Venus Wazeer Samawi

Learn More
Intrusion detection (ID) is an interesting approach that could be used to improve the security of network systems. IDS detects suspected patterns of network traffic on the remaining open parts through monitoring user activities (runtime gathering of data from system operations), and the subsequent analysis of these activities. The purpose of this work is to(More)
Text summarization is the process of creating a short description of a specified text while preserving its information context. This paper tackles Arabic text summarization problem. The semantic redundancy and insignificance will be removed from the summarized text. This can be achieved by checking the text entailment relation, and lexical cohesion.(More)
An Intrusion Detection System (IDS) is one of the widely used tools for defending computer networks. Its main goal is to classify activities into two major categories: (1) normal activities and (2) intrusive activities. Both types of activities are hard to predict as the boundaries cannot be well defined and a prediction process may generate false alarms.(More)
The use of biometric information has been known widely for both person identification and security application. Each person can be identified by the unique characteristics of one or more of person biometrics. One of the biometric characteristics of that a person can be identified by his voice. In this research, we are interested in studying the effect of(More)
Corresponding Author: Venus Wazeer Samawi Department of Computer Information Systems, Amman Arab University, Amman, Jordan Email: venus@aau.edu.jo Abstract: One of the important factors of Wireless Sensor Networks (WSNs) is sensors lifetime. Elongating sensors lifetime increases the benefits from the network capabilities as much as possible. To elongate(More)
World Wide Web (WWW) is a mine of information for most people. Due to the huge amount of ‎information and documents available on the internet, the process ‎of retrieving documents that are most relevant to user needs become a tremendous problem. In addition to ‎that, the time needed for retrieving what a user searches for ‎increases dramatically. In this(More)
  • 1