Title | Authors |
Improving Energy Consumption in Content-Addressable Memory Through Precomputation
| Hanaa Alrushood;Sa'ed Abed;Asmaa Alabdulhadi |
A Survey: Threat Hunting for the OT Systems
| Ashraf Abzakh;Ahmad AA Alkhatib;Omar Rabayah;Shorouq Elmanaseer;Rand N Albustanji;Nagham Almadi |
The Effectiveness of Nearpod in Developing Online Interactive Lesson Design Skills for Mathematics and Computer Teachers
| Fadi B Ahmad;Haitham Qawaqneh;Amied Zraiqat;Sabah Jamil Al Nawaiseh |
A Proposed Technique for Business Process Modeling Diagram Using Natural Language Processing
| Shorouq Elmanaseer;Ahmad AA Alkhatib;Rand N Albustanji |
Intelligent Model for Optimizing Gantt Chart in the Planning Stage
| Noor Bdair;Wael Alzyadat;Shadi AlZubi |
Towards the Application of Test Driven Development in Big Data Engineering
| Daniel Staegemann;Matthias Volk;Mohammad Abdallah;Klaus Turowski |
Arcaboard: An Overview of the SElectromagnetic HoverBoard
| Nagham Al-Madi;Mohammad Al-Madi;Wael Alzyadat;Khulood Abu Mariah;Ahmed Al-Khateeb;Fanan Al-Madi |
Sequentially compact and compactly generated groups
| Omar Ghanam;Hamza Alzaareer |
Fixed point results using cyclic (ρ - θ)-admissible mapping and extended simulation function concept in rectangular b-metric space
| Habes Alsamir;Haitham Qawaqneh |
FPGA-Based Radio Transceiver Using the TV White Space for Disaster Response Operation
| Khryzz Lyden G. Cueto;Ricky Mae V. Santos;Claudette Jane C. Hilario;John Carl V. Aggari;Ralph Gerard B. Sangalang |
Reliability Function of the Connected-(2,2)-out-of-(m,n): F Linear and Circular System Using Markov Chain
| Imad I. H. Nashwan |
Detection of Fabricated Survey Data using Clustering Analysis
| Lamia AbedNoor Muhammed;Ban Abdnoor Mohammed |
Integrated Boolean Sensing and Event Radius Model on Data Aggregation in Wireless Sensor Networks
| Mohammad Adawy;Omar Almomani;Muhannad Tahboush;Ahmad Althunibat |
Classification of Arabic Software Requirements Using Machine Learning Techniques
| Bayan Alsawareah;Ahmad Althunibat;Bilal Hawashin |
VGG16-Based Deep Learning Architectures for Classification of Lung Sounds into Normal, Crackles, and Wheezes using Gammatonegrams
| Neili Zakaria;Kenneth Sundaraj |
Exploring Scalable and Efficient Deployment of Machine Learning Models: A Comparative Analysis of Amazon SageMaker and Heroku
| Radhika V. Kulkarni;Arjun Thakur;Shravani Nalbalwar;Shubham Shah;Sankalp Chordia |
A Systematic Review of the use of Virtual Reality in Education
| Ahmad A. Mazhar;Mustafa M. Al Rifaee |
EASY E-VOTE: An Ethereum-based Voting System using IPFS and MetaMask for Student Government Election
| Reineir S. Duran;Charven B. Balbon;Justine Zenon E. Balmes;Pol Brian G. Castro;Unice G. Lopez;Kobe A. Talosig;Ma. Elena A. Noriega;Orland D. Tubola |
ChatGPT in Education: SWOT analysis approach
| Hamzeh Mohammad Alabool |
Bayes Estimation of the Parameters of the Kumaraswamy Probability Distribution
| Ma'mon Abu Hammad;Hassan Al-Zoubi;Azezah Al Abdallah |
Factors Influencing University Students' Adoption of digital educational technologies in Higher Education
| Manal A. Altawalbeh;Sultan Alshourah;Fadi Bani Ahmad;Sabah Jamil Al–Nawaiseh |
Numerical Solution for Incommensurate System of Fractional Order Differential Equations
| Iqbal M. Batiha;Shameseddin Alshorm;Amjed Zraiqat;Mohammad Alia;Iqbal Jebril |
DMEgrader: Android Mobile Application for Diabetic Macular Edema Grading Prediction
