Skip to main content

Hamza Aldabbas

  • PhD Degree in Computer Science and Software Engineering, De Montfort University, Leicester-United Kingdom (2009-2012)... moreedit
Cloud computing refers to the on-demand availability of personal computer system assets, specifically data storage and processing power, without the client's input. Emails are commonly used to send and receive data for individuals or... more
Cloud computing refers to the on-demand availability of personal computer system assets, specifically data storage and processing power, without the client's input. Emails are commonly used to send and receive data for individuals or groups. Financial data, credit reports, and other sensitive data are often sent via the Internet. Phishing is a fraudster's technique used to get sensitive data from users by seeming to come from trusted sources. The sender can persuade you to give secret data by misdirecting in a phished email. The main problem is email phishing attacks while sending and receiving the email. The attacker sends spam data using email and receives your data when you open and read the email. In recent years, it has been a big problem for everyone. This paper uses different legitimate and phishing data sizes, detects new emails, and uses different features and algorithms for classification. A modified dataset is created after measuring the existing approaches. We cr...
Nowaday, emails are used in almost every field, from business to education. Emails have two subcategories, i.e., ham and spam. Email spam, also called junk emails or unwanted emails, is a type of email that can be used to harm any user by... more
Nowaday, emails are used in almost every field, from business to education. Emails have two subcategories, i.e., ham and spam. Email spam, also called junk emails or unwanted emails, is a type of email that can be used to harm any user by wasting his/her time, computing resources, and stealing valuable information. The ratio of spam emails is increasing rapidly day by day. Spam detection and filtration are significant and enormous problems for email and IoT service providers nowadays. Among all the techniques developed for detecting and preventing spam, filtering email is one of the most essential and prominent approaches. Several machine learning and deep learning techniques have been used for this purpose, i.e., Naïve Bayes, decision trees, neural networks, and random forest. This paper surveys the machine learning techniques used for spam filtering techniques used in email and IoT platforms by classifying them into suitable categories. A comprehensive comparison of these techniqu...
A forensic autopsy is a surgical process in which experts collect a deceased body's internal and external information. These death certificates are the source of timely warnings of an increase in disease activity. It's only... more
A forensic autopsy is a surgical process in which experts collect a deceased body's internal and external information. These death certificates are the source of timely warnings of an increase in disease activity. It's only helpful if accurate and quantitative data is available. Therefore, the Classification of plain text medical autopsy reports reduces the time consumption and irregularities. The motive is to design an automatic text classification system that classifies plain text autopsy reports. Therefore, a methodology proposes using different Automatic Text Classification Techniques (ATC). This technique has embedded Feature Extraction, Feature Representation, and Feature Reduction techniques. These techniques use for the construction of classification models that classify the text of autopsy reports. Data sets collected from these types will be helpful in future experiments. Finally, the performance of the classifier measures by using different Evaluation parameters. These Evaluation Measures are Precision, Recall, Accuracy, and F-measure.
For the last two decades, cybercrimes are growing on a daily basis. To track down cybercrimes and radio network crimes, digital forensic for radio networks provides foundations. The data transfer rate for the next-generation wireless... more
For the last two decades, cybercrimes are growing on a daily basis. To track down cybercrimes and radio network crimes, digital forensic for radio networks provides foundations. The data transfer rate for the next-generation wireless networks would be much greater than today’s network in the coming years. The fifth-generation wireless systems are considering bands beyond 6 GHz. The network design of the next-generation wireless systems depends on propagation characteristics, frequency reuse, and bandwidth variation. This article declares the channel’s propagation characteristics of both line of sight (LoS) and non-LOS (NLoS) to construct and detect the path of rays coming from anomalies. The simulations were carried out to investigate the diffraction loss (DL) and frequency drop (FD). Indoor and outdoor measurements were taken with the omnidirectional circular dipole antenna with a transmitting frequency of 28 GHz and 60 GHz to compare the two bands of the 5th generation. Millimeter...
