Papers by Shadi Aljawarneh

Many e-learning tools are currently available for using in education. E-learning tools can provid... more Many e-learning tools are currently available for using in education. E-learning tools can provide training and education to large number of students with diverse cultural backgrounds and educational levels. However, e-learning could be failed in education when overestimating what e-learning can accomplish. Some people normally do not understand the weaknesses and limitations of e-learning and some of them may expect too much. In this paper, we review the different e-learning tools such as MOODLE, and Blackboard. We also comment on the most important aims of each tool and analyze the advantages and disadvantages. From this analysis we obtain a global view of the current and future tendencies of e-learning tools and therefore we provide possible important comments for using e-learning tools such as MOODLE in the classroom. Upon to our teaching experience, MOODLE is effective in the e-learning development. Authors and practitioners showed a greater preference for MOODLE over Blackboar...
A tool for monitoring and tracing multi-agent applications
2011 24th Canadian Conference on Electrical and Computer Engineering(CCECE), 2011
In this paper, we have designed and implemented a tool that can be used to effectively collect th... more In this paper, we have designed and implemented a tool that can be used to effectively collect the trace data of multi-agent applications developed using the Java Agent DEvelopment Framework (JADE). The tool can also be used to monitor JADE applications and to report the occurrence of certain events of interest. The collected trace data can be used later by

An algorithm for constructing XML Schema documents from relational databases
The aim of this paper is to present a solution to automatically generate an XML schema from an ex... more The aim of this paper is to present a solution to automatically generate an XML schema from an existing relational database (RDB). The important goal of this translation is to enriching the source schema using semantics that might have not been clearly expressed in it, by acquiring as much information as possible about objects and relationships that exist among them. The next step is to produce an enhanced meta data model, which captures essential characteristics of target XML schema, and is suitable for translation. In details, we present translations of all constructs of an RDB into an XML Schema and integrated these into an algorithm. This process is to simplify exchange of data between different databases, practically the import of data of RDBs into XML documents. A prototype has been developed to realize the algorithm and generate target schema. To validate our proposal, we present experimental results using both schemas. The results show that the proposed algorithm is correct.
A Proposed Method to Recognize the Research Trends using Web-based Search Engines
This paper presents a novel approach to recognize research trends in a particular domain of resea... more This paper presents a novel approach to recognize research trends in a particular domain of research (i.e. Agent development) that is based on the number of data extracted from search engines. Several well-known mathematical and statistical theories have been used, from which a mathematical model has been derived to predict the agent development. The proposed solution attempts to convert the raw resulted number of documents found on the Internet (in PDF format) into useful information, and fit a curve representing the number of searched data of every year. A prototype has been designed, to search multi-keywords at the same time and collect the required data automatically to eliminate the useless data, before converting it into usable data.
An Overview about the Polymorphic Worms Signatures
With the proliferation of the internet among casual users as well as businesses, the range and fr... more With the proliferation of the internet among casual users as well as businesses, the range and frequency of security threats have increased dramatically. One of these threats is a particular type of malware known as a polymorphic worm. This is a program that can mutate its appearance with each infection and spreads through the network via semantics-preserving code manipulation methods or self-encryption techniques. This paper describes the characteristics of polymorphic worms and then explains the most common forms of pattern based detection, such as Autograph.
A new web engineering security approach for distributed e-learning systems in Jordan
Searching and Generating Authoring Information: A Hybrid Approach
Survivability of Web Content: Theoretical and Practical Approaches Protection of static and dynamic data against tampering
Secure Communication: A Proposed Public Key Watermark System
Many key challenges influence on the use of Arabic information retrieval systems, one of these is... more Many key challenges influence on the use of Arabic information retrieval systems, one of these is the performance of the Arabic information retrieval systems in terms of precision and recall. In this paper, we present the Genetic Algorithms to improve performance of Arabic information retrieval system based on vector space model. The main idea in this paper is the usage of an adaptive matching function, which obtained from a weighted combination of four similarity measures (Dot, Cosine, Jaccard, and Dice). The Genetic Algorithms used to optimize these matching functions, through obtaining the best achievable combination of these weights. The proposed genetic process is tested on Arabic documents collection and then results has shown a considerable improvement on the precision as performance measure.
Gene Classification: A Review
RDFa Ontology-Based Architecture for String-Based Web Attacks: Testing and Evaluation
Lecture Notes in Electrical Engineering, 2010
Abstract String input is an issue for web application security. The problem is that developers of... more Abstract String input is an issue for web application security. The problem is that developers often trust string input without checking for validity. Typically, a lit-tle attention is paid to it in a web development project, because overenthusiastic validation can tend to break the ...
Extracting authoring information based on keywords and semantic search
Many people, in particular researchers, are interested in searching and retrieving authoring info... more Many people, in particular researchers, are interested in searching and retrieving authoring information from online authoring databases to be cited in their research projects. In this paper, we propose a novel approach for retrieving authoring information that combines keyword and semantic-based approaches. In this approach, the user is interested only in retrieving authoring information considering some specified keywords and ignore

An expert code generator using rule-based and frames knowledge representation techniques
2014 5th International Conference on Information and Communication Systems (ICICS), 2014
ABSTRACT This paper aims to demonstrate the development of an expert code generator using rule-ba... more ABSTRACT This paper aims to demonstrate the development of an expert code generator using rule-based and frames knowledge representation techniques (ECG-RF). The ECG-RF system presented in this paper is a passive code generator that carries out the task of automatic code generation in fixed-structure software. To develop an ECG-RF system, the artificial intelligence (AI) of rule-based system and frames knowledge representation techniques was applied to a code generation task. ECG-RF fills a predefined frame of a certain fixed-structure program with code chunks retrieved from ECG-RF's knowledge base. The filling operation is achieved by ECG-RF's inference engine and is guided by the information collected from the user via a graphic user interface (GUI). In this paper, an ECG-RF system for generating a device driver program is presented and implemented with VBasic software. The results show that the ECG-RF design concept is reasonably reliable.
Multi-Agent Systems - Modeling, Control, Programming, Simulations and Applications, 2011
Integration of Wireless Technologies in Smart University Campus Environment
International Journal of Information and Communication Technology Education, 2015
Protection of Cell Phone Content from Viruses: A Proposed Methodology
International Conference on Computer and Computer Intelligence (ICCCI 2011), 2011

A Secure Data Transmission Mechanism for Cloud Outsourced Data
International Journal of Cloud Applications and Computing, 2013
ABSTRACT The Cloud has become a significant topic in computing; however, the trend has establishe... more ABSTRACT The Cloud has become a significant topic in computing; however, the trend has established a new range of security issues that need to be addressed. In Cloud, the data and associated software are not under their control. In addition, with the growing demands for Cloud networks communication, it becomes increasingly important to secure the data flow path. The existing research related to security mechanisms only focuses on securing the flow of information in the communication networks. There is a lack of work on improving the performance of networks to meet quality of service QoS constrains for various services. The security mechanisms work by encryption and decryption of the information, but do not consider the optimised use of the network resources. In this paper the authors propose a Secure Data Transmission Mechanism SDTM with Preemption Algorithm that combines between security and quality of service. Their developed SDTM enhanced with Malicious Packets Detection System MPDS which is a set of technologies and solutions. It enforces security policy and bandwidth compliance on all devices seeking to access Cloud network computing resources, in order to limit damage from emerging security threats and to allow network access only to compliant and trusted endpoint devices. This SDTM also provides support for quality of service. High-level simulations and the related results are provided to show the properties of the SDTM.
Uploads
Papers by Shadi Aljawarneh