Admission & Registration| طلب الالتحاق الالكتروني| IU on google scholar

  • isra university جامعة الإسراء
  • xxxsextres xxxsexwatch
    qi redhead slut lydia star
    erin and blu get
    Tuesday, 09 January 2018 00:00

    Research Production

    Written by
    • Share
    Rate this item
    (0 votes)

    Research title, Publisher, Date

    Name of researcher

    #

    Publication 2017

    Segmented Block Cipher Algorithm based on ASCII Codes “ Journal of Computer Science (JCS)  2017, VOL  13 (12): 748.755 ISSN Print: 1549-3636, ISSN Online: 1552-6607

    Shadi R. Masadeh and Hamza A. A. Al_Sewadi

    1)       

    Smooth Handoff Process Cluster Based In Vehicular Ad Hoc Networks. International Journal of Computing Academic Research (IJCAR), 2017.

     

    Wa’el Jum’ah Al_Zyadat, Faisal Y.AlZyoud Aysh M. Alhroob

     

    2)       

    “An Algorithmic Approach for Sketching Sequence Diagram (AASSD)”. International Conference on Advances in Image Processing (ICAIP 2017). Bangkok, Thailand, August 2017

    Heba A. Nassar, Aysh Alhroob and Ayad T. Imam

    3)     

    Cloud Computing Security Challenges in Higher Educational Institutions” - A Survey. International journal of Computer Applications.  Volume 61. No. 6.  DOI 10.5120/ijca2017913217. (2017)

     

    Khalil H. A. Al-Shqeerat, Faiz M. A. Al-Shrouf, Mohammad R. Hassan, Hassen Fajraoui.

    4)       

    Utilization of Computer and Information Technology by Physicians. International Journal of Computing Academic Research (IJCAR) 6 (5), 66-170.2017

    Alhadidi, B., and Al-Rousan,T.

    5)     

    Mode Division Multiplexing of Helical-Phased Spot Mode and Donut Mode in Multimode Fiber Interconnects. 2017 IEEE Symposium on Computer Applications & Industrial Electronics. 2017

    Yousef Fazea, Angela Amphawan, Osama Qtaish

    6)     

    Real-Time Objects Recognition Approach for Assisting Blind People,  International Journal of Current Engineering and Technology, Vol.7, No. 1, February, 2017.

    Jamal S. Zraqou, Wissam M. Alkhadour, and Mohammad Z. Siam.

    7)       

    A New Maturity Model for the Implementation of Software Process Improvement in Web-Based Projects, Journal of Digital Information Management 15 (2), 66-75 2017

    Thamer Al-rousan, Bassam  Al-Shargabi

    8)       

    Energy Saving in Modified RPL: An Experimental Study and Results. The 2ⁿᵈ International Computer Sciences and Informatics Conference (ICSIC 2017),Amman-Jordan 2017

    W,Mardini,Bassam Al-Shargabi.M,Bani Yassein, A,Alkhatatbeh and E, Abdarahman

    9)       

    A Multi-threaded Symmetric Block Encryption Scheme Implementing PRNG for DES and AES systems

    International Journal of Advanced Computer Science and Applications, Volume 8 Issue 2, 2017.

     

     

    Adi A. Maaita, Hamza A. Al-Sewadi

    10)   

    A Trace Simplification Framework. ICIT 2017 the 8th International Conference on Information Technology, IEEE.

    Abualese, H.; Al-Rousan, T.,  and Rasmi, M.

    11)   

    Internet of Things an Exploration Study of Opportunities and Challenges, , IEEE ICEMIS 2017

    Bassam AL-Shargabi, Omar Sabri

    12)   

    The Future of the Internet of Things. 2th International Conference on Recent Trends in Engineering and Technology), At Paris, 2017.

    Al-Rousan, T.

    13)   

    Utility classes detection metrics for execution trace analysis. ICIT 2017 the 8th International Conference on Information Technology, IEEE.

    Abualese, H.; Al-Rousan, T.,  and Rasmi, M.

    14)   

    Publication 2016

    “A New Secure Forward Digital Signatures Based on Forecasting and Statistical Entropy of Key Exposures”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 5, Issue 1, January 2016

     

    Faris M. Al-Athari, Abdulameer Khalaf Hussain, Adnan Hadi Mahdi Al-Helali

     

    15)   

    Jordanian Consumer Perspective for B2C E-commerce Website Evaluation Factors”.  International Conference on Computer Sciences and Informatics, Amman-Jordan. (2016)

     

    Omar Tarawneh, Faiz Al Shrouf, Mohammad Nassar

    16)   

    “A Proposed Mobile Commerce Model Based on Mobile Agents” .  International Conference Computer Sciences and InformaticsConference.  Amman, Jordan. (2016).

    Faiz Al Shrouf, Omar Al Tarawneh

    17)   

    A Hybrid Method for Finding Correspondences From Un-calibrated Pair of High Resolution Images, Macrotrends in Technology and Science, 19-21 December, 2016.

    J. Zraqou, W. Alkhadour, A. Tayyar and S. Masaadeh

    18)   

    The Classification Filter Techniques By Field Of Application And The Results Of Output, Australian Journal Of Basic And Applied Sciences, ISSN: 1991-8178, EISSN: 2309-8414, Oct. 2016, Pp.68-77.

    FAISAL Y.AL-ZYOUD, WA’EL JUM’AH AL_ZYADAT

     

    19) 

    Cloud Computing Security Enhancement by Using Mobile PIN Code, Journal of Computers (JCP), DBLP, EBSCO, DOAJ, ProQuest, Vol. 11, No. 3, May 2016.