Vehicular ad hoc networks (VANETs) are a subclass of mobile ad hoc networks (MANETs) in which the mobile nodes are vehicles; these vehicles are autonomous systems connected by wireless communication on a peer-to-peer basis. They are... more
Vehicular ad hoc networks (VANETs) are a subclass of mobile ad hoc networks (MANETs) in which the mobile nodes are vehicles; these vehicles are autonomous systems connected by wireless communication on a peer-to-peer basis. They are self-organized, self-configured and self-controlled infrastructure-less networks. This kind of network has the advantage of being able to be set-up and deployed anywhere and anytime because it has no infrastructure set-up and no central administration. Distributing information between these vehicles over long ranges in such networks, however, is a very challenging task, since sharing information always has a risk attached to it especially when the information is confidential. The disclosure of such information to anyone else other than the intended parties could be extremely damaging, particularly in military applications where controlling the dissemination of messages is essential. This thesis therefore provides a review of the issue of security in VANE...
Facial Emotion Recognition is considered very significant for Human Computer Interaction (HCI) and they play a vital role in everyday human life. In recent years Convolutional Neural Network (CNNs) has become very popular among researcher... more
Facial Emotion Recognition is considered very significant for Human Computer Interaction (HCI) and they play a vital role in everyday human life. In recent years Convolutional Neural Network (CNNs) has become very popular among researcher for image analysis, because CNNs have generated remarkable results. However, CNNs needs a lot of data to train from scratch. This problem has been addressed by several researchers who have trained CNNs with millions of images, this training knowledge can also be used in a different task which is known as Transfer Learning. AlexNet is one of the best pre-trained CNNs. Our work reflects a brief comparison between modern pre-trained CNNs and using transfer learning with classification approach like Support Vector Machine (SVM), generally known as hybrid classifier. The testing has been done on two very popular expression database Cohn-Kanade+ (CK+) database and Natural Visible and Infrared Expression (NVIE) database. Results clearly depicts that pre-trained CNNs produces better result than handcrafted approaches.
The technology growth nowadays has made its way into the world of transportation by establishing smart vehicles and smarter vehicular transportation named Vehicular Ad-hoc networks (VANET). VANET gains its fame day by day by the way how... more
The technology growth nowadays has made its way into the world of transportation by establishing smart vehicles and smarter vehicular transportation named Vehicular Ad-hoc networks (VANET). VANET gains its fame day by day by the way how it facilitates the efficient and safe transportation to the voyagers. However, the prime requirement of VANET is authentication. The main aim of the proposed work is to develop a practical and efficient pseudonymous authentication protocol which augments the conditional privacy preservation. Two-Way authentication is provided using local alias and global alias name. The alias name has offered to all the vehicles who register with the certification authority. The simulation result shows that the Two-Way protocol provides authentication with optimal packet delivery ratio (PDR), end-to-end delay and propagation delay.
Emotions detection in social media is very effective to measure the mood of people about a specific topic, news, or product. It has a wide range of applications, including identifying psychological conditions such as anxiety or depression... more
Emotions detection in social media is very effective to measure the mood of people about a specific topic, news, or product. It has a wide range of applications, including identifying psychological conditions such as anxiety or depression in users. However, it is a challenging task to distinguish useful emotions’ features from a large corpus of text because emotions are subjective, with limited fuzzy boundaries that may be expressed in different terminologies and perceptions. To tackle this issue, this paper presents a hybrid approach of deep learning based on TensorFlow with Keras for emotions detection on a large scale of imbalanced tweets’ data. First, preprocessing steps are used to get useful features from raw tweets without noisy data. Second, the entropy weighting method is used to compute the importance of each feature. Third, class balancer is applied to balance each class. Fourth, Principal Component Analysis (PCA) is applied to transform high correlated features into norm...
Citizens of developing countries have been observed to have a low level of trust in their e Government services, because of the limited user involvement in the entire development life cycle of the e Government portal. Hence, we are... more
Citizens of developing countries have been observed to have a low level of trust in their e Government services, because of the limited user involvement in the entire development life cycle of the e Government portal. Hence, we are looking for means to improve this emerging concern with a special focus on the Jordanian Government Portal (JGP). This paper aims to contribute to the advancement of e Government services provided in developing countries. We proposed a conceptual model on eGovernment adoption and acceptance by integrating and augmenting key notions from the Technology Acceptance Model (TAM3), Information System Success Model (ISSM) and other relevant literature in the field of Management Information Systems (MIS). Based on the model, we have designed empirical studies to investigate how citizens perceive the quality of the JGP, which was used as a case study. A questionnaire survey has been conducted to identify important factors influencing the adoption and acceptance of...
In the past few decades wireless networks have become increasingly popular, due to the wide availability and rapid introduction of wireless transceivers into a variety of computing devices such as PDAs, laptop and desktop computers.... more
In the past few decades wireless networks have become increasingly popular, due to the wide availability and rapid introduction of wireless transceivers into a variety of computing devices such as PDAs, laptop and desktop computers. Global Positioning System (GPS) is used to determine position and speed of objects by using the satellite technology. Furthermore, Radio Frequency is another technology which is used to determine the objects' locations. In this paper we have presented an overview for using the previous technologies to track a stolen vehicle by using a system that is resulted from mixing all of those technologies in addition to proposed an enhancement idea that could help the resulted system to determine the cars' thieves by sending their photos to the security agency base to be recognized.
Research Interests:
Computer crime is the use of information technology in any suspicious criminal activities. Recently, our life becomes increasingly depending on modern information technology; however, it becomes very important to improve the computer... more
Computer crime is the use of information technology in any suspicious criminal activities. Recently, our life becomes increasingly depending on modern information technology; however, it becomes very important to improve the computer crime investigation procedure especially in cases of processing very important and sensitive information such as government and military intelligence, banking information or personal private information. Cybercrime investigation helps detecting unauthorized access to any digital source information with the intent of modifying, destroying or stealing that digital data or information. Such suspicious actions can cause financial damages or important information loss; moreover, it might distribute or destroy high secret and private or confidential information. Therefore, this paper focuses mainly on highlighting the main challenges of the North Africa's countries (Libya, Tunis, Algeria, and Morocco) in computer crime investigation system by taking a loo...
Research Interests:
Research Interests:
We present a policy-based approach for the control of information flow between services. The controlled dissemination of information shared between services is achieved by the communication and enforcement of policies associated with... more
We present a policy-based approach for the control of information flow between services. The controlled dissemination of information shared between services is achieved by the communication and enforcement of policies associated with shared information. The presented approach integrates easily as a communication middle-ware in existing service-based information systems keeping the management and distribution of policies transparent to the service implementation. This article focuses on the architecture and presents initial ...
Mobile ad hoc networks (MANETs) are autonomous systems which are comprised of a number of mobile nodes that communicate between themselves by wireless communication in a peer-to-peer basis. They are self-organized, self-configured and... more
Mobile ad hoc networks (MANETs) are autonomous systems which are comprised of a number of mobile nodes that communicate between themselves by wireless communication in a peer-to-peer basis. They are self-organized, self-configured and self-controlled infrastructure-less networks. Nodes can communicate with each other without any pre-planned or a base station. Disseminating information securely between these nodes in such networks however is a challenging task, particularly when the information is confidential. ...
Mobile Ad Hoc Network (MANET) and Vehicular Ad Hoc Network (VANET) are autonomous systems connected by wireless communication on a peer-to-peer basis. They are self-organized, self-configured, and self-controlled infrastructure-less... more
Mobile Ad Hoc Network (MANET) and Vehicular Ad Hoc Network (VANET) are autonomous systems connected by wireless communication on a peer-to-peer basis. They are self-organized, self-configured, and self-controlled infrastructure-less networks. These kinds of networks have the advantage of being able to be set-up and deployed anywhere and anytime because it has a simple infrastructure set-up and no central administration. Distributing information between these nodes over long ranges in such networks, however, is a very challenging task, since sharing information always has a risk attached to it, especially when the information is confidential. The disclosure of such information to anyone else other than the intended parties could be extremely damaging. They are explored in this chapter.
The vehicle routing problem (VRP) is one of the challenging problems in optimization and can be described as combinatorial optimization and NP-hard problem. Researchers have used many artificial intelligence techniques in order to try to... more
The vehicle routing problem (VRP) is one of the challenging problems in optimization and can be described as combinatorial optimization and NP-hard problem. Researchers have used many artificial intelligence techniques in order to try to solve this problem. Among these techniques, metaheuristic algorithms that can perform random search are the most promising because they can be used to find the right solution in the shortest possible time. Therefore, in this paper, the Harris hawks optimization (HHO) algorithm was used to attempt to solve the VRP. The algorithm was applied to 10 scenarios and the experimental results revealed that the HHO had a strong ability to check for and find the best route as compared to other metaheuristic algorithms, namely, simulated annealing and artificial bee colony optimization. The comparison was based on three criteria: minimum objective function obtained, minimum number of iterations required and satisfaction of capacity constraints. In all scenarios...
