Ahmad B. A. Hassanat
Mutah University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Ahmad B. A. Hassanat.
arXiv: Computer Vision and Pattern Recognition | 2011
Ahmad B. A. Hassanat
Lip reading is used to understand or interpret speech without hearing it, a technique especially mastered by people with hearing difficulties. The ability to lip read enables a person with a hearing impairment to communicate with others and to engage in social activities, which otherwise would be difficult. Recent advances in the fields of computer vision, pattern recognition, and signal processing has led to a growing interest in automating this challenging task of lip reading. Indeed, automating the human ability to lip read, a process referred to as visual speech recognition (VSR) (or sometimes speech reading), could open the door for other novel related applications. VSR has received a great deal of attention in the last decade for its potential use in applications such as human-computer interaction (HCI), audio-visual speech recognition (AVSR), speaker recognition, talking heads, sign language recognition and video surveillance. Its main aim is to recognise spoken word(s) by using only the visual signal that is produced during speech. Hence, VSR deals with the visual domain of speech and involves image processing, artificial intelligence, object detection, pattern recognition, statistical modelling, etc.
International Journal of Advanced Computer Science and Applications | 2016
Mouhammd Alkasassbeh; Ghazi Al-Naymat; Ahmad B. A. Hassanat; Mohammad Almseidin
Users and organizations find it continuously challenging to deal with distributed denial of service (DDoS) attacks. . The security engineer works to keep a service available at all times by dealing with intruder attacks. The intrusion-detection system (IDS) is one of the solutions to detecting and classifying any anomalous behavior. The IDS system should always be updated with the latest intruder attack deterrents to preserve the confidentiality, integrity and availability of the service. In this paper, a new dataset is collected because there were no common data sets that contain modern DDoS attacks in different network layers, such as (SIDDoS, HTTP Flood). This work incorporates three well-known classification techniques: Multilayer Perceptron (MLP), Naive Bayes and Random Forest. The experimental results show that MLP achieved the highest accuracy rate (98.63%).
Proceedings of SPIE | 2010
Ahmad B. A. Hassanat; Sabah Jassim
This paper is concerned with lip localization for visual speech recognition (VSR) system. We shall present an efficient method for localization humans lips/mouth in video images. This method is based on using the YCbCr approach to find at least any part of the lip as an initial step. Then we use all the available information about the segmented lip-pixels such as r, g, b, warped hue, etc. to segment the rest of the lip. The mean is calculated for each value, then for each pixel in ROI, Euclidian distance from the mean vector is calculated. Pixels with smaller distances are further clustered as lip pixels. Thus, the rest of the pixels in ROI will be clustered (to lip/non-lip pixel) depending on their distances from the mean vector of the initial segmented lip region. The method is evaluated on a new-recorded database of 780,000 frames; the experiments show that the method localizes the lips efficiently, with high level of accuracy (91.15%) that outperforms existing lip detection approaches.
Proceedings of SPIE, the International Society for Optical Engineering | 2008
Ahmad B. A. Hassanat; Sabah Jassim
This paper is concerned with face localization for visual speech recognition (VSR) system. Face detection and localization have got a great deal of attention in the last few years, because it is an essential pre-processing step in many techniques that handle or deal with faces, (e.g. age, face, gender, race and visual speech recognition). We shall present an efficient method for localization humans faces in video images captured on mobile constrained devices, under a wide variation in lighting conditions. We use a multiphase method that may include all or some of the following steps starting with image pre-processing, followed by a special purpose edge detection, then an image refinement step. The output image will be passed through a discrete wavelet decomposition procedure, and the computed LL sub-band at a certain level will be transformed into a binary image that will be scanned by using a special template to select a number of possible candidate locations. Finally, we fuse the scores from the wavelet step with scores determined by color information for the candidate location and employ a form of fuzzy logic to distinguish face from non-face locations. We shall present results of large number of experiments to demonstrate that the proposed face localization method is efficient and achieve high level of accuracy that outperforms existing general-purpose face detection methods.
Information-an International Interdisciplinary Journal | 2018
Ahmad B. A. Hassanat; V. Prasath; Mohammed Abbadi; Salam Abu-Qdari; Hossam Faris
Genetic algorithm (GA) is one of the well-known techniques from the area of evolutionary computation that plays a significant role in obtaining meaningful solutions to complex problems with large search space. GAs involve three fundamental operations after creating an initial population, namely selection, crossover, and mutation. The first task in GAs is to create an appropriate initial population. Traditionally GAs with randomly selected population is widely used as it is simple and efficient; however, the generated population may contain poor fitness. Low quality or poor fitness of individuals may lead to take long time to converge to an optimal (or near-optimal) solution. Therefore, the fitness or quality of initial population of individuals plays a significant role in determining an optimal or near-optimal solution. In this work, we propose a new method for the initial population seeding based on linear regression analysis of the problem tackled by the GA; in this paper, the traveling salesman problem (TSP). The proposed Regression-based technique divides a given large scale TSP problem into smaller sub-problems. This is done using the regression line and its perpendicular line, which allow for clustering the cities into four sub-problems repeatedly, the location of each city determines which category/cluster the city belongs to, the algorithm works repeatedly until the size of the subproblem becomes very small, four cities or less for instance, these cities are more likely neighboring each other, so connecting them to each other creates a somehow good solution to start with, this solution is mutated several times to form the initial population. We analyze the performance of the GA when using traditional population seeding techniques, such as the random and nearest neighbors, along with the proposed regression-based technique. The experiments are carried out using some of the well-known TSP instances obtained from the TSPLIB, which is the standard library for TSP problems. Quantitative analysis is carried out using the statistical test tools: analysis of variance (ANOVA), Duncan multiple range test (DMRT), and least significant difference (LSD). The experimental results show that the performance of the GA that uses the proposed regression-based technique for population seeding outperforms other GAs that uses traditional population seeding techniques such as the random and the nearest neighbor based techniques in terms of error rate, and average convergence.