| Hamada R.H. Al-Absi;Gilbert Njihia Muchori;Saleh Musleh;Mohammad Tariqul Islam;Anant Pai;Tanvir Alam |
The Impact of Operational Characteristics on the Total Risk Management: Evidence from the Industrial Firms
| Abdul Razzak Alshehadeh;Haneen Al-khawaja;Mohammad A. Alia;Farid Kourtel;Ehab Injadat;Iqbal H. Jebril |
A Perspective on the Application of Fintech as a Gateway for Financial Literacy
| Deepa Pillai;Ardhendu Shekhar Singh;Trupti Bhosale;Adesh Doifode |
Human Body Action Recognition based on 3D Feature Fusion over RGB Scenes
| Heba Nsour;Zaid Mustafa;Maria Al-Sendah |
The Role of Smart Technologies in Reducing Energy Consumption and Promoting Sustainable Practices in Households and Businesses
| Belal Mahmoud AlWadi;Varadaraj Aravamudhan;K. Mohanasundaram;Mohammad Abduljawad |
The Role of the Internet of Things in Monitoring Air Pollution-A Survey
| Ahmad Abusukhon;Bareeq Alghannam |
A Review: Human Factor and Cybersecurity
| Ashraf Abzakh;Ahmad Althunibat |
Bayesian Estimation for Inverse-Gaussian Distribution under Square Error Loss Function
| Sondos Rasem;Amjed M Zraiqat;Waseem Ghazi Alshanti;Abdulkarim Farah;Ma'mon Abu Hammad |
Correcting Wide-Range of Arabic Spelling Mistakes Using Machine Learning and Transformers
| Raghda Diab Hasan;Gheith Ali Abandah |
Bayes Estimators of the Log-Normal Distribution Parameters Using Lindley's Approximation
| Siham Ali Abrikah;Ghadeer Farraj;Ma'mon Abu Hammad |
A Novel Virtual Cosmetics Recommender System Based On Pre-Trained Computer Vision Models
| Samia A. Abu-Shanab;Shadi AlZu'bi;Amjad Zraiqat |
Predicting the Helpfulness of Online Customer Reviews
| Hamzah Zureigat;Omar Al–Qudah;Bushra Alhijawi |
Intelligent Agents and Neural Fuzzy Logic: Enhancing Agent Intelligence in Complex Environments
| Shorouq Elmanaseer;Wael Alzyadat |
Revolutionizing Cyberbullying Prevention: A Cutting-Edge Natural Language Processing-Based Approach
| Tarek Kanan;Samar Hendawi;Shadi AlZu'bi;Mohammed Elbes;Ala Mughaid |
Security of Cyber-Physical Systems Against Actuator Attacks through Cryptography*
| Samuel Oliveira;André B. Leal;Marcelo Teixeira;Yuri K. Lopes |
A Proposed Quality Model For Social Media Websites
| Gana Sawalhi;Mohammad Abdallah |
A Study of Human Fitness Pose Classification Using Artificial Neural Networks
| Sijie Shang;Rong Jin;Kevin Desai |
Interactive, Visual-Learning based Tool for Hearing Impaired Children to Improve Language and Cognitive Skills
| Saluka Udbhasa;Parami Lelkada;Modeesha Priyanka;Esala Senarathna;Samitha Vidhanaarachchi;Jagath Wickramarathne;Janaka L. Wijekoon |
On α-Homogeneous Fractional Differential Equations
| Waseem Ghazi Alshanti;Ahmad Alshanty;Roshdi Khalil |
Score-based Diffusion Model for Conformer Generation
| Dang Cao Cuong |
A Survey on Cyber Security in Smart Grids using Internet of Things
| Heba Alamereah;Ahmad AA Alkhatib;Shorouq Elmanaseer;Rand N Albustanji;Hani M. Al–mimi;Mohammad Al Rawajbeh |
On the Optimization of Bi-variate Logarithmic Functions Using Bernstein-Lagrange Method
| Fatima S. AL–Shaar;Abdelrahman Aloudat;Tareq Hamadneh |
Sound Noise Monitoring using Wireless Sensor Networks in Annaba City
| Mohamed Fezari;Ali Al Dahoud;Mohamed Arif;Ahmad Al-Dahoud;Hani M. Al-Mimi |
Blockchain Based Voting Framework With Non-Transferable Non-Fungible Tokens
| Musan Eltuhami;Munaisyah Abdullahe;Bazilah A. Talip;Nik Azlina Nik Ahmad |
Prayer Sitting .. Is it a Biometric?
| Bassam M. Al-Mahadeen;Rufaydah Alhuweimel;Khalid Mohammad Jaber |
Developing an LTE Learning Material: Experiences from a University in a Developing Country
| Leinard C. Lontoc;Marjorie H. Basco;Vannesa Ann P. Sulit;Genesis Aubrey M. Magpantay;Mirasol C. Dilay;Ralph Gerard B. Sangalang |
A Reliable Analytical Method for Solving Klein-Gordan Equation by Tensor Product Theory of Banach Spaces
| Waseem Ghazi Alshanti;Ahmad Alshanty;Bashar Aljawarneh;Roshdi Khalil |
A Proposed Cloud Quality Model (IaaSQual) for “Infrastructure as a Service (IaaS)” from User's Perspective
| Hussain Aletabi;Mohammad Abdallah |
Study on Green Cloud Computing-A Survey
| Sameer Mehra;Laxmi Ahuja |
Approximate Bayes Estimators of Laplace Distribution under Linex Loss Function
| Ma'mon Abu Hammad;Maysoon Mustafa Mohmmad Qousini;Zakrea Mohmmad Rabab'h |
Smart Irrigation System Using LoRaWAN
| Moustafam Kurdi |
Unleashing the Full Potential of Artificial Intelligence and Machine Learning in Cybersecurity Vulnerability Management
| Mohammed Elbes;Samar Hendawi;Shadi AlZu'bi;Tarek Kanan;Ala Mughaid |
Quadrics of Coordinate Finite Type
| Mohammad Al-kafaween;Hamza Alzaareer;Hassan Alzoubi |
Analysing Vehicle Routing in Urban Pest Control Using a Cluster-First Route-Second Approach
| Yigit Alisan;Faruk Serin;Suleyman Mete;Eren Ozceylan |
Distribution of Shannon Statistic from Nakagami Sample
| Afaf Mohammad Al Sous;Ma'mon Abu Hammad |
An Image Encryption Algorithm Based on XOR, Flipping, Expansion Permutation and Shifting
| Qasem H. Makki;Ayman M. Abdalla |
Utilization of Information and Communication Technology (ICT) by Faculty Members at Information and Communication Technology College Al-Zaytoonah University in Jordan
| Mowafaq Muhammed Al-kassab;Haya Al-Masalha;Lina Ma'mon Abu hammad;Ali mohammad Daradkeh;Haneen Al-khawaja |
From Data to Narrative: Automating and Engineering the Art of Data Storytelling
| Mohammad Daradkeh;Shadi Atalla |
Demand Prediction Using Sequential Deep Learning Model
| Fayçal Messaoudi;Manal Loukili;Mohammed El Ghazi |
Requirements Elicitation and Stakeholder Communications for Explainable Machine Learning Systems: State of the Art
| Saikat Das;Mazharul Hossain;Sajjan G. Shiva |
An Employment of the Evolutionary Algorithms in Training of Neuro Fuzzy Inference System for Forecasting Personnel Radiation Exposure
| Armin Kobilica;Anas A. Abudaqa;Mustafa Ghaleb |
Arabic User Requirements Classification Using Machine Learning
| Reem Amro;Ahmad Althunibat;Bilal Hawashin |
Towards Better Software Development Effort Estimation with Analogy-based Approach and Nature-based Algorithms
| Mona Najafi Sarpiri;Mohammadreza Soltan Aghaei;Taghi Javdani Gandomani |
Design and Characterization of a Passive Wireless Chipless RFID Humidity Sensor
| Bo Wang;Youwei Li;Fei Gao;Bei Han;Chaohui Chen;Junqiang He |
Abstractive Multi-Document Summarization Using Sentence Fusion
| Sohini Roy Chowdhury;Kamal Sarkar |
How Data can Mislead Machine Learning Prediction Process: Case Study of Building Cooling and Heating Loads
| Mohammad Z. Masoud;Ahmad Manasrah;Yousef Jaradat;Nabeel A. Abu Shaban |
Intelligent Detecting of Emergency Vehicles on the Road Networks: Available Datasets Assessment
| Mo'ath Shatnawi;Maram Bani Younes |
Predicting Students' Performance Using Machine Learning
| Sabreen Abulhaija;Shyma Hattab;Wael Etaiwi |
Arabic Non-Functional Requirements Extraction Using Machine Learning
| Reem Amro;Ahmad Althunibat;Bilal Hawashin |
Green and Network-Aware Smart IoT Logistics Applications
| Hatem A. Alharbi |
Blockchain Based Identity Management System Using Cryptography and Steganography
| Praditi Rede;Sahaana Iyer;Sheetal Sharma;Sujata Deshmukh |
Using of Blockchain in the Context of Automotive Industry: A Survey
| Yazeed Alhajjaj;Mohammad Qatawneh;Orieb AbuAlghanam;Mohammed A Almaiah |
Analyzing Data Format Interoperability in API Ecosystems Using Big Data Architecture
| Wael Alzyadat;Suleyman Al-Showarah |
Training Machine Learning Classifiers on Differentiating Major Depressive Disorder and Parkinson's Disease Using Cognitive Performance
| Aya Mousa;Ashar Natsheh;Rashid Jayousi;Mohammad M. Herzallah |
Properties of Conformable Fractional Half-Normal Distribution
| Afaf Mohammad Al Sous;Ma'mon Abu Hammad |
Arabic Automatic Speech Recognition for Speakers With Speech Disorders: A Comprehensive Review
| Assal A. M. Alqudah;Mohammad A. M. Alshraideh;Ahmad A. S. Sharieh;Mohammad A. M. Abushariah;Fatima M. D. Quiam |
Electrical Load Forecasting Based on Random Forest, XGBoost, and Linear Regression Algorithms
| Mobarak Abumohsen;Amani Yousef Owda;Majdi Owda |
A Novel Approach to Elicit Software Requirements for IoT Systems Using SVM Classifier
| Akram AbdelQader;Mohammed Lafi;Khalil Awad;Mohammad A. AbedelQader |
An Enhanced UNet Model to Detect Water Bodies From Remote Sensing Data
| Mina Al-Saad;Nour Aburaed;Mohammed Q. Alkhatib;Mohammad Sami Zitouni;Hussain Al-Ahmad |
Internet of Things - Enabled Stress Surveillance When Pandemic Lockdown: Revolutionizing Resilience
| A.H. Hasanudin;M.A. Othman;A.A. Azwan;A.A.F. Mohd Roki;S. Ismail;Y.T. Nugraha;S. Suhaimi;N.M. Hassan |
Improving Arabic Fake News Detection Using Optimized Feature Selection
| Bilal Hawashin;Ahmad Althunibat;Tarek Kanan;Shadi AlZu'bi;Yousef Sharrab |
Water Quality Classification Decision Support System
| Noura Abulail;Amani Yousef Owda;Majdi Owda |
Degree of Employing Distance Learning Technology by Faculty Members and its Role in Students' Acquisition of Self-Learning Skills
| Tahani Fawaz Abu Jraiban |
In-Vehicles Infotainment System Forensics Case Study
| Ammar Dawabsheh;Majdi Owda |
Using Of Multivariate Linear Regression and Exponential Smoothing Model to Predict the Gross Domestic Product in Jordan
| Shahed Nabeel Al-khateeb;Ameera S. Jaradat |
Towards a Sustainable Future: Exploring Key Features, Challenges, and Global Examples of Building Smart Cities
| Shadi AlZu'bi;Samar Hendawi;Mohammed Elbes;Tarek Kanan;Ala Mughaid |
Helicoidal Surfaces Satisfying ΔIIIr=Ar
| Hassan Alzoubi;Waseem Al-Mashaleh;Haitham Qawaqneh;Mohammad Al-kafaween |
Building a Counseling Program Based on Islamic Culture and Social Learning Theory to Reduce the Aggressive Behavior of Students in the Primary Stage
| Ola Yahia Aljamal;Najihah Abd Wahid;Hafsah Yahia Aljamal |
An XAI Approach to Predictive Analytics of Pancreatic Cancer
