default search action
ICIT 2023: Amman, Jordan
- International Conference on Information Technology, ICIT 2023, Amman, Jordan, August 9-10, 2023. IEEE 2023, ISBN 979-8-3503-2006-0
- Imad I. H. Nashwan:
Reliability Function of the Connected-(2,2)-out-of-(m,n): F Linear and Circular System Using Markov Chain. 1-6 - AlsharifHasan Mohamad Aburbeian, Majdi Owda, Amani Yousef Owda:
Digital Forensic Analysis of Hologram Projection Fans. 7-12 - Essohanam Djeki, Jules R. Dégila, Muhtar Hanif Alhassan:
Analysis of Critical Factors Influencing E-Learning Platforms Security. 13-18 - Manal Loukili, Fayçal Messaoudi, Mohammed El Ghazi:
Personalizing Product Recommendations using Collaborative Filtering in Online Retail: A Machine Learning Approach. 19-24 - Mobarak A. Abu Mohsen, Amani Yousef Owda, Majdi Owda:
Electrical Load Forecasting Based on Random Forest, XGBoost, and Linear Regression Algorithms. 25-31 - Ammar Dawabsheh, Majdi Owda:
In-Vehicles Infotainment System Forensics Case Study. 32-37 - Awf Alhalaybeh, Ahmad Alkhatib, Rand Albustanji, Shorouq Elmanaseer, Tarek Kanan, Rashed Alsakarnah:
Facilitating Metaverse Integration in Education via Extended Reality and the Internet of Things: AN OVERVIEW. 38-42 - Heba Alamereah, Ahmad Alkhatib, Shorouq Elmanaseer, Rand Albustanji, Hani Mahmoud Al-Mimi, Mohammad Al-Rawajbeh:
A Survey on Cyber Security in Smart Grids using Internet of Things. 43-46 - Abdul Razzak Alshehadeh, Haneen A. Al-Khawaja, Mohammad Ahmad Alia, Farid Kourtel, Ehab Injadat, Iqbal H. Jebril:
The Impact of Operational Characteristics on the Total Risk Management: Evidence from the Industrial Firms. 47-50 - Lamia Ouchene, Sadik Bessou:
FastText Embedding and LSTM for Sentiment Analysis: An Empirical Study on Algerian Tweets. 51-55 - Sameer Mehra, Laxmi Ahuja:
Study on Green Cloud Computing-A Survey. 56-61 - Marwa Mustafa Owess, Amani Yousef Owda, Majdi Owda:
Decision Support System in Healthcare for Predicting Blood Pressure Disorders. 62-67 - Hanaa Alrushood, Sa'ed Abed, Asmaa Alabdulhadi:
Improving Energy Consumption in Content-Addressable Memory Through Precomputation. 68-72 - Noura Abulail, Amani Yousef Owda, Majdi Owda:
Water Quality Classification Decision Support System. 73-78 - Sara Albakhit, Ahmad Alkhatib, Rand Albustanji, Shorouq Elmanaseer, Mosa Salah, Reem Amro:
A Survey of IoT Healthcare Applications. 79-82 - Zakaria Neili, Kenneth Sundaraj:
VGG16-Based Deep Learning Architectures for Classification of Lung Sounds into Normal, Crackles, and Wheezes using Gammatonegrams. 83-88 - Yaman Salem, Majdi Owda, Amani Yousef Owda:
A Comprehensive Review of Digital Forensics Frameworks for Internet of Things (IoT) Devices. 89-96 - Mohamed Fezari, Ali Al-Dahoud, Mohamed Arif, Ahmad Al-Dahoud, Hani Mahmoud Al-Mimi:
Sound Noise Monitoring using Wireless Sensor Networks in Annaba City. 97-101 - Suha Afaneh, Mohammad Rasmi Al-Mousa, Hilal Shrif Al-hamid, Bara'h Suliman AL-Awasa, Mohammad Alia, Hani Almimi, Ahmad A Alkhatib:
Security Challenges Review in Agile and DevOps Practices. 102-107 - Moustafa M. Kurdi:
Smart Irrigation System Using LoRaWAN. 108-113 - Mona Mona Mona Najafi Sarpiri, Mohammadreza Soltan Aghaei, Taghi Javdani Gandomani:
Towards Better Software Development Effort Estimation with Analogy-based Approach and Nature-based Algorithms. 114-117 - Michael Lescisin, Qusay H. Mahmoud:
A Blockchain-Based Solution for Defining and Enforcing Personal Data Access Policies. 118-124 - Malek Mahmoud Barhoush, Ameera Saleh Jaradat, Najla'a Saleh, Isra'a Saleh:
Mobile Object Detection and Tracking Using DRONES. 125-129 - Ashraf Abzakh, Ahmad Alkhatib, Omar Rabayah, Shorouq Elmanaseer, Rand Albustanji, Nagham Almadi:
A Survey: Threat Hunting for the OT Systems. 130-134 - Mahmoud AlJamal, Rabee Alqura'n, Issa AL-Aiash, Ala Mughaid, Shadi AlZu'bi, Ala A. Abutabanjeh:
A Novel Machine Learning Cyber Approach for Detecting WannaLocker Ransomware Attack on Android Devices. 135-142 - Shahed Nabeel Al-khateeb, Ameera Saleh Jaradat:
Using Of Multivariate Linear Regression and Exponential Smoothing Model to Predict the Gross Domestic Product in Jordan. 143-148 - Siham Ali Abrikah, Ghadeer Farraj, Ma'mon Abu Hammad:
Bayes Estimators of the Log-Normal Distribution Parameters Using Lindley's Approximation. 149-152 - Ma'mon Abu Hammad, Azezah Al Abdallah, Siham Ali Abrikah, Ghadeer Farraj:
Distribution of Shannon Statistic from Exponential Sample. 153-155 - Afaf Mohammad Al Sous, Ma'mon Abu Hammad:
Properties of Conformable Fractional Half-Normal Distribution. 156-158 - Afaf Mohammad Al Sous, Ma'mon Abu Hammad:
Distribution of Shannon Statistic from Nakagami Sample. 159-162 - Daniel Staegemann, Matthias Volk, Mohammad Abdallah, Klaus Turowski:
Towards the Application of Test Driven Development in Big Data Engineering. 163-167 - Mohammad Abdallah, Alaa Hammad, Daniel Staegemann:
A Data Collection Quality Model for Big Data Systems. 168-172 - Praditi Rede, Sahaana Iyer, Sheetal Sharma, Sujata Deshmukh:
Blockchain Based Identity Management System Using Cryptography and Steganography. 173-177 - Ahmad Abdel-Aziz Sharieh, Nesreen A. Hamad, Heba I. Abu Kaf, Fuad H. Abuadas:
Predicting Patient's Willingness for Colorectal Cancer Screening Practices Using Machine Learning Classifiers. 178-183 - Hamzeh Mohammad Alabool:
ChatGPT in Education: SWOT analysis approach. 184-189 - Hamada R. H. Al-Absi, Gilbert Njihia Muchori, Saleh Musleh, Mohammad Tariqul Islam, Anant Pai, Tanvir Alam:
DMEgrader: Android Mobile Application for Diabetic Macular Edema Grading Prediction. 190-195 - Mai AbuJazoh, Duha Al-Darras, Nesreen A. Hamad, Saleh Al-Sharaeh:
Feature Selection for High-Dimensional Imbalanced Malware Data Using Filter and Wrapper Selection Methods. 196-201 - Manal A. Altawalbeh, Sultan Alshourah, Fadi Bani Ahmad, Sabah Jamil Al Nawaiseh:
Factors Influencing University Students' Adoption of digital educational technologies in Higher Education. 202-207 - Salemah Almutlak, Ghadeer Farraj, Amjed M. Zraiqat, Azezah Al Abdallah, Siham Ali Abrikah, Bayan Alkhalaileh:
Properties of Conformable Fractional Maxwell-Boltzmann Probability Distribution. 208-213 - Heba Nsour, Zaid Mustafa, Maria Al-Sendah:
Human Body Action Recognition based on 3D Feature Fusion over RGB Scenes. 214-219 - Tarek Kanan, Samar Hendawi, Shadi AlZu'bi, Mohammed W. Elbes, Ala Mughaid:
Revolutionizing Cyberbullying Prevention: A Cutting-Edge Natural Language Processing-Based Approach. 220-225 - Marwan Al-Tawil, Moh'd Belal Al-Zoubi, Yousef Majdalawi, Tamara Almarabeh, Ali Al-Dahoud:
Geospatial Analysis of COVID-19 Lockdown Effects on Air Quality in Jordan and Surrounding Countries. 226-229 - Aya H. Mousa, Ashar Y. Natsheh, Rashid Jayousi, Mohammad M. Herzallah:
Training Machine Learning Classifiers on Differentiating Major Depressive Disorder and Parkinson's Disease Using Cognitive Performance. 230-235 - Ashar Y. Natsheh, Joman Y. Natsheh, Aya H. Mousa, Mahmoud H. Al-Saheb, Ahmed A. Moustafa, Mohammad M. Herzallah:
A Reinforcement Learning Model of Temporal Difference Variations for Action-Selection and Action-Execution in the Human Brain. 236-243 - Diala Othman Qatanani, Abdallah Qusef:
Factors Influencing The Adoption of E-commerce in Jordanian SMEs. 244-249 - Sijie Shang, Rong Jin, Kevin Desai:
A Study of Human Fitness Pose Classification Using Artificial Neural Networks. 250-255 - Yaser Alkurdi, Mustafa Al-Fayoumi, Amer Al-badarneh, Qasem Abu Al-Haija:
Enhancing Password Security via Supervised Learning. 256-259 - Khawla Shalabi, Mustafa Al-Fayoumi, Qasem Abu Al-Haija:
Enhancing Financial System Resilience Against Cyber Threats via SWIFT Customer Security Framework. 260-265 - Meghna Praveen, Wesam Almobaideen:
The Current State of Research on Malware Written in the Rust Programming Language. 266-270 - Muhammad Nazif Firdaus Mazlan, Norzilah Musa, Norzehan Sakamat, Afiza Ismail:
Applying A* Search Algorithm in Mobile Game-Based Learning for Malay Proverbs. 271-275 - Mohammed W. Elbes, Samar Hendawi, Shadi AlZu'bi, Tarek Kanan, Ala Mughaid:
Unleashing the Full Potential of Artificial Intelligence and Machine Learning in Cybersecurity Vulnerability Management. 276-283 - Shadi AlZu'bi, Samar Hendawi, Mohammed W. Elbes, Tarek Kanan, Ala Mughaid:
Towards a Sustainable Future: Exploring Key Features, Challenges, and Global Examples of Building Smart Cities. 284-291 - Fadi Bani Ahmad, Haitham Qawaqneh, Amjed Zraiqat, Sabah Jamil Al Nawaiseh:
The Effectiveness of Nearpod in Developing Online Interactive Lesson Design Skills for Mathematics and Computer Teachers. 292-294 - Leinard C. Lontoc, Marjorie H. Basco, Vannesa Ann P. Sulit, Genesis Aubrey M. Magpantay, Mirasol C. Dilay, Ralph Gerard B. Sangalang:
Developing an LTE Learning Material: Experiences from a University in a Developing Country. 295-299 - Khryzz Lyden G. Cueto, Ricky Mae V. Santos, Claudette Jane C. Hilario, John Carl V. Aggari, Ralph Gerard B. Sangalang:
FPGA-Based Radio Transceiver Using the TV White Space for Disaster Response Operation. 300-304 - Ola Yahia Aljamal, Najihah Abd Wahid, Hafsah Yahia Aljamal:
Statistical Differences Between the Experimental and Control Groups and the Role of the Counseling Program to Reduce Aggressive Behavior Among Primary School Students. 305-308 - Ola Yahia Aljamal, Najihah Abd Wahid, Hafsah Yahia Aljamal:
Building a Counseling Program Based on Islamic Culture and Social Learning Theory to Reduce the Aggressive Behavior of Students in the Primary Stage. 309-313 - Saumya Mehta, Gayatri Doctor:
Assessing the Maturity of Online Service Delivery by Applying Local Online Service Index (LOSI) Methodology in Selected Indian Cities. 314-318 - Aws Abed Al Raheem Magableh:
Towards Leveraging Explainable Artificial Intelligent (XAI) in Requirements Engineering (RE) to Identify Aspect (Crosscutting Concern): A Systematic Literature Review (SLR) and Bibliometric Analysis. 319-326 - Belal Mahmoud Al-Wadi, Varadaraj Aravamudhan, K. Mohanasundaram, Mohammad Abdul Jawad:
The Role of Smart Technologies in Reducing Energy Consumption and Promoting Sustainable Practices in Households and Businesses. 327-334 - Maha S. Alsaoudi, Ahlam Guiatni, Sondos Rasem:
Applications to Conformable $\alpha$ - Log-Normal Distribution. 335-338 - Sondos Rasem, Amjed M. Zraiqat, Waseem Ghazi Alshanti, Abdulkarim Farah, Ma'mon Abu Hammad:
Bayesian Estimation for Inverse-Gaussian Distribution under Square Error Loss Function. 339-342 - Srinidhi B, M. S. Bhargavi:
An XAI Approach to Predictive Analytics of Pancreatic Cancer. 343-348 - Mirjana Ivanovic, Dragan Macos:
Applications of Artificial Intelligence Methods in Medicine. 349-354 - Awf Alhalaybeh, Ahmad Althunibat, Bassam M. Al-Mahadeen, Khaldoun Khalil Habashneh, Ali Mohammad Daradkeh:
Towards a Conceptual Model for Assessing User Satisfaction in Metaverse-Based Learning. 355-360 - Awf Alhalaybeh, Ahmad Althunibat:
Measuring Acceptance of Adoption Metaverse in eLearning by Using TAM Model. 361-366 - Mo'ath Shatnawi, Maram Bani Younes:
Intelligent Detecting of Emergency Vehicles on the Road Networks: Available Datasets Assessment. 367-372 - Farhan Abdel-Fattah, Seraj Fayyad, Abdullah Mubarak Heyari, Hassan Al-Zoubi:
A Survey of Internet of Things (IoT) Forensics Frameworks and Challenges. 373-377 - Musan Eltuhami, Munaisyah Abdullah, Bazilah A. Talip, Nik Azlina Nik Ahmad:
Blockchain Based Voting Framework With Non-Transferable Non-Fungible Tokens. 378-383 - Ma'mon Abu Hammad, Maysoon Mustafa Mohmmad Qousini, Zakrea Mohmmad Rabab'h:
Approximate Bayes Estimators of Laplace Distribution under Linex Loss Function. 384-386 - Ma'mon Abu Hammad, Hassan Al-Zoubi, Azezah Al Abdallah:
Bayes Estimation of the Parameters of the Kumaraswamy Probability Distribution. 387-390 - Salam Hamdan, Manal A. Mizher, Hani Mimi, Eman Abu Maria, Abdullah Mubarak Heyari:
Feature Extraction with Differential Evolution Algorithm. 391-396 - Liana Khamis Qabajeh, Radwan Tahboub, Mohammed AbuJoodeh:
A New Lightweight AES for IoT. 397-404 - Raghda Diab Hasan, Gheith A. Abandah:
Correcting Wide-Range of Arabic Spelling Mistakes Using Machine Learning and Transformers. 405-410 - Mina Al-Saad, Nour Aburaed, Mohammed Q. Alkhatib, Mohammad Sami Zitouni, Hussain Al-Ahmad:
An Enhanced UNet Model to Detect Water Bodies From Remote Sensing Data. 411-415 - Saluka Udbhasa, Parami Lelkada, Modeesha Priyanka, Esala Senarathna, Samitha Vidhanaarachchi, Jagath Wickramarathne, Janaka L. Wijekoon:
Interactive, Visual-Learning based Tool for Hearing Impaired Children to Improve Language and Cognitive Skills. 416-421 - Ahmad A. Mazhar, Mustafa M. Al Rifaee:
A Systematic Review of the use of Virtual Reality in Education. 422-427 - Armin Kobilica, Anas Ahmad Abudaqa, Mustafa Ghaleb:
An Employment of the Evolutionary Algorithms in Training of Neuro Fuzzy Inference System for Forecasting Personnel Radiation Exposure. 428-434 - Manal A. Mizher, Salam Hamdan, Manar Abduljabbar Ahmad Mizher, Ahmad A. Mazhar, Hani Mimi, Abdullah Mubarak Heyari:
Three Dimensional Objects Encryption Algorithms: A Review. 435-440 - Hatem A. Alharbi:
Green and Network-Aware Smart IoT Logistics Applications. 441-446 - Habes Alsamir, Haitham Qawaqneh:
Fixed point results using cyclic (ρ - θ)-admissible mapping and extended simulation function concept in rectangular b-metric space. 447-452 - Anishka Chauhan, Anuraag Tsunduru, Kishwar Parveen, Srilatha Tokala, Koduru Hajarathaiah, Murali Krishna Enduri:
A Crop Recommendation System Based on Nutrients and Environmental Factors Using Machine Learning Models and IoT. 453-458 - Areej Derbas, Nancy Al-Ramahi, Adnan Hnaif, Thamer A. Alrawashdeh, Rasha Adnan Mubaideen:
The Effectiveness of E-Learning System on Students' of Al-Zaytoonah university of Jordan: A Case Study. 459-463 - Tahani Fawaz Abu Jraiban:
Degree of Employing Distance Learning Technology by Faculty Members and its Role in Students' Acquisition of Self-Learning Skills. 464-469 - Sabreen Abulhaija, Shyma Hattab, Wael Etaiwi:
Predicting Students' Performance Using Machine Learning. 470-475 - Lamia AbedNoor Muhammed, Ban Abdnoor Mohammed:
Detection of Fabricated Survey Data using Clustering Analysis. 476-482 - Reem Amro, Ahmad Althunibat, Bilal Hawashin:
Arabic User Requirements Classification Using Machine Learning. 483-488 - Reem Amro, Ahmad Althunibat, Bilal Hawashin:
Arabic Non-Functional Requirements Extraction Using Machine Learning. 489-494 - Mohammad Al-kafaween, Hamza Alzaareer, Hassan Al-Zoubi:
Quadrics of Coordinate Finite Type. 495-500 - Abdul Razzak Alshehadeh, Kamel Rezig, Haneen A. Al-Khawaja, Iqbal H. Jebril, Ehab Injadat, Abeer fouzan Aref Al-Abbadi:
The Disclosure Governance and its Role in the Operational Risk Management: Evidence from Commercial Banks. 501-505 - Yazan Abu Hammoudeh, Mohammad Qatawneh, Orieb AbuAlghanam, Mohammed Amin Almaiah:
Digital Certificate Validation Using Blockchain: A Survey. 506-510 - Islam AlTalahin, Shadi AlZu'bi, Assal A. M. Alqudah, Ala Mughaid:
Unmasking the Truth: A Deep Learning Approach to Detecting Deepfake Audio Through MFCC Features. 511-518 - Yazeed Alhajjaj, Mohammad Qatawneh, Orieb AbuAlghanam, Mohammed Amin Almaiah:
Using of Blockchain in the Context of Automotive Industry: A Survey. 519-523 - Mohammad Y. Alkhanafseh, Ola M. Surakhi:
A Dynamic Locality Sensitive Hashing Algorithm for Efficient Security Applications. 524-530 - Mohammad Altarawneh, Saif Al-Deen Al-Ghammaz:
The Journey of E-Learning Technology From Application to Challenges: Evidence From Jordan. 531-536 - Lana Al-Dabbas, Hassan Al-Tarawneh, Thamer A. Alrawashdeh:
Customer Personality Segmentation Using K-Means Clustering. 537-543 - Abdullah Al-Hasanat, Omar Almomani, Malek Ahmad Theeb Almomani, Adeeb Alsaaidah, Ahmad Adel Abu Shareha, Ahmad Althunibat:
Improving Routing Decision Algorithm for RPL Networks. 544-549 - Mohammad Daradkeh, Shadi Atalla:
From Data to Narrative: Automating and Engineering the Art of Data Storytelling. 550-555 - Noor Bdair, Wael Alzyadat, Shadi AlZu'bi:
Intelligent Model for Optimizing Gantt Chart in the Planning Stage. 556-560 - Saikat Das, Mazharul Hossain, Sajjan G. Shiva:
Requirements Elicitation and Stakeholder Communications for Explainable Machine Learning Systems: State of the Art. 561-566 - Fatima S. Al-Sha'ar, Abdelrahman Aloudat, Tareq Hamadneh:
On the Optimization of Bi-variate Logarithmic Functions Using Bernstein-Lagrange Method. 567-571 - Shorouq Elmanaseer, Ahmad Alkhatib, Rand Albustanji:
A Proposed Technique for Business Process Modeling Diagram Using Natural Language Processing. 572-576 - Fayçal Messaoudi, Manal Loukili, Mohammed El Ghazi:
Demand Prediction Using Sequential Deep Learning Model. 577-582 - Ahmad Abusukhon, Bareeq Alghannam:
The Role of the Internet of Things in Monitoring Air Pollution-A Survey. 583-585 - Omar Ghanam, Hamza Alzaareer:
Sequentially compact and compactly generated groups. 586-588 - Ashraf Abzakh, Ahmad Althunibat:
A Review: Human Factor and Cybersecurity. 589-592 - Seiga Al Ghifari, Hudan Studiawan:
Image Splicing Localization Using Superpixel and Wavelet Mean Squared Error. 593-598 - S. Ismail, Mohd Azlishah Othman, Mohamad Harris Misran, Maizatul Alice Meor Said, A. S. Jaafar, R. Abdul Manap, Y. T. Nugraha, N. M. Hassan, Shadia Suhaimi:
An Analysis of Width Feedline of Ice Cream Cone Antenna in 5G Technology for Internet of Things (IoT) Applications. 599-603 - A. H. Hasanudin, Mohd Azlishah Othman, A. A. Azwan, A. A. F. Mohd Roki, S. Ismail, Y. T. Nugraha, Shadia Suhaimi, N. M. Hassan:
Internet of Things - Enabled Stress Surveillance When Pandemic Lockdown: Revolutionizing Resilience. 604-608 - Wael Jumah Alzyadat, Suleyman Al-Showarah:
Analyzing Data Format Interoperability in API Ecosystems Using Big Data Architecture. 609-612 - Mohammad Adawy, Omar Almomani, Muhannad Tahboush, Ahmad Althunibat:
Integrated Boolean Sensing and Event Radius Model on Data Aggregation in Wireless Sensor Networks. 613-619 - Fatima M. D. Quiam, Assal A. M. Alqudah, Maher A. Nabulsi, Shadi AlZu'bi:
Examining the Validity of Inference Rules: Utilizing Truth Tables and Contrapositive Analysis. 620-624 - Bo Wang, Bei Han, Youwei Li, Fei Gao, Chaohui Chen, Junqiang He:
Design and Research of Temperature Sensor Based on Single Split Ring Resonator. 625-630 - Bayan Alsawareah, Ahmad Althunibat, Bilal Hawashin:
Classification of Arabic Software Requirements Using Machine Learning Techniques. 631-636 - Omar Baradia, Liana Jalalaltamimi:
Stable Clustering Algorithms for VANETs: A Survey. 637-642 - Yigit Alisan, Faruk Serin, Süleyman Mete, Eren Özceylan:
Analysing Vehicle Routing in Urban Pest Control Using a Cluster-First Route-Second Approach. 643-646 - Bo Wang, Youwei Li, Fei Gao, Bei Han, Chaohui Chen, Junqiang He:
Design and Characterization of a Passive Wireless Chipless RFID Humidity Sensor. 647-651 - Iqbal M. Batiha, Shameseddin Alshorm, Amjed Zraiqat, Mohammad Alia, Iqbal H. Jebril:
Numerical Solution for Incommensurate System of Fractional Order Differential Equations. 652-656 - Shameseddin Alshorm, Iqbal M. Batiha, Iqbal H. Jebril, Amer Dababneh:
Handling Systems of Incommensurate Fractional Order Equations Using Improved Fractional Euler Method. 657-660 - Maysoon Qousini, Omar Ghanam:
A Brief Review For Separation Axioms In Bitopological Spaces. 661-663 - Nagham A. Al-Madi, Mohammad Azmi Al-Madi, Wael Alzyadat, Khulood Abu Maria, Ahmed Alkhateeb, Fanan Al-Madi:
Arcaboard: An Overview of the SElectromagnetic HoverBoard. 664-666 - Assal A. M. Alqudah, Mohammad A. M. Alshraideh, Ahmad A. S. Sharieh, Mohammad A. M. Abushariah, Fatima M. D. Quiam:
Arabic Automatic Speech Recognition for Speakers With Speech Disorders: A Comprehensive Review. 667-673 - Waseem Ghazi Alshanti, Ahmad Alshanty, Bashar Aljawarneh, Roshdi Khalil:
A Reliable Analytical Method for Solving Klein-Gordan Equation by Tensor Product Theory of Banach Spaces. 674-676 - Waseem Ghazi Alshanti, Ahmad Alshanty, Roshdi Khalil:
On α-Homogeneous Fractional Differential Equations. 677-679 - AlMotasem Bellah AlAjlouni, Jinlong Li:
Knowledge Transfer to Solve Split and Rephrase. 680-685 - Hamzah Zureigat, Omar AlQudah, Bushra Alhijawi:
Predicting the Helpfulness of Online Customer Reviews. 686-689 - Bilal Hawashin, Ahmad Althunibat, Tarek Kanan, Shadi AlZu'bi, Yousef O. Sharrab:
Improving Arabic Fake News Detection Using Optimized Feature Selection. 690-694 - Hussain Aletabi, Mohammad Abdallah:
A Proposed Cloud Quality Model (IaaSQual) for "Infrastructure as a Service (IaaS)" from User's Perspective. 695-699 - Qasem H. Makki, Ayman M. Abdalla:
An Image Encryption Algorithm Based on XOR, Flipping, Expansion Permutation and Shifting. 700-704 - Hassan Alzoubi, Waseem Al-Mashaleh, Haitham Qawaqneh, Mohammad Al-kafaween:
Helicoidal Surfaces Satisfying $\boldsymbol{\varDelta}^{\boldsymbol{III}} \boldsymbol{r}=\boldsymbol{Ar}$. 705-708 - Mohammad Z. Masoud, Ahmad M. Manasrah, Yousef Jaradat, Nabeel A. Abu Shaban:
How Data can Mislead Machine Learning Prediction Process: Case Study of Building Cooling and Heating Loads. 709-714 - Gana Sawalhi, Mohammad Abdallah:
A Proposed Quality Model For Social Media Websites. 715-718 - Abdelrahman Aloudat, Fatima S. Al-Sha'ar, Haitham Al-Qawaqneh, Amer Dababneh:
The Bernstein Expansion for Rational Differentiable Functions in Newton Divided Differences Form. 719-723 - Muhammad Sukriyllah Yusri, Mohamad Harris Misran, Norbayah Yusop, Maizatul Alice Meor Said, Mohd Azlishah Othman, Shadia Suhaimi:
Transfer Efficiency Enhancement on Wireless Power Transfer Using Metamaterial. 724-729 - Necmi Taspinar, Burcu Ketenci:
Cooperative Spectrum Sensing Using Bat Algorithm in Cognitive Radio. 730-733 - Sohini Roy Chowdhury, Kamal Sarkar:
Abstractive Multi-Document Summarization Using Sentence Fusion. 734-741 - Shorouq Elmanaseer, Wael Alzyadat:
Intelligent Agents and Neural Fuzzy Logic: Enhancing Agent Intelligence in Complex Environments. 742-745 - Radhika V. Kulkarni, Arjun Thakur, Shravani Nalbalwar, Shubham Shah, Sankalp Chordia:
Exploring Scalable and Efficient Deployment of Machine Learning Models: A Comparative Analysis of Amazon SageMaker and Heroku. 746-751 - Rajaa Alqudah, Mohammed Al-Qaisi, Rakan Ammari, Yazan Abu Ta'a:
OSINT-Based Tool for Social Media User Impersonation Detection Through Machine Learning. 752-757 - Samuel Oliveira, André B. Leal, Marcelo Teixeira, Yuri K. Lopes:
Security of Cyber-Physical Systems Against Actuator Attacks through Cryptography. 758-764 - Samia A. Abu-Shanab, Shadi AlZu'bi, Amjed M. Zraiqat:
A Novel Virtual Cosmetics Recommender System Based On Pre-Trained Computer Vision Models. 765-770 - Samar Hendawi, Islam AlTalahin, Shadi AlZu'bi, Ayman M. Abdalla:
Diameter-Constrained Minimum Spanning Tree Problems: A Survey. 771-774 - Mohammed Lafi, Akram A. AbdelQader:
Automated Business Rules Classification Using Machine Learning to Enhance Software Requirements Elicitation. 775-778 - Akram A. AbdelQader, Mohammed Lafi, Khalil Awad, Mohammad A. AbedelQader:
A Novel Approach to Elicit Software Requirements for IoT Systems Using SVM Classifier. 779-782 - Bassam M. Al-Mahadeen, Rufaydah Alhuweimel, Khalid Mohammad Jaber:
Prayer Sitting .. Is it a Biometric? 783-787 - Dang Cao Cuong:
Score-based Diffusion Model for Conformer Generation. 788-793 - Wael Jumah Alzyadat, Mohammad Azmi Al-Madi, Mohammad I. Muhairat, Nagham A. Al-Madi, Feras Altarawneh:
A Roadmap for Artificial Intelligence Augmented Software Development Life Cycle: Aspects of Knowledge Vaporization. 794-799 - Pratik Thantharate:
IntelligentMonitor: Empowering DevOps Environments with Advanced Monitoring and Observability. 800-805 - Mowafaq Muhammed Al-Kassab, Haya Al-Masalha, Lina Ma'mon Abu Hammad, Ali Mohammad Daradkeh, Haneen A. Al-Khawaja:
Utilization of Information and Communication Technology (ICT) by Faculty Members at Information and Communication Technology College Al-Zaytoonah University in Jordan. 806-810 - Deepa Pillai, Ardhendu Shekhar Singh, Trupti Bhosale, Adesh Doifode:
A Perspective on the Application of Fintech as a Gateway for Financial Literacy. 811-814 - Reineir S. Duran, Charven B. Balbon, Justine Zenon E. Balmes, Pol Brian G. Castro, Unice G. Lopez, Kobe A. Talosig, Ma. Elena A. Noriega, Orland D. Tubola:
EASY E-VOTE: An Ethereum-based Voting System using IPFS and MetaMask for Student Government Election. 815-820 - Mary Rachelle Anne F. Eliang, Rona Klarizz S. Del Rosario, Dorothy B. Matalang, Sam-Eduard T. Quintana, Aldem John E. Salvadora, Noel Irvin M. Titong, Ben B. Andres, Orland D. Tubola:
Ethereum-Based Smart Contract and Traceability System for Food Bank Operations. 821-826 - Radwan Moh'd Al-Dwairi, Maali Al-Khataybeh:
Web 2.0 Tools and Service Quality: The Key to Effective Customer Relationships in E-Commerce Environments. 827-831
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.