Google play store allow the user to download a mobile application (app) and user get inspired by the rating and reviews of the mobile app. A recent study analyzes that user preferences, user opinion for improvement, user sentiment about... more
Google play store allow the user to download a mobile application (app) and user get inspired by the rating and reviews of the mobile app. A recent study analyzes that user preferences, user opinion for improvement, user sentiment about particular feature and detail with descriptions of experiences are very useful for an application developer. However, many application reviews are very large and difficult to process manually. Star rating is given of the whole application and the developer cannot analyze the single feature. In this research, we have scrapped 282,231 user reviews through different data scraping techniques. We have applied the text classification on these user reviews. We have applied different algorithms and find the precision, accuracy, F1 score and recall. In evaluated results, we have to find the best algorithm.
Image data in healthcare is playing a vital role. Medical data records are increasing rapidly, which is beneficial and detrimental at the same time. Large Image dataset are difficult to handle, extracting information, and machine... more
Image data in healthcare is playing a vital role. Medical data records are increasing rapidly, which is beneficial and detrimental at the same time. Large Image dataset are difficult to handle, extracting information, and machine learning. The mammograms data used in this research are low range x-ray images of the breast region, which contains abnormalities. Breast cancer is the most frequently diagnosed cancer and ranked 9th worldwide in breast cancer-related deaths. In Pakistan 1 in 9 women expected to have breast cancer at some stage in life. Screening mammography is the most effective means for its early detection. This high rate of oversampling is responsible for billions in excess health care cost and unnecessary patient anxiety. This research mainly focuses on the development of deep learning based computer-aided system to detect, classify and segment the cancerous region in mammograms. Moreover, the preprocessing mechanism is proposed that remove noise, artifacts and muscle region that can cause a high false positive rate. In order to increase the efficiency of the system and counter the large resource requirement, the pre-processed image is converted to 512 × 512 patches. The two publicly available breast cancer dataset are employed i.e. Mammographic Image Analysis Society (MIAS) digital mammogram dataset and Curated Breast Imaging Subset of (Digital Database for Screening Mammography) (CBIS-DDSM). The two states of art deep learning-based instance segmentation frameworks are used, i.e. DeepLab and Mask RCNN. The pre-processing algorithm helps to increase the area under the receiver operating curve for each transfer learning method. The fine tuning is performed for better performance, the area under the curve was equal to 0.98 and 0.95 for mask RCNN and deep lab respectively on a test set of 150 cases. However, mean average precision for the segmentation task is 0.80 and 0.75. The radiologists accuracy ranged from 0.80 to 0.88. The proposed research has the potential to help radiologists with breast mass classification as well as segmentation of the cancerous region.
It has been seen that most of the accidents occur due to driver’s fatigue. Drowsiness is a state of mind before the driver falls asleep, which means the driver could not accomplish his actions, such as vehicular braking, controlling... more
It has been seen that most of the accidents occur due to driver’s fatigue. Drowsiness is a state of mind before the driver falls asleep, which means the driver could not accomplish his actions, such as vehicular braking, controlling vehicular motion, properly. We have built an Internet of things–based medical application to analyze driver’s drowsiness. An architecture has been proposed and a simulation of that scenario in NS3 WSN simulation tool has been done. This simulation shows that the ratio of accidents can be majorly reduced. When drowsiness of drivers is captured, a message alert is delivered to all other drivers of the vehicles that are near to the sleeping driver; for this, different sensor nodes are used. Another unique feature of the sensor network used here is the collaborative effect of sensor nodes. So for measurement and analysis of applications on Google Play, a dataset of the medical applications category was scraped. The scraping was done with 550 applications of ...