| Srinidhi B;M S Bhargavi |
The Disclosure Governance and its Role in the Operational Risk Management: Evidence from Commercial Banks
| Abdul Razzak Alshehadeh;Kamel Rezig;Haneen Al-khawaja;Iqbal Jebril;Ehab Injadat;Abeer fouzan Aref Al-Abbadi |
Cooperative Spectrum Sensing Using Bat Algorithm in Cognitive Radio
| Necmi Taşpinar;Burcu Ketenci |
Customer Personality Segmentation Using K-Means Clustering
| Lana Al-Dabbas;Hassan Al-Tarawneh;Thamer A Al-Rawashdeh |
Towards Leveraging Explainable Artificial Intelligent (XAI) in Requirements Engineering (RE) to Identify Aspect (Crosscutting Concern): A Systematic Literature Review (SLR) and Bibliometric Analysis
| Aws A. Magableh |
Knowledge Transfer to Solve Split and Rephrase
| AlMotasem Bellah AlAjlouni;Jinlong Li |
A New Lightweight AES for IoT
| Liana Qabajeh;Radwan Tahboub;Mohammed AbuJoodeh |
Assessing the Maturity of Online Service Delivery by Applying Local Online Service Index (LOSI) Methodology in Selected Indian Cities
| Saumya Mehta;Gayatri Doctor |
OSINT-Based Tool for Social Media User Impersonation Detection Through Machine Learning
| Rajaa Alqudah;Mohammed Al-Qaisi;Rakan Ammari;Yazan Abu Ta'a |
A Data Collection Quality Model for Big Data Systems
| Mohammad Abdallah;Alaa Hammad;Daniel Staegemann |
Image Splicing Localization Using Superpixel and Wavelet Mean Squared Error
| Seiga Al Ghifari;Hudan Studiawan |
An Analysis of Width Feedline of Ice Cream Cone Antenna in 5G Technology for Internet of Things (IoT) Applications
| S. Ismail;M.A. Othman;M.H. Misran;M.A. Meor Said;A.S. Jaafar;R. Abdul Manap;Y.T. Nugraha;N.M. Hassan;S. Suhaimi |
Digital Certificate Validation Using Blockchain: A Survey
| Yazan Abu Hammoudeh;Mohammad Qatawneh;Orieb AbuAlghanam;Mohammed A Almaiah |
Security Challenges Review in Agile and DevOps Practices
| Suha Afaneh;Mohammad Rasmi Al-Mousa;Hilal Shrif Al-hamid;Bara'h Suliman AL-Awasa;Mohammad Alia;Hani Almimi;Ahmad A Alkhatib |
A Survey of IoT Healthcare Applications
| Sara Albakhit;Ahmad AA Alkhatib;Rand N Albustanji;Shorouq Elmanaseer;Mosa Salah;Reem Amro |
Factors Influencing The Adoption of E-commerce in Jordanian SMEs
| Diala Othman Qatanani;Abdallah Qusef |
Facilitating Metaverse Integration in Education via Extended Reality and the Internet of Things: AN OVERVIEW
| Awf Alhalaybeh;Ahmad AA Alkhatib;Rand N Albustanji;Shorouq Elmanaseer;Tarek Kanan;Rashed Alsakarnah |
Mobile Object Detection and Tracking Using DRONES
| Malek Mahmoud Barhoush;Ameera Saleh Jaradat;Najla'a Saleh;Isra’a Saleh |
Personalizing Product Recommendations using Collaborative Filtering in Online Retail: A Machine Learning Approach
| Manal Loukili;Fayçal Messaoudi;Mohammed El Ghazi |
A Dynamic Locality Sensitive Hashing Algorithm for Efficient Security Applications
| Mohammad Y.AlKhanafseh;Ola M.Surakhi |
Feature Selection for High-Dimensional Imbalanced Malware Data Using Filter and Wrapper Selection Methods
| Mai Abujazoh;Duha Al-Darras;Nesreen A. Hamad;Saleh Al-Sharaeh |
Predicting Patient's Willingness for Colorectal Cancer Screening Practices Using Machine Learning Classifiers
| Ahmad Sharieh;Nesreen A. Hamad;Heba I. Abu Kaf;Fuad H. Abuadas |