Journal of Near Eastern Studies | 2017
Alex de Voogt; Ahmad B. A. Hassanat; Mahmoud B. Alhasanat
The rules and presence of the game of ṭāb have been described for only a few parts of the Near East. In recent years, occasional attestations of game boards have been found in rock surfaces corresponding with geographical locations at the outer borders of the Ottoman Empire, such as Sudan and Oman. In those locations, the game boards were differentiated from Roman gaming practices. This survey of the archaeological region of Petra in Jordan reveals an unusually large number of ṭāb playing boards carved in rock surfaces. The study presents the implications of these finds for our understanding of the game, as well as the importance of this game for the history of the region. The history and distribution of the game known as ṭāb has been linked to the expansion of Islam.1 It is almost exclusively associated with areas that are part of the Muslim world, and is not found in sub-Saharan Africa or beyond the Near East. Early references to the game are not necessarily conclusive, as they do not include playing rules, but Thierry Depaulis2 has argued that Franz Rosenthal’s3 mention of a game found in an early fourteenth century poem is a reference to ṭāb.
Signal, Image and Video Processing | 2018
Ahmad B. A. Hassanat; V. B. Surya Prasath; Mouhammd Alkasassbeh; Ahmad S. Tarawneh; Ahmad J. Al-shamailh
In fingerprint recognition systems, feature extraction is an important part because of its impact on the final performance of the overall system, particularly, in the case of low-quality images, which poses significant challenges to traditional fingerprint feature extraction methods. In this work, we make two major contributions: First, a novel feature extraction method for low-quality fingerprints images is proposed, which mimics the magnetic energy when attracting iron fillings, and this method is based on image energies attracting uniformly distributed points to form the final features that can describe a fingerprint. Second, we created a new low-quality fingerprints image database to evaluate the proposed method. We used a mobile phone camera to capture the fingerprints of 136 different persons, with five samples for each to obtain 680 fingerprint images in total. To match the computed features, we used the dynamic time warping and evaluated the performance of our system based on k-nearest neighbor classifier. Further, we represent the features using their probability density functions to evaluate the method using some other classifiers. The highest identification accuracy recorded by several experiments reached 95.11% using our in-house database. The experimental results show that the proposed method can be used as a general feature extraction method for other applications.
Journal of Computer Applications in Technology | 2017
Ahmad B. A. Hassanat; Esra’a Alkafaween
This paper investigates the use of more than one crossover operator to enhance the performance of genetic algorithms. Novel crossover operators are proposed such as the Collision crossover, which is based on the physical rules of elastic collision, in addition to proposing two selection strategies for the crossover operators, one of which is based on selecting the best crossover operator and the other randomly selects any operator. Several experiments on some Travelling Salesman Problems (TSP) have been conducted to evaluate the proposed methods, which are compared to the well-known Modified crossover operator and partially mapped Crossover (PMX) crossover. The results show the importance of some of the proposed methods, such as the collision crossover, in addition to the significant enhancement of the genetic algorithms performance, particularly when using more than one crossover operator.
International Journal of Biometrics | 2017
Ahmad B. A. Hassanat; V. B. Surya Prasath; Bassam M. Al-Mahadeen; Samaher Madallah Moslem Alhasanat
This study aims to investigate to what extent a computer system can identify veiled-human and recognise gender using eyes and the uncovered part of the face. For the purpose of this study, we have created a new veiled persons image (VPI) database shot using a mobile phone camera, imaging 100 different veiled-persons over two sessions. After preprocessing and segmentation we used a fused method for feature extraction. The fusion occurs between geometrical (edge ratio) and textural (probability density function of the colour moments) features. The experimental results using different classifiers were ranging from 88:63% to 97:22% for person identification accuracy before feature selection and up to 97:55% after feature selection. The proposed method achieved up to 99:41% success rate for gender classification.
2017 8th International Conference on Information and Communication Systems (ICICS) | 2017
Ahmad B. A. Hassanat; Eman Btoush; Mohammad Ali Abbadi; Bassam M. Al-Mahadeen; Mouhammd Al-awadi; Khalil I.A. Mseidein; Amin M. Almseden; Ahmad S. Tarawneh; Mahmoud B. Alhasanat; V. B. Surya Prasath; Fatimah Al-Alem
Covering the face and all body parts, sometimes the only evidence to identify a person is their hand geometry, and not the whole hand-only two fingers (the index and the middle fingers) while showing the victory sign, as seen in many terrorists videos. This paper investigates for the first time a new way to identify persons, particularly (terrorists) from their victory sign. We have created a new database in this regard using a mobile phone camera, imaging the victory signs of 50 different persons over two sessions. Simple measurements for the fingers, in addition to the Hu Moments for the areas of the fingers were used to extract the geometric features of the shown part of the hand shown after segmentation. The experimental results using the KNN classifier with three different distance metrics were encouraging for most of the recorded persons; with about 40% to 93% total identification accuracy, depending on the features, distance metric and K used.