Jamil S. al-Azzeh

@bau.edu.jo

Associate Professor in Computer Engineering Department.
AL-BALQA APPLIED UNIVERSITY



                 

https://researchid.co/azzehjamil

Dr. Jamil S. Al-Azzeh received his PhD Degree in Computer Engineering from great Saint-Petersburg polytechnic university State University - Russia in 2008. Since 2008. Dr. Al-Azzeh has been an associated professor in the Computer Engineering Department. Faculty of Engineering Technology, at Al-Balqa' Applied University. His research interests include computer system architecture, parallel processing, packet switching networks, group communications, fault-tolerance, microarchitecture, programmable logic devices, image processing, and microprogramming. He is the author and a co-author of over 60 papers in international and domestic journals, and more than 20 papers in conference proceedings

azzegjamil@

EDUCATION

PhD Degree in Computer Engineering
Saint-Petersburg State University –Russia
2005-2008

RESEARCH INTERESTS

Image Processing, Computer System Architecture, Digital System, Parallel Processing Systems, Computer Networks and Microprocess

32

Scopus Publications

1426

Scholar Citations

21

Scholar h-index

37

Scholar i10-index

Scopus Publications

  • Efficiency Assessment of the Permutation-Based Frame Synchronization Method
    Jamil Samih Al-Aazzeh, Emil Faure, Mykola Makhynko, Artem Lavdanskyi, Constantine Bazilo, Abdelwadood Mesleh, and Majdi T. Oraiqat

    Praise Worthy Prize

  • Method for QOE monitoring and increasing in cellular networks based on QOE-to-QOS mapping using spline approximation
    Jamil S. Al-Azzeh, Roman Odarchenko, Anastasiia Abakumova, and Serhii Bondar

    Springer Science and Business Media LLC
    AbstractThe current level of development of the cellular services market, qualitative changes in the means and methods of providing services, and the increased volume and diversity of information circulating in cellular networks have evoked the need for service quality assessment system improvement. To maintain competitiveness, the main efforts of operators are aimed at improving quality and increasing the service life of subscribers in the network by ensuring the required level of customer satisfaction in high-quality services through a system of organizational–technical and socioeconomic measures to bring the achieved level of quality-of-service (QoS) provision in accordance with the existing, emerging, or projected needs of subscribers. To achieve improved QoS provision, a functional relationship between network parameters has been established: The impact of key performance indicators on a key quality indicator through the use of cubic Hermitian splines (CHS) has been determined. The use of splines, as a signal model, can significantly improve the quality of signal processing due to the continuity of values and partial derivatives in the joints of spline gluing. CHS are characterized by calculation simplicity, as they provide high-speed computing, which, in turn, is important for real-time work when processing large data sets. Experimentally, it was shown that the use of splines allows for the ability to calculate statistical estimates of the required parameters of spline approximations, but also their confidence intervals, which increases the accuracy and probability of further calculations and is a distinct advantage of this approach. Also, the methods of service quality management through machine learning have been improved, which are effective tools for modeling integrated indicators of communication services quality control, monitoring their condition in terms of final copies of services, determining the causes of degradation, and reporting. It monitors the service performance provided by the cellular operator. Finally, the method checks the readiness and availability of services, detects network nodes through which quality degradation occurs, collects various quality metrics, and compares them with pre-installed quality indicators.

  • A Method of Accuracy Increment Using Segmented Regression
    Jamil Al-Azzeh, Abdelwadood Mesleh, Maksym Zaliskyi, Roman Odarchenko, and Valeriyi Kuzmin

    MDPI AG
    The main purpose of mathematical model building while employing statistical data analysis is to obtain high accuracy of approximation within the range of observed data and sufficient predictive properties. One of the methods for creating mathematical models is to use the techniques of regression analysis. Regression analysis usually applies single polynomial functions of higher order as approximating curves. Such an approach provides high accuracy; however, in many cases, it does not match the geometrical structure of the observed data, which results in unsatisfactory predictive properties. Another approach is associated with the use of segmented functions as approximating curves. Such an approach has the problem of estimating the coordinates of the breakpoint between adjacent segments. This article proposes a new method for determining abscissas of the breakpoint for segmented regression, minimizing the standard deviation based on multidimensional paraboloid usage. The proposed method is explained by calculation examples obtained using statistical simulation and real data observation.

