


default search action
25th ACIT 2024: Zarqa, Jordan
- 25th International Arab Conference on Information Technology, ACIT 2024, Zarqa, Jordan, December 10-12, 2024. IEEE 2024, ISBN 979-8-3315-4001-2

- Naglaa F. Noaman, Ahmad Al Smadi

, Bassam M. Kanber
, Ahed Abugabah:
Hybrid ResNet-ViT Model for Lung Cancer Classification from Histopathology Images. 1-5 - Ahmad Y. A. Bani Ahmad, Mahmoud Allahham, Wasef Ibrahim Almajali, Firas Tayseer Ayasrah, Samar Sabra:

Smart Logistics Services: How Artificial Intelligence Transforms Decision-Making. 1-4 - Mahmoud Rajallah Asassfeh, Esraa Abu Elsoud, Sultan Mohammed Albilasi, Abdullah Al-Qammaz, Ala'a Al-Shaikh, Suha Afaneh, Ahmad Bany Doumi, Ali Elrashidi, Ghassan Samara:

Cloud Security: Analyzing Threats and Challenges. 1-8 - Moath Khalaf Alomery, Salem Khalil Al Aqtash, Omran Ahmad Musleh, Mohammad Hussein Ahmad Faqeeh, Dima Ibrahim Farhat:

Student Teachers' Attitudes towards the Use of ChatGPT in Teaching. 1-7 - Hanay Almomani, Ayoub Alsarhan, Mahmoud AlJamal, Mohammad Aljaidi, Tamam Alsarhan, Bashar Khassawneh, Ghassan Samara, Manish Kumar Singla, Ahmed BaniMustafa:

Proactive Insider Threat Detection Using Facial and Behavioral Biometrics. 1-7 - Mohammed N. Al-Refai, Hamed Fawareh, Hamzeh Aljawawdeh, Fuad Sameh Alshraiedeh, Mohammad Al-Quraan, Hisham Al-Odat, Ahmed Ali Otoom

, Zeyad M. Jamhawi, Mohammad Kanan:
Maximize Leader Election Algorithm Performance in Bi-Directional Ring Networks With Both Links Down Between Two Nodes. 1-6 - Huda Dhari, Nidhal K. El Abbadi:

Diabetic Retinopathy Detection and Classification Using Deep-wavelet and multiple classifiers. 1-8 - Firas Tayseer Mohammad Ayasrah, Khaleel Alarabi, Ibtehal Mahmoud Aburezeq, Ahmad Y. A. Bani Ahmad, Musab Mustafa Hijazi:

Social Media Transparency: How Digital Marketing Shapes Strategic Decisions. 1-6 - Amneh Alamleh, Ola Nasir, Ayman Abu Hannoun, Mustafa Darwish, Bashar Alallawi, Zaid Alshurafa, Mohammed Khouj:

Real-Time VPN Anomaly Detection System. 1-7 - Mohammed N. Al-Refai, Yazan Al-Smadi, Adai Al-Momani

, Zeyad M. Jamhawi, Ahmed Ali Otoom
, Issa Atoum, Ahid Yaseen, Jafar Ababneh, Mohammad Kanan:
A Proposed Approach for Risk Planning and Management. 1-4 - Noura Tegoan, Srimannarayana Grandhi, Santoso Wibowo, Rongbin Yang:

Applying Extended Reality Technology in Teaching New Languages: A Study from Academics' Perspective in Australian Universities. 1-6 - Zina Houhamdi, Mohamed Raid Athamena, Belkacem Athamena, Ghaleb Elrefae

:
Decision Support in Goal-Oriented Requirements Engineering. 1-4 - Mahmoud Asassfeh, Mohammad Rasmi Al-Mousa

, Hasan Al-Dweikat, Malak Hamad Al-Mashagbeh
, Suha Afaneh, Ghassan Samara, Ali Abu Zaid
, Mohammed Khouj, Essam Al Daoud:
An Overview of Tools and Techniques in Network Forensics. 1-7 - Bassam Jamil Mohd, Khalil M. Ahmad Yousef, Salah Abu Ghalyon:

A Comparative Evaluation of Retrieval-Augmented Generation For Arabic Documents. 1-6 - Raed Alazaidah, Ola Nasir, Wael Hadi, Ghassan Samara, Essam Al Daoud, Mohammad Aljaidi, Mohammed Talat Khouj, Esraa Abu Elsoud, Haneen Alzoubi:

Multi Label Classification Algorithm Based on Conditional Local Correlations among Labels and Ensemble Learning. 1-8 - Tuqa S. Al Bshibsh, Nidhal K. El Abbadi:

Filling the Gaps: A Comprehensive Review of Image Inpainting. 1-9 - Khawlah M. Al-Tkhayneh, Abdulrasheed Olowoselu, Mona Kamal Ibrahim, Ibrahim Suleiman Al Qatawneh, Tamim Ahmed Jabarah:

Navigating Artificial Intelligence in Strategic Management in Schools and Organizations. 1-5 - Bilal Mokhtari, Amani Massa, Karima Femmam:

Correlation-Driven Feature Selection and Penalty-Enhanced Autoencoder for Dimensionality Reduction. 1-11 - Shahad Altamimi

, Mohammad Ababneh:
Detecting Spam and Malware Using BERT and LLMs. 1-6 - Ahmad Y. A. Bani Ahmad, Mahmoud Allahham, Wasef Ibrahim Almajali, Firas Tayseer Ayasrah, Samar Sabra:

Supply Chain Innovation on Acceleration Decision-Making, The Mediating Role of Tech and Integration in the Retail Sector. 1-6 - Gheed Mufied Alsalem, Noor Sarhan, Mustafa Hammad, Bayan Zawaideh:

Predicting Students' Performance using Machine Learning Classifiers. 1-5 - Ahmed BaniMustafa, Hazem Qattouz, Sattam Almatarneh

, Khalid Mansour, Raed Alazaidah, Olla Bulkrock:
Automating the Diagnosis of Cucumber Plant Diseases Using Machine Learning. 1-6 - Mohammad Arabiat, Suhaila Abuowaida, Nawaf Alshdaifat, Ahmad Aburomman

, Esraa Al Henawi, Mohammad Dmour, Ali Elrashidi:
Enhanced accuracy of deep learning method for fruit images classification. 1-9 - Jie Chen, Kai Zhang, Ni Wu, Ling Zhang:

Two-Stage Dynamic Cooperative Evolution Algorithm for Constrained Multi-objective Optimization. 1-6 - Ramy M. Bahy, Jafar Ababneh, Hani Attar, Mohammad Alhihi, Mohamed Hafez

, Ahmed A. A. Solyman:
Fingerprint Authentication Method using Two Steps Verification Algorithm. 1-5 - Ragad M. Tawafak, Roy Mathew, Ghaliya Al Farsi, Abir Al-Sideiri, Sohail Iqbal Malik:

Escape Rooms and E-Learning Unite for Smart Cities Education Entertainment. 1-6 - Ali Hadi Al-Obeidi, Shuq Hussein:

Unraveling the 'Safe Harbor ': A Crucial Balance between Liability and Expression in Social Media Networks. 1-4 - Fatima Alhadidi, Hazeem Hiary:

Offline signature verification using lightweight deep learning. 1-10 - Osama S. AlJamal, Mahmoud AlJamal, Ayoub Alsarhan, Mohammad Aljaidi, Saif Okour, Issa Al-Aiash, Ahmad Al-Qerem, Essam Al Daoud, Ali Elrashidi:

Design and Simulation of a Network Infrastructure for a Multi-Branch Organization Using Cisco Packet Tracer. 1-10 - Reda S. M. Al-Mawadieh, Mohammad F. Al-Abdallat

, Mohammad Noor Injadat, Rawia Zuod, Ruaa Binsaddig:
Exploring Digital Twins in Higher Education: Redefining Educational Technology in Jordanian Universities. 1-11 - Hamzeh Aljawawdeh, Hamed Fawareh, Mohammed Al Refai, Fuad Alshraideh, Randa Salman, Sara Abu Dabaa't, Heba Alazzeh, Hazim M. Al-Shdaifat

, Mohammed Khouj:
Ethical Considerations in AI-Driven HCI Systems in Software Engineering. 1-6 - Mutaz AlMomani, Ahmad Al-Qerem, Shadi Nashwan, Issam Jebreen, Mohammed Rajab, Mohammad Alauthman, Mohammad Jeadi, Ali Elrashidi:

Detection of Thyroid Disease Through Machine Learning Technique. 1-17 - Mohamed Elmaghrabi:

ESG Risk Management, Sustainability-Oriented Firms and Financial Distress in the Financial Industry: an AI-aided approach. 1-3 - Suzan Al Abidi, Khaleel Alarabi, Othman Abu Khurma

, Aktham Alarabi, Razan Taani:
Sustainability in Three Dimensions: Mapping the Metaverse's Blueprint on Sustainable Development Goals (SDGs) through a Bibliometric Journey. 1-7 - Ahmad Y. A. Bani Ahmad, Mahmoud Allahham, Wasef Ibrahim Almajali, Firas Tayseer Ayasrah, Samar Sabra:

From Interaction to Action: How User Input Shapes Logistics and Decisions in Jordan's E-Industry. 1-6 - Ghassan Samara, Ala'Mazen Elhilo, Mohammad Aljaidi, Amneh Alamleh, Mohammad Rasmi Al-Mousa

, Radwan Batyha, Raed Alazaidah, Alaa Bani-Bakr, Ali Elrashidi:
Enhancing Convergence Efficiency in Federated Learning Models. 1-4 - Hani Attar, Jafar Ababneh, Mohammad Al-Hihi, Ali Rachini

, Ahmed A. A. Solyman:
Simulating a Finite-State Markov Chain for Rayleigh Block-Fading Channel based on its Mathematical Model, and Practical Representation. 1-5 - Omar Khair Alla Alidmat, Raed Alazaidah, Mohammad Arabiat, Hayel Khafajeh, Mohammad Aljaidi, Umi Kalsom Yusof, Ali Elrashidi:

Dynamic Exit Selection and Counting Area Adjustment for Efficient Crowd Evacuation in Asymmetrical Layouts. 1-10 - Rania Saadeh, Iqbal M. Batiha

, Ahmad Qazza, Iqbal H. Jebril, Ali Elrashidi, Shaher Momani:
Controlling DC Motor Speed with FoPID-Controllers. 1-7 - Abdallah Moubayed, MohammadNoor Injadat, Mohammad Kanan:

A Comparative Study of Gaze Estimation Models. 1-10 - Fayez Alnusair, Mouza Al Ameri, Moustafa Elmetwaly Kandeel, Ghaleb Elrefae

:
Civil Liability of The Data Controller For Data Storage: A General Perspective In Light of The UAE Personal Data Protection Law. 1-5 - Adnan Shaout, Arif Hasan, Murlidharan Shravan:

Hardware Embedded Fingerprinting Based on Electric Noise. 1-7 - Ghassan Samara, Hussain Mohammed Turki, Mahmoud Odeh, Anas M. Al-Oraiqat

, Mohammad Aljaidi, Raed Alazaidah, Mohammad Rasmi Al-Mousa
, Ahmed BaniMustafa, Mohammad Kanan:
Efficient Road Status Monitoring in Vehicular Ad-Hoc Networks: An Optimization Framework. 1-5 - Hangyu Fan, Kai Zhang, Ling Zhang, Ni Wu:

An Adaptive Two-Stage MOEA/D For Solving Constrained Multi-Objective Problem. 1-7 - Mohammad AlShaikh-Hasan, Gheorghita Ghinea:

Evaluating the Impact of Multi-Layer Data on Machine Learning Classifiers for Predicting Student Academic Performance. 1-6 - Shahad Altamimi

, Walid A. Salameh:
Deepfake Video Detection: Analysis for Deep Learning models using Transfer Learning. 1-9 - Muhyeeddin Alqaraleh

, Mowafaq Salem Alzboon
, Mohammad Al-Batah, Oqeili Saleh, Hatim Solayman Migdadi, Ali Elrashidi, Raed Alazaidah:
Advanced Machine Learning Models for Real-Time Drone and Bird Differentiation in Aerial Surveillance Systems. 1-8 - Adnan Al-Smadi, Murar Al-Nusairat, Ammar Erjoub, Laith Freitekh, Mohammed Khouj:

Intelligent Farm Irrigation and Safety System. 1-4 - Abdullah Al-Qammaz, Mohammad Rasmi Al-Mousa

, Ali Abu Zaid
, Mahmoud Asassfeh, Mohammad Abdulrazzaq Rajab, Sherien Dajah, Abdulla M. F. Alali, Mohammed Khouj:
Unveiling Android Malware: A Deep Learning Perspective Using RNN and LSTM. 1-4 - Adai Mohammad Almomani, Mohammed N. Al-Refai, Ahmad Aburomman

, Omar Khair Alla Alidmat, Qotadeh Saber, Fuad Alshariedeh, Mohammed Khouj:
Usage of Blockchain Technology for Improving Computer Security. 1-6 - Yusra Al Najjar

, Ali Elrashidi, Nada Salamah:
A Comparative Analysis of Steganography in Formats of Digital Images. 1-6 - Md. Nuhi-Alamin, Ajay Krishno Sarkar, Md. Simul Hasan Talukder, Mohammad Aljaidi, Safkat Shahrier Swapnil:

Continuous Wavelet Transform Spectral Image Based Epileptic Episode Classification. 1-6 - Ahmad Ghandour

, Brendon J. Woodford:
Guidelines to Develop a Cybersecurity Policy in Schools, Perspectives Informed from Jordanian Cybercrime Law. 1-6 - Hani Attar, Jafar Ababneh, Ali Rachini

, Ramy M. Bahy, Mohamed Hafez
, Ahmed A. A. Solyman:
Fractional Fourier Transform-Based OFDM System with low complexity equalizer for Underwater Acoustic Communications. 1-6 - Ola Nasir, Raed Alazaidah, Maram Y. Al-Safarini, Amneh Alamleh, Ali Abu Zaid

, Hasan Mansur
, Ali Elrashidi, Haneen Alzoubi, Alaa Bani-Bakr:
Classification of Sleep-Related Disorders Using Machine Learning Techniques. 1-11 - Md. Simul Hasan Talukder, Sohag Kumar Mondal, Oyshi Tabassum Aditi, Mohammad Aljaidi, Rejwan Bin Sulaiman, Ahmad Al-Qerem:

Explainable AI for Epileptic Seizure Prediction: A SHAPE and LIME Approach. 1-7 - Noor Abu-El-Rub, Nikan Chavoshi, Abdullah Mueen:

"Breaking Bad": Ranking Bot's Malevolence in Twitter. 1-8 - Zaitoun Eman

, Alamassi Sherin, Labib Bayan:
Exploring Healthcare Students' Perspectives on Artificial Intelligence in Healthcare. 1-6 - Hebatullah Khattab, Ala'a Al-Shaikh, Ala'a Saeb Al-Sherideh, Ali Elrashidi:

Energy-Efficient Parallel Approach for Cloud Service Broker Scheduling. 1-6 - Mu'taz Momani, Nidal Yousef, Qotadeh Aljawazneh, A. T. Issa, Suhaila Abuowaida, Raed Alazaidah, Mohammed Talat Khouj, Radwan Batyha, Esraa Abu Elsoud:

Utilization of Machine Learning in Breast Cancer Detection. 1-10 - Musab Mustafa Hijazi, Qutaibah Althebyan:

A Review study on Utilizing Deep Learning in Arabic Text Classification. 1-3 - Ahmad Samhan, Suhair AlHajHassan, Sara Abu Dabaa't, Ali Elrashidi:

A Review of AI-Assisted Impact Analysis for Software Requirements Change: Challenges and Future Directions. 1-13 - Bengoud Kenza, Taoui Ranya, Hadni Meryeme, Hamza Machiche Alami:

Real-time vehicle detection and classification using deep-transfer learning. 1-6 - Huda Dhari, Nidhal K. El Abbadi:

Retinal Blood Vessels Segmentation Using Classical Edge Detection Filters and the Watershed. 1-7 - Raed Alazaidah, Ghassan Samara, Anwar Katrawi, Wael Hadi, Maram Y. Al-Safarini, Farah Al-Mamoori, Ali Elrashidi, Muhyeeddin Alqaraleh

, Haneen Alzoubi:
Prediction of Hypertension Disease Using Machine Learning Techniques: Case Study from Jordan. 1-6 - Mustafa S. Al-Shaikh, Mohammad Rasmi Al-Mousa

, Hassan Ali Al-Ababneh, Mofeed Wild Ali, Sabha Maria Alkaawneh, Fawaz Mohd Salim Barhoush, Ruaa Binsaddig:
The Challenges of Using Generative AI Applications in Electronic Commerce. 1-5 - Rahma Abu Salma, Ahmad Alqerem, Abedalhakeam Iessa, Mohammed Rajab, Mohammad Alauthman, Mohammad Jeadi, Ali Elrashidi:

Advancing Stroke Prediction: Explainable Machine Learning Models and Data Augmentation Strategies. 1-8 - Shonak Bansal, Arnav Bansal, Mohammad Aljaidi, Krishna Prakash:

Future IoT sensing: Silvaco simulation of graphene-gated p-i-n photosensor on SOI for blue and ultraviolet light. 1-8 - Rabee Alqura'n, Mahmoud AlJamal, Mohammad Aljaidi, Mohammad AlJamal, Bashar Khassawneh, Ayoub Alsarhan, Omar Alidmat, Ghassan Samara, Sattam Almatarneh

:
Machine Learning as the Shield: Mitigating ARP Poisoning Attacks in Software Defined Networks. 1-8 - Ahmed BaniMustafa, Sattam Almatarneh

, Olla Bulkrock, Raed Alazaidah, Hossam Almahasneh
, Ghassan Samara:
Investigating Principle Component Analysis Impact on the Performance of Machine Learning Classifiers: A Health Informatics Application. 1-6 - Raed M. Khalil, Rania Saadeh, Mohamed A. Abdoon, Mohammed Berir

, Ahmad Qazza, Ali Elrashidi:
Analyzing Chaotic Jerk System with Hyperbolic Sine: a new algorithm for Engineering Applications. 1-6 - Ola Nasir, Raed Alazaidah, Wael Hadi, Ghassan Samara, Essam Al Daoud, Suhaila Abu Owaida, Ali Elrashidi, Esraa Abu Elsoud, Haneen Alzoubi:

Multi Label Classification Based on Ensemble Learning: Investigative Study. 1-8 - Hazem Jihad Badarneh, Mohammad Rasmi Al-Mousa

, Fuad Alshraiedeh, Mohammed Khouj:
Application of Big Data Analytics in Hashemite Kingdom of Jordan: Perspectives on the Mobile Telecommunications Industry. 1-8 - Ahmad Y. A. Bani Ahmad, Mahmoud Allahham, Wasef Ibrahim Almajali, Firas Tayseer Ayasrah, Samar Sabra:

Building Trust: The Role of Strategic Decision-Making in Digital Market Confidence. 1-6 - Ahmad Aburomman

, Suhaila Abuowaida, Adai Al-Momani, Esraa Al Henawi, Esraa Abu Elsoud, Zaher Salah
, Haneen Alzoubi, Huah Yong Chan, Mohammed Khouj:
Automated Detection of Alzheimer's Disease Using EfficientNet-B3 Architecture with Transfer Learning. 1-6 - Adnan Shaout, Abdullah Albadi, Abdel-Rahman Shaout:

State of the Art on Auto Electrification. 1-8 - Anas M. Al-Oraiqat

, Oleksandr Drieiev, Ghassan Samara, Sattam Almatarneh
, Karim A. Al-Oraiqat, Hazim Alrawashdeh, Hanna Drieieva, Ali Elrashidi, Yassin M. Y. Hasan:
Bridging Machine Learning and Formal Concept Analysis for Effective Crowd Detection. 1-9 - Abeer Al-Mohtaseb, Ali Qasim Hanoon, Ghassan Samara, Essam Al Daoud, Omar Alidmat, Radwan Batyha, Mohammad Aljaidi, Raed Alazaidah, Ali Elrashidi:

A Comprehensive Review of VANET Attacks: Predictive Models, Vulnerability Management, and Defense Selection. 1-9 - Adam Bou Moghlebey, Abdallah Moubayed, MohammadNoor Injadat:

Optimizing One-Stage Object Detection for URLLC: A Two-Stage Pipeline with Oculi SPU. 1-8 - Hmmam M. Alrjoob, Raed Alazaidah, Radwan Batyha, Hayel Khafajeh, Esraa Abu Elsoud, Ala'a Saeb Al-Sherideh, Ali Elrashidi, Muhyeeddin Alqaraleh

, Waleed Amer:
Classifying Psychiatric Patients Using Machine Learning. 1-9 - Abdellateef Abdelhafez Alqawasmi, Asmaa Jumah Almahdawi, Najeh Rajeh Ibrahim Alsalhi, Ibtehal Mahmoud Aburezeq, Munther Balawi:

The Ethical Considerations of Using Artificial Intelligence (AI) Tools for Professional Diploma Students/Case Study. 1-6 - Hamed Fawareh, Hazim M. Al-Shdaifat

, Al-Refai M, Faid AlNoor Fawareh, Mohammed Khouj:
Investigates the Impact of AI-generated Code Tools on Software Readability Code Quality Factor. 1-5 - Jafar Ababneh, Amer Abu-Jassar, Suhaila Abuowaida, Valentyn Liubchenko, Vyacheslav V. Lyashenko:

Evaluation of Three Different Operators for Object Highlighting in Medical RGB Images: Canny, Roberts, and LoG in Independent Color Spaces. 1-7 - Nedhal A. Al-Saiyd, Intisar A. Al Sayed:

Semantic Textual Similarity (STS) in Arabic using Lexical-Semantic Analysis. 1-6 - Adnan Shaout, Abdel-Rahman Shaout, Songhan Duan:

An Intelligent Embedded Alcohol Detection System for Drivers. 1-7 - Khalid M. O. Nahar, Mohammad Ebrahim Megdad, Rabia Emhamed Al Mamlook

, Mohammad Aljaidi, Besan K. M. Nahar, Mohammad K. M. Nahar, Samar Hussni Anbarkhan, Hayel Khafajeh, Waleed Amer:
COVID-19 Infection Detection in X-Ray Images Using Enhanced Image Segmentation and Machine Learning Models. 1-7 - Rahaf Alsawi, Raed Alazaidah, Ghassan Samara, Haneen Alzoubi, Omar Alidmat, Esraa Abu Elsoud, Mohammed Talat Khouj, Anwar Katrawi, Mo'ath Alluwaici:

Application of Machine Learning in Mental Diseases Diagnosis. 1-6 - Zina Houhamdi, Belkacem Athamena:

Big Data Potentials to Reduce Uncertainty in Strategic Decision-Making Process. 1-8 - Batool Zyoud, Saad Bani-Mohammad, Ismail Ababneh:

Heavy-Tailed Distributions: Their Impact on Noncontiguous Allocation and Job Scheduling in 2D Mesh NoCs. 1-11 - Mahmoud Obaid, Allam Abumwais, Rami Hodrob, Suhail Odeh:

A Blockchain-Based Framework for Efficient and Secure E-Certification Sharing and Verification. 1-6 - Ziad Algendi, Hani Attar, Mohamed A. Hafez

, Hussein Al-Faiz, Jafar Ababneh, Mohanad A. Deif:
Feature Selection for Geomagnetic Storm Forecasting Using Particle Swarm Optimisation. 1-7 - Ahmed Samir, Samir Bendoukha, Hani Attar, Jafar Ababneh, Mohammad Alhihi, Mohamed Hafez

:
Enhancing Wireless Communication with Compact SIW Resonator-based UWB Fork Monopole Antenna. 1-9 - Mennatallah Sherif, Hani Attar, Mohamed A. Hafez

, Jafar Ababneh, Hussein Al-Faiz, Mohanad A. Deif:
Multi-class classification algorithm for ocular diseases classification based GLCM texture features. 1-10 - Raed Alazaidah, Mohammed Abu Safaqah, Haneen Alzoubi, Hani Omar, Maram Y. Al-Safarini, Esraa Abu Elsoud, Ali Elrashidi, Mo'ath Alluwaici, Suhaila Abu Owaida:

Heart Diseases Prediction Using Machine Learning Techniques: A Case Study from Jordan. 1-6 - Igor Petukhov, Luydmila Steshina, Ilya Tanryverdiev, Ilya Steshin, Pavel Kurasov, Danil Galkin:

Research into the accuracy of complex sensorimotor responses of operators to joystick-run technological equipment. 1-6 - Riad Taha Al-Kasasbeh, Sergey Filist, Olga Vladimirovna Shatalova, Dmitry Sergeevich Kondrashov, Ashraf Adel Shaqadan, Nikolay Alexeyevich Korenevskiy, Osama M. Al-Habahbeh

, Emad Saleh Tarawneh, Evgeny Starkov:
Intelligent System for Classifying of Acoustic Endoscopic Images of the Pancreas Based the Analysis of Walsh Spectra of Local Windows. 1-6 - Shaohuo Gao, Juanjuan He, Yi Liao, Hongwei Liu:

A MOEA/D Framework Based on Memory Differential Cooperation Mechanism for Dynamic Multiobjective Optimization. 1-8 - Shrouq Al-Daja, Ala' Alyabrodi, Abdallah Moubayed, MohammadNoor Injadat, Ali Elrashidi:

Criteria-based Unsupervised Feature Selection Techniques: A Comparative Study Over Chest CT Scan. 1-8 - Jehad Nasereddin

, Amer Abu Salem:
Enhancing Printed Document Security with QR Code-Based Digital Signatures. 1-6 - Abdallah Moubayed, Nouh Alhindawi, Jamal Alsakran, MohammadNoor Injadat, Mohammad Kanan:

A Data-Driven Approach Towards Software Regression Testing Quality Optimization. 1-8 - Ala' F. Khalifeh, Rami Ghanem:

Solar Panel Soiling Classification Using Machine Learning Algorithms. 1-5 - Qingxi Chen, Gu Gong:

Adaptive Parameter Tuning with Double Layer Genetic Algorithm for Solving TSP. 1-7 - Ghassan Samara, Mohammad Abu Fadda, Abeer Al-Mohtaseb, Raed Alazaidah, Alrefai Mohamed N., Mahmoud Odeh, Mohammad Aljaidi, Mohammed Mahmod Shuaib, Mohammad Kanan:

Deep Learning Approaches for Malware Detection in the Industrial Internet of Things: A Comprehensive Analysis. 1-7 - Wei Xiao, Yu Liu, XiangLong Li, Feng Gao, Jinguang Gu:

TKG-RAG: A Retrieval-Augmented Generation Framework with Text-chunk Knowledge Graph. 1-9 - Abdallah Rezgui, Brahim Nasraoui

, Arij Alfaidi, Mourad Talbi:
A New ECG Denoising Technique based on WATV and Convex Fused-Lasso. 1-6 - Charles Gomarga, Gregorius Jason Winata, Joshiah Elroi Thungriallu, Richard Wiputra:

Smart Contract Security Vulnerability Through The NIST Cybersecurity Framework 2.0 Perspective. 1-8 - Hanay Almomani, Ayoub Alsarhan, Mahmoud AlJamal, Mohammad Aljaidi, Tamam Alsarhan, Bashar Khassawneh, Abdelrahman Alfaqih, Ghassan Samara, Manish Kumar Singla:

Securing Internet of Vehicles IoV Communications: A Biometric and Hash-Key Derivation Function HKDF-Based Approach. 1-7 - Muhyeeddin Alqaraleh

, Mowafaq Salem Alzboon
, Mohammad Al-Batah, Hatim Solayman Migdadi, Oqeili Saleh, Raed Alazaidah, Ali Elrashidi:
Innovative Machine Learning Solutions for Automated Kidney Tumor Detection in CT Imaging Through Comparative Analysis. 1-9 - Shorouq F. Eletter, Ghaleb A. Elrefae

, Saad Ghaleb Yaseen, Abdul Razzak Alshehadeh
:
Using Monte Carlo Simulation for Real Estate Price Valuation. 1-4 - Hamed Fawareh, Yazan Al-Smadi, Hamzeh Aljawawdeh, Faid AlNoor Fawareh, Fuad Alshraiedeh, Mohammed Khouj:

An Empirical Study on Measuring the Impact of Code Smells on Web Applications. 1-5 - Khaleel Rabih AlJohany, Ola Mohammad Surakhi

:
A Sensitive Analysis for Teacher Burnout Identification using Machine Learning Method: Jordan Case Study. 1-10 - Tahir Hassan, Khalid Mansour, Waseemullah Waseemullah, Muhammad Qasim Memon:

Carbon Dioxide Emission Forecasting using Machine Learning and Time Series Statistical Models. 1-6 - Zhengwei Qiao, Kai Zhang, Ni Wu, Ling Zhang:

Two-Stage Archive Evolutionary Algorithm for Multimodal MultiObjective Optimization. 1-8 - Mahmoud Asassfeh, Mohammad Rasmi Al-Mousa

, Waleed Amer, Adai Mohammad Almomani, Ala'a Al-Shaikh, Suha Afaneh, Mohammed Nayef Alrefai, Ali Elrashidi, Ghassan Samara:
Main Confidentiality Challenges in Network Security: A Literature Review. 1-9 - Hamed Fawareh, Yazan Al-Smadi, Rania Saadeh, Faid AlNoor Fawareh, Ali Elrashidi, Hazim M. Al-Shdaifat

:
A Comparative Study between Agile and Waterfall Methodologies during Software Development Process. 1-5 - Bintang Annisa Bagustari

, Abdul Razzak Alshehadeh
, Haneen A. Al-Khawaja, Ihab El Qirem, Ghaleb A. Elrefae
, Ayman Abdalmajeed Alsmadi:
The Impact of Artificial Intelligence Tools on the Quality of Financial Reports in Service Companies. 1-5 - Yazan Alahmed

