default search action
ICIT 2021: Amman, Jordan
- International Conference on Information Technology, ICIT 2021, Amman, Jordan, July 14-15, 2021. IEEE 2021, ISBN 978-1-6654-2870-5
- Maroua Ahmid, Okba Kazar:
A Cloud-IoT Health Monitoring System Based on Smart Agent for Cardiovascular Patients. 1-6 - Layth Abu Arram, Mohammed Moreb:
Cyber Security In Mobile Apps And User CIA. 7-12 - Ma'mon Abu Hammad, Iqbal H. Jebril, Duha AbuJudeh, Yousef Dalahmeh, Siham Ali Abrikah:
Properties of Conformable Fractional Rayleigh Probability Distribution. 13-15 - Iqbal H. Jebril, Ma'mon Abu Hammad, Eman Nouh, Rahaf Hamidi, Yousef Dalahmeh, Salemah Almutlak:
Properties of Conformable Fractional Gamma with two Parameters Probability Distribution. 16-18 - Amer Dababneh, Ma'mon Abu Hammad, Amjed Zreqat, Bilal Albarmawi, Siham Ali Abrikah:
Conformable Fractional of Euler Type Equation. 19-20 - Yaman Salem, Mohammed Moreb, Khalid S. Rabayah:
Evaluation of Information Security Awareness among Palestinian Learners. 21-26 - Mohammad Shadeed, Mohammed Moreb:
Lightweight Encryption for Multimedia in the Internet of thing(iot). 27-32 - Mohammad J. Hamayel, Mobarak A. Abu Mohsen, Mohammed Moreb:
Improvement of personal loans granting methods in banks using machine learning methods and approaches in Palestine. 33-37 - Zoubir Dahmani, Ahmed Anber, Yazid Gouari, Mohamed Kaid, Iqbal H. Jebril:
Extension of a Method for Solving Nonlinear Evolution Equations Via Conformable Fractional Approach. 38-42 - Firas Abuhasan, Mohammed Moreb:
The Impact of the Digital Transformation on Customer Experience in Palestine Banks. 43-48 - Sara El-Switi, Mohammad Qatawneh:
Application of Blockchain Technology in Used Vehicle Market: A Review. 49-54 - Zbigniew Szadkowski, Krzysztof Pytel:
Trigger Support based on Discrete Cosine Transform for a Detection of Very Inclined Showers in Water Cherenkov Detectors. 55-60 - Gerardo Javier Kuri-Monge, Marco Antonio Aceves-Fernández, Julio Alberto Ramírez Montañez, Jesús Carlos Pedraza Ortega:
Capability of a Recurrent Deep Neural Network Optimized by Swarm Intelligence Techniques to Predict Exceedances of Airborne Pollution (PMx) in Largely Populated Areas. 61-68 - Manal Al-Labadi, Eman Mohammad Almuhur, Anwar Alboustanji:
Independence Number and Covering Vertex Number of Γ(R(+)M). 69-73 - Md. Rahatur Rahman, Md. Abdullah Al Forhad, Salah Uddin Ahmed, Shamim Akhter:
Design and Development of An ASP.NET Based ITM Data Center To Support Open Data. 74-79 - Eman Almuhur, Manal Al-Labadi, Amani Shatarah, Sarah Khamis, Nosaiba Omar:
Almost, Weakly and Nearly L-closed topological spaces. 80-84 - Hassan Al-Zoubi, Tareq Hamadneh, Hamza Alzaareer, Mutaz Al-Sabbagh:
Tubes in the Euclidean 3-space with coordinate finite type Gauss map. 85-88 - Khaled Mustafa Aljamal, Ahmad Termimi Ab Ghani, Khaled A. Al-Sharo:
Finite groups whose every p-subgroup is nearly S-permutably Embedded. 89-91 - N. Roopesh, Akarsh M. S, C. Narendra Babu:
An Optimal Data Entry Method, Using Web Scraping and Text Recognition. 92-97 - Lidiya S. Ivanova, Danila A. Sokolov, Oleg A. Zmeev:
UML Representation of Object-Oriented Design Antipatterns. 98-103 - Shahadat Hossain, Shamim Akhter:
Realtime Person Identification using Ear Biometrics. 104-108 - Saleem Al-Ashhab, Majdi Al-Qdah:
