A. Tesanovic, Goran Manev, E. Vasilyeva, E. Knutov, S. Verwer
{"title":"Additional Reviewers","authors":"A. Tesanovic, Goran Manev, E. Vasilyeva, E. Knutov, S. Verwer","doi":"10.1109/PDP.2003.10007","DOIUrl":"https://doi.org/10.1109/PDP.2003.10007","url":null,"abstract":"A Bayesian hierarchical model is applied to the contextaware collaborative recommendation problem. The proposed method treats users, items, and contexts symmetrically, in contrast to existing contextaware extensions of collaborative filters, which treat them asymmetrically. Evaluation using internet questionnaire data demonstrates that the proposed method outperforms conventional collaborative filtering (CF) models and is very stable, even when the number of ratings is very small.","PeriodicalId":177556,"journal":{"name":"2023 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123888021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Android Stalkerware Detection Techniques: A Survey Study","authors":"Ruba Taha EyalSalman","doi":"10.1109/JEEIT58638.2023.10185812","DOIUrl":"https://doi.org/10.1109/JEEIT58638.2023.10185812","url":null,"abstract":"Mobile stalkerware system refers to a type of software that is specifically designed to be installed on a person's mobile device without their knowledge or consent. Once installed, it allows someone else to track the device's location, monitor calls and text messages, and access other personal information. Mobile stalkerware poses several risks to individuals whose devices have been compromised. Most notably, the violation of user privacy. Several techniques proposed to detect stalkerware on a device. This research aims to provide a survey on the different mechanisms proposed to detect stalkerware applications on smartphones. This research includes a summary of the research that has been published about stalkerware applications, their capabilities, and the differences between them in terms of complexity and functionality. As a result, several classifications are used to detect these systems, the most prominent of which are Signature-based, Heuristic-based, Behavioral-based, Machine learning-based, and Sandboxing approaches. It was found that the efficiency of the different detection methods depends on the nature of the stalkerware design, and no particular method can be considered the most efficient. After reviewing the published research, it was found that the efficiency of these applications in terms of functionality is measured by several criteria, the most important of which is their ability to hide and the amount of information they leak about the victim's phone.","PeriodicalId":177556,"journal":{"name":"2023 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT)","volume":"38 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116657907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hamzah Abdulkhaleq Naji, R. A. Fayadh, A. H. Mutlag
{"title":"ANN-based Fault Location in 11 kV Power Distribution Line using MATLAB","authors":"Hamzah Abdulkhaleq Naji, R. A. Fayadh, A. H. Mutlag","doi":"10.1109/JEEIT58638.2023.10185849","DOIUrl":"https://doi.org/10.1109/JEEIT58638.2023.10185849","url":null,"abstract":"Artificial Neural Networks (ANN) have been making a significant impact in the field of electrical engineering, particularly in the realm of power systems. This study explores the use of ANN for fault detection and location in a power distribution line, providing valuable insights into the potential of this technology for power systems management. This research is important to investigate the use of ANN to detect and locate faults in power distribution lines to improve the efficiency and accuracy of fault detection in power systems. The problem this work aims to address is finding a more accurate and faster method for detecting and locating faults in power distribution lines. The study uses MATLAB and the Levenberg-Marquardt algorithm to design and train an ANN model using preprocessed data. The ANN model was configured with various hidden layers and neuron configurations. The study's results showed that the ANN model had a high accuracy in identifying and locating faults in the power distribution line, outperforming traditional fault detection methods in terms of accuracy and speed. The findings of this study demonstrate the potential of ANN for fault detection and location in power systems. The results suggest that further research in this area could lead to even more efficient and accurate fault detection methods, improving the management and maintenance of power systems.","PeriodicalId":177556,"journal":{"name":"2023 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129293604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Application of Synchronverter for the Enhancement of Power System Stability","authors":"Basel Taha Alkhamis, A. Al-Odienat","doi":"10.1109/JEEIT58638.2023.10185786","DOIUrl":"https://doi.org/10.1109/JEEIT58638.2023.10185786","url":null,"abstract":"This paper is aimed at investigating the impact of the virtual synchronous generator in the enhancement of power system stability. The virtual synchronous generator is built and applied to enhance the transient stability margins for the power system whenever a photo-voltaic panels are added to the system. IEEE 9-bus system is chosen for investigating the effectiveness of the proposed synchronverter control scheme. The synchronverter has been connected to a single machine infinite bus system through a 208V/ 13.8kV step up transformer. The proposed scheme is verified using MATLAB® Simulink software which is used for the simulations in this study. The results demonstrates that the synchronverter enhances the behavior of the power system in transient and steady state operation.","PeriodicalId":177556,"journal":{"name":"2023 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126998886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent Solution for Inverse Kinematic of Industrial Robotic Manipulator Based on RNN","authors":"Areej Shaar, J. Ghaeb","doi":"10.1109/JEEIT58638.2023.10185778","DOIUrl":"https://doi.org/10.1109/JEEIT58638.2023.10185778","url":null,"abstract":"The joint angles required for the robotic manipulator to execute a task in a preset location should be calculated using inverse kinematic equations. Finding these equations is important but it requires hard effort and a large time. In this work an Artificial Neural Network, more specifically, Recurrent Neural Network (RNN) is designed and trained using MATLAB such that the inverse kinematics for a robotic manipulator could be calculated. First, the Denavit-Hartenberg approach is used to derive the forward kinematics of a 6 Revolute (6R) robotic manipulator. Then, a dataset of 100000 samples is produced using the calculated homogeneous transformation matrices to train the RNN. The results are outstanding with MSE of 0.0013 and RF of 0.99 when compared to other techniques that are mentioned in the literature.","PeriodicalId":177556,"journal":{"name":"2023 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131178173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Implementation of a Malware Detection Tool Using Network Traffic Analysis in Android-based Devices","authors":"Areen Eltaher, Dania Abu-juma'a, Dania Hashem, Heba Alawneh","doi":"10.1109/JEEIT58638.2023.10185826","DOIUrl":"https://doi.org/10.1109/JEEIT58638.2023.10185826","url":null,"abstract":"Smartphone use and dependability have increased substantially in recent years, as have malicious attempts to compromise mobile devices with various malware. Therefore, smartphones must have an active malware detection program to protect user privacy. We propose Android Malware Buster (AMB), a malware detection application for Android devices. AMB utilizes a machine learning classifier to identify ongoing malicious behavior through its network traffic analysis. The machine learning model was trained on a diverse set of Adware, Scareware, and Ransomware apps. The accuracy of the AMB classifier has reached 93 %. Furthermore, AMB correctly classified the vast majority of applications during real-time testing.","PeriodicalId":177556,"journal":{"name":"2023 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131684950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hiba Al Tatar, Noura AlMaghareez, Raed Abed, Joud Alsarayra, H. Qandil, Emad Abdelsalam
{"title":"Integration of Helix Wind and Archimedes Screw Turbines for Renewable Energy Generation from Wind and Rainwater","authors":"Hiba Al Tatar, Noura AlMaghareez, Raed Abed, Joud Alsarayra, H. Qandil, Emad Abdelsalam","doi":"10.1109/JEEIT58638.2023.10185909","DOIUrl":"https://doi.org/10.1109/JEEIT58638.2023.10185909","url":null,"abstract":"The use of wind energy has grown drastically over recent years. As wind can occasionally be accompanied by rainfall and storms, the combined harvesting of wind energy and rainwater can be a viable and efficient solution. This work proposes a novel design to collect wind and water flow energy to supply an elementary school building in the Al Zaatari refugee camp in Jordan with electricity. The design integrates a helix vertical axis wind turbine (V A WT) and an Archimedes screw turbine. This work showed how to utilize the helix wind turbine to generate energy from the wind movement and how the rainwater is collected via gutters to pour into the integrated Archimedes screw water turbine and further generate more power. Results showed that the total average wind energy production per year was 12.96 MWh, and the total average energy production from rainwater was 16.35 kWh, using a 30-unit system at the school.","PeriodicalId":177556,"journal":{"name":"2023 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117254159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Compact 2 × 1 MIMO Microstrip Patch Antenna with Enhanced Gain for UWB Applications","authors":"A. Hindi, Essam Trrad, M. Dwairi","doi":"10.1109/JEEIT58638.2023.10185806","DOIUrl":"https://doi.org/10.1109/JEEIT58638.2023.10185806","url":null,"abstract":"An ultra-wideband UWB $2times 1$ MIMO antenna, based on the reference single UWB antenna, to enhance the realized peak gain is proposed. The proposed antenna is designed by a modified circular radiator constructed from a circular patch integrated with two circular shapes at 5mm from the main patch center with a radius of 5.35mm for each circle. The modified patch is fastened on the top of a FR4-epoxy substrate dielectric material and fed by a microstrip type transmission line, and partial ground, while the proposed MIMO UWB antenna is composed of two optimized patch antennas, placed 180 degrees from each other, and a 2mm distance was inserted between the grounds. The simulation results, using CST-EM software package, prove that the realized peak gain is enhanced at about 1.5 dB more than the single UWB antenna without effecting the operating UWB and the fractional BW of the MIMO antenna is about 131%. The radiation pattern of the investigated MIMO antenna also has been investigated for selected resonant frequencies. The proposed MIMO antenna covers the whole UWB range, while the antenna improves the narrow bands gain that lie within this band, such as narrow bands WLAN, WIMAX, and X-Band, which are suitable for different telecommunication applications.","PeriodicalId":177556,"journal":{"name":"2023 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT)","volume":"226 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134029525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"VulDefend: A Novel Technique based on Pattern-exploiting Training for Detecting Software Vulnerabilities Using Language Models","authors":"Marwan Omar","doi":"10.1109/JEEIT58638.2023.10185860","DOIUrl":"https://doi.org/10.1109/JEEIT58638.2023.10185860","url":null,"abstract":"The detection of vulnerabilities in source code is a critical task in software assurance. In this work, we propose a semi-supervised learning approach that leverages pattern-exploiting training and cloze-style questions. Our approach involves training a language model on the SARD and Devign datasets of code snippets with vulnerabilities, where the input is generated by masking parts of the code and asking the model to predict the masked tokens. Experimental results demonstrate that our approach can effectively detect vulnerabilities in source code, while leveraging the pattern information learned from the code snippets. This work highlights the feasibility of using pattern-exploiting training and cloze-style questions for improved performance in the detection of vulnerabilities in source code.","PeriodicalId":177556,"journal":{"name":"2023 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122650654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yazan M. Dweiri, Mohammad M. AlAjlouni, Jawdat R. Ayoub, Alaa Y. Al-Zeer, Ali H. Hejazi
{"title":"Biomimetic Grasp Control of Robotic Hands Using Deep Learning","authors":"Yazan M. Dweiri, Mohammad M. AlAjlouni, Jawdat R. Ayoub, Alaa Y. Al-Zeer, Ali H. Hejazi","doi":"10.1109/JEEIT58638.2023.10185845","DOIUrl":"https://doi.org/10.1109/JEEIT58638.2023.10185845","url":null,"abstract":"Gripping force modulation based on pressure feedback is an essential element for intuitive and natural-like control of powered limb prostheses. This paper aims to mimic human hand-gripping control in robotic arms by processing dynamic pressure maps with state-of-the-art artificial intelligence algorithms. A pressure-sensing glove was built with integrated data acquisition to learn human grip behavior when holding various objects, and then transfer the observed control pattern to control a robotic arm. The pressure readings are processed using a recurrent convolutional neural network and were able to predict the biological gripping termination with an accuracy of 84.5% for a single type of object and 77% for mixed object types. The proposed control system has proven to be a viable approach for biomimetic handling control for an intelligent robotic arm with pressure feedback.","PeriodicalId":177556,"journal":{"name":"2023 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124769006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}