People’s lives have become easier and simpler as technology has proliferated.This is especially true with the Internet of Things(IoT).The biggest problem for blind people is figuring out how to get where they want to... People’s lives have become easier and simpler as technology has proliferated.This is especially true with the Internet of Things(IoT).The biggest problem for blind people is figuring out how to get where they want to go.People with good eyesight need to help these people.Smart shoes are a technique that helps blind people find their way when they walk.So,a special shoe has been made to help blind people walk safely without worrying about running into other people or solid objects.In this research,we are making a new safety system and a smart shoe for blind people.The system is based on Internet of Things(IoT)technology and uses three ultrasonic sensors to allow users to hear and react to barriers.It has ultrasonic sensors and a microprocessor that can tell how far away something is and if there are any obstacles.Water and flame sensors were used,and a sound was used to let the person know if an obstacle was near him.The sensors use Global Positioning System(GPS)technology to detect motion from almost every side to keep an eye on them and ensure they are safe.To test our proposal,we gave a questionnaire to 100 people.The questionnaire has eleven questions,and 99.1%of the people who filled it out said that the product meets their needs. 展开更多
关键词 IOT smart shoe SENSORS GSM GPS ARDUINO blind people safety system
下载PDF
Cyberbullying Detection and Recognition with Type Determination Based on Machine Learning
2
作者 Khalid M.O.Nahar Mohammad Alauthman +1 位作者 Saud Yonbawi ammar almomani 《Computers, Materials & Continua》 SCIE EI 2023年第6期5307-5319,共13页
Social media networks are becoming essential to our daily activities,and many issues are due to this great involvement in our lives.Cyberbullying is a social media network issue,a global crisis affecting the victims a... Social media networks are becoming essential to our daily activities,and many issues are due to this great involvement in our lives.Cyberbullying is a social media network issue,a global crisis affecting the victims and society as a whole.It results from a misunderstanding regarding freedom of speech.In this work,we proposed a methodology for detecting such behaviors(bullying,harassment,and hate-related texts)using supervised machine learning algo-rithms(SVM,Naïve Bayes,Logistic regression,and random forest)and for predicting a topic associated with these text data using unsupervised natural language processing,such as latent Dirichlet allocation.In addition,we used accuracy,precision,recall,and F1 score to assess prior classifiers.Results show that the use of logistic regression,support vector machine,random forest model,and Naïve Bayes has 95%,94.97%,94.66%,and 93.1%accuracy,respectively. 展开更多
关键词 CYBERBULLYING social media naïve bayes support vector machine natural language processing LDA
下载PDF
Age and Gender Classification Using Backpropagation and Bagging Algorithms
3
作者 ammar almomani Mohammed Alweshah +6 位作者 Waleed Alomoush Mohammad Alauthman Aseel Jabai Anwar Abbass Ghufran Hamad Meral Abdalla Brij B.Gupta 《Computers, Materials & Continua》 SCIE EI 2023年第2期3045-3062,共18页
Voice classification is important in creating more intelligent systems that help with student exams,identifying criminals,and security systems.The main aim of the research is to develop a system able to predicate and ... Voice classification is important in creating more intelligent systems that help with student exams,identifying criminals,and security systems.The main aim of the research is to develop a system able to predicate and classify gender,age,and accent.So,a newsystem calledClassifyingVoice Gender,Age,and Accent(CVGAA)is proposed.Backpropagation and bagging algorithms are designed to improve voice recognition systems that incorporate sensory voice features such as rhythm-based features used to train the device to distinguish between the two gender categories.It has high precision compared to other algorithms used in this problem,as the adaptive backpropagation algorithm had an accuracy of 98%and the Bagging algorithm had an accuracy of 98.10%in the gender identification data.Bagging has the best accuracy among all algorithms,with 55.39%accuracy in the voice common dataset and age classification and accent accuracy in a speech accent of 78.94%. 展开更多
关键词 Classify voice gender ACCENT age bagging algorithms back propagation algorithms AI classifiers
下载PDF
A Robust Model for Translating Arabic Sign Language into Spoken Arabic Using Deep Learning
4
作者 Khalid M.O.Nahar ammar almomani +1 位作者 Nahlah Shatnawi Mohammad Alauthman 《Intelligent Automation & Soft Computing》 SCIE 2023年第8期2037-2057,共21页
This study presents a novel and innovative approach to auto-matically translating Arabic Sign Language(ATSL)into spoken Arabic.The proposed solution utilizes a deep learning-based classification approach and the trans... This study presents a novel and innovative approach to auto-matically translating Arabic Sign Language(ATSL)into spoken Arabic.The proposed solution utilizes a deep learning-based classification approach and the transfer learning technique to retrain 12 image recognition models.The image-based translation method maps sign language gestures to corre-sponding letters or words using distance measures and classification as a machine learning technique.The results show that the proposed model is more accurate and faster than traditional image-based models in classifying Arabic-language signs,with a translation accuracy of 93.7%.This research makes a significant contribution to the field of ATSL.It offers a practical solution for improving communication for individuals with special needs,such as the deaf and mute community.This work demonstrates the potential of deep learning techniques in translating sign language into natural language and highlights the importance of ATSL in facilitating communication for individuals with disabilities. 展开更多
关键词 Sign language deep learning transfer learning machine learning automatic translation of sign language natural language processing Arabic sign language
下载PDF
Ensemble-Based Approach for Efficient Intrusion Detection in Network Traffic
5
作者 ammar almomani Iman Akour +5 位作者 Ahmed M.Manasrah Omar almomani Mohammad Alauthman Esra’a Abdullah Amaal Al Shwait Razan Al Sharaa 《Intelligent Automation & Soft Computing》 SCIE 2023年第8期2499-2517,共19页
