default search action
Amjad Aldweesh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2020
- [b1]Amjad Aldweesh:
Benchmarking and evaluation of blockchain systems and applications. University of Newcastle upon Tyne, UK, 2020
Journal Articles
- 2024
- [j20]Maen Alzubi, Mohammad Almseidin, Mouhammd Alkasassbeh, Jamil Al-Sawwa, Amjad Aldweesh:
Comparative Analysis of Fuzzy Rule Interpolation Techniques Across Various Scenarios Using a Set of Benchmarks. IEEE Access 12: 33140-33153 (2024) - [j19]Lizhuang Tan, Amjad Aldweesh, Ning Chen, Jian Wang, Jianyong Zhang, Yi Zhang, Konstantin Kostromitin Igorevich, Peiying Zhang:
Energy efficient resource allocation based on virtual network embedding for IoT data generation. Autom. Softw. Eng. 31(2): 66 (2024) - [j18]Abdelraouf Ishtaiwi, Ali Mohd Ali, Ahmad Al-Qerem, Yazan Alsmadi, Amjad Aldweesh, Mohammad Alauthman, Omar Alzubi, Shadi Nashwan, Awad Ramadan, Musab Al-Zghoul, Someah Alangari:
Impact of Data-Augmentation on Brain Tumor Detection Using Different YOLO Versions Models. Int. Arab J. Inf. Technol. 21(3): 466-482 (2024) - [j17]Amjad Aldweesh, Sarangam Kodati, Mohammad Alauthman, Ibrahim Aqeel, Ibrahim Mohsen Khormi, M. Dhasaratham, R. Lakshmana Kumar:
Mlora-CBF: efficient cluster-based routing protocol against resource allocation using modified location routing algorithm with cluster-based flooding. Wirel. Networks 30(2): 671-693 (2024) - [j16]Amjad Aldweesh:
The impact of blockchain on digital content distribution: a systematic review. Wirel. Networks 30(2): 763-779 (2024) - 2023
- [j15]Saghir Ahmed, Basit Raza, Lal Hussain, Amjad Aldweesh, Abdulfattah Omar, Mohammad Shahbaz Khan, Elsayed Tag-Eldin, Muhammad Amin Nadim:
The Deep Learning ResNet101 and Ensemble XGBoost Algorithm with Hyperparameters Optimization Accurately Predict the Lung Cancer. Appl. Artif. Intell. 37(1) (2023) - [j14]AbdulHafeez Muhammad, Ansar Siddique, Muhammad Mubasher, Amjad Aldweesh, Noorulhasan Naveed Quadri:
Prioritizing Non-Functional Requirements in Agile Process Using Multi Criteria Decision Making Analysis. IEEE Access 11: 24631-24654 (2023) - [j13]Hasan Idhaim, Yousef Kilani, Ayoub Alsarhan, Mohammad Aljaidi, Ala Altaweel, Ahmed Bouridane, Amjad Aldweesh:
Improving Recommender Systems by a Further Factorization of the Factor Matrices. IEEE Access 11: 91539-91549 (2023) - [j12]Ehab Almasri, Mouhammd Alkasassbeh, Amjad Aldweesh:
Towards Generating a Practical SUNBURST Attack Dataset for Network Attack Detection. Comput. Syst. Sci. Eng. 47(2): 2643-2669 (2023) - [j11]Bashar Igried, Atalla Fahed Al-Serhan, Ayoub Alsarhan, Mohammad Aljaidi, Amjad Aldweesh:
Machine Learning Failure-Aware Scheme for Profit Maximization in the Cloud Market. Future Internet 15(1): 1 (2023) - [j10]Amjad Aldweesh, Mohammad Alauthman, Mohammad Al Khaldy, Abdelraouf Ishtaiwi, Ahmad Al-Qerem, Ammar Almomani, Brij B. Gupta:
The Meta-Fusion: A Cloud-Integrated Study on Blockchain Technology Enabling Secure and Efficient Virtual Worlds. Int. J. Cloud Appl. Comput. 13(1): 1-24 (2023) - [j9]Ala Hamarsheh, Ahmad Alqerem, Iman Akour, Mohammad Alauthman, Amjad Aldweesh, Ali Mohd Ali, Ammar Almomani, Someah Alangari:
Comparative Evaluation of Host-Based Translator Mechanisms for IPv4-IPv6 Communication Performance Analysis With Different Routing Protocols. Int. J. Cloud Appl. Comput. 13(1): 1-26 (2023) - [j8]Mohammad Alauthman, Ahmad Al-Qerem, Someah Alangari, Ali Mohd Ali, Ahmad Nabot, Amjad Aldweesh, Issam Jebreen, Ammar Almomani, Brij B. Gupta:
Machine Learning for Accurate Software Development Cost Estimation in Economically and Technically Limited Environments. Int. J. Softw. Sci. Comput. Intell. 15(1): 1-24 (2023) - [j7]Mohammad Al Khaldy, Abdelraouf Ishtaiwi, Ahmad Al-Qerem, Amjad Aldweesh, Mohammad Alauthman, Ammar Almomani, Varsha Arya:
Redefining E-Commerce Experience: An Exploration of Augmented and Virtual Reality Technologies. Int. J. Semantic Web Inf. Syst. 19(1): 1-24 (2023) - [j6]Mohammad Alauthman, Ahmad Al-Qerem, Bilal Sowan, Ayoub Alsarhan, Mohammed Eshtay, Amjad Aldweesh, Nauman Aslam:
Enhancing Small Medical Dataset Classification Performance Using GAN. Informatics 10(1): 28 (2023) - [j5]Prabhakar Krishnan, Kurunandan Jain, Amjad Aldweesh, P. Prabu, Rajkumar Buyya:
OpenStackDP: a scalable network security framework for SDN-based OpenStack cloud infrastructure. J. Cloud Comput. 12(1): 26 (2023) - 2022
- [j4]Adil Aslam Mir, Lal Hussain, Muhammad Hammad Waseem, Amjad Aldweesh, Saim Rasheed, El Sayed Yousef, Malik Sajjad Ahmed Nadeem, Elsayed Tag-Eldin:
Analysis of Proposed and Traditional Boosting Algorithm with Standalone Classification Methods for Classifying Gene Expresssion Microarray Data Using a Reject Option. Appl. Artif. Intell. 36(1) (2022) - [j3]Lal Hussain, Shahzad Ahmad Qureshi, Amjad Aldweesh, Jawad ur Rehman Pirzada, Faisal Mehmood Butt, Elsayed Tag-Eldin, Mushtaq Ali, Abdulmohsen Algarni, Muhammad Amin Nadim:
Automated breast cancer detection by reconstruction independent component analysis (RICA) based hybrid features using machine learning paradigms. Connect. Sci. 34(1): 2784-2806 (2022) - 2021
- [j2]Amjad Aldweesh, Maher Alharby, Maryam Mehrnezhad, Aad van Moorsel:
The OpBench Ethereum opcode benchmark framework: Design, implementation, validation and experiments. Perform. Evaluation 146: 102168 (2021) - 2020
- [j1]Paul D. Ezhilchelvan, Amjad Aldweesh, Aad van Moorsel:
Non-blocking two-phase commit using blockchain. Concurr. Comput. Pract. Exp. 32(12) (2020)
Conference and Workshop Papers
- 2024
- [c15]Mouhammd Alkasassbeh, Ammar Almomani, Amjad Aldweesh, Ahmad Al-Qerem, Mohammad Alauthman, Khalid M. O. Nahar, Beenu Mago:
Cyberbullying Detection Using Deep Learning: A Comparative Study. ICCR 2024: 1-6 - [c14]Mohammad Alauthman, Ahmad Al-Qerem, Mouhammd Alkasassbeh, Nauman Aslam, Amjad Aldweesh:
Malware Threats Targeting Cryptocurrency: A Comparative Study. ICCR 2024: 1-8 - [c13]Mohammad Alauthman, Amjad Aldweesh, Ahmad Al-Qerem:
IoT Security Challenges in Modern Smart Cities. ICCR 2024: 1-6 - [c12]Ali Mohd Ali, Shadi Nashwan, Ahmad Al-Qerem, Amjad Aldweesh, Mohammad Alauthman, Zenab Elgamal, Ammar Almomani:
CNNs in Crop Care: A Comparative Analysis of Tomato Disease Detection Models. ICCR 2024: 1-5 - [c11]Ali Mohd Ali, Shadi Nashwan, Ahmad Al-Qerem, Ammar Almomani, Mahmoud Al Sakhnini, Amjad Aldweesh:
Machine Learning Models for Brain Signal Classification: A Focus on EEG Analysis in Epilepsy Cases. ICCR 2024: 1-8 - [c10]Abdelraouf Ishtaiwi, Ali Al Maqousi, Amjad Aldweesh:
Securing Emerging IoT Environments with Super Learner Ensembles. ICCR 2024: 1-7 - [c9]Mohammad Al Khaldy, Garam Alshdifat, Trad M. Almalahmeh, Amjad Aldweesh:
Blockchain as a Resilient Infrastructure for e-Business Transactions. ICCR 2024: 1-6 - 2023
- [c8]Ahmad Al-Qerem, Ali Mohd Ali, Mohammad Alauthman, Mohammad Al Khaldy, Amjad Aldweesh:
The effect of Data Augmentation Using SMOTE: Diabetes Prediction by Machine Learning Techniques. AICCC 2023: 13-20 - 2021
- [c7]Huda Ali Alatwi, Amjad Aldweesh:
Adversarial Black-Box Attacks Against Network Intrusion Detection Systems: A Survey. AIIoT 2021: 34-40 - 2020
- [c6]Maher Alharby, Roben Castagna Lunardi, Amjad Aldweesh, Aad van Moorsel:
Data-Driven Model-Based Analysis of the Ethereum Verifier's Dilemma. DSN 2020: 209-220 - 2019
- [c5]Amjad Aldweesh, Maher Alharby, Maryam Mehrnezhad, Aad van Moorsel:
OpBench: A CPU Performance Benchmark for Ethereum Smart Contract Operation Code. Blockchain 2019: 274-281 - 2018
- [c4]Amjad Aldweesh, Maher Alharby, Aad van Moorsel:
Performance Benchmarking for Ethereum Opcodes. AICCSA 2018: 1-2 - [c3]Amjad Aldweesh, Maher Alharby, Ellis Solaiman, Aad van Moorsel:
Performance Benchmarking of Smart Contracts to Assess Miner Incentives in Ethereum. EDCC 2018: 144-149 - [c2]Paul D. Ezhilchelvan, Amjad Aldweesh, Aad van Moorsel:
Non-Blocking Two Phase Commit Using Blockchain. CRYBLOCK@MobiSys 2018: 36-41 - 2017
- [c1]Changyu Dong, Yilei Wang, Amjad Aldweesh, Patrick McCorry, Aad van Moorsel:
Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing. CCS 2017: 211-227
Informal and Other Publications
- 2020
- [i3]Maher Alharby, Roben Castagna Lunardi, Amjad Aldweesh, Aad van Moorsel:
Data-Driven Model-Based Analysis of the Ethereum Verifier's Dilemma. CoRR abs/2004.12768 (2020) - 2018
- [i2]Changyu Dong, Yilei Wang, Amjad Aldweesh, Patrick McCorry, Aad van Moorsel:
Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing. IACR Cryptol. ePrint Arch. 2018: 489 (2018) - 2017
- [i1]Changyu Dong, Yilei Wang, Amjad Aldweesh, Patrick McCorry, Aad van Moorsel:
Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing. CoRR abs/1708.01171 (2017)
Coauthor Index
aka: Ahmad Al-Qerem
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint