Title | Authors |
A Cloud-IoT Health Monitoring System Based on Smart Agent for Cardiovascular Patients
| Maroua Ahmid;Okba Kazar |
Data an Overview of Cybersecurity Threats on Credit Card Companies and Credit Card Risk Mitigation
| Fajer Almudaires;Mohammed Almaiah |
Short Videos, or Long Videos? A Study on the Ideal Video Length in Online Learning
| Ahmad Manasrah;Mohammad Masoud;Yousef Jaradat |
A Survey on SQL Injection Attack: Detection and Challenges
| Zain Marashdeh;Khaled Suwais;Mohammad Alia |
Tubes in the Euclidean 3-Space With Coordinate Finite Type Gauss Map
| Hassan Al-Zoubi;Tareq Hamadneh;Hamza Alzaareer;Mutaz Al-Sabbagh |
On Fixed Points Results in b-Multiplicative Metric Spaces Having Simulation Function
| Haitham Qawaqneh;Mohd Salmi Noorani;Habes Alsamir |
Estimating Lung Capacity in Pulmonary Fibrosis Patients via Computerized Tomography (CT) Scan Data and Machine Learning
| Mark E. Earle;Mahmood Al-Khassaweneh |
On the Edge and Cloud: Recommendation Systems with Distributed Machine Learning
| Trung T. Nguyen |
A Genetic Programming Based Polutant Concentration Predictor Desing for Urban Pollution Monitoring Based on Multi-Sensor Electronic Nose
| Davut Ari;Baris Baykant Alagoz |
Cybersecurity in Smart City: A Systematic Mapping Study
| Maryam Alamer;Mohammed Amin Almaiah |
Optimal Coverage and Bandwidth-Aware Transmission Planning for Augmented Reality/Virtual Reality
| Mobasshir Mahbub;Bobby Barua |
Recent Intelligent Approaches for Managing and Optimizing Smart Blood Donation Process
| Shadi AlZu’bi;Darah Aqel;Ala Mughaid |
CNN-Based Transfer Learning for Covid-19 Diagnosis
| Zanear Sh. Ahmed;Nigar M. Shafiq Surameery;Rasber Dh. Rashid;Shadman Q. Salih;Hawre Kh. Abdulla |
Internal DoS Attack Detection and Prevention in Fog Computing
| Asad Ullah;Syed Irfan Ullah;Abdul Salam |
Design and Implementation of Efficient Electric Vehicle with Clean Energy
| Md. Nazmul Alam;Abu Shufian;Riadul Islam;Md. Asraful Islam;S.M. Minhazur Rahman;Minul Khan Rahat |
Recent Quality Models in BigData Applications
| Waleed Hattawi;Sameeh Shaban;Aon Al Shawabkah;Shadi Alzu’bi |
Mobile App Development Through Designing Structural Visual Method for Effective Learning Foreign Language
| Imad H. Tahini;Alex K. Dadykin |
Deep CNN Model Based on VGG16 for Breast Cancer Classification
| Dheeb Albashish;Rizik Al-Sayyed;Azizi Abdullah;Mohammad Hashem Ryalat;Nedaa Ahmad Almansour |
Privacy and Security Issues in Cloud Computing: A Survey Paper
| Doaa M. Bamasoud;Atheer Salem Al-Dossary;Nouf Mubarak Al-Harthy;Rudaina Abdullah Al-Shomrany;Ghaida Saeed Alghamdi;Rawan Othman Algahmdi |
On the 0-1 Test for Chaos Applied to the Generalized Fractional-Order Arnold Map
| Adel Ouannas;Iqbal M. Batiha;Amina-Aicha Khennaoui;Iqbal H. Jebril |
Predicting Different Types of Imbalanced Intrusion Activities Based on a Multi-Stage Deep Learning Approach
| Raneem Qaddoura;Ala’ M. Al-Zoubi;Iman Almomani;Hossam Faris |
Business Intelligence Model to Analyze Social Network Advertising
| Mohammad Hamad Allaymoun;Omer Awad Hag Hamid |
Improvement of personal loans granting methods in banks using machine learning methods and approaches in Palestine
| Mohammad J. Hamayel;Mobarak A. Abu Mohsen;Mohammed Moreb |
Development of Security Starting System for Vehicles Based on IoT
| Tuyisenge Jean Claude;Ishimwe Viviane;Iradukunda Jean Paul;Mukanyiligira Didacienne |
Cyber Security Threats in Cloud: Literature Review
| Roaa Al Nafea;Mohammed Amin Almaiah |
Evaluation of Information Security Awareness Among Palestinian Learners
| Yaman Salem;Mohammed Moreb;Khalid S. Rabayah |
Arabic Text Categorization: A Comparison Survey
| Tarek Kanan;Amani AbedAlghafer;Ghassan G. Kanaan;Riyad AlShalabi;Mohammed Elbes;Shadi AlZubi |
User Centric Explanations: A Breakthrough for Explainable Models
| Ali Hassan;Mansoor Abdullateef Abdulgabber Abdulhak;Riza Bin Sulaiman;Hasan Kahtan |
A Text Search Algorithm in Compressed Text
| Majed AbuSafiya |
An Optimal Data Entry Method, Using Web Scraping and Text Recognition
| Roopesh N;Akarsh M S;C. Narendra Babu |
A Comprehensive Performance Empirical Study of the Symmetric Algorithms: AES, 3DES, Blowfish and Twofish
| Hasan Dibas;Khair Eddin Sabri |
Diabetic Retinopathy Detection Using Ensemble Machine Learning
| Israa Odeh;Mouhammd Alkasassbeh;Mohammad Alauthman |
Accident Mitigation System With Drowsiness Detection: A Machine Learning and Iot With Hybrid Approach
| Ms. Suhail Razeeth;Rkar. Kariapper;S. Sabraz Nawaz |
An Overview of Cybersecurity, Data Size and Cloud Computing in light of Saudi Arabia 2030 Vision
| Fajer Almudaires;M.M Hafizur Rahman;Motaz Almudaires |
Capability of a Recurrent Deep Neural Network Optimized by Swarm Intelligence Techniques to Predict Exceedances of Airborne Pollution (PMx) in Largely Populated Areas
| Gerardo Javier Kuri-Monge;Marco Antonio Aceves-Fernández;Julio Alberto Ramírez-Montañez;Jesús Carlos Pedraza-Ortega |
An Analysis on Abrupt Fall of Indian Stock Markets
| Sadhvi Mehra;Sumedha Seniaray |
Finite groups whose every p-subgroup is nearly S-permutably Embedded
| Khaled Mustafa Aljamal;Ahmad Termimi Ab Ghani;Khaled A. Al-Sharo |
Modeling Daily Financial Market Data by Using Tree-Based Genetic Programming
| Davut Ari;Baris Baykant Alagoz |
Illicit Accounts Detection Over the Ethereum Blockchain Using Machine Learning
| Rahmeh Fawaz Ibrahim;Aseel Mohammad Elian;Mohammed Ababneh |
A Novel Recommender System Using Interest Extracting Agents and User Feedback
| Bilal Hawashin;Ayman Mansour;Farshad Fotouhi;Shadi AlZu’bi;Tarek Kanan |
Swarm of Drones Using LoRa Flying Ad-Hoc Network
| Qazawat Zirak;Dmitriy Shashev;Stanislav Shidlovskiy |
A Computational Intelligent Analysis Scheme for Optimal Engine Behavior by Using Artificial Neural Network Learning Models and Harris Hawk Optimization
| Ozlem Imik Simsek;Baris Baykant Alagoz |
Cyber Security in Mobile Apps and User CIA
| Layth Abu Arram;Mohammed Moreb |
Properties of Conformable Fractional Rayleigh Probability Distribution
| Ma’mon Abu Hammad;Iqbal Jebril;Duha AbuJudeh;Yousef Dalahmeh;Siham Ali Abrikah |
Designing a Marker Set for Vertical Tangible User Interfaces
| Geoffrey Attard;Clifford De Raffaele;Serengul Smith |
UML Representation of Object-Oriented Design Antipatterns
| Lidiya S. Ivanova;Danila A. Sokolov;Oleg A. Zmeev |
Recent Advances on UAV and Deep Learning for Early Crop Diseases Identification: A Short Review
| Abdelmalek Bouguettaya;Hafed Zarzour;Ahmed Kechida;Amine Mohammed Taberkit |
Emotion Recognition using Electroencephalography in Response to High Dynamic Range Videos
| Majid Riaz;Muhammad Majid;Junaid Mir |
Auditing Linux Operating System With Center of Internet Security (CIS) Standard
| Wadlkur Kurniawan Sedano;Muhammad Salman |
Blockchain Technology for Preventing Counterfeit in Health Insurance
| Baker Alhasan;Mohammad Qatawneh;Wesam Almobaideen |
Unified Theory of Acceptance and Use of Technology (UTAUT) LEGO Sets in Education
| Abeer Abusobaih;Martin Havranek;Mansoor Abdullateef Abdulgabber |
Impact of Infertility Factors on IVF Success Rate Using Fuzzy Inference System
| Ayman M Mansour;Mohammad A Obeidat |
Water Preservation Using IoT: A Proposed IoT System for Detecting Water Pipeline Leakage
| Ahmad Abusukhon;Fadel Altamimi |
Survey of Denoising Methods for Inertial Sensor Measurements
| Moutayam Khaddour;Stanislav Shidlovskiy;Dmitriy Shashev;Mainak Mondal |
Cybersecurity in Healthcare Industry
| Khadija Abu Ali;Sarah Alyounis |
A Survey of Blockchain Technology in Used Vehicles Market
| Sara El-Switi;Mohammad Qatawneh |
Lightweight Encryption for Multimedia in the Internet of thing(iot)
| Mohammad Shadeed;Mohammed Moreb |
Using YOLOv5 Algorithm to Detect and Recognize American Sign Language
| Tasnim Ferdous Dima;Md. Eleas Ahmed |
Gender Recognition Using EEG During Mobile Game Play
| Bushra Fatima;Aasim Raheel;Aamir Arsalan;Muhammad Majid;Muhammad Ehatisham-Ul-Haq;Syed Muhammad Anwar |
Slant Toeplitz Like Operators on the Lebesgue Space of the Torus
| Amani Shatarah |
Conformable Fractional of Euler Type Equation
| Amer Dababneh;Ma’mon Abu Hammad;Amjed Zreqat;Bilal Albarmawi;Siham Ali Abrikah |
On the Effectiveness of Using Wavelet-Based LBP Features for Melanoma Recognition in Dermoscopic Images
| Fatimah Shamsulddin Abdulsattar |
Comparative Study of Machine Learning Algorithms for Classification of Cardiovascular Disease Data
| Wada Mohammed Jinjri;Pantea Keikhosrokiani;Nasuha Lee Abdullah |
a Survey of Human Face Recognition for Partial Face View
| Samia A. Abushanap;Ayman M. Abdalla;Abdelfatah A. Tamimi;Shadi Alzu’bi |
Empirical Study of Most Popular PHP Framework
| Hamza Abutaleb;Abdelfatah Tamimi;Thamer Alrawashdeh |
Pubic Cloud Computing: Big Three Vendors
| Ahmad Alkhatib;Abeer Al Sabbagh;Randa Maraqa |
Bangladeshi Indigenous Fish Classification Using Convolutional Neural Networks
| Krishno Dey;Md. Mustahid Hassan;Md. Masud Rana;Mst. Hasna Hena |
Parameter Tuning of MLP, RBF, and ANFIS Models Using Genetic Algorithm in Modeling and Classification Applications
| Sam Ansari;Khawla A. Alnajjar;Saeed Abdallah;Mohamed Saad;Ali A. El-Moursy |
A Systematic Literature Review of Software Defined Optical Network for Cloud Computing
| Fajer Almudaires;M. M Hafizur Rahman;Motaz Almudaires |
Localizing and Tracking a Mobile Rouge Access Point
| Lilas Qawasmeh;Fahed Awad |
Improving Monitoring Greenhouse System using Smart wireless Sensors Actuators Networ
| Ali Al-Dahoud;Mohamed Fezari |
Modeling the Factors That Influence Digital Economy Services Acceptance
| Ahmad Althunibat;Basem Alokush;Raneem Dawood;Saeed M. Z. A. Tarabieh;Ignácio Gil-Pechuan |
Fuzzy PID Based Autonomous UAV Design for Railway Tracking
| Emre Güçlü;İlhan Aydın;Erhan Akın |
Software Requirements Classification Using Machine Learning Algorithm's
| Gaith Y Quba;Hadeel Al Qaisi;Ahmad Althunibat;Shadi AlZu’bi |
Reinforcement Learning Approach for Disassembly Line Balancing Problem
| Suleyman Mete;Faruk Serin |
A Feature Selection Algorithm for Intrusion Detection System Based on Moth Flame Optimization
| Arar Al Tawil;Khair Eddin Sabri |
Cybersecurity Concerns in Smart-Phones and Applications: A Survey
| Maryam Abdulaziz Saad Bubukayr;Mohammed Amin Almaiah |
Let's Learn With a Jigsaw! Implementing a Unique Collaborative Online Learning in an Engineering Course
| Shahnaz Alkhalil;Ahmad Manasrah;Mohammad Masoud |
Investigating the Operational Dynamics of Different Transportation Modes in Vehicular Networks
| Elmer R. Magsino |
Network Intrusion Detection on the IoT Edge Using Adversarial Autoencoders
| Fadi Aloul;Imran Zualkernan;Nada Abdalgawad;Lana Hussain;Dara Sakhnini |
Reducing Counterfeit Drugs With Blockchains: A Survey
| Abdullah Quzmar;Mohammad Qatawneh;Sarah Al-Maaitah |
Almost, Weakly and Nearly L-closed topological spaces
| Eman Almuhur;Manal Al-labadi;Amani Shatarah;Sarah Khamis;Nosaiba Omar |
A Speculative Execution Framework for Big Data Processing Systems
| Samar A. Said;M. Saad El-Sayed;Sameh A. Salem;Shahira M. Habashy |
Semi-Automated Classification of Arabic User Requirements Into Functional and Non-Functional Requirements Using NLP Tools
| Karmel Shehadeh;Nabil Arman;Faisal Khamayseh |
An Intelligent Arabic Chatbot System Proposed Framework
| Nagham A. Al-Madi;Khulood Abu Maria;Mohammad Azmi Al-Madi;Mohammad Ahmad Alia;Eman Abu Maria |
An Interpretable Catboost Model to Predict the Power of Combined Cycle Power Plants
| Rafat Ashraf Joy |
On preimages of the quasi-treed HNN groups
| Khaled Mustafa Aljamal;Ahmad Termimi Ab Ghani;Rasheed Mahmood Saleh |
The Relationship Between Liquidity Risk And Profitability In The Commercial Banks Listed In Amman Stock Exchange
| Abdul Razzak Alshehadeh |
K-Means Clustering-Based Market Basket Analysis: U.K. Online E-Commerce Retailer
| Tristan Lim |
Fixed point of ϱ — ℨ - contraction type mapping in b-metric like spaces
| Habes Alsamir;Haitham Qawaqneh;Hassen Aydi;Wasfi Shatanawi |
Text-independent Speaker Recognition using Deep Neural Networks
| Seham Nasr;Muhannad Quwaider;Rizwan Qureshi |
A Comparison Between Machine Learning Researches That Use Arabic Text: A Case Study of Social Media Datasets
| Tarek Kanan;Woruod Rathi;Bilal Hawashin |
IoT Based Intelligent Computer-Aided Diagnosis and Decision Making System for Health Care
| Channabasava Chola;Md Belal Bin Heyat;Faijan Akhtar;Omar Al Shorman;Bibal Benifa J V;Abdulla Yahya Mohammed Muaad;Mahmoud Masadeh;Fahad Alkahatni |
Mental Models Review for Security and Privacy Policy: An Approach
| Auwal Shehu Ali;Zarul Fitri Zaaba |
Intelligent Security in the Era of AI: The Key Vulnerability of RC4 Algorithm Property
| Ala’ Mughaid;Ahmed Al-Arjan;Mohammad Rasmi;Shadi AlZu’bi |
The Measurements for Optimal Small Cell Base Station Positioning Considering 5G Cellular Network
| Mobasshir Mahbub;Bobby Barua |
Cybersecurity Threats in Line With Awareness in Saudi Arabia
| Shaima Salah Alhashim;M M Hafizur Rahman |
On the Appropriate Methodologies for Data Science Projects
| Amin Karimi Dastgerdi;Taghi Javdani Gandomani |
Current Trends and Approaches in Synonyms Extraction: Potential Adaptation to Arabic
| Eman Naser-Karajah;Nabil Arman;Mustafa Jarrar |
Trigger Support Based on Discrete Cosine Transform for a Detection of Very Inclined Showers in Water Cherenkov Detectors
| Zbigniew Szadkowski;Krzysztof Pytel |
Modeling Individual’s Instinctive Reaction Against Dangerous Source when the Occurrence of Unexpected Contact
| Mohammed Mahmod Shuaib;Osama Moh’d Alia |
Prediction of Covid-19 Patients States Using Data Mining Techniques
| Tibra Alsmadi;Nour Alqudah;Hassan Najadat |
Implementation of Software Product Line With .Net
| Shafya Abdullah Alshahrani;Doaa M. Bamasoud |
Generic Proactive IoT Cybercrime Evidence Analysis Model for Digital Forensics
| Mohammad Rasmi Al-Mousa |
Empirical Investigation of the Impact of the Adapter Design Pattern on Software Maintainability
| Mohammed Ghazi Al-Obeidallah;Dimah Ghaleb Al-Fraihat;Ahmad Mohammad Khasawneh;Ashraf Mousa Saleh;Hayfa Addous |
ROAD TRAFFIC Management SOLUTIONS
| Ahmad AA Alkhatib;Zeyad Mohammad;Eman Abu Maria |
Transfer Learning in Data Fusion at Autonomous Driving
| Iyad H. Ghaith;Aseel Rawashdeh;Shadi Al Zubi |
Leveraging the Power of Machine Learning for Performance Evaluation Prediction in Wireless Sensor Networks
| Siham Zroug;Ikram Remadna;Laid Kahloul;Saber Benharzallah;Sadek Labib Terrissa |
Revisiting Knowledge Transfer for Success Enterprise System Project
| Jamal Hussien;Mansoor Abdullateef;Hasan Kahtan;Riza Sulaiman |
Realtime Person Identification Using Ear Biometrics
| Shahadat Hossain; Shamim Akhter |
Industry Standards and Standardization: An Expert Survey on Opportunities and Challenges
| Girish Chandra;Arunabha Mukhopadhayay |
A Conceptual Framework for Representing Business Functions and Their Role in the Quality of E-Banking Services
| Hani AlNaaji;Abdallah Qusef |
A Survey of Image Encryption Algorithms
| Qasem H. Makki;Ayman M. Abdalla;Abdelfatah A. Tamimi |
Applying Test Driven Development in the Big Data Domain - Lessons From the Literature
| Daniel Staegemann;Matthias Volk;Erik Lautenschläger;Matthias Pohl;Mohammad Abdallah;Klaus Turowski |
Remotely Controlled Smart Home System Using GSM and IOT
| Mohammad A Obeidat;Ayman M Mansour;Tareq Hamadneh;Jalal Abdullah |
Eigenvalues of Self Complementary and Compound Magic Squares With an Application in Image Cryptography
| Saleem Al-Ashhab;Majdi Al-qdah |
Management of Shared Customers Through Pool Collaboration in Last-Mile Transportation
| Amina Antit;Safa Bhar Layeb;Amal Jaoua;Chefi Triki |
A Tutorial on Singular Value Decomposition With Applications on Image Compression and Dimensionality Reduction
| Yousef Jaradat;Mohammad Masoud;Ismael Jannoud;Ahmad Manasrah;Mohammad Alia |
Big Data, Classification, Clustering and Generate Rules: An Inevitably Intertwined for Prediction
| Wael Alzyadat;Aysh AlHroob;Ikhlas Hassan Almukahel;Mohammad Muhairat;Mohammad Abdallah;Ahmad Althunibat |
E-Voting System Based on Blockchain Technology: A Survey
| Sarah Al-Maaitah;Mohammad Qatawneh;Abdullah Quzmar |
Extension of a Method for Solving Nonlinear Evolution Equations via Conformable Fractional Approach
| Zoubir Dahmani;Ahmed Anber;Yazid Gouari;Mohamed Kaid;Iqbal Jebril |
Detecting Flaws on Railways Using Semantic Segmentation
| Mehmet Sevi;İlhan Aydın |
Comparison between proposed Convolutional Neural Network and KNN For Finger Vein and Palm Print
| Hiba Wasmi;Mustafa Al-Rifaee;Ahmad Thunibat;Bassam Al-Mahadeen |
Additional New Logical Identities Related to Propositional Logic
| Nesreen A. Hamad;Maher Nabulsi |
Performance Improvement of Heart Disease Prediction by Identifying Optimal Feature Sets Using Feature Selection Technique
| Asif Newaz;Sabiq Muhtadi |
Resolution Representation Based Person Re-Identification for Smart Cities Using Deep Neural Networks (DNNs)
| Jawad Qammar;Waqar Ahmad |
Cybersecurity in Industrial Control Systems (ICS)
| Motaz AlMedires;Mohammed AlMaiah |
Anomaly-Based Intrusion Detection System Using Fuzzy Logic
| Mohammad Almseidin;Jamil Al-Sawwa;Mouhammd Alkasassbeh |
Cryptanalysis of a Tightly-Secure Authenticated Key Exchange Without NAXOS Approach Based on Decision Linear Problem
| Zeyad Mohammad;Ahmad AA Alkhatib;Mohammed Lafi;Ahmad Abusukhon;Dheeb Albashish;Jaffar Atwanhxu6+ bz bn |
The Impact of the Digital Transformation on Customer Experience in Palestine Banks
| Firas Abuhasan;Mohammed Moreb |
An Efficient Approach for Secure Data Outsourcing Using Hybrid Data Partitioning
| Sultan Badran;Nabil Arman;Mousa Farajallah |
identical Chua’s circuits application using hybrid dislocated synchronization scheme
| Ramzi B. Albadarneh;Adel Ouanna;Iqbal M. Batiha |
Passive Object-Based Video Authentication Using Stereo Statistical Descriptor on Wavelet Decomposition
| Manar Abduljabbar Mizher;Mei Choo Ang;Siti Norul Huda Sheikh Abdullah;Kok Weng Ng;Ahmad A. Mazhar;Manal Abd-Aljabbar Mizher |
Mathematical Model of Scheduler With Semi-Markov Input and Bandwidth Sharing Discipline
| Anatoly Nazarov;Alexander Moiseev;Ivan Lapatin;Svetlana Paul;Olga Lizyura;Pavel Pristupa;Xi Peng;Li Chen;Bo Bai |
Machine Learning and Data Mining in Cybersecurty
| Farhan Abdel-Fattah;Fadel AlTamimi;Khalid A. Farhan |
Non-GNSS Navigation Systems in Aerial Vehicles (Multi-Rotors)
| Mainak Mondal;Stanislav Shidlovskiy;Dmitriy Shashev;Moutayam Khaddour |
The Quotient Homotopy Analysis Method for Solving Nonlinear Initial Value Problems
| Jamal Oudetallah;Ghenaiet Bahia;Adel Ouannas;Iqbal M. Batiha |
COVID-19 Diagnosis From Chest X-Ray Images Using Convolutional Neural Network(CNN) and InceptionV3
| Nazmus Shakib Shadin;Silvia Sanjana;Nusrat Jahan Lisa |
An Integrated Analytical Approach to Mathematical Modelling the Stochastic Behaviour of Software Debugging Phenomenon
| ‘Mohd Taib’ Shatnawi;Omar Shatnawi |
May I Know Your IBAN? Cracking the Short Message Service (SMS) as a Second Factor Authentication for Online Payments
| Mohamamd Z. Masoud;Yousef Jaradat;Ahamad Manasrah;Ismael Jannoud;Mohammad Alia |
Independence Number and Covering Vertex Number of Γ(R(+)M))
| Manal Al-Labadi;Eman Mohammad Almuhur;Anwar Alboustanji |
Design and Development of an ASP.NET Based ITM Data Center to Support Open Data
| Md. Rahatur Rahman;Md. Abdullah Al Forhad;Salah U. Ahmed;Shamim Akhter |
Usable Tourism Application: Malaysia Attraction Travel Application (MATA)
| Cheong Suk Fun;Zarul Fitri Zaaba;Auwal Shehu Ali |
An Intelligent Prototype for Requirements Validation Process Using Machine Learning Algorithms
| Hadeel Al Qaisi;Gaith Y Quba;Ahmad Althunibat;Ayman Abdallah;Shadi Alzu’bi |
The Effect of Using Cyber Hunt Strategy on Developing the Mathematical Academic Achievement for Jordanian Universities Students
| Haitham Qawaqneh;Fadi Bani Ahmad;Amjed Zraiqat |
A CNN Approach for Skin Cancer Classification
| William O'Keefe;Boubacar Ide;Mahmood Al-Khassaweneh;Osama Abuomar;Piotr Szczurek |
Automated Test Cases Generation From Requirements Specification
| Mohammed Lafi;Thamer Alrawashed;Ahmad Munir Hammad |
IoT Based Intelligent Information-Analytical System Architecture for Water Tank Monitoring
| Viktor Zhukovskyy;Damon Printz;Nataliia Zhukovska;Maksym Hubach;Hesham Rajab |
Graph Traversal-based Solutions for Trip Planning in Public Transportation Graph
| Faruk Serin;Suleyman Mete;Eren Ozceylan |
Properties of Conformable Fractional Gamma With Two Parameters Probability Distribution
| Iqbal Jebril;Ma’mon Abu Hammad;Eman Nouh;Rahaf Hamidi;Yousef Dalahmeh;Salemah Almutlak |
A Survey on Malware Detection Techniques
| Tibra Alsmadi;Nour Alqudah |
Data Strategy and Its Impact on Open Government Data Quality
| Hania Al Omari;Sawsan Barham;Abdallah Qusef |
Optimization of Path Selection and Code-Coverage in Regression Testing Using Dragonfly Algorithm
| Sultan M. Al Khatib |
Novel Control Law for the Fractional-Order Chaotic Duffing Map
| Adel Ouannas;Iqbal M. Batiha;Amina-Aicha Khennaoui;Amjed Zraiqat;Abeer A. Al-Nana |
Light Fidelity to Transfer Secure Data Using Cryptograhy
| Wassan S. Aldolimi;Adnan A. Hnaif;Mohammad A. Alia |
Machine Learning Classifiers for Network Intrusion Detection System: Comparative Study