Digital Forensic Analysis of Hologram Projection Fans
| AlsharifHasan Mohamad Aburbeian;Majdi Owda;Amani Yousef Owda |
FastText Embedding and LSTM for Sentiment Analysis: An Empirical Study on Algerian Tweets
| Lamia Ouchene;Sadik Bessou |
A Blockchain-Based Solution for Defining and Enforcing Personal Data Access Policies
| Michael Lescisin;Qusay H. Mahmoud |
Feature Extraction with Differential Evolution Algorithm
| Salam Hamdan;Manal Mizher;Hani Mimi;Eman Abu Maria;Abdullah Mubarak Heyari |
A Brief Review For Separation Axioms In Bitopological Spaces
| Maysoon Qousini;Omar Ghanam |
The Effectiveness of E-Learning System on Students' of Al-Zaytoonah university of Jordan: A Case Study
| Areej Derbas;Nancy Al-Ramahi;Adnan Hnaif;Thamer Ahmad Alrawashdeh;Rasha Adnan Mubaideen |
Diameter-Constrained Minimum Spanning Tree Problems: A Survey
| Samar Hendawi;Islam Altalahin;Shadi AlZu'bi;Ayman Abdalla |
Automated Business Rules Classification Using Machine Learning to Enhance Software Requirements Elicitation
| Mohamamed Lafi;Akram AbdelQader |
Applications to Conformable α—Log-Normal Distribution
| Maha S. Alsaoudi;Ahlam Guiatni;Sondos Rasem |
Stable Clustering Algorithms for VANETs: A Survey
| Omar Baradia;Liana Jalalaltamimi |
Examining the Validity of Inference Rules: Utilizing Truth Tables and Contrapositive Analysis
| Fatima Quiam;Assal A. M. Alqudah;Maher A. Nabulsi;Shadi AlZu'bi |
The Journey of E-Learning Technology From Application to Challenges: Evidence From Jordan
| Mohammad Altarawneh;Saif Al-Deen Al-Ghammaz |
The Bernstein Expansion for Rational Differentiable Functions in Newton Divided Differences Form
| Abdelrahman Aloudat;Fatima S. Al-Sha'ar;Haitham Al-Qawaqneh;Amer Dababneh |
Decision Support System in Healthcare for Predicting Blood Pressure Disorders
| Marwa Mustafa Owess;Amani Yousef Owda;Majdi Owda |
Ethereum-Based Smart Contract and Traceability System for Food Bank Operations
| Mary Rachelle Anne F. Eliang;Rona Klarizz S. Del Rosario;Dorothy B. Matalang;Sam-Eduard T. Quintana;Aldem John E. Salvadora;Noel Irvin M. Titong;Ben B. Andres;Orland D. Tubola |
Applying A* Search Algorithm in Mobile Game-Based Learning for Malay Proverbs
| Muhammad Nazif Firdaus Mazlan;Norzilah Musa;Norzehan Sakamat;Afiza Ismail |
A Survey of Internet of Things (IoT) Forensics Frameworks and Challenges
| Farhan Abdel-Fattah;Seraj Fayyad;Abdullah Mubarak Heyari;Hassan Al-Zoubi |
Applications of Artificial Intelligence Methods in Medicine
| Mirjana Ivanovic;Dragan Macos |
Improving Routing Decision Algorithm for RPL Networks
| Abdullah Al Zaqebah;Omar Almomani;Malek Almomani;Adeeb Alsaaidah;Ahmad Adel Abu-Shareha;Ahmad Althunibat |
Handling Systems of Incommensurate Fractional Order Equations Using Improved Fractional Euler Method
| Shameseddin Alshorm;Iqbal M. Batiha;Iqbal Jebril;Amer Dababneh |
Towards a Conceptual Model for Assessing User Satisfaction in Metaverse-Based Learning
| Awf Alhalaybeh;Ahmad Althunibat;Bassam M. Al-mahadeen;Khaldoun Khalil Habashneh;Ali mohammad Daradkeh |
IntelligentMonitor: Empowering DevOps Environments with Advanced Monitoring and Observability
| Pratik Thantharate |
