Middle East University at Amman

Amman, Jordan

Middle East University is a national education research consulting non-profit organization in Amman, Jordan, owned by the Company Middle East University for Graduate Studies.The university started its first stage on behalf of the University of Graduate Studies as of 30 June 2005, after having completed all the requirements of licensing and accreditation. And received the first batch of students in a dozen specialized master's program at the beginning of Chapter II of the academic year 2005–2006 at the site of the university. With the beginning of the academic year 2008–2009 will receive the university in the second phase of her first batch of undergraduate students in a dozen specialized in the total area of buildings amounted to M². Wikipedia.

Time filter
Source Type

Azar S.M.,Dar Al Uloom University | Mousa A.A.,Middle East University at Amman | Khalifeh J.M.,University of Jordan
Intermetallics | Year: 2017

Density functional theory calculations based on full potential linearized augmented plane-wave (FP-LAPW) plus local orbital method in the framework of GGA-PBE, as embodied in the WIEN2k code, is used to investigate the structural, electronic and magnetic properties of intermetallic Ti1+xFeSb Heusler compounds, where (x=−0.75,−0.50,−0.25,0.0,0.25,0.50,0.75,1.0). Moreover, the Tran-Blaha parameterized of the modified Becke-Johnson (TB-mBJ) exchange potential, as a semi-local method, is employed to predict the bandgap more precisely. The physical characteristic of these systems are found to be mostly determined by the crystal structure and the electron concentration or the number of valence electrons. We examined the site preference of the parent compound TiFeSb and varied the electron concentration by doping or removing a Ti atom and we found that the variation plays a crucial role in the physical properties of these material systems. Alloys with x≤0 are found to exhibit a ferrimagnetic phase, and the alloy with x=0.25 exhibits non-magnetic properties, whereas the rest have shown ferromagnetic phase. The band-structure analysis of Ti1.75FeSb and Ti2FeSb (CuHg2Ti-type) alloys suggested that they could be ferromagnetic half-metallic candidates with bandgaps 0.350 and 0.468 eV, respectively. We found that Ti rich Ti1+xFeSb alloys have high spin polarization. © 2017 Elsevier Ltd

Al-Obaidi N.M.,Middle East University at Amman | Al-Jarrah M.M.,Middle East University at Amman
Proceedings - 2016 9th International Conference on Developments in eSystems Engineering, DeSE 2016 | Year: 2017

This paper presents a keystroke dynamics system for mobile devices that employs a statistical distance-to-median anomaly detector. The selected feature set combines the keystroke timing features of hold and latency and the touch screen features of pressure and finger area. The proposed system consists of two modules: training and testing. The aim of the system is to be a research tool to serve two purposes: (i) the generation of a model-independent dataset of keystroke data on mobile devices, for comparison of keystroke dynamics anomaly detectors, (ii) to be used in the evaluation of the authentication performance of the implemented distance-to-median anomaly detector. The system works in the Android environment on Nexus smartphones and tablets. The experimental work has generated a dataset of 2856 records from 56 subjects, 51 records per subject, where each record represents 71 feature elements resulting from the typing of a standard 10-character password. Statistical analysis of the collected dataset showed an equal-error-rate (EER) of 0.049 when using a different pass-mark per subject, and 0.054 when using a global pass-mark for all subjects. The EER results are much lower than previously published results using three distance-based verification models. Also, the false-acceptance-rate at 5% false-rejection-rate is 5.6%, which is much lower than previously published results, but it is still high and needs to be reduced. Evaluation of the testing (authentication) part of the system was carried out through test runs where a genuine user enters his user-id and password as a login attempt, and the resulting test vector of feature elements are matched against the stored template of the user. The login attempt is classified as genuine or impostor based on a preset pass-mark. Conclusions and suggestions for future work are presented. © 2016 IEEE.

Al-Bayati M.T.,Middle East University at Amman | Al-Jarrah M.M.,Middle East University at Amman
Proceedings - 2016 9th International Conference on Developments in eSystems Engineering, DeSE 2016 | Year: 2017

Steganography, the technology of protecting a secret message by embedding it inside a cover image, continues to be investigated and enhanced as an alternative data protection method. This paper deals with hiding multimedia files in true color RGB cover images with an emphasis on reducing the cover size, increasing hiding capacity and enhancing security of the hidden data. A proposed model (DuoHide) is presented in which a secret multimedia file, regardless of its type, is processed without un-compression, and divided between two cover images of equal size and dimensions. The multimedia file is read as a stream of bytes and split vertically into two parts, one part contains the least significant half-bytes, and the other part contains the most significant half-bytes. The two parts are hidden inside two uncompressed RGB cover images using a least significant 4-bit replacement technique. The resulting dual stego images are expected to be sent separately, through different channels, to avoid capture of both stego files by an adversary. Extraction of the secret file is achieved through merging LSB half-bytes from the two stego files. The extracted file is identical in content and structure with the original secret file. The implemented DuoHide system was evaluated using a set of public multimedia files, images, audios, and videos, of various sizes. The secret file sizes ranged from 5% to about 100% of the cover image's size. The experimental results showed that even at the highest embedding ratio, which is based on the secret-to-cover ratio, there were no perceptible visual differences between cover and stego images. The PNSR value was calculated as PSNR1, for cover1 and stego1, and PSNR2 for cover2 and stego2. The lowest PSNR value was around 31 dB for the highest embedding ratio, which is considered acceptable concerning statistical imperceptibility. The PSNR value increased as the embedding ratio decreased, reaching around 65 Decibel (dB) for the case of 5% secret-to-cover ratio. The integrity of the extracted secret file was verified through a bitwise comparison between original and extracted files, which showed zero differences. The DuoHide model is expected to provide better security for the hidden file, in case an attacker manages to capture one of the stego images and recover the hidden content because the attacker will only get an incomprehensible set of half-byte bits. An additional advantage of using a pair of stego files is that of reducing stego file size by 50%, to avoid problems and limitations of transmitting large files, especially that multimedia files are often large, and they cannot be compressed because they are already compressed. Security of the DuoHide system can further be improved by randomizing storage locations within the two stego images. © 2016 IEEE.

Al-Turk W.,Middle East University at Amman | Al-Dujaili E.A.,Queens Medical Research Institute
Steroids | Year: 2016

There has been a lot of effort by scientists to elucidate the multi functions of the naturally occurring hormone, dehydroepiandrosterone (DHEA). However, to plan research experiments optimally, it is important first to characterize the diurnal rhythm in healthy individuals. The aim of this research was to investigate the daily circadian rhythms of DHEA among the 2 genders, and the effect of age and exercise on salivary DHEA circadian rhythms. Volunteers (20-39 and 40-60 years) were recruited for 2 studies investigating the salivary DHEA circadian rhythm. The first study looked at the effect of gender and age on DHEA levels on 2 non-consecutive days, and the second study explored the effect of exercise on DHEA circadian rhythm in males. DHEA levels were estimated by a sensitive and specific ELISA method. The results showed a clear daily circadian rhythm in salivary DHEA in all participants groups, however the profile was flatter in the older female group. There was a significant difference between age and gender groups particularly at 8.00 h. In young males DHEA reduced from 541.1 ± 101.3 (mean ± sd) at 8.00 h to 198.9 ± 90.7 pg/mL at 18.00 h; p<0.0001, and young females from 401.6 ± 149.5 to 215.4 ± 95.3 pg/mL; p<0.001. In older males DHEA reduced from 267.5 ± 32.4 to 132.5 ± 46.7 pg/mL; p<0.001, and older females from 147.7 ± 78.1 to 89.5 ± 29.1 pg/mL; p=0.05. DHEA levels on 2 non-consecutive days showed some variations but this was not significant. Aerobic exercise has significantly increased DHEA levels at 2 time points of the day (p=0.05) in male subjects. In conclusion, our study showed a clear daily circadian rhythm in salivary DHEA in all participants was observed, but the profile was flatter in the older groups. Copyright © 2016. Published by Elsevier Inc.

Mousa A.A.,Middle East University at Amman
International Journal of Modern Physics B | Year: 2014

Structural and electronic properties of perovskite KCaX3 (X = F and Cl) compounds are investigated using the full potential linearized augmented plane wave (FP-LAPW) method as implemented in the Wien2k code. The exchange-correlation potential is treated by the generalized gradient approximation within the scheme of Perdew, Burke and Ernzerhof (GGA-PBE). Based on these calculations, it has been concluded that KCaX3 compounds have indirect energy band-gap (Γ-R). Moreover, the theoretical investigation which has been carried out on the highly hydrostatic pressure dependence of the KCaX3 electronic properties revealed a linear relationship between both the hydrostatic pressure and the energy band-gap. In addition, the electronic and bonding properties of the band structure, density of states (DOS) and electron charge density have been calculated and presented. Besides that, the dielectric function, refractive index and extinction coefficient are calculated. The origin of some of the peaks in the optical spectra is discussed in terms of the calculated electronic structure. Finally, the calculated structural properties are found to agree well with the available experimental and theoretical data. © 2014 World Scientific Publishing Company.

Mahmoud N.T.,University of Jordan | Khalifeh J.M.,University of Jordan | Hamad B.A.,University of Jordan | Mousa A.A.,Middle East University at Amman
Intermetallics | Year: 2013

Density Functional Theory (DFT) calculations are performed using full potential linearized augmented plane wave (FP-LAPW) method to investigate the effect of defects on the electronic and magnetic properties of Co2VSn full Heusler alloy. The formation energies are calculated for antisite, swap and vacancy defects. The Vsn antisite, V, Co and Sn vacancies have relatively low formation energies with high probability to occur. The half metallicity is maintained in all structures with band gaps smaller than that of the perfect alloy except for CoSn, SnCo antisite and Co-Sn swap, which exhibit a metallic behavior. © 2012 Elsevier Ltd. All rights reserved.

Abuarqoub A.,Middle East University at Amman
Proceedings - 2015 European Intelligence and Security Informatics Conference, EISIC 2015 | Year: 2015

One of the most critical properties of a wireless sensor network is the adaptivity to topological changes. Several studies have demonstrated the benefits of using mobile nodes as an effective tool for gathering data from sensor nodes. However, nodes mobility causes steady connectivity disruptions, where the delay between two disruptions is dependent on the node movement speed and direction. In this paper, we introduce an approach, which based on the connection expiry time, to cluster nodes around a moving mobile sink. Sensor nodes joins the mobile sink that offers the longest connectivity time and the lowest communication overhead. When compared to its best rivals in the literature, the proposed approach improves the packet delivery ratio by up to 21%, end-to-end delay by up to 28% and energy consumption by up to 42%. © 2015 IEEE.

Kayed A.,Middle East University at Amman
2013 5th International Conference on Computer Science and Information Technology, CSIT 2013 - Proceedings | Year: 2013

There are various methodologies to evaluate ontologies. One of them is based on the percentage coverage of ontology for domain knowledge i.e. gold samples. This paper demonstrates several experiments to show how we can use this ontological coverage to test the quality of ontology. The main concern here is how to use the coverage measure to accept or reject the quality of ontology. Two domains ontologies for Java and.Net have been chosen. Two ontologies in each domain with five frequencies have been selected. Ten gold definitions have been selected in each domain. The coverage has been computed for each definition. The coverage measure has been normalized by divining it on the number of words in the definitions (definition normalization). The second ontology in both domains has been chosen to be better than the first one by including the first ontology in the second one with more concepts in the second. The percentage coverage measures have been computed for the four ontologies with 50 (10 5 frequencies) cases. Finding the 'good' population between two populations is a well-know statistical problem. Four techniques have been borrowed: 1) Non-parametric statistical method Mann-Whitney-Wilcoxon U (MWW) test, 2) The average (mean analysis) of the coverage, 3) The average differences in coverage, and 4) The percentage of positive differences in coverage between any two ontologies (sign test). Results show that the technique number 4 (sign test) gives significant results among other tests. © 2013 IEEE.

Mubarak A.A.,King Abdulaziz University | Mousa A.A.,Middle East University at Amman
Computational Materials Science | Year: 2012

We present ab initio theoretical study of the structural, electronic and optical properties for fluoroperovskite BaXF 3 (X = Li, Na, K, and Rb) compounds using full potential linearized augmented plane wave method as implemented in Wien2k code. We employed the generalized gradient approximation as exchange-correlation potential. Our calculations show that these compounds have direct energy band-gap (Γ-Γ). The dielectric function, refractive index, extinction coefficient, absorption coefficient, and reflectivity are calculated. All structures in the optical response are shifted toward lower energies as moved from Li to Rb. Our calculated optical properties show considerable anisotropy at low and high energies. © 2012 Elsevier B.V. All rights reserved.

Kayed A.,Middle East University at Amman
2013 1st International Conference and Exhibition on the Applications of Information Technology to Renewable Energy Processes and Systems, IT-DREPS 2013 | Year: 2013

Renewable energy applications nowadays are a critical factor to their success. Making sure that a specific information, service or product from an online provider is reliable and trustworthy may sometimes be a difficult task. The World Wide Web (WWW) is an open environment in which every person is allowed to populate some information. The accuracy or reliability of such information, to some extent, is unknown, and therefore cannot be trusted. In this paper, we argued that using ontologies may form a useful tool to find the best renewable energy provider. The contribution of this paper is to develop ontology concepts for measuring such "goodness". Common and frequent concepts from five popular and trusted online renewable energy providers were extracted, refined, and then checked against nine other online providers. These providers are also judged by experts who are renewable energy specialists. The results discussed in this paper have shown that the proposed approach has achieved high matching score to the experts' judgments. © 2013 IEEE.

Loading Middle East University at Amman collaborators
Loading Middle East University at Amman collaborators