Dr. Akram AbdelQader
About University
Al-Zaytoonah Private University of Jordan (henceforth, Al-Zaytoonah) was established in 1993 after receiving its license and general accreditation by Decision No. 848 on March 6, 1993. Instruction began on September 6, 1993, and since then Al-Zaytoonah has witnessed ... Read more
Academic & Administrative Staff
There are 300 faculty members of various ranks distributed among the six faculties of the University, and 80 teaching and research assistants and lab technicians. In addition, there are 210 administrative employees and 260 workers.

Al Zaytoonah University of Jordan

Blog

A Novel Automated Requirements Prioritization and Selection Model Based on Requirements Weights and Stakeholder Importance, April 2017

Mohammed Lafi · Akram AbdelQader

Article in International Journal of Information Technology 4(4) · April 2017
Abstract
This paper proposes a novel approach to select and prioritize the requirement items in the requirement document. We use an automated requirement method that collects requirements from different stakeholders groups and categories. The new approach is based on assigning an importance factor to each stakeholder group and an acceptance weight for each requirement item. The importance factor and the acceptance weight for each requirement are used to decide whether to include or exclude this requirement item based on a proposed formula. This method is validated by using a case study based on a set of examples, and shows a significant improvement in software requirements process.

A Novel Image Steganography Approach Using Multi-Layers DCT Features Based on Support Vector Machine Classifier,February 2017

 Article: The International Journal of Multimedia & Its Appli, cations (IJMA) Vol.9, No.1, February 2017

Abstract
Steganography is the science of hidden data in the cover image without any updating of the cover image. The recent research of the steganography is significantly used to hide large amount of information within an image and/or audio files. This paper proposed a new novel approach for hiding the data of secret image using Discrete Cosine Transform (DCT) features based on linear Support Vector Machine (SVM) classifier. The DCT features are used to decrease the image redundant information. Moreover, DCT is used to embed the secrete message based on the least significant bits of the RGB. Each bit in the cover image is changed only to the extent that is not seen by the eyes of human. The SVM used as a classifier to speed up the hiding process via the DCT features. The proposed method is implemented and the results show significant improvements. In addition, the performance analysis is calculated based on the parameters MSE, PSNR, NC, processing time, capacity, and robustness.

A novel approach to generate distributed global and local use cases: A new notation_Sep 2016

A novel approach to generate distributed global and local use cases: A new notation

M.I. Muhairat · A. Abdelqader · M. Al Rawajbeh

Article · Sep 2016 · Journal of Theoretical and Applied Information Technology
Abstract

Requirements analysis is very important phase of the software development life cycle (SDLC). It is used to build domain or conceptual models from requirements analysis. These models are helpful for defining stakeholders and functional requirements. Also, these functional requirements are easy to define for local systems, but they are very difficult to define for distributed stakeholders or systems. In this paper, we proposed a new approach to generate integrated requirements for a distributed system. This approach is composed of four steps: The first one is to generate an event table with a proposed template that suitable for requirements collection. This event table will be filled for each department and branch. The second one is to generate a normalized event table for all departments and branches. The third one is building and analyzing an integrated table to define the redundancy of functional requirements for all departments and branches. The final one is to generate and propose a new UML notation for distributed functional requirements. This approach is applied to a real ERP system as a case study and shows a significant result.

A Mathematical Model to Verify a Reverse Engineering Approach Which Convert Form Fill Format into UML Class Diagram

 Mohammad I. MuhairatAkram A. Abdelqader

Jun 2016 International Journal of Software Engineering and its Applications

ABSTRACT

This paper proposes a mathematical model to verify a reverse engineering approach which converts a form fill format document into a UML class diagram. The proposed approach used to convert a form fill format document into a UML class diagram consists of the following phases. The first phase is the capturing process that scans the form document and identifies the form components into tables; the second step is the normalization process that normalizes the tables in the first phase. The third phase is the mapping process to construct and build the relationship diagram. Finally, the translation process is conducted to construct and build the class diagrams. To verify the correctness of algorithms Interpreted Perti Nets Models will be generated to implement the proposed transformation processes (i.e. Capturing, normalization, mapping, and translation process). This verification is done because the importance of this approach as a helpful algorithm for researchers and practitioners in the Software Engineering field, since most of the reverse engineering approaches are based on source code. This approach is tested by using several word form fill format documents and shows a significant result.

Jun 2016 · International Journal of Software Engineering and its Applications

Book: Computer Skills

ABSTRACT: Computer Skills

Book: Information Technology

ABSTRACT: Information Technology

UML Diagrams Generator: A New CASE Tool to Construct the Use-Case and Class Diagrams from an Event Table

ABSTRACT: Problem statement: Building UML diagrams is a very important and time consuming task for both requirements and design phases. However, some of these diagrams, such as use-case and class diagrams can be considered as a transition between the two phases. Approach: Through this study, the event table will be used to derive the use-case and class diagrams. Results: A new CASE tool to automate the proposed approach will be introduced, that is, the UML diagrams generator (UMLdg). Conclusion: It is clearly noted that the proposed CASE tool (UMLdg) gives an ideal and reasonable methodology to construct the intended use-case and class diagrams from any comprehensive event table. Furthermore, this tool will save the time for the building process of such diagrams.

Multi function control system using GSM modem based SM5100B Module

ABSTRACT: This paper proposes a multi function solution, based on GSM (Global System for Mobile Communication) networks [1] for control of a motor driving circuit and LCD (Liquid Crystal Display). This system provides ideal solution for controlling the direction of motor driving within a specified range of time, two directions where controlled in addition to activated functionality with 5V. In this system, a real time data can be accessed world wide using the GSM network. The system can also be configured to control an alarm or any other electrical device via a mobile phone using SMS text messaging. The proposed system controls the motor direction from the remote location, determines the time duration the motor is in a specified direction and whenever it crosses the Cellular Shield to the SM5100B Module. The Cellular Shield will send the signal to the output PIN’s which are programmed using C language to control the motor operation. The concerned authority can control the system through his mobile phone by sending AT Commands to GSM MODEM and in turn to microcontroller. The system uses GSM technology [2] thus providing the access to the system for security and automated monitoring and control the motor operations.

Electronic Student Attendance Recording System

ABSTRACT: Bluetooth technology is offering a very robust way to transfer data in faster rates within a short range wireless communication local network. Wireless and radio communication technologies are giving organizations and users many benefits such as portability and flexibility, increased productivity, and lower the installation costs. Register the attendance and absence for students in the classroom of all educational institutions is one of the most intensive daily operations. In this paper, we are interesting to use the free wireless communication via Bluetooth technology that is available in most mobile phones and computer systems to build a computerized wireless clients-server network system. The client side will be a mobile phone that used to fill the list of attendance and absence for students in a classroom of educational institutions in an easy and fast way. Server side will contain the centralized database and monitoring attendance system for the distributing clients connected to the system. The idea of this system is developed and implemented on real educational institution. The recorded results show that the system saves a costs and efforts and helps the educational institution to get a more effective system than the old one.

Distributed Graphical User Interfaces to Class Diagram: Reverse Engineering Approach using Pattern Recognition

ABSTRACT: The graphical user interfaces of software programs are used by researchers in the soft-ware engineering field to measure functionality, usability, durability, accessibility, and performance. This paper describes a reverse engineering approach to transform the captured images of the distributed GUI’s into class diagram. The processed distributed GUI’s come from different and separate client computers. From the distributed GUI’s, the inter-faces are captured as images, attributes and functions are extracted and processed through pattern recognition mechanism to be stored into several temporary tables corresponding to each client’s graphical user interface. These tables will be analyzed and processed into one integrated normalized table eliminating any attribute redundancies. Further, the normalized the one integrated table is to create a class diagram.

Contact

Please don’t hesitate to contact me for more information about my work.

Tel: +962-6-4291511
Fax: +962-6-4291432

No more, where are you going?

Go back to top or use the menu to your left to navigate.

Thanks for downloading!

Top