Properties of Conformable Fractional Maxwell-Boltzmann Probability Distribution
| Salemah Almutlak;Ghadeer Farraj;Amjad Zraigat;Azezah Al Abdallah;Siham Ali Abrikah;Bayan Alkhalaileh |
A Novel Machine Learning Cyber Approach for Detecting WannaLocker Ransomware Attack on Android Devices
| Mahmoud AlJamal;Rabee Alquran;Issa AL-Aiash;Ala Mughaid;Shadi AlZu'bi;Ala A. Abutabanjeh |
A Crop Recommendation System Based on Nutrients and Environmental Factors Using Machine Learning Models and IoT
| Anishka Chauhan;Anuraag Tsunduru;Kishwar Parveen;Srilatha Tokala;Koduru Hajarathaiah;Murali Krishna Enduri |
A Roadmap for Artificial Intelligence Augmented Software Development Life Cycle: Aspects of Knowledge Vaporization
| Wael Alzyadat;Mohammad Al-Madi;Mohammad Muhairat;Nagham Al-Madi;Feras Altarawneh |
Three Dimensional Objects Encryption Algorithms: A Review
| Manal Mizher;Salam Hamdan;Manar Mizher;Ahmad A. Mazhar;Hani Mimi;Abdullah Mubarak Heyari |
Transfer Efficiency Enhancement on Wireless Power Transfer Using Metamaterial
| Muhammad Sukriyllah Yusri;Mohamad Harris Misran;Norbayah Yusop;Maizatul Alice Meor Said;Mohd Azlishah Othman;Shadia Suhaimi |
Geospatial Analysis of COVID-19 Lockdown Effects on Air Quality in Jordan and Surrounding Countries
| Marwan Al-Tawil;Moh'd Belal Al-Zoubi;Yousef Kh. Majdalawi;Tamara Almarabeh;Ali Al Dahoud |
Distribution of Shannon Statistic from Exponential Sample
| Ma'mon Abu Hammad;Azezah Al Abdallah;Siham Ali Abrikah;Ghadeer Farraj |
Enhancing Password Security via Supervised Learning
| Yaser Alkurdi;Mustafa Al Fayoumi;Amer Al-badarneh;Qasem Abu Al-Haija |
Analysis of Critical Factors Influencing E-Learning Platforms Security
| Essohanam Djeki;Jules Dégila;Muhtar Hanif Alhassan |
Design and Research of Temperature Sensor Based on Single Split Ring Resonator
| Bo Wang;Bei Han;Youwei Li;Fei Gao;Chaohui Chen;Junqiang He |
A Comprehensive Review of Digital Forensics Frameworks for Internet of Things (IoT) Devices
| Yaman Salem;Majdi Owda;Amani Yousef Owda |
A Reinforcement Learning Model of Temporal Difference Variations for Action-Selection and Action-Execution in the Human Brain
| Ashar Y. Natsheh;Joman Y. Natsheh;Aya H. Mousa;Mahmoud H. Al-Saheb;Ahmed A. Moustafa;Mohammad M. Herzallah |
The Current State of Research on Malware Written in the Rust Programming Language
| Meghna Praveen;Wesam Almobaideen |
Web 2.0 Tools and Service Quality: The Key to Effective Customer Relationships in E-Commerce Environments
| Radwan Moh'd Al-Dwairi;Maali Al-Khataybeh |
Enhancing Financial System Resilience Against Cyber Threats via SWIFT Customer Security Framework
| Khawla Shalabi;Mustafa Al-Fayoumi;Qasem Abu Al-Haija |
Measuring Acceptance of Adoption Metaverse in eLearning by Using TAM Model
| Awf Alhalaybeh;Ahmad Althunibat |
Unmasking the Truth: A Deep Learning Approach to Detecting Deepfake Audio Through MFCC Features
| Islam Altalahin;Shadi AlZu'bi;Assal Alqudah;Ala Mughaid |
Statistical Differences Between the Experimental and Control Groups and the Role of the Counseling Program to Reduce Aggressive Behavior Among Primary School Students
| Ola Yahia Aljamal;Najihah Abd Wahid;Hafsah Yahia Aljamal |