JoomlaLock.com All4Share.net

Research Production

  • Read 90 times

Faculty of Information Technology

Research Production

2010-2017

 

Research title, Publisher, Date

Name of researcher

#

Publication 2017

 

Segmented Block Cipher Algorithm based on ASCII Codes “ Journal of Computer Science (JCS)  2017, VOL  13 (12): 748.755 ISSN Print: 1549-3636, ISSN Online: 1552-6607

Shadi R. Masadeh and Hamza A. A. Al_Sewadi

1)       

Smooth Handoff Process Cluster Based In Vehicular Ad Hoc Networks. International Journal of Computing Academic Research (IJCAR), 2017.

 

Wa’el Jum’ah Al_Zyadat, Faisal Y.AlZyoud Aysh M. Alhroob

 

2)       

“An Algorithmic Approach for Sketching Sequence Diagram (AASSD)”. International Conference on Advances in Image Processing (ICAIP 2017). Bangkok, Thailand, August 2017

Heba A. Nassar, Aysh Alhroob and Ayad T. Imam

3)       

Cloud Computing Security Challenges in Higher Educational Institutions” - A Survey. International journal of Computer Applications.  Volume 61. No. 6.  DOI 10.5120/ijca2017913217. (2017)

 

Khalil H. A. Al-Shqeerat, Faiz M. A. Al-Shrouf, Mohammad R. Hassan, Hassen Fajraoui.

4)       

Utilization of Computer and Information Technology by Physicians. International Journal of Computing Academic Research (IJCAR) 6 (5), 66-170.2017

Alhadidi, B., and Al-Rousan,T.

5)       

Mode Division Multiplexing of Helical-Phased Spot Mode and Donut Mode in Multimode Fiber Interconnects. 2017 IEEE Symposium on Computer Applications & Industrial Electronics. 2017

Yousef Fazea, Angela Amphawan, Osama Qtaish

6)       

Real-Time Objects Recognition Approach for Assisting Blind People,  International Journal of Current Engineering and Technology, Vol.7, No. 1, February, 2017.

 Jamal S. Zraqou, Wissam M. Alkhadour, and Mohammad Z. Siam.

7)       

A New Maturity Model for the Implementation of Software Process Improvement in Web-Based Projects, Journal of Digital Information Management 15 (2), 66-75 2017

Thamer Al-rousan, Bassam  Al-Shargabi

8)       

Energy Saving in Modified RPL: An Experimental Study and Results. The 2ⁿᵈ International Computer Sciences and Informatics Conference (ICSIC 2017),Amman-Jordan 2017

W,Mardini,Bassam Al-Shargabi.M,Bani Yassein, A,Alkhatatbeh and E, Abdarahman

9)       

A Multi-threaded Symmetric Block Encryption Scheme Implementing PRNG for DES and AES systems

International Journal of Advanced Computer Science and Applications, Volume 8 Issue 2, 2017.

 

 

Adi A. Maaita, Hamza A. Al-Sewadi

 

 

10)   

A Trace Simplification Framework. ICIT 2017 the 8th International Conference on Information Technology, IEEE.

Abualese, H.; Al-Rousan, T.,  and Rasmi, M.

11)   

Internet of Things an Exploration Study of Opportunities and Challenges, , IEEE ICEMIS 2017

Bassam AL-Shargabi, Omar Sabri

12)   

The Future of the Internet of Things. 2th International Conference on Recent Trends in Engineering and Technology), At Paris, 2017.

Al-Rousan, T.

 

13)   

Utility classes detection metrics for execution trace analysis. ICIT 2017 the 8th International Conference on Information Technology, IEEE.

Abualese, H.; Al-Rousan, T.,  and Rasmi, M.

14)   

Publication 2016

 

“A New Secure Forward Digital Signatures Based on Forecasting and Statistical Entropy of Key Exposures”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 5, Issue 1, January 2016

 

Faris M. Al-Athari, Abdulameer Khalaf Hussain, Adnan Hadi Mahdi Al-Helali

 

15)   

Jordanian Consumer Perspective for B2C E-commerce Website Evaluation Factors”.  International Conference on Computer Sciences and Informatics, Amman-Jordan. (2016)

 

Omar Tarawneh, Faiz Al Shrouf, Mohammad Nassar

16)   

“A Proposed Mobile Commerce Model Based on Mobile Agents” .  International Conference Computer Sciences and InformaticsConference.  Amman, Jordan. (2016).

 Faiz Al Shrouf, Omar Al Tarawneh

17)   

A Hybrid Method for Finding Correspondences From Un-calibrated Pair of High Resolution Images, Macrotrends in Technology and Science, 19-21 December, 2016.

J. Zraqou, W. Alkhadour, A. Tayyar and S. Masaadeh

18)   

The Classification Filter Techniques By Field Of Application And The Results Of Output, Australian Journal Of Basic And Applied Sciences, ISSN: 1991-8178, EISSN: 2309-8414, Oct. 2016, Pp.68-77.

FAISAL Y.AL-ZYOUD, WA’EL JUM’AH AL_ZYADAT

 

19)   

Cloud Computing Security Enhancement by Using Mobile PIN Code, Journal of Computers (JCP), DBLP, EBSCO, DOAJ, ProQuest, Vol. 11, No. 3, May 2016.

 

Alhadidi1, Basim, Arabeyat, Zahraa, Alzyoud, Faisal, Alkhwaldeh, Ali

 

20)   

Arabic Keyword Extraction using SOM Neural Network, International Computer Sciences and Informatics Conference (ICSIC 2016), 12-13 January 2016, Amman, Jordan. (2016)

 

Ebtehal H.Omousha, Venus W. Samawi (2016),

 

21)   

Opinion Mining: Analysis of Comments Written In Arabic Colloquial, Proceeding of the conference of World Congress on Engineering and Computer Science (WCECS 16) San Francisco, USA, 21-23 October, Vol 1, pp:470-475. (2016).

 

Ahmed Y. Al-Obaidi, Venus Samawi,

 

22)   

Smooth handoff process cluster_based in vehicular ad hoc networks, 2016.

 

Wa’el Jum’ah Al_Zyadat, Faisal Y.Alzyoud ,

 

23)   

“A Novel Polygon Cipher Technique using hybrid key Scheme “International Journal of Computer Science and Information Security (IJCSIS) , VOl 14. NO 4 April 2016 ISSN 1947 5500 Copyright © IJCSIS, USA.

Shadi R. Masadeh and Hamza A. A. Al_Sewadi

24)   

A Novel Paradigm for Symmetric Cryptosystem” International Journal of Advanced Computer Science and Applications(ijacsa), 7(3), 2016. http://dx.doi.org/10.14569/IJACSA.2016.070317

Shadi R. Masadeh, Hamza A. Al_Sewadi and Mohammad A. Wadi

25)   

The classification filters, techniques by field of application and the results of output, 2016.

 

Faisal Y.Alzyoud, Wa’el Jum’ah Al_Zyadat

 

26)   

A Hybrid Method For Finding Correspondences From Un-Calibrated Pair Of High Resolution Images. The Journal of MacroTrends in Technology and Innovation,Pages 20-26, December 2016.

J. Zraqou, W. Alkhadour, A. Tayyar and S. Masaadeh

27)   

A Hybrid Method for Finding Correspondences From Un-calibrated Pair of High Resolution Images, Macrotrends in Technology and Science, 19-21 December, 2016.

J. Zraqou, W. Alkhadour, A. Tayyar and S. Masaadeh

28)   

Security Engineering for E-Government Web Services: A Trust Model, IEEE,2016

Bassam al-shargabi

29)   

Resistance Factors Influencing the Adoption of Cloud Computing in Middle East Government Sectors.2016 .

Al-Rousan, T., and Abu Hashish

30)   

A study of Adopting Cloud Computing from Enterprise Perspective using Delone and Mclean IS Success Model,IJCSIS.2016

 

Bassam al-shargabi,Omar Sabri

31)   

Publication 2015

 

The Definition of Intelligent Computer Aided Software Engineering (I-CASE) Tools, Journal of Information Engineering and Applications, 2015.

 

Ayad T. Imam, Ayman J. A, Aysh Al-Hroob

 

32)   

Best Test Cases Selection Approach Using Genetic Algorithm”, Journal of Computer and Information Science” vol.8 no.1, 2015

 

Nidal Yousef, Aysh Alhroob, Hassan tarwaneh

 

33)   

Cloud Computing for Global Software Development: Opportunities and Challenges.2015

Al-Rousan, T.

34)   

Prospects of Cloud Computing In E-Government. International Journal of Advanced Computational Engineering and Networking. 3 (10).2015.

Al-Rousan, T.

 

35)   

Integration of e-learning and cloud computing platform through software engineering”. Recent Patents on Computer Science, Volume 8, Number 2, August 2015, pp. 100-105(6). Bentham Science Publishers (Canada). 2015

Aljawarneh, Shadi; Alshargabi, Bassam; M.A. Hayajneh, Sofyan; Ayad Tareq Imam

36)   

“Database Copyright Protection using Watermarking Arabic-Characters”. 3rd International Conference on Communication and Electronics Information (ICCEI 2015), Bali, Indonesia. January 2015

Shadi Masadeh, Ashraf Odeh, Ayad T. Al-Zobaydi

37)   

“Adaptive Routing Protocols for Dynmic Wireless Senser Networks, International Journal of Electrical and Computer Engineering Vol 2, No:11, 2015.

Fayez Mostafa Alhamoui and Adnan Hadi Mahdi Al-Helali

38)   

Impact of Cloud Computing on Educational Institutions: A Case Study.2015

Al-Rousan, T., and Abu Al Ese,

39)   

"A Secure Authentication System for ePassport Detection and Verification", , pp. 173-176, 2015, doi:10.1109/EISIC.2015.21

Fadi Hamad, Jamal Zraqou, Adi Maiita, Anas Abu Taleb

40)   

“A Generic Adaptive Multi-Gene-Set Genetic Algorithm (AMGA)”, International Journal of Advanced Computer Science and Applications 6(5):12 - 18 · June 2015

Adi A. Maaita · Jamal Zraqou · Fadi Hamad · Hamza A. Al-Sewadi

41)   

Cloud Computing for Global Software Development: Opportunities and Challenges. International Journal of Cloud Applications and Computing. IGI. U.S.A.5 (1).2015.

Al-Rousan, T.

 

42)   

“An efficient image processing and browser tool for solar images”, Journal of Theoretical and Applied Information Technology,80.1 (Oct 2015): 124-132

A. Odat · A. Maaita · F. Hamad · J. Zraqou

43)   

"Automatic Test Data Generation for Java Card Applications Using Genetic Algorithm", Journal of Software Engineering and Applications, Dec 2015, DOI: 10.4236/jsea.2015.812057

 

Manaseer, S. , Manasir, W. , Alshraideh, M. , Hashish, N. and Adwan,

 

44)   

Visualizing and Processing Solar Images Efficiently, International Journal of Science and Applied Information Technology (IJSAIT), 23 – 24 November, 2015.

Jamal Zraqou & Shadi Masaadeh

45)   

A novel secure system for E-Learning: Schools in MOE in Jordan Case Study, International Journal of Science and Applied Information Technology (IJSAIT), 23 – 24 November, 2015.

Shadi Masaadeh, Jamal Zraqou, and Mohammad Wadi

46)   

“An efficient detection system for a drowsy driver”, Journal of Theoretical and Applied Information Technology78.3 (Aug  2015): 421-426

J. Zraqou · A. Maaita · W. Alkhadour · F. Hamad

47)   

“A Generic Adaptive Multi-Gene-Set Genetic Algorithm (AMGA)”, International Journal of Advanced Computer Science and Applications 6(5):12 - 18 · June 2015

Adi A. Maaita · Jamal Zraqou · Fadi Hamad · Hamza A. Al-Sewadi

 

48)   

Impact of Cloud Computing on Educational Institutions: A Case Study.2015

Al-Rousan, T., and Abu Al Ese,

49)   

“An efficient image processing and browser tool for solar images”, Journal of Theoretical and Applied Information Technology,80.1 (Oct 2015): 124-132

A. Odat · A. Maaita · F. Hamad · J. Zraqou

50)   

Security In Mobile Computing, in Ala’a Alhamami and Ghossoon M. Waleed al-Saadoon (Eds). Threat Detection and Countermeasures in Network Security, Book Chapter. IGI, (2015)

 

Venus W. Samawi

 

51)   

Traffic Light Control Utilizing Image Analysis (2015). Gi-Chul; Ao, Sio-long; Gelman, Len (Eds), Transactions on Engineering Technologies: World Congress on Engineering 2014. Book chapter, Springer. (2015).

 

Obadah M. A. Ayesh, Venus W. Samawi, and Jehad Q.

 

52)   

A Cryptographically Secure Multi-Stage Pseudo-random number Generator International Journal of Advanced Research in Computer and Communication Engineering 05/2015; 4(5):12 - 18.

 

Adi A. Maaita, Hamza A. A. Al_Sewadi, Abdulamir K. Husain, Osama Al-Haj Hassan

 

53)   

Enhancement Arabic Text Classification Using Semantic Relation With Part Of Speech Tagger. Proceeding of the 14th International Conference on Artificial Intelligence, Knowledge Engineering and Databases (AIKED '15), pp: 195-201, Spain, 10-12 Jan. (2015)

 

Suhad A. Yousif, Venus W. Samawi, Rached Zantout, Islam Elkabani

 

54)   

Deterministic Random Number Generator Algorithm for Cryptosystem Keys CISAI 2015: 17th International Conference on Information Security and Artificial Intelligence, Venice, Italy; 04/2015

 

Adi A. Maaita, Hamza A. A. Al_Sewadi

 

55)   

Lexical Cohesion and Entailment based Segmentation for Arabic Text Summarization (LCEAS). The World of Computer Science and Information Technology Journal (WCSIT), Vol. 5, No.3, pp. 51-60 (2015).

Fatima T. AL-Khawaldeh, Venus W. Samawi

 

56)   

Enhancement of Arabic Text Classification Using Semantic Relations of Arabic WordNet, Science publication, Journal of Computer Science, Vol 11, Issue 3, pp: 498.509 2015. DOI: 10.3844/jcssp.2015.498.509 (2015).

Suhad A. Yousif, Venus W. Samawi, Islam Elkaban and Rached Zantout,

 

57)   

The Effect of Combining Different Semantic Relations on Arabic Text Classification", The World of Computer Science and Information Technology Journal (WSCIT), Vol 5, Issue 6. pp. 112-118, 2015.

Suhad A. Yousif, Venus W. Samawi, Islam Elkabani, Rached Zantout

 

58)   

Web Information Retrieval Using Island Genetic Algorithm. Proceeding of the conference of World Congress on Engineering and Computer Science (WCECS 15) San Francisco, USA, 21-23 October, Vol 1, pp:325-330. (2015). Available: http://www.iaeng.org/publication/WCECS2015/

 

Noha Mezyan, Venus W. Samawi

 

59)   

Load Balancing Technique Based on Broadcasting & Residual Energy Using Adaptive Clustering Hierarchy Protocol (LBEACH), Science publication, Journal of Computer Science. Vol 11, Issue 6, pp 821-838. DOI : 10.3844/jcssp.2015.821.838(2015).

 

Abdullah Soliman Alshraa, Venus W. Samawi

 

60)   

Security Issues in Cloud Computing: A Perspective and New Directions, European Journal of Science and Technology,2015

S Aljawarneh, B Al-Shargabi, B Hawashin

61)   

User Preference-Based Web Service Composition and Execution Framework, Advanced Research on Cloud Computing Design and Applications, 118,2015

Bassam al-shargabi

62)   

Integration of E-learning and Cloud Computing Platform Through Software Engineering., Recent Patents on Computer Science,2015

S Aljawarneh, B Alshargabi, S M.A. Hayajneh, A T. Imam

63)   

An Evaluation Of MIS Implementation Success Factors. International Conference of Engineering and MIS 2015.Istanbul Turkey, October 24-26.

Bassam Al-Shargabi,Omar Sabri.

64)   

Publication 2014

 

The Influence of SMS Advertising by Jordanian Commercial Companies on Mobile Phone Users' Consuming Behaviour”, Journal of Information and Knowledge Management, Vol. 4. No.11, 2014

 

Amaal Al-Amawi, Salwa Alsamarai, Manar Maraqa, Aysh Alhroob

 

65)   

A Hybrid Simulated Annealing with Tabu List and Allowable Solutions Memory to Solve University Course Timetabling Problem”, Journal of European Journal of Scientific Research Vol.126 No.1 2014

 

Aysh Alhroob, Hassan tarawneh

 

 

66)   

Transforming UML State Machine Diagram to High Level Petri Net Using Genetic Algorithm”, LNSE 2014 Vol.2 (3): 243-246 ISSN: 2301-3559 DOI: 10.7763/LNSE.2014.V2.130

 

Aysh Alhroob Nidal Yousef

 

67)   

An Efficient and Scalable Ranking Technique for Mashups Involving RSS Data Sources. Journal of Network and Computer Applications. Science Direct. U.S.A. 39(1).2014.

Hassan,O.,  Al-Rousan,T., and Abu Taleb.

68)   

Automatic Diagnosis of Distortion Type of Arabic /r/ Phoneme Using Feed Forward Neural Network”. Journal of Computer Engineering and Intelligent Systems; ISSN (Paper); Vol. 5, No 12. International Institute for Science, Technology and Education (IISTE), New York-USA, 2014

 

Ayad T. Imam; Jehad A. Alaraifi; Ibtisam Hussien J

 

69)   

Designing Structured Peer-to-Peer Architectures for Mashups

IAENG International Journal of Computer Science 02/2014; 41(1):72 - 80.

 

Osama Al-Haj Hassan, Ashraf Odeh, Adi Maaita, Aymen Abu-Errub

70)   

Developing of Natural Language Interface to Robot- an Arabic Language Case Study”, International Review on Computers and Software (I.RE.CO.S.), ISSN: 1828-6003, Vol. 9. No. 7, pp. 1256-1262. Praise Worthy Prize Publishing (U.K.) 2014

 

Ayad T. Al-Zobaydi, Thamer Rousan, Ashraf Odeh,

 

71)   

“The Roles of Decision Making and Empowerment In Jordanian Web-Based Development Organizations”; Journal of Web Engineering; Rinton Press, ISSN: 1540-9589, Vol.13 No.5&6, USA, 2014

 

Thamer Al-Rousan, Ayad Al-Zobaydi

 

 

 

 

72)   

 “An Expert Code Generator using Rule-Based and Frames Knowledge Representation Techniques”; in proceeding of 5th International Conference on Information and Communication Systems (ICICS), Jordan University of Science and Technology, Irbid, Jordan, Pp 1-6,  Print ISBN: 978-1-4799-3022-7, Publisher: IEEE, April, 2014

 

Ayad T. Imam, Shadi Aljawarneh, Thamer Rousan

73)   

“Cooperative distributed architecture for mashups”, Enterprise Information Systems 8(3):406-444 · May 2014

Osama Mohammad Al-Haj Hassan · Lakshmish Ramaswamy · Fadi Hamad · Anas Abu Taleb

74)   

Analysis of Mobile Agent Optimization Patterns. British Journal of Applied Sciences& technology.  4(12).  P.p. 1841-1857. (2014)

 

 Faiz Al Shrouf, Aiman Turani, Ayman AbuBaker, Ahmad Omri. 

75)   

  Microcalcification Enhancement and Detection using Texture Features and SupportVector Machine.  European Journal of Scientific Research.  Vol.119. No. 1. P.p. 85-97. (2014)

 

Ayman AbuBaker, Faiz Al Shrouf, Aiman Turani. 

76)   

Balancing the Network Clusters for the Lifetime Enhancement in Dense Wireless Sensor Networks.  Arabian Journal of Science and Engineering.  DOI 10.1007/s13369-014-1059-x,  Springer. (2014)

 

Hesham Abusaimeh, Mohammmad Shkoukani, Faiz Al Shrouf. 

77)   

Modeling Virtual Meetings Within Software Engineering Environment.  International Journal of Computer Science and Engineering.  Vol. 6, No. 4.  P.p.164-168. (2014)

 

Aiman Turani, Ayman AbuBaker, Faiz Al Shrouf

 

78)   

Software Process Improvement for Web-Based Project. Proceedings on Computational and Experimental Science and Engineering Conference (ICCESEN 2014). Antalya, Turkey.2014.

Al-Rousan, T.

 

79)   

Componentized-Based Framework for Developing Engineering E-Training Content. “European Journal of Scientific Research”. Volume 121 No 3 pp: 321-327. (2014)

 

Aiman Turani, Mohammad H. Alomari and Faiz Al-Shrouf

80)   

“E-Assessments Systems: A Comparison of the Views of Samples

of Students and Professors”, in the Journal of Management Science

and Engineering, Vol. 8, No. 3, 5-10, 2014 Salwa Alsamarai, Amaal Amawi, Mohammad Ali H.Eljinini

Salwa Alsamarai, Amaal

Amawi, Mohammad Ali H.

Eljinini

81)   

Using Data Mining to Predict& Generate Optimum Multiple Execution Paths Compositions. The International Journal for Software Engineering (IJSE). 2014

Osama Qtaish, Zulikha Jamaludin, Mahmuddin

82)   

Online Handwriting Recognition for Maldivian Language. Proceedings of the International Conference on Computer Science, Computer Engineering, and Social Media, December,2014

 J. Zraqou

83)   

Emotion Interaction With Virtual Reality Using Hybrid Emotion Classification Technique Toward Brain Signals, International Journal of Computer Science & Information Technology (IJCSIT), April 2014.

Faris A. Abuhashish, Jamal Zraqou, Wesam Alkhodour, Mohd S. Sunar and  Hoshang Kolivand1

84)   

A Moderated Distance Based Broadcasting Algorithm for MANETs, International Journal of Computer and Communication Engineering (IJCCE), EI (INSPEC, IET), Google Scholar, Crossref, Engineering & Technology Digital Library, ProQuest, and Electronic Journals Library, Vol. 3, No. 6, November 2014.

 

Alhadidi, Basim; Alzyoud, Faisal

 

85)   

Traffic Light Control Utilizing Queue Length, Proceedings of the World Congress on Engineering 2014 Vol I, WCE 2014, July 2 - 4, 2014, London, U.K.pp: 590-594, (2014).

 

Obadah M.A Ayesh, Venus W. Samawi, and Jehad Q.

 

86)   

Robust Real-Time Facial Expressions Tracking and Recognition,

International Journal of Technology and Education Marketing (IJTEM), Pages 95-105,  March, 2014

Zraqou, J., Alkhadour, W., & Al-Nu'aimi

87)   

CPU Utilization for a Multiple Video Streaming over a fiber optic ATM-Network when varying the Quality of Service” International Journal of Emerging Trends in Computing and Information Sciences, Vol. 5 No. 4, April 2014 (E-ISSN 2218-6301/ISSN

2079-8407).

Ahmad Azzazi, Hesham Abusaimeh, Shadi R. Masadeh

 

88)   

A Novel Paradigm In Authentication System Using Swifi Encryption /Decryption Approach" The International Journal of Network Security & Its Applications (IJNSA), , Volume 6, Issue 1, 2014, ISSN : 0975 – 2307 EISSN : 0974 – 9330.

Shadi R.Masadeh , Ahmed Azzazi , Bassam Alqaraleh and Ali Alnimat

89)   

Secure Communication: A Proposed Public Key Watermark System" International Journal of Information Security and Privacy

(IJISP). Volume 7, Issue 4 , 2014 ISSN: 1930-1650; EISSN: 1930-1669

Shadi R.Masadeh , Shadi Jawarneh, Ashraf odeh and Abdulla Alhaj

90)   

Publication 2013

 

The Impact of Frequent Use Email When Creating Account at the Websites on the Users Privacy and Security” International Journal of Computer Science & Information Technology (IJCSIT) Vol 5, No 6, December 2013

 

S. Al-Samairrai, Z. Fadhil, A. Alhroob

 

91)   

Evaluation of Different Query Expansion Techniques for Arabic Text Retrieval System”. American Journal of Applied Sciences, vol.10 no.9 USA, 2013

 

A. Alhroob, H. Khafajeh N. Innab

 

92)   

, “A Comparative Study of Development Methodologies for Web Project: Towards a Viable Alternative”; European Journal of Social Sciences, by Social Sciences Research Platform (SSRP), France, ISSN: 1450-2267, Vol. 40 Issue 1, 2013

 

Thamer Al-Rousan, Osama Al-Haj Hassan, Shadi Al-jawarneh, Ashraf Odeh, Ayad Al-Zobaydi

93)   

DOI: 10.1080/17517575.2013.          

Commerce and the Internet of Things”,

IETE Technical Review 26(5) ·

September 2009

Fadi Hamad · Leonid Smalov · Anne James

94)   

“The Utilization of the Moodle E-Learning System in Isra

University”, Advances in Intelligent Systems and Computing, Vol.

220, 2013

Eljinini MA, Muhsen Z,

Maaita A, Alnsour A, Azzam

MA, Barhoum K

95)   

“E-Assessments Systems: From Academics Personal Trends”, in the

Journal of Theoretical and Applied Information Technology

(JATIT), Vol. 52, No. 2, 173-182, 20th June 2013

Alsamarai Salwa, Eljinini

Mohammad Ali, Amawi

Amaal, Hameed Suha

 

96)   

“The Impact on the Utilization of E-Learning Systems”,

International Journal of Emerging Trends & Technology in

Computer Science (IJETTCS), Vol. 2, No. 3, 171-175, May-June

2013

Eljinini MA, Muhsen Z

97)   

An Efficient Approach for Recognizing and Tracking Spontaneous Facial Expressions, The Second International Conference on E-Learning  & E-Technologies in Education (ICEEE2013), December 2013.

J. Zraqou, W. Alkhadour, and A. Al-Nu’aimi

98)   

Self-Embedding Watermarking for Digital Images Depending On Edge Energy, The Second International Conference on Informatics, Engineering and Information Science (ICIEIS2013).

Abdallah Al-Tahan Al-Nu'aimi, Jamal Zraqou and Wessam Alkhadour

 

99)   

“Robust Real-Time fand Recognition”, International Journal of Technology and Educational Marketing, 2013

Zraqou, J., Alkhadour, W., & A. Al-Nu'aimi

100)           

A Comparison Study of Common Routing Procols used in Wireless Ad-Hoc Networks, Research Journal of Applied Sciences, Engineering and Technology, ISI Thomson, Vol. 15, No. 12, April 10, 2013

 

Alhadidi, Basim; Alzyoud, Faisal Y.;El-Khairy, Amer; Zakerneh, Ehab

 

101)           

Intrusion Detection by Dynamic Length Rule, AWERProcedia Information Technology & Computer Science. [Online]. 2013, 3, pp 1460-1470. Available from: http://www.world-education-center.org/index.php/P-ITCS

 

Susan M. Al Naqshbandi, Venus W. Samawi, Jaap van den Herik

 

102)           

Fingerprint Identification Technique Based On Wavelet-Bands Selection Features (WBSF), International Journal of Computer Engineering and Technology (IJCET). Vol. 4, No. 3. pp:308–323. (2013)

 

Mustafa Dhiaa Al-Hassani, Abdulkareem A. Kadhim, Venus W. Samawi

 

103)           

Arabic Expert System Shell, International Arab Journal of Information Technology (IAJIT), Vol. 10, No.1. (2013)

 

Venus W. Samawi, Akram A. Mustafa, Abeer K. Ahmad

 

104)           

Software Protection via Hiding Function Using Software Obfuscation, International Arab Journal of Information Technology (IAJIT), Vol. 10, No.6. (2013)

 

Venus W. Samawi, Adeeb H. Sulaiman

 

 

 

105)           

Speaker Identification using Selected Features from DWT, Proceeding of the 2nd International Conference on Advanced Computer Science Applications and Technologies–ACSAT2013,23-24 December, Malaysia-Sarawak. (2013)

 

Feras Abualadas, Venus W. Samawi

 

106)           

Self-Embedding Watermarking for Digital Images Depending On Edge Energy, The Second International Conference on Informatics, Engineering and Information Science (ICIEIS2013).

Abdallah Al-Tahan Al-Nu'aimi, Jamal Zraqou and Wessam Alkhadour

107)      

Cloud computing challenges and Solutions ” International Journal of computer networks and Communications (IJCNC) Vol.5, No.5, September 2013, ISSN : 0974 - 9322[Online]; 0975 - 2293 [Print].

 

Nidal M. turab, Anas Abu Taleb, Shadi R. Masadeh

 

 

108)           

Novel Secure E-Contents System For Multi-Media Interchange Workflows In Elearning Environments” International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013 , ISSN : 0974 - 9322[Online]; 0975 - 2293 [Print].

 

Shadi R. Masadeh, ,Bilal Abul-Huda and Nidal M. Turab

 

109)           

A Proposed Campus Building Process in Cloud Computing” International Journal of Computer Science and Telecommunications, Volume 4, Issue 6, June 2013 , pages 47-50, ISSN 2047-3338.

 

Shadi R. Masadeh and Nidal M. Turab

 

110)           

 

 

111)           

A Secure Data Transmission Mechanism for Cloud Outsourced Data " International Journal of Cloud Applications and Computing (IJCAC) , Volume 3, Issue 1, 2013 , pages 34-43, ISSN: 2156-1834, EISSN: 2156-1826

 

Abdullah Alhaj, Shadi Aljawarneh, Shadi Masadeh and Evon Abu-Taieh

 

112)           

Publication 2012

 

Transforming UML State Diagrams To High Level Petri Nets”. In proceeding of International Conference of Software Technology and Engineering Phuket, Thailand, IEEE, 2012

 

A. Alhroob, N. Yousef A. Maitah

 

113)           

“A Fast Personal Palmprint Authentication based on 3D-Multi Wavelet Transformation”, Transnational Journal of Science and Technology, Vol. 2, No. 8, Sep. 2012.

 

Adnan H. M. Al-Helali, W. A. Mahmmoud, and H. A. Ali

 

114)           

Analysis of Mobile Agent Systems Performance Using Linear Predection Model.  International Journal of Reviews in Computing.  Vol. (12).  P.p.  44-50. (2012)

 

Faiz Al Shrouf, Aiman Turani

115)           

Evaluating Time Performance Optimization Analysis for Mobile Agent Message Communication using Assignment Computing Agent.  Journal of Applied Sciences..  Vol. 12, Issue 12.  P.p.  1290-1296 .   (2012)

Faiz Al Shrouf, Hesham Abusaimeh, Khaleel Shqeerat, Mahmoud Omari

 

116)           

Dynamic Probabilistic Approach for Improving the Route Discovery in MANETsResearch Journal of Applied Sciences, Engineering and Technology.. Vol. 4 (15). p.p.  2396-2402. ((2012) 

 

Khaleel Shqeerat, Alia Sabri, Faiz Al Shrouf

117)           

“The Impact of E-Assessments System on the Success of the

Implementation Process”, in the International Journal of Modern Education and Computer Science (IJMECS), Vol. 4, No. 11, 76-84,

December 2012

Eljinini Mohammad Ali,

Alsamarai Salwa, Hameed

Suha, Amawi Amaal

118)           

A Comparative Study of Development Methodologies for Web Project: Towards a Viable Alternative. Journal of Social Sciences. 40(1).2013

Al-Rousan, T.

119)           

Choosing Appropriate Programming Language to Implement Software for Real-Time Resource- Constrained Embedded Systems Embedded Systems - Theory and Design Methodology, 03/2012; , ISBN: 978-953-51-0167-3

Mouaaz Nahas, Adi Maaita

 

120)           

Optimal QoS Aware Multi-Path Web Service Composition Using Heuristics Algorithm And Data Mining. In The International Conference on Computing, Networking and Digital Technologies (ICCNDT2012), (pp. 136-141). The Society of Digital Information and Wireless Communication. 2012

Osama Qtaish, Zulikha Jamaludin, Mahmuddin

121)           

Multi-Path QoS-Aware Service Composition. International Journal of Engineering Research and Applications (IJERA). 2(2),(pp.1075-1085). 2012

Osama Qtaish, Zulikha Jamaludin, Mahmuddin

122)           

Hiding Degraded Version of  Digital Image within Itself to Prove the Legal Ownership, The 2nd International Conference on Computing and Artificial Intelligence, MIC-CAI, 2012.

J. Zraqou and A. Al-Nu’aimi

123)      

An Automated Method for Generating an Enhanced Set of Correct Matches from  Pairs of Uncalibrated Images,  The 2nd International Conference on Computing and Artificial Intelligence MIC- CAI 2012.

A. Al-Nu’aimi, A. Alnsour, M.A. Eljinini, W. Alkhadour and J. Zraqou

124)      

The effect of using P-XCAST routing protocol on many-to-many applications, International Arab Journal of Information Technology (IAJIT), I.F.: 0.127, ISI Thomson, Vol. 9, No. 4, Jul.2012.

Faisal Y. Alzyoud, Tat-Chee Wan

125)           

One-rule Genetic-Fuzzy classifier. International Conference on Computer Science and Automation Engineering (CSAE), 25-27 May, China, IEEE Xpolre, Vol 2, PP 204-208. (2012).

 

Naqshbandi, Susan M. Al; Samawi, Venus W.

 

126)           

Requirement Manual Document for Weather Data Filtering and (short-term) Prediction, 2012

 

Rodziah Binti Atan Wa’el Jumah Al-zyadat

 

127)           

Weather Data Filtering Tool for Relevant-Based Data Prediction, 2012

 

Rodziah Binti Atan Wa’el Jumah Al-zyadat

 

128)           

A secure model for building e-learning systems. Network Security, Volume 2012, Issue 1, January 2012, Pages 17-20.

 

Shadi R Masadeh, Nedal Turab, Farhan Obisat

 

129)           

Publication 2011

 

“Relative-Fuzzy: A Novel Approach for Handling Complex Ambiguity for Software Engineering of Data Mining Models”. Book. ISBN 978-3-8454-7212-6.  LAP Lambert Academic Publishing Company; Germany 2011

Ayad Tareq Imam

130)           

Intelligent e-Learning Framework for Practicing EducationalTesting Services. The International Arab Journal of Information Technology (IAJIT).  Vol.  8, No.  4, p.p.  372-375. (2011)

 

Aiman Turani, Faiz Al-Shrouf. 

131)           

Software Agents for E-Commerce Data Workflow management.  Second International Conference in Communications in Computer and Information Science, ICSECS, Springer –Verlag Berlin Heidelberg 2011,  Pahang, Malaysia. (2011)

 

Faiz Al-Shrouf, Aiman Turani, and Khalil Al-Shqeerat. 

132)           

A Scalable Framework to Quantitatively Evaluate Success Factors of Mobile Learning Systems, " International Journal of Mobile Learning and Organisation,Vol. 5, No.3/4, Inderscience, 12/31/2011, pp.299 - 316

Ghassan Issa, Hussein Al-Bahadili, and Maher Abuhamdeh

133)           

A Hierarchical Framework for Evaluating Success Factors of M-Learning, " the 2011 Conference on Innovations in Computing and Engineering Machinery (CICEM 2001) , Jordan ACM Professional Chapter-ISWSA, Amman, jordan, 9/6/2011, pp.53 – 59

Hussein Al-Bahadili, Ghassan Issa, and Maher Abuhamdeh

 

 

134)           

“Implementing Moodle as a Tool to Develop the Isra University ELearn System”, in the International Journal of Computer Science

and Network Security (IJCSNS), Vol. 11, No. 6, June 2011

Alnsour A, Muhsen Z,

Dababnah M, Eljinini MA,

Barhoum K, Ahed M, and

Almara'beh H

135)           

"Managing the E-Learning System of Isra University", in the

European Journal of Scientific Research, Vol. 55, No. 3, June 2011

Alnsour A, Muhsen Z, Eljinini

MA, Dababneh M, Barhoum

K, Hammoudeh MA, Ahed M

136)           

“The Medical Semantic Web: Opportunities and Issues”, in:

International Journal of Information Technology and Web

Engineering (IJITWE), Vol. 6, No. 2, April-June 2011

Eljinini MA

 

 

 

 

137)           

QoS criteria for distinguishing the competing web services, Proceedings of the 2011 First IRAST International Conference on Data Engineering and Internet Technology (DEIT), Bali, Indonesia: IEEE Computer Society 2011

Osama Qtaish, Zulikha Jamaludin

138)           

“Using Watermarking Techniques to Prove Rightful Ownership of Web Images", International Journal of Information Technology and Web Engineering, 2011

 

A. S. Alnuaimi

139)           

Developing AIS For Detecting Intrusions Based on Feature Clustering. Proceeding of the 7th International Conference on Computer Applications and Network Security (ICCANS). May 27-29. Maldives, (2011)

 

 

Yamur K. Al-Douri, Venus W. Samawi

 

140)           

“A Formal Evaluation of the Security Schemes for Wireless Networks”. Research Journal of Applied Sciences, Engineering and Technology, 3(09): 910-913 ,2011

 

Shadi R. Masadeh and Nidal Turab

 

141)           

Deploying a Web Client Authentication System Using Smart Card for E-Systems. Research Journal of Applied Sciences, Engineering and Technology, 3(09): 948-952. ,2011

 

Shadi Aljawarneh, Maher debabneh, Shadi R. Masadeh and Abdullah Alhaj

 

142)           

Publication 2010

 

"Computer Operating System", Al-Safa Publisher, Amman, Jordan, 2010.

 

Adnan H. M. Al-Helali and Fayze Al-Hamoui,

 

143)           

Using analytical hierarchy process to measure critical success factors of m-learning”, European, Mediterranean & Middle Eastern Conference on Information Systems 2010 (EMCIS2010), April 12-13 2010, Abu Dhabi, UAE

Maher Abu Hamdeh  & Adel Hamdan

144)           

Developing a Theoretical Framework for Knowledge Acquisition”, European Journal of Scientific Research, Vol.42 No.3 (2010), pp.453-463.

Ibrahim Abu-Nahleh, Adel Hamdan Mohammad, Maher Abu Hamdeh and Alia TahaSabri

145)           

3D Modeling and Solar Image Processing Algorithms, Developed by Space Weather Research Team in University of Bradford, Presentation in Solar Image Processing Workshop, September 2010.

T. Colak, R. Qahwaji, J. Zraqou, and S. Ipson

 

146)      

A New Technique for Location of Fault Location on Transmission Lines, Modern Applied Science, CABI Chemical Abstracts database EBSCOhost Excellence in Research for Australia (ERA) Google Scholar LOCKSS NewJour Open J-Gate Polish Scholarly Bibliography (PBN) ProQuest SHERPA/RoMEO Standard Periodical Directory Ulrich's Universe Digital Library, Vol. 4, No. 8, August 2010.

Alzyoud, Khalaf Y.; Alzyoud, Faisal Y.; Al-Mofleh Anwar

147)           

“A secure wifi system for wireless networks: an experimental evaluation ", International Journal of Network Security, Volume 2010, Issue 6, June 2010,

 

 

 

Shadi Aljawarneh, Shadi R. Masadeh ,Faisal Alkhateeb

 

148)           

Publication 2009

 

“Slantlet Transform for Multispectral Image Fusion”, Journal of Computer Science, Vol. 5, No. 4, 2009, pp: 263-269.

 

Adnan H. M. Al-Helali, Hamza A. Ali, Buthainah Al-Dulaimi, Dhia Alzubaydi and Walid A. Mahmmoud

 

149)           

“Language Constructs for Generalising unit test “, Research Proposal, Testing: Academic and Industrial Conference - Practice and Research Washington, DC, USA ©2009.

Nabil Hashish, Leonardo Bottaci

 

150)           

Enhanced 3D Perception using Super-Resolution and Saturation Control Techniques for Solar Images, UbiCC, Septemper 2009..

Zraqou J., Alkhadour W., Qahwaji R., Ipson S. and Ugail H

151)           

Publication 2008

152)           

"Fundamental of Computer Networks ", Al-Juhayna Publisher, Amman, Jordan, 2008.

 

Adnan H. M. Al-Helali and Fayze Al-Hamoui

 

153)           

“Interactive RPC Binding Model”, European Journal of Scientific Research. 2008

 

Fawaz A. M. Masoud, Qatawneh Mohammad, WesamAlmobaideen, Mohammad Alshraideh, Nabil Abu Hashish, OraibMegdady, Shatha Al-Asir, Shorouq. Aladaileh

 

154)           

Others

 

Development of a Conceptual Approach for Managing E-Risk”, the 7th international scientific conference in Jordan (16-18 April, 2007), Alzaytoonah Private University.

 

Adel Hamdan, Maher Abu Hamdeh, Samer Al Hiwari

155)           

“MS/Ayad-Marwan Network: A New Architecture of an Artificial Neural Network”;  Conference on Interactive Mobile and Computer Aided Leaning (IMCL 2006) Amman, Jordan, April 19 - 21, 2006

 

Ayad T. Al-Zobaydi and Marwan Al-Akaidi

156)           

“Data Mining Model for ASR (DMM4ASR)”; Middle East Simulation & Modeling Conference (MESM2005); Page 147-150; Porto, Portugal; Oct. 2005

 

Ayad T. Al-Zobaydi, Marwan M. Al-Akaidi and Robert I. John

157)           

“Automatic Speech Recognition”; Middle East Simulation & Modeling Conference (MESM2004); Page 102-107; PU, DMU, Gant university, and Eurosis organization; Amman, Jordan; Sept. 2004

 

Ayad T. Al-Zobaydi and M. M. Al-Akaidi;

158)           

“Device Driver for Plotter”; Journal of Computer Researches; folder 2, Vol. 2; Arabic research centers-Arab league; Baghdad- Iraq; 1998

 

Ayad Tareq Imam and Maha I. Hadid

159)           

“PAS2C: A New Trend of Translating Program”, Journal of Education and Science; College of Education; Mosul University; Mosul- Iraq; Fall 1997

 

Ayad Tareq I.

160)           

Last modified onWednesday, 17 January 2018 09:24