Crime prevention in online shopping and online banking B2C e-commerce has been an issue for both electronic retailers and banks, and their customers. This book provides information on security awareness that is useful to e-commerce... more
Crime prevention in online shopping and online banking B2C e-commerce has been an issue for both electronic retailers and banks, and their customers. This book provides information on security awareness that is useful to e-commerce organisations such as electronic retailers and banks, and their customers. The book will benefit online consumers by helping them to know how to protect themselves better in online transactions and will also be of great benefit to e-commerce organisations because it provides up-to-date information on how they can protect their customers better and also how to educate them in a way they can be turned into the first line of defence in the fight against crimes in B2C e-commerce.
To maintain the competitive edge and evaluating the needs of the quality app is in the mobile application market. The user’s feedback on these applications plays an essential role in the mobile application development industry. The rapid... more
To maintain the competitive edge and evaluating the needs of the quality app is in the mobile application market. The user’s feedback on these applications plays an essential role in the mobile application development industry. The rapid growth of web technology gave people an opportunity to interact and express their review, rate and share their feedback about applications. In this paper we have scrapped 506259 of user reviews and applications rate from Google Play Store from 14 different categories. The statistical information was measured in the results using different of common machine learning algorithms such as the Logistic Regression, Random Forest Classifier, and Multinomial Naïve Bayes. Different parameters including the accuracy, precision, recall, and F1 score were used to evaluate Bigram, Trigram, and N-gram, and the statistical result of these algorithms was compared. The analysis of each algorithm, one by one, is performed, and the result has been evaluated. It is conc...
Research Interests:
The recent revolution in technology has encouraged governments throughout the world to change their approaches to providing services to their citizens. Accordingly, some countries have set up e-government portals as one such approach to... more
The recent revolution in technology has encouraged governments throughout the world to change their
approaches to providing services to their citizens. Accordingly, some countries have set up e-government
portals as one such approach to deliver services efficiently, economically, and promptly. The synergy of
information with communication technology has the potential to make e-government a major advance;
some citizens, however, are not satisfied with e-services introduced in several countries due to factors
including lack of computer skills, limited availability of the Internet, and less than total coverage of
necessary infrastructure. Effective E-government has several immediate benefits: 1) to lessen the need
of travelling to and queuing in the various government departments; and 2) to combine access to different
departments together in one government portal. A case study might be the e-government developments
in Saudi Arabia, where, in the last few years, huge amounts of money have been expended to
establish e-government service. In this context, the question arises whether the expenditure has been
worthwhile. In the current research, the satisfaction levels with these services were surveyed among a
set of users in order to determine drawback to using the system or any obstacles to access. Objectives
were established in order to achieve the aims, and research questions devised to examine the usage of
e-government and the service’s usability, as well as to identify the barriers and factors that can affect
the use of e-government. The relationship between these barriers and overall satisfaction levels with
respect to e-government projects is also analyzed.
Research Interests:
Mobile ad hoc network (MANET) and Vehicular ad hoc network (VANET) are autonomous systems connected by wireless communication on a peer-to-peer basis. They are self-organized, self-configured and self-controlled infrastructure-less... more
Mobile ad hoc network (MANET) and Vehicular ad hoc network (VANET) are autonomous systems connected by wireless communication on a peer-to-peer basis. They are self-organized, self-configured and self-controlled infrastructure-less networks. These kinds of networks have the advantage of being able to be setup and deployed anywhere and anytime because it has a simple infrastructure setup and no central administration. Distributing information between these nodes over long ranges in such networks, however, is a very challenging task, since sharing information always has a risk attached to it especially when the information is confidential. The disclosure of such information to anyone else other than the 2 intended parties could be extremely damaging.
The aim of this paper is to conduct a study on the Saudi culture to extract Saudi users' preferences on Arabic website usability. Its purpose is to determine the most important issues that should be considered when designing for the Saudi... more
The aim of this paper is to conduct a study on the Saudi culture to extract Saudi users' preferences on Arabic website usability. Its purpose is to determine the most important issues that should be considered when designing for the Saudi culture. The data collection instrument consist of an online questionnaire for Saudi Internet users'. The main outcome of this study is that Saudi users agree on the importance of website usability issues such as adherence to local language, culture, and religious beliefs, in addition to consistency in navigation scheme, messages, and text format. The results of this study highlight the need to consider the cultural preferences of the target audience for successful local websites or applications.
Usability now appears to be a highly important attribute for software quality; it is a critical factor that needs to be considered by every software-development organization when developing software to improve customer satisfaction and... more
Usability now appears to be a highly important attribute for software quality; it is a critical factor that needs to be considered by every software-development organization when developing software to improve customer satisfaction and increase competition in the market. There exists a lack of a reference model or framework for small-sized software-development organizations to indicate which usability practices should be implemented, and where in the system-development life cycle they need to be considered. We offer developers who have the objective of integrating usability practices into their development life cycle a framework that characterizes 10 selected user-centered design (UCD) methods in relation to five relevant criteria based on some ISO factors that have an effect on the selection of methods (ISO/TR16982). The selection of the methods for inclusion in the framework responds to these organizations' needs; and we selected basic methods that are recommended, cost-effective, simple to plan and apply, and easy to learn by developers; and which can be applied when time, resources, skills, and expertise are limited. We favor methods that are generally applicable across a wide range of development environments. The selected methods are organized in the framework according to the stages in the development process where they might be applied. The only requirement for the existing development life cycle is that it to be based on an iterative approach.
Computer crime is the use of information technology in any suspicious criminal activities. Recently, our life becomes increasingly depending on modern information technology; however, it becomes very important to improve the computer... more
Computer crime is the use of information technology in any suspicious criminal activities. Recently, our life
becomes increasingly depending on modern information technology; however, it becomes very important to improve the
computer crime investigation procedure especially in cases of processing very important and sensitive information such as
government and military intelligence, banking information or personal private information. Cybercrime investigation helps
detecting unauthorized access to any digital source information with the intent of modifying, destroying or stealing that digital
data or information. Such suspicious actions can cause financial damages or important information loss; moreover, it might
distribute or destroy high secret and private or confidential information. Therefore, this paper focuses mainly on highlighting
the main challenges of the North Africa's countries (Libya, Tunis, Algeria, and Morocco) in computer crime investigation
system by taking a look at the recent developments in the continent’s Internet infrastructure and the need of information
security laws in these particular countries.
Research Interests:
The recent revolution in technology has encouraged governments throughout the world to change their approaches to providing services to their citizens. Accordingly, some countries have set up e-government portals as one such approach to... more
The recent revolution in technology has encouraged governments throughout the world to change their approaches to providing services to their citizens. Accordingly, some countries have set up e-government portals as one such approach to deliver services efficiently, economically, and promptly. The synergy of information with communication technology has the potential to make e-government a major advance; some citizens, however, are not satisfied with e-services introduced in several countries due to factors including lack of computer skills, limited availability of the Internet, and less than total coverage of necessary infrastructure. Effective E-government has several immediate benefits: 1) to lessen the need of travelling to and queuing in the various government departments; and 2) to combine access to different departments together in one government portal. A case study might be the e-government developments in Saudi Arabia, where, in the last few years, huge amounts of money have been expended to establish e-government service. In this context, the question arises whether the expenditure has been worthwhile. In the current research, the satisfaction levels with these services were surveyed among a set of users in order to determine drawback to using the system or any obstacles to access. Objectives were established in order to achieve the aims, and research questions devised to examine the usage of e-government and the service’s usability, as well as to identify the barriers and factors that can affect the use of e-government. The relationship between these barriers and overall satisfaction levels with respect to e-government projects is also analyzed.
Research Interests:
Mobile ad hoc network (MANET) and Vehicular ad hoc network (VANET) are autonomous systems connected by wireless communication on a peer-to-peer basis. They are self-organized, self-configured and self-controlled infrastructure-less... more
Mobile ad hoc network (MANET) and Vehicular ad hoc network (VANET) are autonomous systems connected by wireless communication on a peer-to-peer basis. They are self-organized, self-configured and self-controlled infrastructure-less networks. These kinds of networks have the advantage of being able to be set-up and deployed anywhere and anytime because it has a simple infrastructure set-up and no central administration. Distributing information between these nodes over long ranges in such networks,however, is a very challenging task, since sharing information always has a risk attached to it especially when the information is confidential. The disclosure of such information to anyone else other than the intended parties could be extremely damaging.
Research Interests:

And 14 more