The exponential growth of Internet and network usage has neces-sitated heightened security measures to protect against data and network breaches.Intrusions,executed through network packets,pose a significant challenge... The exponential growth of Internet and network usage has neces-sitated heightened security measures to protect against data and network breaches.Intrusions,executed through network packets,pose a significant challenge for firewalls to detect and prevent due to the similarity between legit-imate and intrusion traffic.The vast network traffic volume also complicates most network monitoring systems and algorithms.Several intrusion detection methods have been proposed,with machine learning techniques regarded as promising for dealing with these incidents.This study presents an Intrusion Detection System Based on Stacking Ensemble Learning base(Random For-est,Decision Tree,and k-Nearest-Neighbors).The proposed system employs pre-processing techniques to enhance classification efficiency and integrates seven machine learning algorithms.The stacking ensemble technique increases performance by incorporating three base models(Random Forest,Decision Tree,and k-Nearest-Neighbors)and a meta-model represented by the Logistic Regression algorithm.Evaluated using the UNSW-NB15 dataset,the pro-posed IDS gained an accuracy of 96.16%in the training phase and 97.95%in the testing phase,with precision of 97.78%,and 98.40%for taring and testing,respectively.The obtained results demonstrate improvements in other measurement criteria. 展开更多
关键词 Intrusion detection system(IDS) machine learning techniques stacking ensemble random forest decision tree k-nearest-neighbor
下载PDF
An Automated Approach to Generate Test Cases From Use Case Description Model 被引量:1
6
作者 Thamer A.Alrawashed ammar almomani +1 位作者 Ahmad Althunibat Abdelfatah Tamimi 《Computer Modeling in Engineering & Sciences》 SCIE EI 2019年第6期409-425,共17页
Test complexity and test adequacy are frequently raised by software developers and testing agents.However,there is little research works at this aspect on specification-based testing at the use case description level.... Test complexity and test adequacy are frequently raised by software developers and testing agents.However,there is little research works at this aspect on specification-based testing at the use case description level.Thus,this research proposes an automatic test cases generator approach to reduce the test complexity and to enhance the percentage of test coverage.First,to support the infrastructure for performing automatic,this proposed approach refines the use cases using use case describing template and save it in the text file.Then,the saved file is input to the Algorithm of Control Flow Diagram(ACFD)to convert use case details to a control flow diagram.After that,the Proposed Tool of Generating Test Paths(PTGTP)is used to generate test cases from the control flow diagram.Finally,the genetic algorithm associated with transition coverage is adapted to optimize and evaluate the adequacy of such test cases.A money withdrawal use case in the ATM system is used as an ongoing case study.Preliminary results show that the generated test cases achieve high coverage with an optimal test case.This automatic test case generation approach is effective and efficient.Therefore,it could promote to use other test case coverage criteria. 展开更多
关键词 SOFTWARE testing test CASES SOFTWARE specifications GENETIC algorithm
下载PDF
Hadoop Based Defense Solution to Handle Distributed Denial of Service (DDoS) Attacks 被引量:2
7
作者 Shweta Tripathi Brij Gupta +2 位作者 ammar almomani Anupama Mishra Suresh Veluru 《Journal of Information Security》 2013年第3期150-164,共15页
Distributed denial of service (DDoS) attacks continues to grow as a threat to organizations worldwide. From the first known attack in 1999 to the highly publicized Operation Ababil, the DDoS attacks have a history of ... Distributed denial of service (DDoS) attacks continues to grow as a threat to organizations worldwide. From the first known attack in 1999 to the highly publicized Operation Ababil, the DDoS attacks have a history of flooding the victim network with an enormous number of packets, hence exhausting the resources and preventing the legitimate users to access them. After having standard DDoS defense mechanism, still attackers are able to launch an attack. These inadequate defense mechanisms need to be improved and integrated with other solutions. The purpose of this paper is to study the characteristics of DDoS attacks, various models involved in attacks and to provide a timeline of defense mechanism with their improvements to combat DDoS attacks. In addition to this, a novel scheme is proposed to detect DDoS attack efficiently by using MapReduce programming model. 展开更多
关键词 DDOS DoS DEFENSE Mechanism Characteristics HADOOP MAPREDUCE
下载PDF
A Novel Solution to Handle DDOS Attack in MANET 被引量:1
8
作者 Meghna Chhabra Brij Gupta ammar almomani 《Journal of Information Security》 2013年第3期165-179,共15页
Distributed Denial of Service (DDoS) attacks in the networks needs to be prevented or handled if it occurs, as early as possible and before reaching the victim. Dealing with DDoS attacks is difficult due to their prop... Distributed Denial of Service (DDoS) attacks in the networks needs to be prevented or handled if it occurs, as early as possible and before reaching the victim. Dealing with DDoS attacks is difficult due to their properties such as dynamic attack rates, various kinds of targets, big scale of botnet, etc. Distributed Denial of Service (DDoS) attack is hard to deal with because it is difficult to distinguish legitimate traffic from malicious traffic, especially when the traffic is coming at a different rate from distributed sources. DDoS attack becomes more difficult to handle if it occurs in wireless network because of the properties of ad hoc network such as dynamic topologies, low battery life, multicast routing, frequency of updates or network overhead, scalability, mobile agent based routing, and power aware routing, etc. Therefore, it is better to prevent the distributed denial of service attack rather than allowing it to occur and then taking the necessary steps to handle it. This paper discusses various the attack mechanisms and problems due to DDoS attack, also how MANET can be affected by these attacks. In addition to this, a novel solution is proposed to handle DDoS attacks in mobile ad hoc networks (MANETs). 展开更多
关键词 DDoS ATTACK MANET AODV DSR FLOODING ATTACK BOTNET
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部