     

    Alhadidi1, Basim, Arabeyat, Zahraa, Alzyoud, Faisal, Alkhwaldeh, Ali

     

    20)   

    Arabic Keyword Extraction using SOM Neural Network, International Computer Sciences and Informatics Conference (ICSIC 2016), 12-13 January 2016, Amman, Jordan. (2016)

     

    Ebtehal H.Omousha, Venus W. Samawi (2016),

     

    21)   

    Opinion Mining: Analysis of Comments Written In Arabic Colloquial, Proceeding of the conference of World Congress on Engineering and Computer Science (WCECS 16) San Francisco, USA, 21-23 October, Vol 1, pp:470-475. (2016).

     

    Ahmed Y. Al-Obaidi, Venus Samawi,

     

    22)   

    Smooth handoff process cluster_based in vehicular ad hoc networks, 2016.

     

    Wa’el Jum’ah Al_Zyadat, Faisal Y.Alzyoud ,

     

    23)   

    “A Novel Polygon Cipher Technique using hybrid key Scheme “International Journal of Computer Science and Information Security (IJCSIS) , VOl 14. NO 4 April 2016 ISSN 1947 5500 Copyright © IJCSIS, USA.

    Shadi R. Masadeh and Hamza A. A. Al_Sewadi

    24)   

    A Novel Paradigm for Symmetric Cryptosystem” International Journal of Advanced Computer Science and Applications(ijacsa), 7(3), 2016. http://dx.doi.org/10.14569/IJACSA.2016.070317

    Shadi R. Masadeh, Hamza A. Al_Sewadi and Mohammad A. Wadi

    25)   

    The classification filters, techniques by field of application and the results of output, 2016.

    Faisal Y.Alzyoud, Wa’el Jum’ah Al_Zyadat

    26)   

    A Hybrid Method For Finding Correspondences From Un-Calibrated Pair Of High Resolution Images. The Journal of MacroTrends in Technology and Innovation,Pages 20-26, December 2016.

    J. Zraqou, W. Alkhadour, A. Tayyar and S. Masaadeh

    27)   

    A Hybrid Method for Finding Correspondences From Un-calibrated Pair of High Resolution Images, Macrotrends in Technology and Science, 19-21 December, 2016.

    J. Zraqou, W. Alkhadour, A. Tayyar and S. Masaadeh

    28)   

    Security Engineering for E-Government Web Services: A Trust Model, IEEE,2016

    Bassam al-shargabi

    29)   

    Resistance Factors Influencing the Adoption of Cloud Computing in Middle East Government Sectors.2016 .

    Al-Rousan, T., and Abu Hashish

    30)   

    A study of Adopting Cloud Computing from Enterprise Perspective using Delone and Mclean IS Success Model,IJCSIS.2016

     

    Bassam al-shargabi,Omar Sabri

    31)   

    Publication 2015

    The Definition of Intelligent Computer Aided Software Engineering (I-CASE) Tools, Journal of Information Engineering and Applications, 2015.

     

    Ayad T. Imam, Ayman J. A, Aysh Al-Hroob

     

    32)   

    Best Test Cases Selection Approach Using Genetic Algorithm”, Journal of Computer and Information Science” vol.8 no.1, 2015

     

    Nidal Yousef, Aysh Alhroob, Hassan tarwaneh

     

    33)   

    Cloud Computing for Global Software Development: Opportunities and Challenges.2015

    Al-Rousan, T.

    34) 

    Prospects of Cloud Computing In E-Government. International Journal of Advanced Computational Engineering and Networking. 3 (10).2015.

    Al-Rousan, T.

     

    35) 

    Integration of e-learning and cloud computing platform through software engineering”. Recent Patents on Computer Science, Volume 8, Number 2, August 2015, pp. 100-105(6). Bentham Science Publishers (Canada). 2015

    Aljawarneh, Shadi; Alshargabi, Bassam; M.A. Hayajneh, Sofyan; Ayad Tareq Imam

    36) 

    “Database Copyright Protection using Watermarking Arabic-Characters”. 3rd International Conference on Communication and Electronics Information (ICCEI 2015), Bali, Indonesia. January 2015

    Shadi Masadeh, Ashraf Odeh, Ayad T. Al-Zobaydi

    37) 

    “Adaptive Routing Protocols for Dynmic Wireless Senser Networks, International Journal of Electrical and Computer Engineering Vol 2, No:11, 2015.

    Fayez Mostafa Alhamoui and Adnan Hadi Mahdi Al-Helali

    38)   

    Impact of Cloud Computing on Educational Institutions: A Case Study.2015

    Al-Rousan, T., and Abu Al Ese,

    39)   

    "A Secure Authentication System for ePassport Detection and Verification", , pp. 173-176, 2015, doi:10.1109/EISIC.2015.21

    Fadi Hamad, Jamal Zraqou, Adi Maiita, Anas Abu Taleb

    40)   

    “A Generic Adaptive Multi-Gene-Set Genetic Algorithm (AMGA)”, International Journal of Advanced Computer Science and Applications 6(5):12 - 18 · June 2015

    Adi A. Maaita · Jamal Zraqou · Fadi Hamad · Hamza A. Al-Sewadi

    41)   

    Cloud Computing for Global Software Development: Opportunities and Challenges. International Journal of Cloud Applications and Computing. IGI. U.S.A.5 (1).2015.

    Al-Rousan, T.

    42)   

    “An efficient image processing and browser tool for solar images”, Journal of Theoretical and Applied Information Technology,80.1 (Oct 2015): 124-132

    A. Odat · A. Maaita · F. Hamad · J. Zraqou

    43)   

    "Automatic Test Data Generation for Java Card Applications Using Genetic Algorithm", Journal of Software Engineering and Applications, Dec 2015, DOI: 10.4236/jsea.2015.812057

     

    Manaseer, S. , Manasir, W. , Alshraideh, M. , Hashish, N. and Adwan,

     

    44)   

    Visualizing and Processing Solar Images Efficiently, International Journal of Science and Applied Information Technology (IJSAIT), 23 – 24 November, 2015.

    Jamal Zraqou & Shadi Masaadeh

    45)   

    A novel secure system for E-Learning: Schools in MOE in Jordan Case Study, International Journal of Science and Applied Information Technology (IJSAIT), 23 – 24 November, 2015.

    Shadi Masaadeh, Jamal Zraqou, and Mohammad Wadi

    46)   

    “An efficient detection system for a drowsy driver”, Journal of Theoretical and Applied Information Technology78.3 (Aug  2015): 421-426

    J. Zraqou · A. Maaita · W. Alkhadour · F. Hamad

    47)   

    “A Generic Adaptive Multi-Gene-Set Genetic Algorithm (AMGA)”, International Journal of Advanced Computer Science and Applications 6(5):12 - 18 · June 2015

    Adi A. Maaita · Jamal Zraqou · Fadi Hamad · Hamza A. Al-Sewadi

     

    48)   

    Impact of Cloud Computing on Educational Institutions: A Case Study.2015

    Al-Rousan, T., and Abu Al Ese,

    49)   

    “An efficient image processing and browser tool for solar images”, Journal of Theoretical and Applied Information Technology,80.1 (Oct 2015): 124-132

    A. Odat · A. Maaita · F. Hamad · J. Zraqou

    50)   

    Security In Mobile Computing, in Ala’a Alhamami and Ghossoon M. Waleed al-Saadoon (Eds). Threat Detection and Countermeasures in Network Security, Book Chapter. IGI, (2015)

     

    Venus W. Samawi

     

    51)   

    Traffic Light Control Utilizing Image Analysis (2015). Gi-Chul; Ao, Sio-long; Gelman, Len (Eds), Transactions on Engineering Technologies: World Congress on Engineering 2014. Book chapter, Springer. (2015).

     

    Obadah M. A. Ayesh, Venus W. Samawi, and Jehad Q.

     

    52)   

    A Cryptographically Secure Multi-Stage Pseudo-random number Generator International Journal of Advanced Research in Computer and Communication Engineering 05/2015; 4(5):12 - 18.

    Adi A. Maaita, Hamza A. A. Al_Sewadi, Abdulamir K. Husain, Osama Al-Haj Hassan

    53)   

    Enhancement Arabic Text Classification Using Semantic Relation With Part Of Speech Tagger. Proceeding of the 14th International Conference on Artificial Intelligence, Knowledge Engineering and Databases (AIKED '15), pp: 195-201, Spain, 10-12 Jan. (2015)

     

    Suhad A. Yousif, Venus W. Samawi, Rached Zantout, Islam Elkabani

     

    54)   

    Deterministic Random Number Generator Algorithm for Cryptosystem Keys CISAI 2015: 17th International Conference on Information Security and Artificial Intelligence, Venice, Italy; 04/2015

    Adi A. Maaita, Hamza A. A. Al_Sewadi

    55)   

    Lexical Cohesion and Entailment based Segmentation for Arabic Text Summarization (LCEAS). The World of Computer Science and Information Technology Journal (WCSIT), Vol. 5, No.3, pp. 51-60 (2015).

    Fatima T. AL-Khawaldeh, Venus W. Samawi

     

    56)   

    Enhancement of Arabic Text Classification Using Semantic Relations of Arabic WordNet, Science publication, Journal of Computer Science, Vol 11, Issue 3, pp: 498.509 2015. DOI: 10.3844/jcssp.2015.498.509 (2015).

    Suhad A. Yousif, Venus W. Samawi, Islam Elkaban and Rached Zantout,

     

    57)   

    The Effect of Combining Different Semantic Relations on Arabic Text Classification", The World of Computer Science and Information Technology Journal (WSCIT), Vol 5, Issue 6. pp. 112-118, 2015.

    Suhad A. Yousif, Venus W. Samawi, Islam Elkabani, Rached Zantout

     

    58)   

    Web Information Retrieval Using Island Genetic Algorithm. Proceeding of the conference of World Congress on Engineering and Computer Science (WCECS 15) San Francisco, USA, 21-23 October, Vol 1, pp:325-330. (2015). Available: http://www.iaeng.org/publication/WCECS2015/

     

    Noha Mezyan, Venus W. Samawi

     

    59)   

    Load Balancing Technique Based on Broadcasting & Residual Energy Using Adaptive Clustering Hierarchy Protocol (LBEACH), Science publication, Journal of Computer Science. Vol 11, Issue 6, pp 821-838. DOI : 10.3844/jcssp.2015.821.838(2015).

     

    Abdullah Soliman Alshraa, Venus W. Samawi

     

    60)   

    Security Issues in Cloud Computing: A Perspective and New Directions, European Journal of Science and Technology,2015

    S Aljawarneh, B Al-Shargabi, B Hawashin

    61)   

    User Preference-Based Web Service Composition and Execution Framework, Advanced Research on Cloud Computing Design and Applications, 118,2015

    Bassam al-shargabi

    62)   

    Integration of E-learning and Cloud Computing Platform Through Software Engineering., Recent Patents on Computer Science,2015

    S Aljawarneh, B Alshargabi, S M.A. Hayajneh, A T. Imam

    63)   

    An Evaluation Of MIS Implementation Success Factors. International Conference of Engineering and MIS 2015.Istanbul Turkey, October 24-26.