| Omar Almomani;Mohammed Amin Almaiah;Adeeb Alsaaidah;Sami Smadi;Adel Hamdan Mohammad;Ahmad Althunibat |
Applying the Reconfigurable Computing Environment Concept to the Deep Neural Network Accelerators Development
| Vladislav Shatravin;Dmitriy Shashev;Stanislav Shidlovskiy |
Tor Detection Using a Machine Learning Approach Using Correlation Based Feature Selection With Best First and Random Forest
| Malak Hamad Al-Mashagbeh;Mohammad Ababneh |
Predicting Accounts Receivable With Machine Learning: A Case in Malaysia
| Thangeswariy a-p Ramanei;Nasuha Lee Abdullah;Pang Tong Khim |
Deep Learning Weather Forecasting Techniques: Literature Survey
| Ayman M. Abdalla;Iyad H. Ghaith;Abdelfatah A. Tamimi |
On the Security of the Standardized MQV Protocol and Its Based Evolution Protocols
| Zeyad Mohammad;Vincent Nyangaresi;Ahmad Abusukhon |
Computer Vision Based Skin Disorder Recognition Using EfficientNet: A Transfer Learning Approach
| Rashidul Hasan Hridoy;Fatema Akter;Aniruddha Rakshit |
Using Prefix Reversals to Looplessly Generate O(1)Time Multiset Permutation by Boustrophedon Linked List
| Eleas Ahmed;Tasnim Ferdous Dima |
Design of a Navigation System Based on Scene Matching and Software in the Loop Simulation
| Ayham Shahoud;Dmitriy Shashev;Stanislav Shidlovskiy |
Blind Quality Assessment of Super-Resolution Images Using Relative Gradient Statistics of Salient and Non-Salient Objects
| Malik Waqar Aziz;Imran Fareed Nizami;Muhammad Majid |
Assessing the Usability of Hajj and Umrah Websites
| Mohd Khaled Yousef Shambour |
A Big Data Maturity Model for Electronic Health Records in Hospitals
| Rania Daraghmeh;Raymond Brown |
On the Growth Analysis of Meromorphic Functions Solutions Offinite Logarithmic Order of Linear Difference Equation the Unit Disc
| Iqbal H. Jebril;Nityagopal Biswas;Sanjib Kumar Datta |
A Computer Vision Based Food Recognition Approach for Controlling Inflammation to Enhance Quality of Life of Psoriasis Patients
| Rashidul Hasan Hridoy;Fatema Akter;Md. Mahfuzullah;Faria Ferdowsy |
Daily Forecasting of Demand Orders With Optimal Architecture Artificial Neural Network Learning Models
| Ozlem Imik Simsek;Baris Baykant Alagoz |
A n E learning Portal Quality Model from Al Zaytoonah University Students’ Perspective
| Mohammad Abdallah;Khalid Mohammad Jaber;Mousa Salah;Mohammad Abdul Jawad;Naji AlQbailat;Ayman Abdalla |
Emotion recognition in response to haptic enhanced multimedia using EEG
| Shams-Ul-Haq;Aasim Raheel;Muhammad Majid |
Intelligent Distribution for COVID-19 Vaccine Based on Economical Impacts
| Shadi AlZu’bi;Qasem H Makki;Yazan Abdul Ghani;Hussein Ali |
Diabetes Detection Using Machine Learning Classification Methods
| Nour Abdulhadi;Amjed Al-Mousa |
Comparing the Behaviors of Various Transportation Modes in Vehicular Social Networks
| Elmer R. Magsino |
Prospective Elementary Teachers' Experience With Geogebra on the Area of a Triangle
| Zetra Hainul Putra;Neni Hermita;Jesi Alexander Alim;Gustimal Witri |
Finding the Safest Path: The Case of Yemen
| Mahmood Alzubaidi;Dena A. Al-Thani |