  • Multilink Solution for Seamless Transition Between Multicast and Unicast Areas in 5G Core Network
    Jamil Al-Azzeh, A. Al-Qaisi, R. Odarchenko, Ece Öztürk, V. Pauli, Waqar Zia and B. Altman



  • Permutation-based frame synchronization method for data transmission systems with short packets
    Jamil Al-Azzeh, Emil Faure, Anatoly Shcherba, and Bohdan Stupka

    Elsevier BV

  • Preface


  • Mind-wave wheelchair system
    Mazen Abu Zaher and Jamil Al Azzeh

    Praise Worthy Prize

  • A simple, accurate and highly secure method to encrypt-decrypt digital images
    Jamil Azzeh

    Politeknik Negeri Padang
    Data compression is a size reduction of data to be sent via network or to be stored on auxiliary storage for long time, thus data compression will save storage capacity, speed up file transfer, speedup data transmission by decreasing transferring time, and decrease costs for storage hardware and network bandwidth.In this paper we will invistigate Huffman and LZW methods of data compression-decompression. Different images in sizes and types will treated, compresion , decompression times will be evaluated, compression ratio will obtained, the obtaind results will be anakyzed inorder to do some judgments

  • Methods for obtaining of management decisions during evaluating the controlled parameters by qualitative categories


  • Telecommunication systems with multiple access based on data factorial coding
    Jamil Samih Al-Azzeh, Belal Ayyoub, Emil Faure, Valerii Shvydkyi, Oleksandr Kharin, and Artem Lavdanskyi

    Praise Worthy Prize
    The paper outlines methods for constructing telecommunication systems based on the principle of time division of channels and using factorial code in order to maintain the cyclic phase of receiver/transmitter and ensure information security. These systems provide integrated data protection (against errors in communication channel and attempts of unauthorized access to information), as well as the ability to allocate system resources (bandwidth) between its subscribers. The purpose of this work is to develop and research the approach of building telecommunication systems with multiple access to a common channel for collective use, based on the property of factorial codes to keep clock and frame synchronism with a working signal. The basic idea is to choose the permutations to transfer information with a single set of properties or attributes. This provides opportunities of dividing channel into subchannels, bandwidth sharing on transmission accuracy, and dividing plurality of network users into closed groups. The channel resource sharing procedure based on factorial coding is described. Examples of multiplex cycle organization and the order of occupying/releasing multiplex cycle time channels by users are given. The system load and the subchannel bandwidth are estimated.

  • Developing an expert system for assessment of information-psychological influence
    Bilal Zahran, Jamil AL-Azzeh, Andrii Gizun, Vladyslav Griga, and Bogdana Bystrova

    Institute of Advanced Engineering and Science
    <p><span style="font-size: small;"><span style="font-family: Times New Roman;"><span>Nowadays solving practical problems in various sectors using intelligent solutions, based on expert systems are becoming more and more widespread. </span><span>In this paper an expert system method is proposed for assessment and prediction of destructive influences. All disadvantages of existing assessment systems are taken into account during the development and analysis phases. The most important estimated parameters are determined. This method is based on quantitative methods of expert evaluation, which gives the advantage: there is no need to collect large amounts of statistical data and clear formalization of the current situation.</span></span></span></p>



  • Creating color image signature based on laplacian equation
    Jamil Al-Azzeh, Bilal Zahran, Ziad AlQadi, B. Ayyoub and Muhammed Mesleh


    Colour image retrieval, identification and recognition play an important role in vital computerized applications, so creating an image signature which can be used as a key to identify the image is an essential and important problem to be solved.  In this paper a new method of image signature extraction will be proposed. The proposed method will be implemented and tested and the experimental results will be compared with other method results to prove the efficiency of the proposed method by mean of creating a unique signature which will require a minimum memory space and a smaller time to extract the signature.

  • Improving the security of lsb image steganography
    Jamil Al-Azzeh, Ziad Alqadi, Belal Ayyoub, and Ahmad Sharadqh

    Politeknik Negeri Padang
    Steganography is the technique of hiding secret data (message) within any media such as digital color image. In this paper we will merge steganography process with cryptography process in order to increase the security of the proposed method. The steganography process will based on LSB method, while the cryptography process will based on generating a huge private key and selecting a special function for encryption decryption. The proposed method will be implemented in order to calculate some performance parameters to prove the efficiency of the proposed method.