, Meryem Mazroub:
Building Trustworthy AI systems for secure digital health services. 1-7 - Benselim Mohamed Salah, Djebar Yacine:

Towards Combining Model Driven Engineering and Software Product Line Engineering Based on Variability. 1-9 - Asalla M. Al-Sheyab, Msallam Kousa, Hanadi Bani Hamad, Adai Mohammad Almomani, Ali Elrashidi:

Machine Learning Approaches for Early Detection of Heart Diseases. 1-7 - Md. Sabit Shahriar Haque, Kazi Aklima Sultana, Mohammad Sarwar Morshed:

IoT-Integrated Cashless Sanitary Pad Vending Machine for Sustainable Menstrual Hygiene Management in Bangladesh. 1-10 - Hani Attar, Jafar Ababneh, Mohamed A. Hafez

, Waleed Alomoush
, Hussein Al-Faiz, Mohanad A. Deif:
Automatic Diagnosis of Sarcoidosis Stage Using Machine Learning Algorithms. 1-9 - Ahmad Y. A. Bani Ahmad, Mahmoud Allahham, Wasef Ibrahim Almajali, Firas Tayseer Ayasrah, Samar Sabra:

From Insights to Impact: Business Intelligence's Influence on Jordan's Industrial Decision-Making. 1-5 - Sanabil A. Mahmood, Naktal Moaid Edan, Monji Kherallah:

Improving WebRTC Quality-of-Service Using SDN and a Load Balancing Strategy. 1-9 - Omar Khair Alla Alidmat, Suhaila Abuowaida, Esraa Alhenawi, Hebatullah Khattab Awwad, Adai Al-Momani

, Umi Kalsom Yusof, Ali Elrashidi:
A Novel Cellular Automaton Model for Optimized Multi-Exit Crowd Evacuation in High-Density Environments. 1-10 - Adnan Shaout, Thomas Kyer:

VSK - A Tripartite Development Model based on the V-Model, the Scrum, and the Kanban Methodologies. 1-6 - Hala Khaled AlMasri, Reda S. M. Al-Mawadieh, Eissa Abdul Wahab Al-Tarawneh, Mohammad F. Al-Abdallat

, Luma Fakhir Abdul Razzak, Mohammad Kanan:
The Values of Digital Citizenship Among Social Media Users in Jordan: A Case Study of Facebook. 1-5 - Thabit Sabbah

, Mahmoud Ashraf, Mohammad Abrar:
Enhanced Support Vectors based Oversampling Method. 1-7 - Shuq Hussein:

Legal Aspects, Public Interest, and Legitimate Interest in Processing Personal Data to Operate Autonomous Car. 1-7 - Ala' Alyabrodi, Shrouq Al-Daja, MohammadNoor Injadat, Abdallah Moubayed, Ali Elrashidi:

Evaluation of Chest CT-Scan Anomaly Detection Models Using Principal Component Analysis. 1-6 - Ala'a Al-Shaikh, Ashraf Hasan AlAlfi, Esam Y. A. Al-Nsour, Suha Afaneh, Ghassan Samara, Khaled AlQawasmi, Nabeel Al-Milli, Mohammed Khouj, Amer Abu Salem:

Using Artificial Intelligence Techniques in Law Enforcement: A Survey. 1-7 - Ala'a Saeb Al-Sherideh, Samah Suleiman Al-Zou'bi, Fuad Alshraiedeh, Esraa Abu Elsoud, Suha Afaneh, Mohammad Rasmi Al-Mousa

, Raed Alazaidah, Mohammed Khouj, Ghassan Samara:
Digital Evidence and Forensic Tools in Cyber Law: A Comprehensive Analysis. 1-6 - Mahmoud AlJamal, Rabee Alqura'n, Mohammad Aljaidi, Osama S. AlJamal, Ayoub Alsarhan, Issa Al-Aiash, Ghassan Samara, Mohammad BaniSalman, Mohammad Khouj:

Harnessing ML and NLP for Enhanced Cybersecurity: A Comprehensive Approach for Phishing Email Detection. 1-9 - Mouhamed Laid Abimouloud, Khaled Bensid, Mohamed Elleuch, Oussama Aiadi, Monji Kherallah:

Leveraging Knowledge Distillation in Vision Transformers for Binary Classification of Kidney Tumors from CT Radiography Images. 1-7 - Raed Alazaidah, Radwan Batyha, Ghassan Samara, Esraa Al Henawi, Maram Y. Al-Safarini, Ahmad A. Samhan, Ali Elrashidi, Mo'ath Alluwaici, Deana Al-Omari:

Diabetes Prediction Using Machine Learning Techniques: A Case Study from Jordan. 1-6 - Suhair AlHajHassan, Samer Murrar, Ahmad Samhan, Mohammed Odeh, Ali Elrashidi:

A Comparative Analysis of Goal-Oriented Requirements Engineering and Model-Based Systems Engineering Frameworks for Managing Requirements of Systems of Systems. 1-12 - Leila Benarous, Ihssene Khadidja Bendjazia:

Deep Learning content-based search in media files. 1-6 - Hazem Jihad Badarneh, Loai Ahmad Attiany, Mahmoud Asassfeh, Ala'a Al-Shaikh, Suha Afaneh, Mohammed M. Abu Shquier, Nabeel Al-Milli, Ali Elrashidi, Ghassan Samara:

The power of Network Penetration Testing. 1-6 - Said A. Salloum, Rana Saeed Al-Maroof, Khalaf Naser Tahat, Raghad Alfaisal, Dina Naser Tahat:

Impact of User Innovativeness on Metaverse Adoption. 1-7 - Adnan Shaout, Noah Beattie, Nicholas Kessey:

Theft Alarm and Notification System for Medical Applications. 1-6 - Adnan Shaout, Zachary Brauchler, Jacob Westerbeek:

Design and Implementation of a Two-Stage Tiny Bootloader for Flash-Constrained Microcontrollers Using RAM Execution. 1-7 - Sana Abouelnour

, Aneesa Al Redhaei, Mohammed Azmi Al-Betar, Ghazi Al-Naymat:
Machine Learning in Higher Education: Predicting and Mitigating Student Dropout. 1-7 - Nada Khattab, Ahmad Al-Qerem, Shadi Nashwan, Issam Jebreen, Mohammed Rajab, Mohammad Alauthman, Mohammad Jeadi, Ali Elrashidi:

Unveiling Deception: Different Strategies for Combatting Arabic Fake News. 1-9 - Mohammad Rasmi Al-Mousa

, Mohammad Abdulqawi, Hazem Jihad Badarneh, Ala'a Al-Shaikh, Mahmoud Asassfeh, Ala'a Saeb Al-Sherideh, Ghassan Samara, Ali Elrashidi, Raed Alazaidah:
A secure IoT limited Devices by applying Multi-Round Lightweight Cryptography. 1-8 - Hamed Fawareh, Yazan Al-Smadi, Mohammad A. Hassan, Faid AlNoor Fawareh, Ali Elrashidi:

Software Code De-Compilation Techniques and Approaches: A Comparative Study. 1-4 - Musab Iqtait, Jafar Ababneh, Amer Abu-Jassar, Mohammad Al Refai, Mohammad Dmour, Mohammad Arabiat, Ruaa Binsaddig:

Facial Recognition Utilizing the CLM Model and Supervised Machine Learning: A Comparative Analysis. 1-6 - Md Sakib Ullah Sourav, Mohammad Sultan Mahmud, Hua Zheng, Mohammad Aljaidi, Md. Simul Hasan Talukder, Rejwan Bin Sulaiman, Abdullah Hafez Nur, Ahmad Al-Qerem:

Transformer-based Text Classification on Unified Bangla Multi-class Emotion Corpus. 1-7 - Khalil M. Ahmad Yousef, Bassam Jamil Mohd, Mohammad Amra, Yazeed Kamel, Anas AlMajali:

Security Risk Assessment of Humanoid Robotics: DARWIN-OP2 as Case Study. 1-5 - Hamzeh Aljawawdeh, Randa Salman, Rasha Alzaben, Ragae Dughmosh, Mohammed Khouj:

Evolutionary Insulin Management: A Digital Health Solutions for Type 1 Diabetes Support. 1-7 - Meryeme Hadni, Mounir Gouiouez, Hjiaj Hassane

, Meryem Amane:
Enhanced Arabic Feature Selection using an Improved Whale Optimization Algorithm. 1-6 - Gaganpreet Kaur

, Shonak Bansal, Mohammad Aljaidi, Ujjwal Kaushik:
Hybrid Diabetes Mellitus Prediction Modeling and Analysis Using Machine Learning Techniques. 1-5 - Shonak Bansal, Arnav Bansal, Mohammad Aljaidi, Gaganpreet Kaur

, Krishna Prakash:
Optoelectronic characteristics of bilayer graphene/ZnO nanowires heterojunction UV photodetector for IoT applications: A simulation study. 1-7 - Kunwar Kalra, Vedant Iyer, Neil Patel:

Enhancing Skin Cancer Detection Across Skin Tones with Style Transfer Augmentation. 1-9 - Hatem Mosa

, Amro Saleh, Abdallah Qusef, Ahmad Altamimi, Mohammad Alnabhan:
Leveraging Blockchain for Ethical Sourcing and Sustainability in Supply Chains: A Systematic Review. 1-7 - Mohammad Rasmi Al-Mousa

, Samah Suleiman Al-Zou'bi, Sami Askar, Khaled E. Al-Qawasmi, Ala'a Saeb Al-Sherideh, Ghassan Samara, Rami Almatarneh
, Mohammed Khouj, Mahmoud Odeh:
IoT Security Based On Lightewight Cryptographic (LWC) Algorithms: A survey. 1-9 - Zahoor M. Aydam, Nidhal K. El Abbadi:

From Monochrome to Technicolor: A Comprehensive Review of Video Colorization. 1-13 - Ahmad Y. A. Bani Ahmad, Mahmoud Allahham, Wasef Ibrahim Almajali, Firas Tayseer Ayasrah, Samar Sabra:

Blockchain's Role in Emerging Markets: Accelerating Digital Supply Chain Management and Unlocking New Opportunities. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