Eigenvalues of Self Complementary and Compound Magic Squares with an Application in Image Cryptography. 109-114 - Ahmad Abusukhon, Fadel AlTamimi:
Water Preservation Using IoT: A proposed IoT System for Detecting Water Pipeline Leakage. 115-119 - Fadi A. Aloul, Imran A. Zualkernan, Nada Abdalgawad, Lana Alhaj Hussain, Dara Sakhnini:
Network Intrusion Detection on the IoT Edge Using Adversarial Autoencoders. 120-125 - Tristan Lim:
K-Means Clustering-Based Market Basket Analysis: U.K. Online E-Commerce Retailer. 126-131 - Wada Mohammed Jinjri, Pantea Keikhosrokiani, Nasuha Lee Abdullah:
Machine Learning Algorithms for The Classification of Cardiovascular Disease- A Comparative Study. 132-138 - Ramzi B. AlBadarneh, Adel Ouannas, Iqbal M. Batiha:
identical Chua's circuits application using hybrid dislocated synchronization scheme. 139-142 - Abdullah Quzmar, Mohammad Qatawneh, Sarah Al-Maaitah:
Reducing Counterfeit Drugs with Blockchains: A Survey. 143-148 - Wael Jumah Alzyadat, Aysh M. Alhroob, Ikhlas Hassan Almukahel, Mohammad I. Muhairat, Mohammad Abdallah, Ahmad Althunibat:
Big Data, Classification, Clustering and Generate Rules: An inevitably intertwined for Prediction. 149-155 - Thangeswariy a-p Ramanei, Nasuha Lee Abdullah, Pang Tong Khim:
Predicting Accounts Receivable with Machine Learning: A Case in Malaysia. 156-161 - Elmer R. Magsino:
Comparing the Behaviors of Various Transportation Modes in Vehicular Social Networks. 162-167 - Davut Ari, Baris Baykant Alagöz:
A Genetic Programming Based Pollutant Concentration Predictor Design for Urban Pollution Monitoring Based on Multi-Sensor Electronic Nose. 168-172 - Israa Odeh, Mouhammd Alkasassbeh, Mohammad Alauthman:
Diabetic Retinopathy Detection using Ensemble Machine Learning. 173-178 - Mehmet Sevi, Ilhan Aydin:
Detecting Flaws on Railways Using Semantic Segmentation. 179-183 - Channabasava Chola, Md Belal Bin Heyat, Faijan Akhtar, Omar AlShorman, J. V. Bibal Benifa, Abdulla Yahya Mohammed Muaad, Mahmoud Masadeh, Fahad Alkahatni:
IoT Based Intelligent Computer-Aided Diagnosis and Decision Making System for Health Care. 184-189 - Faruk Serin, Süleyman Mete, Eren Özceylan:
Graph Traversal-based Solutions for Trip Planning in Public Transportation Graph. 190-194 - Jamal Oudetallah, Ghenaiet Bahia, Adel Ouannas, Iqbal M. Batiha:
The Quotient Homotopy Analysis Method for Solving Nonlinear Initial Value Problems. 195-199 - Sarah Al-Maaitah, Mohammad Qatawneh, Abdullah Quzmar:
E-Voting System Based on Blockchain Technology: A Survey. 200-205 - Mohammed Ghazi Al-Obeidallah, Dimah Ghaleb Al-Fraihat, Ahmad Mohammad Khasawneh, Ashraf Mousa Saleh, Hayfa Addous:
Empirical Investigation of the Impact of the Adapter Design Pattern on Software Maintainability. 206-211 - Ali Al-Dahoud, Mohamed Fezari:
Improving Monitoring Greenhouse System using Smart wireless Sensors Actuators Network. 212-217 - Zeyad Mohammad, Ahmad A. A. Alkhatib, Mohammed Lafi, Ahmad Abusukhon, Dheeb Albashish, Jaffar Atwan:
Cryptanalysis of a Tightly-Secure Authenticated Key Exchange without NAXOS Approach Based on Decision Linear Problem. 218-223 - Amina Antit, Safa Bhar Layeb, Amel Jaoua, Chefi Triki:
Management of Shared Customers Through Pool Collaboration in Last-Mile Transportation. 224-229 - Ahmad Alkhatib, Abeer Al Sabbagh, Randa Maraqa:
Pubic Cloud Computing: Big Three Vendors. 230-237 - Adel Ouannas, Iqbal M. Batiha, Amina-Aicha Khennaoui, Amjed Zraiqat, Abeer A. Al-Nana:
Novel Control Law for the Fractional-order Chaotic Duffing Map. 238-241 - Adel Ouannas, Iqbal M. Batiha, Amina-Aicha Khennaoui, Iqbal H. Jebril:
On the 0-1 Test for Chaos Applied to the Generalized Fractional-order Arnold Map. 242-245 - Elmer R. Magsino:
Investigating the Operational Dynamics of Different Transportation Modes in Vehicular Networks. 246-250 - Tibra Alsmadi, Nour Alqudah, Hassan Najadat:
Prediction of Covid-19 patients states using Data mining techniques. 251-256 - Abdul Razzak Alshehadeh:
The Relationship Between Liquidity Risk And Profitability In The Commercial Banks Listed In Amman Stock Exchange. 257-261 - Nesreen A. Hamad, Maher A. Nabulsi:
Additional New Logical Identities Related to Propositional Logic. 262-267 - Fajer Almudaires, M. M. Hafizur Rahman, Motaz Almudaires:
An Overview of Cybersecurity, Data Size and Cloud Computing in light of Saudi Arabia 2030 Vision. 268-273 - Fajer Almudaires, M. M. Hafizur Rahman, Motaz Almudaires:
A Systematic Literature Review of Software Defined Optical Network for Cloud Computing. 274-279 - Mobasshir Mahbub, Bobby Barua:
The measurements for optimal small cell base station positioning considering 5G cellular network. 280-283 - Girish Chandra, Arunabha Mukhopadhayay:
Industry Standards and Standardization: An Expert Survey on Opportunities and Challenges. 284-289 - Mohammad Almseidin, Jamil Al-Sawwa, Mouhammd Alkasassbeh:
Anomaly-based Intrusion Detection System Using Fuzzy Logic. 290-295 - Zanear Sh. Ahmed, Nigar M. Shafiq Surameery, Rasber Dh. Rashid, Shadman Q. Salih, Hawre Kh. Abdulla:
CNN-based Transfer Learning for Covid-19 Diagnosis. 296-301 - Md. Nazmul Alam, Abu Shufian, Riadul Islam, Md. Asraful Islam, S. M. Minhazur Rahman, Minul Khan Rahat:
Design and Implementation of Efficient Electric Vehicle with Clean Energy. 302-307 - Mohd Taib Shatnawi, Omar Shatnawi:
An Integrated Analytical Approach to Mathematical Modelling the Stochastic Behaviour of Software Debugging Phenomenon. 308-313 - Shaima Salah Alhashim, M. M. Hafizur Rahman:
Cybersecurity Threats in Line with Awareness in Saudi Arabia. 314-319 - Zeyad Mohammad, Vincent Omollo Nyangaresi, Ahmad Abusukhon:
On the Security of the Standardized MQV Protocol and Its Based Evolution Protocols. 320-325 - Mohammad Hamad Allaymoun, Omer Awad Hag Hamid:
Business Intelligence Model to Analyze Social network Advertising. 326-330 - Haitham Qawaqneh, Mohd Salmi Md Noorani, Habes Alsamir:
On fixed points results in b-multiplicative metric spaces having simulation function. 331-333 - Abdelmalek Bouguettaya, Hafed Zarzour, Ahmed Kechida, Amine Mohammed Taberkit:
Recent Advances on UAV and Deep Learning for Early Crop Diseases Identification: A Short Review. 334-339 - Khaled Mustafa Aljamal, Ahmad Termimi Ab Ghani, Rasheed Mahmood Saleh:
On preimages of the quasi-treed HNN groups. 340-343 - Hasan Dibas, Khair Eddin Sabri:
A comprehensive performance empirical study of the symmetric algorithms: AES, 3DES, Blowfish and Twofish. 344-349 - Nour Abdulhadi, Amjed A. Al-Mousa:
Diabetes Detection Using Machine Learning Classification Methods. 350-354 - Ozlem Imik Simsek, Baris Baykant Alagöz:
Daily Forecasting of Demand Orders With Optimal Architecture Artificial Neural Network Learning Models. 355-360 - Ozlem Imik Simsek, Baris Baykant Alagöz:
A Computational Intelligent Analysis Scheme for Optimal Engine Behavior by Using Artificial Neural Network Learning Models and Harris Hawk Optimization. 361-365 - Ahmad M. Manasrah, Mohammad Z. Masoud, Yousef Jaradat:
Short Videos, or Long Videos? A Study on the Ideal Video Length in Online Learning. 366-370 - Tibra Alsmadi, Nour Alqudah:
A Survey on malware detection techniques. 371-376 - Arar Al Tawil, Khair Eddin Sabri:
A feature selection algorithm for intrusion detection system based on Moth Flame Optimization. 377-381 - Davut Ari, Baris Baykant Alagöz:
Modeling Daily Financial Market Data by Using Tree-Based Genetic Programming. 382-386 - Doaa M. Bamasoud, Atheer Salem Al-Dossary, Nouf Mubarak Al-Harthy, Rudaina Abdullah Al-Shomrany, Ghaida Saeed Alghamdi, Rawan Othman Algahmdi:
Privacy and Security Issues in Cloud Computing: A Survey Paper. 387-392 - Shafya Abdullah Alshahrani, Doaa M. Bamasoud:
Implementation of Software Product Line with .NET. 393-395 - Shahnaz Alkhalil, Ahmad M. Manasrah, Mohammad Z. Masoud:
Let's Learn with a Jigsaw! Implementing a Unique Collaborative Online Learning in an Engineering Course. 396-399 - Qazawat Zirak, Dmitriy Shashev, Stanislav Shidlovskiy:
Swarm of Drones Using LoRa Flying Ad-Hoc Network. 400-405 - Fatimah Shamsulddin Abdulsattar:
On the Effectiveness of Using Wavelet-based LBP Features for Melanoma Recognition in Dermoscopic Images. 406-411 - Ayham Shahoud, Dmitriy Shashev, Stanislav Shidlovskiy:
Design of a Navigation System Based on Scene Matching and Software in the Loop Simulation. 412-417 - Sultan Badran, Nabil Arman, Mousa Farajallah:
An Efficient Approach for Secure Data Outsourcing using Hybrid Data Partitioning. 418-423 - Süleyman Mete, Faruk Serin:
A Reinforcement Learning Approach for Disassembly Line Balancing Problem. 424-427 - Eman Karajah, Nabil Arman, Mustafa Jarrar:
Current Trends and Approaches in Synonyms Extraction: Potential Adaptation to Arabic. 428-434 - Rafat Ashraf Joy:
An Interpretable Catboost Model to Predict the Power of Combined Cycle Power Plants. 435-439 - Omar Almomani, Mohammed Amin Almaiah, Adeeb Alsaaidah, Sami Smadi, Adel Hamdan Mohammad, Ahmad Althunibat:
Machine Learning Classifiers for Network Intrusion Detection System: Comparative Study. 440-445 - Asif Newaz, Sabiq Muhtadi:
Performance Improvement of Heart Disease Prediction by Identifying Optimal Feature Sets Using Feature Selection Technique. 446-450 - Mainak Mondal, Stanislav Shidlovskiy, Dmitriy Shashev, Moutayam Khaddour:
Non-GNSS Navigation Systems in Aerial Vehicles (Multi-rotors). 451-455 - Emre Güçlü, Ilhan Aydin, Erhan Akin:
Fuzzy PID Based Autonomous UAV Design for Railway Tracking. 456-461 - MS. Suhail Razeeth, Rkar. Kariapper, Samsudeen Sabraz Nawaz:
Accident Mitigation System with Drowsiness Detection: A Machine Learning and Iot with Hybrid Approach. 462-465 - Wadlkur Kurniawan Sedano, Muhammad Salman:
Auditing Linux Operating System with Center for Internet Security (CIS) Standard. 466-471 - William O'Keefe, Boubacar Ide, Mahmood Al-Khassaweneh, Osama Abuomar, Piotr Szczurek:
A CNN Approach for Skin Cancer Classification. 472-475 - Mark E. Earle, Mahmood Al-Khassaweneh:
Estimating Lung Capacity in Pulmonary Fibrosis Patients via Computerized Tomography (CT) Scan Data and Machine Learning. 476-481 - Rashidul Hasan Hridoy, Fatema Akter, Aniruddha Rakshit:
Computer Vision Based Skin Disorder Recognition using EfficientNet: A Transfer Learning Approach. 482-487 - Rahmeh Fawaz Ibrahim, Aseel Mohammad Elian, Mohammed Ababneh:
Illicit Account Detection in the Ethereum Blockchain Using Machine Learning. 488-493 - Anatoly A. Nazarov, Alexander N. Moiseev, Ivan Lapatin, Svetlana Paul, Olga Lizyura, Pavel Pristupa, Xi Peng, Li Chen, Bo Bai:
Mathematical Model of Scheduler with Semi-Markov Input and Bandwidth Sharing Discipline. 494-498 - Jamal Hussien, Mansoor Abdullateef, Hasan Kahtan, Riza Sulaiman:
Revisiting Knowledge Transfer for Success Enterprise System Project. 499-504 - Jean Claude Tuyisenge, Viviane Ishimwe, Jean Paul Iradukunda, Didacienne Mukanyiligira:
Development of Security Starting System for Vehicles Based on IoT. 505-510 - Daniel Staegemann, Matthias Volk, Erik Lautenschläger, Matthias Pohl, Mohammad Abdallah, Klaus Turowski:
Applying Test Driven Development in the Big Data Domain - Lessons From the Literature. 511-516 - Seham Nasr, Muhannad Quwaider, Rizwan Qureshi:
Text-independent Speaker Recognition using Deep Neural Networks. 517-521 - Lilas Qawasmeh, Fahed Awad:
Tracking a Mobile Rouge Access Point. 522-526 - Karmel Shehadeh, Nabil Arman, Faisal Khamayseh:
Semi-Automated Classification of Arabic User Requirements into Functional and Non-Functional Requirements using NLP Tools. 527-532 - Jawad Qammar, Waqar Ahmad:
Resolution Representation Based Person Re-Identification for Smart Cities Using Deep Neural Networks (DNNs). 533-537 - Habes Alsamir, Haitham Qawaqneh, Hassen Aydi, Wasfi A. Shatanawi:
Fixed point of ϱ - ℨ - contraction type mapping in b-metric like spaces. 538-542 - Rashidul Hasan Hridoy, Fatema Akter, Md. Mahfuzullah, Faria Ferdowsy:
A Computer Vision Based Food Recognition Approach for Controlling Inflammation to Enhance Quality of Life of Psoriasis Patients. 543-548 - Haitham Qawaqneh, Fadi Bani Ahmad, Amjed Zraiqat:
The Effect of Using Cyber Hunt Strategy on Developing the Mathematical Academic Achievement for Jordanian Universities Students. 549-552 - Mohammad Abdallah, Khalid Mohammad Jaber, Mousa Salah, Mohammad Abdul Jawad, Naji AlQbailat, Ayman M. Abdalla:
An E-learning Portal Quality Model: from Al-Zaytoonah University Students' Perspective. 553-557 - Ahmad A. A. Alkhatib, Zeyad Mohammad, Eman M. Abu Maria:
ROAD TRAFFIC Management SOLUTIONS. 558-564 - Majid Riaz, Muhammad Majid, Junaid Mir:
Emotion Recognition using Electroencephalography in Response to High Dynamic Range Videos. 565-570 - Samia A. Abushanap, Ayman M. Abdalla, Abdelfatah Aref Tamimi, Shadi AlZu'bi:
A Survey of Human Face Recognition for Partial Face View. 571-576 - Amani Shatarah:
Slant Toeplitz like Operators on The Lebesgue Space of The Torus. 577-581 - Iqbal H. Jebril, Nityagopal Biswas, Sanjib Kumar Datta:
On the growth analysis of meromorphic solutions of finite logarithmic order of linear difference equations in the unit disc. 582-588 - Majed AbuSafiya:
A Text Search Algorithm in Compressed Text. 589-591 - Nagham A. Al-Madi, Khulood Abu Maria, Mohammad Azmi Al-Madi, Mohammad Ahmad Alia, Eman M. Abu Maria:
An Intelligent Arabic Chatbot System Proposed Framework. 592-597 - Qasem H. Makki, Ayman M. Abdalla, Abdelfatah Aref Tamimi:
A Survey of Image Encryption Algorithms. 598-602 - Tasnim Ferdous Dima, Md. Eleas Ahmed:
Using YOLOv5 Algorithm to Detect and Recognize American Sign Language. 603-607 - Hamza Abutaleb, Abdelfatah Aref Tamimi, Thamer A. Alrawashdeh:
Empirical Study of Most Popular PHP Framework. 608-611 - Mobasshir Mahbub, Bobby Barua:
Optimal Coverage and Bandwidth-Aware Transmission Planning for Augmented Reality/Virtual Reality. 612-615 - Samar A. Said, El Sayed M. Saad, Sameh A. Salem, Shahira M. Habashy:
A Speculative Execution Framework for Big Data Processing Systems. 616-621 - Ayman M. Abdalla, Iyad H. Ghaith, Abdelfatah Aref Tamimi:
Deep Learning Weather Forecasting Techniques: Literature Survey. 622-626 - Hani AlNaaji, Abdallah Qusef:
A Conceptual Framework for Representing Business Functions and Their Role in the Quality of E-Banking Services. 627-633 - Bushra Fatima, Aasim Raheel, Aamir Arsalan, Muhammad Majid, Muhammad Ehatisham-ul-Haq, Syed Muhammad Anwar:
Gender Recognition using EEG during Mobile Game Play. 634-639 - Motaz AlMedires, Mohammed AlMaiah:
Cybersecurity in Industrial Control System (ICS). 640-647 - Hania Al Omari, Sawsan Barham, Abdallah Qusef:
Data Strategy and Its Impact on Open Government Data Quality. 648-653 - Mohammad Rasmi Al-Mousa:
Generic Proactive IoT Cybercrime Evidence Analysis Model for Digital Forensics. 654-659 - Sam Ansari, Khawla A. Alnajjar, Saeed Abdallah, Mohamed Saad, Ali A. El-Moursy:
Parameter Tuning of MLP, RBF, and ANFIS Models Using Genetic Algorithm in Modeling and Classification Applications. 660-666 - Amin Karimi Dastgerdi, Taghi Javdani Gandomani:
On the Appropriate Methodologies for Data Science Projects. 667-673 - Bilal Hawashin, Ayman Mansour, Farshad Fotouhi, Shadi AlZu'bi, Tarek Kanan:
A Novel Recommender System Using Interest Extracting Agents and User Feedback. 674-678 - Shadi AlZu'bi, Darah Aqel, Ala Mughaid:
Recent intelligent Approaches for Managing and Optimizing smart Blood Donation process. 679-684 - Gaith Y. Quba, Hadeel Al Qaisi, Ahmad Althunibat, Shadi AlZu'bi:
Software Requirements Classification using Machine Learning algorithm's. 685-690 - Ala Mughaid, Ahmed Al-Arjan, Mohammad Rasmi, Shadi AlZu'bi:
Intelligent security in the era of AI: The key vulnerability of RC4 algorithm. 691-694 - Khadija Abu Ali, Sarah Alyounis:
CyberSecurity in Healthcare Industry. 695-701 - Ali Abdullah Hassan, Mansoor Abdullateef Abdulgabber Abdulhak, Riza Bin Sulaiman, Hasan Kahtan:
User centric explanations: a breakthrough for explainable models. 702-707 - Abeer Abusobaih, Martin Havránek, Mansoor Abdullateef Abdulgabber:
Unified Theory of Acceptance and Use of Technology (UTAUT) LEGO Sets in Education. 708-713 - Iyad H. Ghaith, Aseel Rawashdeh, Shadi AlZu'bi:
Transfer Learning in Data Fusion at Autonomous Driving. 714-718 - Maryam Alamer, Mohammed Amin Almaiah:
Cybersecurity in Smart City: A Systematic Mapping Study. 719-724 - Maryam Abdulaziz Saad Bubukayr, Mohammed Amin Almaiah:
Cybersecurity Concerns in Smart-phones and applications: A survey. 725-731 - Fajer Almudaires, Mohammed AlMaiah:
Data an Overview of Cybersecurity Threats on Credit Card Companies and Credit Card Risk Mitigation. 732-738 - Tarek Kanan, Amani AbedAlghafer, Ghassan G. Kanaan, Riyad Al-Shalabi, Mohammad W. Elbes, Shadi AlZu'bi:
Arabic Text Categorization: A Comparison Survey. 739-742 - Tarek Kanan, Woruod Rathi, Bilal Hawashin:
A Comparison between Machine Learning Researches that use Arabic Text: A Case Study of Social Media Datasets. 743-747 - Mohammad A. Obeidat, Ayman M. Mansour, Tareq Hamadneh, Jalal Abdullah:
Remotely Controlled Smart Home System using GSM and IOT. 748-753 - Md. Eleas Ahmed, Tasnim Ferdous Dima:
Using Prefix Reversals To Looplessly Generate O(1) Time Multiset Permutation By Boustrophedon Linked List. 754-757 - Mohammad Z. Masoud, Yousef Jaradat, Ahmad M. Manasrah, Ismael Jannoud, Mohammad Ahmad Alia:
May I Know your IBAN? Cracking the Short Message Service (SMS) as a Second Factor Authentication for Online Payments. 758-762 - Asad Ullah, Syed Irfan Ullah, Abdul Salam:
Internal DoS Attack Detection and Prevention in Fog Computing. 763-768 - Yousef Jaradat, Mohammad Z. Masoud, Ismael Jannoud, Ahmad M. Manasrah, Mohammad Ahmad Alia:
A Tutorial on Singular Value Decomposition with Applications on Image Compression and Dimensionality Reduction. 769-772 - Imad H. Tahini, Alex K. Dadykin:
Mobile App Development Through Designing Structural Visual Method for Effective Learning Foreign Language. 773-778 - Roaa Al Nafea, Mohammed Amin Almaiah:
Cyber Security Threats in Cloud: Literature Review. 779-786 - Moutayam Khaddour, Stanislav Shidlovskiy, Dmitriy Shashev, Mainak Mondal:
Survey of Denoising Methods for Inertial Sensor Measurements. 787-790 - Manar Abduljabbar Ahmad Mizher, Mei Choo Ang, Siti Norul Huda Sheikh Abdullah, Kok Weng Ng, Ahmad A. Mazhar, Manal Abd-Aljabbar Mizher:
Passive Object-based Video Authentication Using Stereo Statistical Descriptor on Wavelet Decomposition. 791-798 - Nazmus Shakib Shadin, Silvia Sanjana, Nusrat Jahan Lisa:
COVID-19 Diagnosis from Chest X-ray Images Using Convolutional Neural Network(CNN) and InceptionV3. 799-804 - Dheeb Albashish, Rizik M. H. Al-Sayyed, Azizi Abdullah, Mohammad Hashem Ryalat, Nedaa Almansour:
Deep CNN Model based on VGG16 for Breast Cancer Classification. 805-810 - Waleed Hattawi, Sameeh Shaban, Aon Al Shawabkah, Shadi AlZu'bi:
Recent Quality Models in BigData Applications. 811-815 - Zetra Hainul Putra, Neni Hermita, Jesi Alexander Alim, Gustimal Witri:
Prospective elementary teachers' experience with GeoGebra on the area of a triangle. 816-819 - Mohammed Mahmod Shuaib, Osama Moh'd Alia:
Modeling Individuals Instinctive Reaction Against Dangerous Source when the Occurrence of Unexpected Contact. 820-825 - Rania Daraghmeh, Raymond Brown:
A Big Data Maturity Model for Electronic Health Records in Hospitals. 826-833 - Mahmood Alzubaidi, Dena Al-Thani:
Finding the safest path: the case of Yemen. 834-841 - Vladislav Shatravin, Dmitriy Shashev, Stanislav Shidlovskiy:
Applying the Reconfigurable Computing Environment Concept to the Deep Neural Network Accelerators Development. 842-845 - Malik Waqar Aziz, Imran Fareed Nizami, Muhammad Majid:
Blind Quality Assessment of Super-Resolution Images using Relative Gradient Statistics of Salient and Non-salient Objects. 846-851 - Mohammed Lafi, Thamer Alrawashed, Ahmad Munir Hammad:
Automated Test Cases Generation From Requirements Specification. 852-857 - Raneem Qaddoura, Ala' M. Al-Zoubi, Iman M. Almomani, Hossam Faris:
Predicting Different Types of Imbalanced Intrusion Activities Based on a Multi-Stage Deep Learning Approach. 858-863 - Siham Zroug, Ikram Remadna, Laïd Kahloul, Saber Benharzallah, Labib Sadek Terrissa:
Leveraging the Power of Machine Learning for Performance Evaluation Prediction in Wireless Sensor Networks. 864-869 - Hadeel Al Qaisi, Gaith Y. Quba, Ahmad Althunibat, Ayman M. Abdalla, Shadi AlZu'bi:
An Intelligent Prototype for Requirements Validation Process Using Machine Learning Algorithms. 870-875 - Moh'd Khaled Yousef Shambour:
Assessing the Usability of Hajj and Umrah Websites. 876-881 - Sadhvi Mehra, Sumedha Seniaray:
An Analysis on Abrupt Fall of Indian Stock Markets. 882-887 - Cheong Suk Fun, Zarul Fitri Zaaba, Auwal Shehu Ali:
Usable Tourism Application: Malaysia Attraction Travel Application (MATA). 888-892 - Malak Hamad Al-Mashagbeh, Mohammad Ababneh:
Tor Detection using a Machine Learning Approach Using Correlation based Feature Selection with Best First and Random Forest. 893-898 - Krishno Dey, Md. Mustahid Hassan, Md. Masud Rana, Mst. Hasna Hena:
Bangladeshi Indigenous Fish Classification using Convolutional Neural Networks. 899-904 - Auwal Shehu Ali, Zarul Fitri Zaaba:
Mental Models Review for Security and Privacy Policy: An approach. 905-909 - Shams-Ul-Haq, Aasim Raheel, Muhammad Majid:
Emotion Recognition in Response to Haptic Enhanced Multimedia Using EEG. 910-913 - Ayman M. Mansour, Mohammad A. Obeidat:
ÓImpact of Infertility Factors on IVF Success Rate using Fuzzy Inference System. 914-918 - Sultan M. Al Khatib:
Optimization of Path Selection and Code-Coverage in Regression Testing Using Dragonfly Algorithm. 919-923 - Viktor V. Zhukovskyy, Damon Printz, Nataliia A. Zhukovska, Maksym Hubach, Hesham Rajab:
IoT based Intelligent Information-Analytical System Architecture for Water Tank Monitoring. 924-928 - Trung T. Nguyen:
On the Edge and Cloud: Recommendation Systems with Distributed Machine Learning. 929-934 - Baker Alhasan, Mohammad Qatawneh, Wesam Almobaideen:
Blockchain Technology for Preventing Counterfeit in Health Insurance. 935-941 - Ahmad Althunibat, Basem Alokush, Raneem Dawood, Saeed M. Z. A. Tarabieh, Ignácio Gil-Pechuan:
Modeling the factors that influence digital economy services acceptance. 942-945 - Hiba Wasmi, Mustafa Alrifaee, Ahmad Thunibat, Bassam Al-Mahadeen:
Comparison between proposed Convolutional Neural Network and KNN For Finger Vein and Palm Print. 946-951 - Farhan Abdel-Fattah, Fadel AlTamimi, Khalid A. Farhan:
Machine Learning and Data Mining in Cybersecurty. 952-956 - Zain Marashdeh, Khaled Suwais, Mohammad Ahmad Alia:
A Survey on SQL Injection Attack: Detection and Challenges. 957-962 - Wassan S. Aldolimi, Adnan A. Hnaif, Mohammad Ahmad Alia:
Light Fidelity to Transfer Secure Data Using Advanced Encryption Standard Algorithm. 963-967 - Shadi AlZu'bi, Qasem H. Makki, Yazan Abdul Ghani, Hussein Ali:
Intelligent Distribution for COVID-19 Vaccine Based on Economical Impacts. 968-973 - Geoffrey Attard, Clifford De Raffaele, Serengul Smith:
Designing a Marker Set for Vertical Tangible User Interfaces. 974
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.