  • Multi-criteria synthesis of the software-defined network structure


  • A simple, accurate and highly secure method to encrypt-decrypt digital images
    Jamil Al-Azzeh, Ziad Alqadi, and Qazem Jaber

    Politeknik Negeri Padang
     The digital image may be important and has a secret character, which requires not understanding it when looking at the naked eye or not understanding the contents. So seeking a method of digital image encryption-decryption is a very important task.In this paper we will introduce a new method of digital image encryption-decryption, which will be very simple, highly secure and accurate and highly efficient.

  • A novel based on image blocking method to encrypt-decrypt color
    Jamil Al-Azzeh, Jamil Al-Azzeh, Bilal Zahran, Ziad Alqadi, Ziad Alqadi, Belal Ayyoub, Belal Ayyoub, Muhammed Mesleh, and Muhammed Mesleh

    Politeknik Negeri Padang
    Encryption of digital color image is the process of conversion original digital color image into an encrypted one to protect the image from hacking or to prevent an authorized person to get the valuable information located in the color image. The process of color image encryption-decryption is very important issue in human activities and here in this paper we will introduce a new simple, efficient and highly secure method to be used for color image encryption-decryption. The proposed method will be tested and implemented, the efficiency parameters of the proposed method will be calculated and will be compared with other methods parameters to prove the efficiency issues of the proposed method.

  • A novel zero-error method to create a secret tag for an image


  • A modified LBP method to extract features from color images


  • Information technologies for supporting administrative activities of large organisations
    Jamil Al-Azzeh

    Defence Scientific Information and Documentation Centre
    Study describes a specified analytical method and model for the organisational management of a company. The proposed solutions allow for revealing information resources, which can be used to support management decisions adoption and control of plans. Information obtained from programs and information systems of the electronic document flow of organisations were used as data sources. The result of configuration investigation and characteristics of information exchange in information systems can be used as administrative decisions support in the organisation. The conducted research allows for improved approaches to the creation and modernisation of effective information systems of universities. The offered software of administrative activity support allows us to increase the flexibility and adaptability of existing information systems and electronic document flow (program complexes) to increase the efficiency of their operations.

  • Evaluation Method for SDN Network Effectiveness in Next Generation Cellular Networks
    Jamil Al-Azzeh, Abdelwadood Mesleh, Hu Zhengbing, Roman Odarchenko,, Sergiy Gnatyuk, and Anastasiia Abakumova

    Auricle Technologies, Pvt., Ltd.
    5G mobile technology will become the new revolution in the mobile communication market. The new networks will focus on significantly improving the quality of service. The basis for their construction will form SDN networks. Therefore, the work analyzed the advantages and disadvantages of two SDN implementing methods. It was developed mathematical method to assess their complex effectiveness, which consider QoS requirements of implementing service through special weights for scalability, performance and packet delay. There were simulations of Overlay networks by using softswitches to verify the adequacy of the proposed method. The results showed that the use of SDN networks more efficiently by using IP networks for large volumes of traffic and with a large number of network equipment. Also, there were compared the approaches to build SDN management level architecture. Based on the studies and modeling we suggested to use distributed controller architecture because of its higher level of reliability.

  • Salt and pepper noise: Effects and removal
    Jamil Azzeh, Bilal Zahran, and Ziad Alqadi

    Politeknik Negeri Padang
    Noises degrade image quality which causes information losing and unsatisfying visual effects. Salt and Pepper noise is one of the most popular noises that affect image quality. In RGB color image Salt and pepper noise changes the number of occurrences of colors combination depending on the noise ratio. Many methods have been proposed to eliminate Salt and Pepper noise from color image with minimum loss of information. In this paper we will investigate the effects of adding salt and pepper noise to RGB color image, the experimental noise ratio will be calculated and the color combination with maximum and minimum numbers of occurrence will be calculated and detected in RGB color image. In addition this paper proposed a methodology of salt and pepper noise elimination for color images using median filter providing the reconstruction of an image in order to accept result with minimum loss of information. The proposed methodology is to be implemented, tested and experimental results will be analyzed using the calculated values of RMSE and PSNR.

  • Analysis of self-similar traffic models in computer networks
    Jamil Samih Al-Azzeh, Mazin Al Hadidi, R. Odarchenko, S. Gnatyuk, Z. Shevchuk, and Zhengbing Hu

    Praise Worthy Prize
    The growth of society digitalization increases the requirements for data transmission productivity of the information telecommunication networks. Traffic in these networks is self-similar. For its modeling a number of fractal traffic imitation models were developed. However, the modern studies show that the traffic characteristics may change in the wide networks and be dependent of big number of parameters and settings of real networks, protocol and transmitted information’s characteristics, and users’ behavior. So the main aim of the paper was an investigation of modern traffic models to choose the best of them for modern computer networks with different characteristics traffic flow modeling and creation of computer models for generating self-similar traffic in MathCAD. It allows to investigate state of computer networks with different traffic flows conditions, behavior of connected network devices, queue, processing order as good for traditional computer networks and software defined networks with the help of wide-spread MathCAD software.


RECENT SCHOLAR PUBLICATIONS

  • Neural Network System for Selection of Table Tennis Equipment with Elements of Crypto Protection
    Valeriy, S Tazetdinov, O Sysoienko, J Tazetdinov, A Al-Azzeh, Mesleh
    ITEST-2024 2024

  • Neural Network System for Selection of Table Tennis Equipment with Elements of Crypto Protection
    V Tazetdinov, S Sysoienko, O Tazetdinov, J Al-Azzeh, A Mesleh
    International Scientific-Practical Conference" Information Technology for 2024

  • Efficiency Assessment of the Permutation-Based Frame Synchronization Method
    AA Jamil, F Emil, M Mykola, L Artem, B Constantine, M Abdelwadood, ...
    International Journal on Communications Antenna and Propagation. 13 (4), 24 2023

  • A method of accuracy increment using segmented regression
    J Al-Azzeh, A Mesleh, M Zaliskyi, R Odarchenko, V Kuzmin
    Algorithms 15 (10), 378 2022

  • Multilink solution for seamless transition between multicast and unicast areas in 5G core network
    JS Al-Azzeh, A Al-Qaisi, R Odarchenko, E ztrk, V Pauli, W Zia, B Altman
    Wireless Personal Communications 126 (3), 2701-2718 2022

  • Permutation-based frame synchronization method for data transmission systems with short packets
    AA Jamil, F Emil, S Anatoly, S Bohdan
    Egyptian Informatics Journal, 1-17 2022

  • Method for QOE monitoring and increasing in cellular networks based on QOE-to-QOS mapping using spline approximation
    JS Al-Azzeh, R Odarchenko, A Abakumova, S Bondar
    EURASIP Journal on Wireless Communications and Networking 2022 (1), 1-16 2022

  • Egyptian Informatics Journal
    J Al-Azzeh, E Faure, A Shcherba, B Stupka
    2022

  • Mind-Wave Wheelchair System
    M Abuzaher, J Al-Azzeh
    International Review on Modelling and Simulations 14 (1), 10 2021

  • Telecommunication Systems with Multiple Access Based on Data Factorial Coding
    AA Jamil, A Belal, F Emil, S Valerii, K Oleksandr, L Artem
    International Journal on Communications Antenna and Propagation (IRECAP) 10 2020

  • A Simple, Accurate and Highly Secure Method to Encrypt-Decrypt Digital Images
    J Azzeh, Z Alqadi, Q Jaber
    JOIV: International Journal on Informatics Visualization 4 (1), 40-44 2020

  • SMART GAS LEAK DETECTOR AND PREVENTOR WITH TEMPERATURE AND HUMIDITY COMPENSATION
    PD Skopin, DE Skopin, JA Zzeh
    МЕДИКО-ЭКОЛОГИЧЕСКИЕ ИНФОРМАЦИОННЫЕ ТЕХНОЛОГИИ-2020, 161-164 2020

  • Simple procedures to create HSCS
    JAAN Asad, Z Alqadi, I Shayeb, Q Jaber, J Al-Azzeh
    International Journal of Engineering Research and Management (IJERM) 7 (5), 6-10 2020

  • Methods for obtaining of management decisions during evaluating the controlled parameters by qualitative categories
    J Al-Azzeh, A Litvinenko, D Kucherov, I Kashkevych, Z Bagisov
    CEUR Workshop Proceedings Vol. 2654, 402-420, 2020. 2019 International 2019

  • Multi-Criteria Synthesis of the Software-Defined Network Structure
    J Ackoski
    2019

  • Improving the security of LSB image steganography
    J Al-Azzeh, Z Alqadi, B Ayyoub, A Sharadqh
    JOIV: International Journal on Informatics Visualization 3 (4), 384-387 2019

  • Developing an expert system for assessment of information-psychological influence
    B Zahran, J Al-Azzeh, A Gizun, V Griga, B Bystrova
    Indonesian Journal of Electrical Engineering and Computer Science 15 (3 2019

  • Methods for Obtaining of Management Decisions during Evaluating the Controlled Parameters by Qualitative Categories
    AA Jamil, L Alexandr, ZB Dmytro Kucherov, Ivan-Farkhod Kashkevych
    CEUR Workshop 1 (2654), 19 2019

  • A Simple, Accurate and Highly Secure Method to Encrypt-Decrypt Digital Images
    J Al-Azzeh, Z Alqadi, Q Jaber
    JOIV: International Journal on Informatics Visualization 3 (3), 262-265 2019

  • A PARALLEL PIPELINED PACKET SWITCH ARCHITECTURE FOR MESH-CONNECTED MULTIPROCESSORS WITH INDEPENDENTLY ROUTED FLITS
    ALA Jamil, A Mohammed, Z Igor
    Jordanian Journal of Computers and Information Technology 5 (2), 146-162 2019

MOST CITED SCHOLAR PUBLICATIONS

  • Salt and pepper noise: Effects and removal
    J Azzeh, B Zahran, Z Alqadi
    JOIV: International Journal on Informatics Visualization 2 (4), 252-256 2018
    Citations: 144

  • Creating a color map to be used to convert a gray image to color image
    J Al Azzeh, H Alhatamleh, ZA Alqadi, MK Abuzalata
    International Journal of Computer Applications 153 (2), 31-34 2016
    Citations: 141

  • A NOVEL ZERO-ERROR METHOD TO CREATE A SECRET TAG FOR AN IMAGE.
    J Al-Azzeh, B Zahran, Z Alqadi, B Ayyoub, M Abu-Zaher
    Journal of Theoretical & Applied Information Technology 96 (13) 2018
    Citations: 103

  • A novel based on image blocking method to encrypt-decrypt color
    J Al-Azzeh, B Zahran, Z Alqadi, B Ayyoub, M Mesleh
    JOIV: International Journal on Informatics Visualization 3 (1), 86-93 2019
    Citations: 70

  • Statistical Analysis of Methods Used to Enhanced Color Image Histogram
    J Al Azzeh, ZA Qazem, M Jabber
    XX International scientific and technical conference, 24-26 2017
    Citations: 69

  • Enhancing the Capacity of LSB Method by Introducing LSB2Z Method
    Z Alqadi, B Zahran, Q Jaber, B Ayyoub, J Al-Azzeh
    International Journal of Computer Science and Mobile Computing 8 (3), 76-90 2019
    Citations: 65

  • Modified Inverse LSB Method for Highly Secure Message Hiding
    M Abuzalata, Z Alqadi, J Al-Azzeh, Q Jaber
    International Journal of Computer Science and Mobile Computing 8 (2), 93-103 2019
    Citations: 62

  • A MODIFIED LBP METHOD TO EXTRACT FEATURES FROM COLOR IMAGES.
    B Zahran, J Al-Azzeh, Z Alqadi, MA AL-ZOGHOUL, S Khawatreh
    Journal of Theoretical & Applied Information Technology 96 (10) 2018
    Citations: 55

  • Performance analysis of artificial neural networks used for color image recognition and retrieving
    J Al-Azzeh, Z Alqadi, M Abuzalata
    international Journal of Computer Science and Mobile computing 8 (2), 20-33 2019
    Citations: 43

  • Comparative Analysis of Color Image Encryption-Decryption Methods Based on Matrix Manipulation
    RJ Rasras, M Abuzalata, Z Alqadi, J Al-Azzeh, Q Jaber
    International Journal of Computer Science and Mobile Computing 8 (3), 14-26 2019
    Citations: 39

  • Analysis of self-similar traffic models in computer networks
    JS Al-Azzeh, M Al Hadidi, R Odarchenko, S Gnatyuk, Z Shevchuk, Z Hu
    networks 1, 24 2017
    Citations: 39

  • Adaptation of matlab K-means clustering function to create Color Image Features
    ASJ Al-Azzeh, R Rasras, Z Alqadi, B Ayyoub, A Sharadqh
    International Journal of Research in Advanced Engineering and Technology 5 2019
    Citations: 31

  • Adaptive Regulation of Radiated Power Radio Transmitting Devices in Modern Cellular Network Depending on Climatic Conditions
    AA Mazin Al Hadidi,Jamil S. Al-Azzeh,R. Odarchenko,Sergiy Gnatyuk
    Contemporary Engineering Sciences 9 (10), 473-485 2016
    Citations: 31

  • Proposed Implementation Method to Improve LSB Efficiency
    Z Alqadi, B Zahran, Q Jaber, B Ayyoub, J Al-Azzeh, A Sharadqh
    International Journal of Computer Science and Mobile Computing 8 (3), 306-319 2019
    Citations: 30

  • A method of accuracy increment using segmented regression
    J Al-Azzeh, A Mesleh, M Zaliskyi, R Odarchenko, V Kuzmin
    Algorithms 15 (10), 378 2022
    Citations: 29

  • Experimental investigation of method used to remove salt and pepper noise from digital color image
    JAA Sharadqh, B Ayyoub, Z Alqadi, J Al-azzeh
    International Journal of Research in Advanced Engineering and Technology 5 2019
    Citations: 27

  • JPEG based compression algorithm
    M Abuzaher, ALA Jamil
    International Journal of Engineering and Applied Sciences 4 (4), 257481 2017
    Citations: 27

  • An optical character recognition
    A Mesleh, A Sharadqh, ...
    Contemporary Engineering Sciences, 521-529 2012
    Citations: 26

  • A Simple, Accurate and Highly Secure Method to Encrypt-Decrypt Digital Images
    J Al-Azzeh, Z Alqadi, Q Jaber
    JOIV: International Journal on Informatics Visualization 3 (3), 262-265 2019
    Citations: 24

  • A highly secure method of secret message encoding
    Z Alqadi, A Sharadqh, N Asad, I Shayeb, J Al-Azzeh, B Ayyoub
    International Journal of Research in Advanced Engineering and Technology 5 2019
    Citations: 23

Publications

1. Jamil S. Al-Azzeh: Fault-Tolerant Routing in Mesh-Connected Multicomputers based on Majority-Operator-Produced Transfer Direction Identifiers; Jordan Journal of Electrical Engineering Volume 3, Number 2, April 2017.
2. Mazin al hadidi, ,Jamil s. Al-azzeh, oleg p. Tkalich,roman s. Odarchenko,sergiy o. Gnatyuk and yulia ye. Khokhlachova2: Zigbee, Bluetooth And Wi-Fi Complex Wireless Networks Performance Increasing; International Journal On Communications Antenna And Propagation, vol 7 No 1 February 2017. (SJR indicator = 0.620).
3. Jamil Al Azzeh, Daniel Monday Afodigbokwu, Denis Olegovich Bobyntsev, Igor Valerievich Zotov: Implementing Built-In Test in Analog and Mixed-Signal Embedded-Core-Based System-On-Chips; Asian Journal of Information Technology, Medwell Journals ,2016. (SJR indicator = 0.11).
4. Jamil Al Azzeh, Hussein Alhatamleh, Ziad A. Alqadi, Mohammad Khalil Abuzalata : Creating a Color Map to be used to Convert a Gray Image to Color Image; International Journal of Computer Applications (0975 – 8887).Volume 153 – No2, November 2016.
5. Jamil Al-Azzeh :Analysis of Second Order Differential Equation Coefficients Effects on PID Parameters International Journal on Numerical and Analytical Methods in Engineering (IRENA) Vol 4,No 2 2016.
6. Dmitriy Skopin and Jamil Al-Azzeh; Automated Demodulation of Amplitude Modulated Multichannel Signals with Unknown Parameters Using 3D Spectrum Representation Research Journal of Applied Sciences, Engineering and Technology, Maxwel