    Bassam Al-Shargabi,Omar Sabri.

    64)   

    Publication 2014

    The Influence of SMS Advertising by Jordanian Commercial Companies on Mobile Phone Users' Consuming Behaviour”, Journal of Information and Knowledge Management, Vol. 4. No.11, 2014

     

    Amaal Al-Amawi, Salwa Alsamarai, Manar Maraqa, Aysh Alhroob

     

    65)   

    A Hybrid Simulated Annealing with Tabu List and Allowable Solutions Memory to Solve University Course Timetabling Problem”, Journal of European Journal of Scientific Research Vol.126 No.1 2014

     

    Aysh Alhroob, Hassan tarawneh

     

     

    66)   

    Transforming UML State Machine Diagram to High Level Petri Net Using Genetic Algorithm”, LNSE 2014 Vol.2 (3): 243-246 ISSN: 2301-3559 DOI: 10.7763/LNSE.2014.V2.130

     

    Aysh Alhroob Nidal Yousef

     

    67)   

    An Efficient and Scalable Ranking Technique for Mashups Involving RSS Data Sources. Journal of Network and Computer Applications. Science Direct. U.S.A. 39(1).2014.

    Hassan,O.,  Al-Rousan,T., and Abu Taleb.

    68) 

    Automatic Diagnosis of Distortion Type of Arabic /r/ Phoneme Using Feed Forward Neural Network”. Journal of Computer Engineering and Intelligent Systems; ISSN (Paper); Vol. 5, No 12. International Institute for Science, Technology and Education (IISTE), New York-USA, 2014

     

    Ayad T. Imam; Jehad A. Alaraifi; Ibtisam Hussien J

     

    69) 

    Designing Structured Peer-to-Peer Architectures for Mashups

    IAENG International Journal of Computer Science 02/2014; 41(1):72 - 80.

    Osama Al-Haj Hassan, Ashraf Odeh, Adi Maaita, Aymen Abu-Errub

    70) 

    Developing of Natural Language Interface to Robot- an Arabic Language Case Study”, International Review on Computers and Software (I.RE.CO.S.), ISSN: 1828-6003, Vol. 9. No. 7, pp. 1256-1262. Praise Worthy Prize Publishing (U.K.) 2014

     

    Ayad T. Al-Zobaydi, Thamer Rousan, Ashraf Odeh,

     

    71) 

    “The Roles of Decision Making and Empowerment In Jordanian Web-Based Development Organizations”; Journal of Web Engineering; Rinton Press, ISSN: 1540-9589, Vol.13 No.5&6, USA, 2014

    Thamer Al-Rousan, Ayad Al-Zobaydi

    72) 

    “An Expert Code Generator using Rule-Based and Frames Knowledge Representation Techniques”; in proceeding of 5th International Conference on Information and Communication Systems (ICICS), Jordan University of Science and Technology, Irbid, Jordan, Pp 1-6,  Print ISBN: 978-1-4799-3022-7, Publisher: IEEE, April, 2014

    Ayad T. Imam, Shadi Aljawarneh, Thamer Rousan

    73) 

    “Cooperative distributed architecture for mashups”, Enterprise Information Systems 8(3):406-444 · May 2014

    Osama Mohammad Al-Haj Hassan · Lakshmish Ramaswamy · Fadi Hamad · Anas Abu Taleb

    74)   

    Analysis of Mobile Agent Optimization Patterns. British Journal of Applied Sciences& technology.  4(12).  P.p. 1841-1857. (2014)

     

    Faiz Al Shrouf, Aiman Turani, Ayman AbuBaker, Ahmad Omri. 

    75)   

      Microcalcification Enhancement and Detection using Texture Features and SupportVector Machine.  European Journal of Scientific Research.  Vol.119. No. 1. P.p. 85-97. (2014)

     

    Ayman AbuBaker, Faiz Al Shrouf, Aiman Turani. 

    76)   

    Balancing the Network Clusters for the Lifetime Enhancement in Dense Wireless Sensor Networks.  Arabian Journal of Science and Engineering.  DOI 10.1007/s13369-014-1059-x,  Springer. (2014)

     

    Hesham Abusaimeh, Mohammmad Shkoukani, Faiz Al Shrouf. 

    77)   

    Modeling Virtual Meetings Within Software Engineering Environment.  International Journal of Computer Science and Engineering.  Vol. 6, No. 4.  P.p.164-168. (2014)

     

    Aiman Turani, Ayman AbuBaker, Faiz Al Shrouf

     

    78)   

    Software Process Improvement for Web-Based Project. Proceedings on Computational and Experimental Science and Engineering Conference (ICCESEN 2014). Antalya, Turkey.2014.

    Al-Rousan, T.

    79)   

    Componentized-Based Framework for Developing Engineering E-Training Content. “European Journal of Scientific Research”. Volume 121 No 3 pp: 321-327. (2014)

     

    Aiman Turani, Mohammad H. Alomari and Faiz Al-Shrouf

    80)   

    “E-Assessments Systems: A Comparison of the Views of Samples

    of Students and Professors”, in the Journal of Management Science

    and Engineering, Vol. 8, No. 3, 5-10, 2014 Salwa Alsamarai, Amaal Amawi, Mohammad Ali H.Eljinini

    Salwa Alsamarai, Amaal

    Amawi, Mohammad Ali H.

    Eljinini

    81)   

    Using Data Mining to Predict& Generate Optimum Multiple Execution Paths Compositions. The International Journal for Software Engineering (IJSE). 2014

    Osama Qtaish, Zulikha Jamaludin, Mahmuddin

    82)   

    Online Handwriting Recognition for Maldivian Language. Proceedings of the International Conference on Computer Science, Computer Engineering, and Social Media, December,2014

    J. Zraqou

    83)   

    Emotion Interaction With Virtual Reality Using Hybrid Emotion Classification Technique Toward Brain Signals, International Journal of Computer Science & Information Technology (IJCSIT), April 2014.

    Faris A. Abuhashish, Jamal Zraqou, Wesam Alkhodour, Mohd S. Sunar and  Hoshang Kolivand1

    84)   

    A Moderated Distance Based Broadcasting Algorithm for MANETs, International Journal of Computer and Communication Engineering (IJCCE), EI (INSPEC, IET), Google Scholar, Crossref, Engineering & Technology Digital Library, ProQuest, and Electronic Journals Library, Vol. 3, No. 6, November 2014.

     

    Alhadidi, Basim; Alzyoud, Faisal

     

    85)   

    Traffic Light Control Utilizing Queue Length, Proceedings of the World Congress on Engineering 2014 Vol I, WCE 2014, July 2 - 4, 2014, London, U.K.pp: 590-594, (2014).

     

    Obadah M.A Ayesh, Venus W. Samawi, and Jehad Q.

     

    86)   

    Robust Real-Time Facial Expressions Tracking and Recognition,

    International Journal of Technology and Education Marketing (IJTEM), Pages 95-105,  March, 2014

    Zraqou, J., Alkhadour, W., & Al-Nu'aimi

    87)   

    CPU Utilization for a Multiple Video Streaming over a fiber optic ATM-Network when varying the Quality of Service” International Journal of Emerging Trends in Computing and Information Sciences, Vol. 5 No. 4, April 2014 (E-ISSN 2218-6301/ISSN

    2079-8407).

    Ahmad Azzazi, Hesham Abusaimeh, Shadi R. Masadeh

     

    88)   

    A Novel Paradigm In Authentication System Using Swifi Encryption /Decryption Approach" The International Journal of Network Security & Its Applications (IJNSA), , Volume 6, Issue 1, 2014, ISSN : 0975 – 2307 EISSN : 0974 – 9330.

    Shadi R.Masadeh , Ahmed Azzazi , Bassam Alqaraleh and Ali Alnimat

    89)   

    Secure Communication: A Proposed Public Key Watermark System" International Journal of Information Security and Privacy

    (IJISP). Volume 7, Issue 4 , 2014 ISSN: 1930-1650; EISSN: 1930-1669

    Shadi R.Masadeh , Shadi Jawarneh, Ashraf odeh and Abdulla Alhaj

    90)   

    Publication 2013

    The Impact of Frequent Use Email When Creating Account at the Websites on the Users Privacy and Security” International Journal of Computer Science & Information Technology (IJCSIT) Vol 5, No 6, December 2013

     

    S. Al-Samairrai, Z. Fadhil, A. Alhroob

     

    91)   

    Evaluation of Different Query Expansion Techniques for Arabic Text Retrieval System”. American Journal of Applied Sciences, vol.10 no.9 USA, 2013

     

    A. Alhroob, H. Khafajeh N. Innab

     

    92)   

    , “A Comparative Study of Development Methodologies for Web Project: Towards a Viable Alternative”; European Journal of Social Sciences, by Social Sciences Research Platform (SSRP), France, ISSN: 1450-2267, Vol. 40 Issue 1, 2013

    Thamer Al-Rousan, Osama Al-Haj Hassan, Shadi Al-jawarneh, Ashraf Odeh, Ayad Al-Zobaydi

    93) 

    DOI: 10.1080/17517575.2013.          

    Commerce and the Internet of Things”,

    IETE Technical Review 26(5) ·

    September 2009

    Fadi Hamad · Leonid Smalov · Anne James

    94)   

    “The Utilization of the Moodle E-Learning System in Isra

    University”, Advances in Intelligent Systems and Computing, Vol.

    220, 2013

    Eljinini MA, Muhsen Z,

    Maaita A, Alnsour A, Azzam

    MA, Barhoum K

    95)   

    “E-Assessments Systems: From Academics Personal Trends”, in the

    Journal of Theoretical and Applied Information Technology

    (JATIT), Vol. 52, No. 2, 173-182, 20th June 2013

    Alsamarai Salwa, Eljinini

    Mohammad Ali, Amawi

    Amaal, Hameed Suha

     

    96)   

    “The Impact on the Utilization of E-Learning Systems”,

    International Journal of Emerging Trends & Technology in

    Computer Science (IJETTCS), Vol. 2, No. 3, 171-175, May-June

    2013

    Eljinini MA, Muhsen Z

    97)   

    An Efficient Approach for Recognizing and Tracking Spontaneous Facial Expressions, The Second International Conference on E-Learning  & E-Technologies in Education (ICEEE2013), December 2013.

    J. Zraqou, W. Alkhadour, and A. Al-Nu’aimi

    98)   

    Self-Embedding Watermarking for Digital Images Depending On Edge Energy, The Second International Conference on Informatics, Engineering and Information Science (ICIEIS2013).

    Abdallah Al-Tahan Al-Nu'aimi, Jamal Zraqou and Wessam Alkhadour

     

    99)   

    “Robust Real-Time fand Recognition”, International Journal of Technology and Educational Marketing, 2013

    Zraqou, J., Alkhadour, W., & A. Al-Nu'aimi

    100)           

    A Comparison Study of Common Routing Procols used in Wireless Ad-Hoc Networks, Research Journal of Applied Sciences, Engineering and Technology, ISI Thomson, Vol. 15, No. 12, April 10, 2013

     

    Alhadidi, Basim; Alzyoud, Faisal Y.;El-Khairy, Amer; Zakerneh, Ehab

     

    101)           

    Intrusion Detection by Dynamic Length Rule, AWERProcedia Information Technology & Computer Science. [Online]. 2013, 3, pp 1460-1470. Available from: http://www.world-education-center.org/index.php/P-ITCS

     

    Susan M. Al Naqshbandi, Venus W. Samawi, Jaap van den Herik

     

    102)           

    Fingerprint Identification Technique Based On Wavelet-Bands Selection Features (WBSF), International Journal of Computer Engineering and Technology (IJCET). Vol. 4, No. 3. pp:308–323. (2013)

     

    Mustafa Dhiaa Al-Hassani, Abdulkareem A. Kadhim, Venus W. Samawi

     

    103)           

    Arabic Expert System Shell, International Arab Journal of Information Technology (IAJIT), Vol. 10, No.1. (2013)

     

    Venus W. Samawi, Akram A. Mustafa, Abeer K. Ahmad

     

    104)           

    Software Protection via Hiding Function Using Software Obfuscation, International Arab Journal of Information Technology (IAJIT), Vol. 10, No.6. (2013)

     

    Venus W. Samawi, Adeeb H. Sulaiman

     

    105)           

    Speaker Identification using Selected Features from DWT, Proceeding of the 2nd International Conference on Advanced Computer Science Applications and Technologies–ACSAT2013,23-24 December, Malaysia-Sarawak. (2013)

     

    Feras Abualadas, Venus W. Samawi

     

    106)           

    Self-Embedding Watermarking for Digital Images Depending On Edge Energy, The Second International Conference on Informatics, Engineering and Information Science (ICIEIS2013).

    Abdallah Al-Tahan Al-Nu'aimi, Jamal Zraqou and Wessam Alkhadour

    107)      

    Cloud computing challenges and Solutions ” International Journal of computer networks and Communications (IJCNC) Vol.5, No.5, September 2013, ISSN : 0974 - 9322[Online]; 0975 - 2293 [Print].

     

    Nidal M. turab, Anas Abu Taleb, Shadi R. Masadeh

     

    108)           

    Novel Secure E-Contents System For Multi-Media Interchange Workflows In Elearning Environments” International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.5, September 2013 , ISSN : 0974 - 9322[Online]; 0975 - 2293 [Print].

     

    Shadi R. Masadeh, ,Bilal Abul-Huda and Nidal M. Turab

     

    109)           

    A Proposed Campus Building Process in Cloud Computing” International Journal of Computer Science and Telecommunications, Volume 4, Issue 6, June 2013 , pages 47-50, ISSN 2047-3338.

     

    Shadi R. Masadeh and Nidal M. Turab

     

    110)           

     

     

    111)           

    A Secure Data Transmission Mechanism for Cloud Outsourced Data " International Journal of Cloud Applications and Computing (IJCAC) , Volume 3, Issue 1, 2013 , pages 34-43, ISSN: 2156-1834, EISSN: 2156-1826

     

    Abdullah Alhaj, Shadi Aljawarneh, Shadi Masadeh and Evon Abu-Taieh

     

    112)           

    Publication 2012

    Transforming UML State Diagrams To High Level Petri Nets”. In proceeding of International Conference of Software Technology and Engineering Phuket, Thailand, IEEE, 2012

     

    A. Alhroob, N. Yousef A. Maitah

     

    113)           

    “A Fast Personal Palmprint Authentication based on 3D-Multi Wavelet Transformation”, Transnational Journal of Science and Technology, Vol. 2, No. 8, Sep. 2012.

     

    Adnan H. M. Al-Helali, W. A. Mahmmoud, and H. A. Ali

     

    114)           

    Analysis of Mobile Agent Systems Performance Using Linear Predection Model.  International Journal of Reviews in Computing.  Vol. (12).  P.p.  44-50. (2012)

     

    Faiz Al Shrouf, Aiman Turani

    115)           

    Evaluating Time Performance Optimization Analysis for Mobile Agent Message Communication using Assignment Computing Agent.  Journal of Applied Sciences..  Vol. 12, Issue 12.  P.p.  1290-1296 .   (2012)

    Faiz Al Shrouf, Hesham Abusaimeh, Khaleel Shqeerat, Mahmoud Omari

     

    116)           

    Dynamic Probabilistic Approach for Improving the Route Discovery in MANETsResearch Journal of Applied Sciences, Engineering and Technology.. Vol. 4 (15). p.p.  2396-2402. ((2012) 

     

    Khaleel Shqeerat, Alia Sabri, Faiz Al Shrouf

    117)           

    “The Impact of E-Assessments System on the Success of the

    Implementation Process”, in the International Journal of Modern Education and Computer Science (IJMECS), Vol. 4, No. 11, 76-84,

    December 2012

    Eljinini Mohammad Ali,

    Alsamarai Salwa, Hameed

    Suha, Amawi Amaal

    118)           

    A Comparative Study of Development Methodologies for Web Project: Towards a Viable Alternative. Journal of Social Sciences. 40(1).2013

    Al-Rousan, T.

    119)           

    Choosing Appropriate Programming Language to Implement Software for Real-Time Resource- Constrained Embedded Systems Embedded Systems - Theory and Design Methodology, 03/2012; , ISBN: 978-953-51-0167-3

    Mouaaz Nahas, Adi Maaita

    120)           

    Optimal QoS Aware Multi-Path Web Service Composition Using Heuristics Algorithm And Data Mining. In The International Conference on Computing, Networking and Digital Technologies (ICCNDT2012), (pp. 136-141). The Society of Digital Information and Wireless Communication. 2012

    Osama Qtaish, Zulikha Jamaludin, Mahmuddin

    121)           

    Multi-Path QoS-Aware Service Composition. International Journal of Engineering Research and Applications (IJERA). 2(2),(pp.1075-1085). 2012

    Osama Qtaish, Zulikha Jamaludin, Mahmuddin

    122)           

    Hiding Degraded Version of  Digital Image within Itself to Prove the Legal Ownership, The 2nd International Conference on Computing and Artificial Intelligence, MIC-CAI, 2012.

    J. Zraqou and A. Al-Nu’aimi

    123)      

    An Automated Method for Generating an Enhanced Set of Correct Matches from  Pairs of Uncalibrated Images,  The 2nd International Conference on Computing and Artificial Intelligence MIC- CAI 2012.

    A. Al-Nu’aimi, A. Alnsour, M.A. Eljinini, W. Alkhadour and J. Zraqou

    124)      

    The effect of using P-XCAST routing protocol on many-to-many applications, International Arab Journal of Information Technology (IAJIT), I.F.: 0.127, ISI Thomson, Vol. 9, No. 4, Jul.2012.

    Faisal Y. Alzyoud, Tat-Chee Wan

    125)           

    One-rule Genetic-Fuzzy classifier. International Conference on Computer Science and Automation Engineering (CSAE), 25-27 May, China, IEEE Xpolre, Vol 2, PP 204-208. (2012).

     

    Naqshbandi, Susan M. Al; Samawi, Venus W.

     

    126)           

    Requirement Manual Document for Weather Data Filtering and (short-term) Prediction, 2012

     

    Rodziah Binti Atan Wa’el Jumah Al-zyadat

     

    127)           

    Weather Data Filtering Tool for Relevant-Based Data Prediction, 2012

     

    Rodziah Binti Atan Wa’el Jumah Al-zyadat

     

    128)           

    A secure model for building e-learning systems. Network Security, Volume 2012, Issue 1, January 2012, Pages 17-20.

     

    Shadi R Masadeh, Nedal Turab, Farhan Obisat

     

    129)           

    Publication 2011

    “Relative-Fuzzy: A Novel Approach for Handling Complex Ambiguity for Software Engineering of Data Mining Models”. Book. ISBN 978-3-8454-7212-6.  LAP Lambert Academic Publishing Company; Germany 2011

    Ayad Tareq Imam

    130)         

    Intelligent e-Learning Framework for Practicing EducationalTesting Services. The International Arab Journal of Information Technology (IAJIT).  Vol.  8, No.  4, p.p.  372-375. (2011)

     

    Aiman Turani, Faiz Al-Shrouf. 

    131)           

    Software Agents for E-Commerce Data Workflow management.  Second International Conference in Communications in Computer and Information Science, ICSECS, Springer –Verlag Berlin Heidelberg 2011,  Pahang, Malaysia. (2011)

     

    Faiz Al-Shrouf, Aiman Turani, and Khalil Al-Shqeerat. 

    132)           

    A Scalable Framework to Quantitatively Evaluate Success Factors of Mobile Learning Systems, " International Journal of Mobile Learning and Organisation,Vol. 5, No.3/4, Inderscience, 12/31/2011, pp.299 - 316

    Ghassan Issa, Hussein Al-Bahadili, and Maher Abuhamdeh

    133)         

    A Hierarchical Framework for Evaluating Success Factors of M-Learning, " the 2011 Conference on Innovations in Computing and Engineering Machinery (CICEM 2001) , Jordan ACM Professional Chapter-ISWSA, Amman, jordan, 9/6/2011, pp.53 – 59

    Hussein Al-Bahadili, Ghassan Issa, and Maher Abuhamdeh

     

    134)         

    “Implementing Moodle as a Tool to Develop the Isra University ELearn System”, in the International Journal of Computer Science

    and Network Security (IJCSNS), Vol. 11, No. 6, June 2011

    Alnsour A, Muhsen Z,

    Dababnah M, Eljinini MA,

    Barhoum K, Ahed M, and

    Almara'beh H

    135)           

    "Managing the E-Learning System of Isra University", in the

    European Journal of Scientific Research, Vol. 55, No. 3, June 2011

    Alnsour A, Muhsen Z, Eljinini

    MA, Dababneh M, Barhoum

    K, Hammoudeh MA, Ahed M

    136)           

    “The Medical Semantic Web: Opportunities and Issues”, in:

    International Journal of Information Technology and Web

    Engineering (IJITWE), Vol. 6, No. 2, April-June 2011

    Eljinini MA

     

    137)           

    QoS criteria for distinguishing the competing web services, Proceedings of the 2011 First IRAST International Conference on Data Engineering and Internet Technology (DEIT), Bali, Indonesia: IEEE Computer Society 2011

    Osama Qtaish, Zulikha Jamaludin

    138)           

    “Using Watermarking Techniques to Prove Rightful Ownership of Web Images", International Journal of Information Technology and Web Engineering, 2011

     

    A. S. Alnuaimi

    139)           

    Developing AIS For Detecting Intrusions Based on Feature Clustering. Proceeding of the 7th International Conference on Computer Applications and Network Security (ICCANS). May 27-29. Maldives, (2011)

     

     

    Yamur K. Al-Douri, Venus W. Samawi

     

    140)           

    “A Formal Evaluation of the Security Schemes for Wireless Networks”. Research Journal of Applied Sciences, Engineering and Technology, 3(09): 910-913 ,2011

     

    Shadi R. Masadeh and Nidal Turab

     

    141)           

    Deploying a Web Client Authentication System Using Smart Card for E-Systems. Research Journal of Applied Sciences, Engineering and Technology, 3(09): 948-952. ,2011

     

    Shadi Aljawarneh, Maher debabneh, Shadi R. Masadeh and Abdullah Alhaj

     

    142)           

    Publication 2010

    "Computer Operating System", Al-Safa Publisher, Amman, Jordan, 2010.

     

    Adnan H. M. Al-Helali and Fayze Al-Hamoui,

     

    143)           

    Using analytical hierarchy process to measure critical success factors of m-learning”, European, Mediterranean & Middle Eastern Conference on Information Systems 2010 (EMCIS2010), April 12-13 2010, Abu Dhabi, UAE

    Maher Abu Hamdeh  & Adel Hamdan

    144)         

    Developing a Theoretical Framework for Knowledge Acquisition”, European Journal of Scientific Research, Vol.42 No.3 (2010), pp.453-463.

    Ibrahim Abu-Nahleh, Adel Hamdan Mohammad, Maher Abu Hamdeh and Alia TahaSabri

    145)           

    3D Modeling and Solar Image Processing Algorithms, Developed by Space Weather Research Team in University of Bradford, Presentation in Solar Image Processing Workshop, September 2010.

    T. Colak, R. Qahwaji, J. Zraqou, and S. Ipson

     

    146)      

    A New Technique for Location of Fault Location on Transmission Lines, Modern Applied Science, CABI Chemical Abstracts database EBSCOhost Excellence in Research for Australia (ERA) Google Scholar LOCKSS NewJour Open J-Gate Polish Scholarly Bibliography (PBN) ProQuest SHERPA/RoMEO Standard Periodical Directory Ulrich's Universe Digital Library, Vol. 4, No. 8, August 2010.

    Alzyoud, Khalaf Y.; Alzyoud, Faisal Y.; Al-Mofleh Anwar

    147)           

    “A secure wifi system for wireless networks: an experimental evaluation ", International Journal of Network Security, Volume 2010, Issue 6, June 2010,

     

     

     

    Shadi Aljawarneh, Shadi R. Masadeh ,Faisal Alkhateeb

     

    148)           

    Publication 2009

    “Slantlet Transform for Multispectral Image Fusion”, Journal of Computer Science, Vol. 5, No. 4, 2009, pp: 263-269.

     

    Adnan H. M. Al-Helali, Hamza A. Ali, Buthainah Al-Dulaimi, Dhia Alzubaydi and Walid A. Mahmmoud

     

    149)           

    “Language Constructs for Generalising unit test “, Research Proposal, Testing: Academic and Industrial Conference - Practice and Research Washington, DC, USA ©2009.

    Nabil Hashish, Leonardo Bottaci

     

    150)           

    Enhanced 3D Perception using Super-Resolution and Saturation Control Techniques for Solar Images, UbiCC, Septemper 2009..

    Zraqou J., Alkhadour W., Qahwaji R., Ipson S. and Ugail H

    151)           

    Publication 2008

    152)         

    "Fundamental of Computer Networks ", Al-Juhayna Publisher, Amman, Jordan, 2008.

     

    Adnan H. M. Al-Helali and Fayze Al-Hamoui

     

    153)           

    “Interactive RPC Binding Model”, European Journal of Scientific Research. 2008

     

    Fawaz A. M. Masoud, Qatawneh Mohammad, WesamAlmobaideen, Mohammad Alshraideh, Nabil Abu Hashish, OraibMegdady, Shatha Al-Asir, Shorouq. Aladaileh

     

    154)           

    Others

    Development of a Conceptual Approach for Managing E-Risk”, the 7th international scientific conference in Jordan (16-18 April, 2007), Alzaytoonah Private University.

     

    Adel Hamdan, Maher Abu Hamdeh, Samer Al Hiwari

    155)           

    “MS/Ayad-Marwan Network: A New Architecture of an Artificial Neural Network”;  Conference on Interactive Mobile and Computer Aided Leaning (IMCL 2006) Amman, Jordan, April 19 - 21, 2006

    Ayad T. Al-Zobaydi and Marwan Al-Akaidi

    156)         

    “Data Mining Model for ASR (DMM4ASR)”; Middle East Simulation & Modeling Conference (MESM2005); Page 147-150; Porto, Portugal; Oct. 2005

    Ayad T. Al-Zobaydi, Marwan M. Al-Akaidi and Robert I. John

    157)         

    “Automatic Speech Recognition”; Middle East Simulation & Modeling Conference (MESM2004); Page 102-107; PU, DMU, Gant university, and Eurosis organization; Amman, Jordan; Sept. 2004

    Ayad T. Al-Zobaydi and M. M. Al-Akaidi;

    158)         

    “Device Driver for Plotter”; Journal of Computer Researches; folder 2, Vol. 2; Arabic research centers-Arab league; Baghdad- Iraq; 1998

    Ayad Tareq Imam and Maha I. Hadid

    159)         

    “PAS2C: A New Trend of Translating Program”, Journal of Education and Science; College of Education; Mosul University; Mosul- Iraq; Fall 1997

    Ayad Tareq I.

    160)         

    Read 4386 times Last modified on Wednesday, 25 September 2019 08:41