Skip to main content
Raneem Qaddoura

    Raneem Qaddoura

    Fog computing is recently introduced to work along with cloud computing in the promise of providing better performance in contrast with using the cloud computing by itself. This work measures how CPU speed of the fog devices which is... more
    Fog computing is recently introduced to work along with cloud computing in the promise of providing better performance in contrast with using the cloud computing by itself. This work measures how CPU speed of the fog devices which is measured in million instruction per second (MIPS) effects the overall performance of the fog network in terms of energy consumption and end-to-end latency. The experiments conducted in this study proves that the CPU speed of the fog devices can effect the consumption of energy and the latency of the network.
    Requirements prioritization is considered as one of the most important activities in the requirement engineering process. This paper gives an overview of the requirements prioritization activities and techniques. It also presents how data... more
    Requirements prioritization is considered as one of the most important activities in the requirement engineering process. This paper gives an overview of the requirements prioritization activities and techniques. It also presents how data mining and machine learning techniques have been used to prioritize the software project requirements. A comparison between these techniques is also presented.
    Due to the accelerated growth of symmetrical sentiment data across different platforms, experimenting with different sentiment analysis (SA) techniques allows for better decision-making and strategic planning for different sectors.... more
    Due to the accelerated growth of symmetrical sentiment data across different platforms, experimenting with different sentiment analysis (SA) techniques allows for better decision-making and strategic planning for different sectors. Specifically, the emergence of COVID-19 has enriched the data of people’s opinions and feelings about medical products. In this paper, we analyze people’s sentiments about the products of a well-known e-commerce website named Alibaba.com. People’s sentiments are experimented with using a novel evolutionary approach by applying advanced pre-trained word embedding for word presentations and combining them with an evolutionary feature selection mechanism to classify these opinions into different levels of ratings. The proposed approach is based on harmony search algorithm and different classification techniques including random forest, k-nearest neighbor, AdaBoost, bagging, SVM, and REPtree to achieve competitive results with the least possible features. The...
    The security of IoT networks is an important concern to researchers and business owners, which is taken into careful consideration due to its direct impact on the availability of the services offered by IoT devices and the privacy of the... more
    The security of IoT networks is an important concern to researchers and business owners, which is taken into careful consideration due to its direct impact on the availability of the services offered by IoT devices and the privacy of the users connected with the network. An intrusion detection system ensures the security of the network and detects malicious activities attacking the network. In this study, a deep multi-layer classification approach for intrusion detection is proposed combining two stages of detection of the existence of an intrusion and the type of intrusion, along with an oversampling technique to ensure better quality of the classification results. Extensive experiments are made for different settings of the first stage and the second stage in addition to two different strategies for the oversampling technique. The experiments show that the best settings of the proposed approach include oversampling by the intrusion type identification label (ITI), 150 neurons for ...
    Maintaining a high quality of conversation between doctors and patients is essential in telehealth services, where efficient and competent communication is important to promote patient health. Assessing the quality of medical... more
    Maintaining a high quality of conversation between doctors and patients is essential in telehealth services, where efficient and competent communication is important to promote patient health. Assessing the quality of medical conversations is often handled based on a human auditory-perceptual evaluation. Typically, trained experts are needed for such tasks, as they follow systematic evaluation criteria. However, the daily rapid increase of consultations makes the evaluation process inefficient and impractical. This paper investigates the automation of the quality assessment process of patient–doctor voice-based conversations in a telehealth service using a deep-learning-based classification model. For this, the data consist of audio recordings obtained from Altibbi. Altibbi is a digital health platform that provides telemedicine and telehealth services in the Middle East and North Africa (MENA). The objective is to assist Altibbi’s operations team in the evaluation of the provided c...
    The world has witnessed recently a global outbreak of coronavirus disease (COVID-19). This pandemic has affected many countries and has resulted in worldwide health concerns, thus governments are attempting to reduce its spread and impact... more
    The world has witnessed recently a global outbreak of coronavirus disease (COVID-19). This pandemic has affected many countries and has resulted in worldwide health concerns, thus governments are attempting to reduce its spread and impact on different aspects of life such as health, economics, education, and politics by making emergent decisions and policies (e.g., lockdown and social distancing). These new regulations influenced people’s daily life and cast significant burdens, concerns, and disparities on various population groups. Taking the wrong actions and enforcing bad decisions by some countries result in increasing the contagion rate and more catastrophic results. People start to post their opinions and feelings about their government’s decisions on different social media networks, and the data received through these platforms present a very useful source of information that affects how governments perceive and cope with the current the pandemic. Jordan was one of the top a...
    Intrusion detection of IoT-based data is a hot topic and has received a lot of interests from researchers and practitioners since the security of IoT networks is crucial. Both supervised and unsupervised learning methods are used for... more
    Intrusion detection of IoT-based data is a hot topic and has received a lot of interests from researchers and practitioners since the security of IoT networks is crucial. Both supervised and unsupervised learning methods are used for intrusion detection of IoT networks. This paper proposes an approach of three stages considering a clustering with reduction stage, an oversampling stage, and a classification by a Single Hidden Layer Feed-Forward Neural Network (SLFN) stage. The novelty of the paper resides in the technique of data reduction and data oversampling for generating useful and balanced training data and the hybrid consideration of the unsupervised and supervised methods for detecting the intrusion activities. The experiments were evaluated in terms of accuracy, precision, recall, and G-mean and divided into four steps: measuring the effect of the data reduction with clustering, the evaluation of the framework with basic classifiers, the effect of the oversampling technique,...
    Nowadays, cyber hate speech is increasingly growing, which forms a serious problem worldwide by threatening the cohesion of civil societies. Hate speech relates to using expressions or phrases that are violent, offensive or insulting for... more
    Nowadays, cyber hate speech is increasingly growing, which forms a serious problem worldwide by threatening the cohesion of civil societies. Hate speech relates to using expressions or phrases that are violent, offensive or insulting for a person or a minority of people. In particular, in the Arab region, the number of Arab social media users is growing rapidly, which is accompanied with high increasing rate of cyber hate speech. This drew our attention to aspire healthy online environments that are free of hatred and discrimination. Therefore, this article aims to detect cyber hate speech based on Arabic context over Twitter platform, by applying Natural Language Processing (NLP) techniques, and machine learning methods. The article considers a set of tweets related to racism, journalism, sports orientation, terrorism and Islam. Several types of features and emotions are extracted and arranged in 15 different combinations of data. The processed dataset is experimented using Support...