Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Amjad Hudaib is active.

Publication


Featured researches published by Amjad Hudaib.


international conference on information and automation | 2006

Image Information Hiding Using Second Order Biorthogonal Wavelets

Suhad Hajjara; Moussa Abdallah; Amjad Hudaib

Image watermarking techniques have been widely studied since the need for copyright protection. In this paper, we present a method for image watermarking using the biorthogonal wavelet transform. The method is based on decomposing an image using the discrete wavelet transform (DWT), and then embedding a watermark in the most significant coefficients of the transform. Biorthogonal wavelets have the property of perfect reconstruction and smoothness (vanishing points). The method proved its robustness against several attacks.


international conference on information and automation | 2006

Experimenting With Extracting Software Requirements Using NLP Approach

Yara Alkhader; Amjad Hudaib; Bassam Hammo

Requirement engineering is a fundamental step in the production of high quality software. Many attempts have been conducted to automate some aspects of the requirements engineering process. In this paper, we present a framework that provides the requirements engineers with an environment, which accepts English natural language requirements as input and automatically generates the corresponding UML class diagram designs. Moreover the framework can highlight the possibility of specification reusability through a reverse engineering process which saves the requirements engineers both time and efforts.


Information and Communication Systems (ICICS), 2016 7th International Conference on | 2016

Sentiment classification techniques for Arabic language: A survey

Mariam Biltawi; Wael Etaiwi; Sara Tedmori; Amjad Hudaib; Arafat Awajan

With the advent of online data, sentiment analysis has received growing attention in recent years. Sentiment analysis aims to determine the overall sentiment orientation of a speaker or writer towards a specific entity or towards a specific feature of a specific entity. A fundamental task of sentiment analysis is sentiment classification, which aims to automatically classify opinionated text as being positive, negative, or neutral. Although the literature on sentiment classification is quite extensive, only a few endeavors to classify opinionated text written in the Arabic language can be found. This paper provides a comprehensive survey of existing lexicon, machine learning, and hybrid sentiment classification techniques for Arabic language.


international conference on computer science and information technology | 2014

Software Engineering Education in Jordan

Fawaz Al-Zaghoull; Amjad Hudaib; Majdi Ahed

There is a major challenge in providing curriculum guidance for new and emerging disciplines like Software Engineering (SE). The aim of this study is to shed some light over SE in Jordan Universities and its accreditation commission, the Higher Education and Accreditation Commission (HEAC). Therefore, we have looked at the education of software engineering in Jordan, and we have conducted a survey on the software engineering curriculum guidelines proposed at national level by HEAC in Jordan and at international level by organization like IEEE and ACM, and joints initiatives like the SWEBOK. As a case study, we will explore the curriculum and study plan of the software engineering bachelor program at ISRA University and provide some guideline for their improvement.


asian conference on intelligent information and database systems | 2011

Improving Availability in Distributed Component-Based Systems via Replication

Samih Al-Areqi; Amjad Hudaib; Nadim Obeid

One of the important criteria that affect the usefulness and efficiency of a distributed system is availability, which mainly depends on how the components of the system are deployed on the available hosts. If the components that need lots of interaction are on the same host, the availability will definitely be higher given that all the components are working properly. In this paper, we extend the work of the Avala model in two ways: (1) we provide a dependency relation between the components as an additional factor and (2) we extend the Avala algorithm by implementing a replication mechanism.


Archive | 2019

Cost-Sensitive Learner on Hybrid SMOTE-Ensemble Approach to Predict Software Defects

Inas Abuqaddom; Amjad Hudaib

A software defect is a mistake in a computer program or system that causes to have incorrect or unexpected results, or to behave in unintended ways. Machine learning methods are helpful in software defect prediction, even though with the challenge of imbalanced software defect distribution, such that the non-defect modules are much higher than defective modules. In this paper we introduce an enhancement for the most resent hybrid SMOTE-Ensemble approach to deal with software defects problem, utilizing the Cost-Sensitive Learner (CSL) to improve handling imbalanced distribution issue. This paper utilizes four public available datasets of software defects with different imbalanced ratio, and provides comparative performance analysis with the most resent powerful hybrid SMOTE-Ensemble approach to predict software defects. Experimental results show that utilizing multiple machine learning techniques to cope with imbalanced datasets will improve the prediction of software defects. Also, experimental results reveal that cost-sensitive learner performs very well with highly imbalanced datasets than with low imbalanced datasets.


Proceedings of the Computational Methods in Systems and Software | 2017

FIPA-Based Semi-centralized Protocol for Negotiation

Amjad Hudaib; Mais Haj Qasem; Nadim Obeid

An important application of multi-agent systems is task negotiation. The existing protocols for controlling negotiation in multi-agent systems are either centralized or decentralized. The centralized protocols suffer from dependency on the central agent. If any problem occurs at the central agent, such as shutting down or becoming slow, the whole system will be blocked. By contrast, decentralized protocol has insufficient information about the agents being used, which might result in a high possibility of agent failure due to internal or external factors, such as losing connections. In this paper, a semi-centralized protocol is proposed to overcome the limitation of the existing protocols and enable robust and adaptable solution in a highly dynamic environment. The outcome of Java Agent DEvelopment Framework (JADE’s) implementation proves the capabilities of the proposed protocol. In comparison with the Contract Net Protocol, the proposed protocol shows significant improvement in time and communication overhead under various conditions.


international conference on information and communication technologies | 2008

A Suggested Framework for Producing Electronic Courses

Fawaz Ahmad Masoud; Amjad Hudaib; Ahmad Sharieh

In this paper, we suggest an e-learning framework for producing electronic courses. The conceptual model, the use case diagram and the class diagram for the suggested framework are provided. In order to implement the framework, the MOODIE platform is used. The MOODIE platform provides the premier integrated, robust, scalable, flexible and secure services. Because the MOODIE is a free source platform, it can be customized according to the user requirements. In fact, implementing the framework using MOODIE platform will ensure high reliability and availability to the most demanding of user communities, and providing superior risk management, return on investment and the financial flexibility of modular enhance. One of the major outputs of this work is a set of two electronic courses (database and software engineering for undergraduate students) that can be utilized by the University of Jordan and any other interested parties.


Archive | 2009

Digital Image Watermarking Using Localized Biorthogonal Wavelets

S. Hajjar; Moussa Abdallah; Amjad Hudaib


Journal of Computer Science | 2008

A Fast Pattern Matching Algorithm with Two Sliding Windows (TSW)

Amjad Hudaib; Rola Al-Khalid; Dima Suleiman; Mariam Itriq; Aseel Al-Anani

Collaboration


Dive into the Amjad Hudaib's collaboration.

Top Co-Authors

Avatar

Dima Suleiman

Princess Sumaya University for Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge