Abstract is missing.
- Future IoT sensing: Silvaco simulation of graphene-gated p-i-n photosensor on SOI for blue and ultraviolet lightShonak Bansal, Arnav Bansal, Mohammad Aljaidi, Krishna Prakash. 1-8 [doi]
- Hybrid Diabetes Mellitus Prediction Modeling and Analysis Using Machine Learning TechniquesGaganpreet Kaur, Shonak Bansal, Mohammad Aljaidi, Ujjwal Kaushik. 1-5 [doi]
- Optoelectronic characteristics of bilayer graphene/ZnO nanowires heterojunction UV photodetector for IoT applications: A simulation studyShonak Bansal, Arnav Bansal, Mohammad Aljaidi, Gaganpreet Kaur, Krishna Prakash. 1-7 [doi]
- Hardware Embedded Fingerprinting Based on Electric NoiseAdnan Shaout, Arif Hasan, Murlidharan Shravan. 1-7 [doi]
- Legal Aspects, Public Interest, and Legitimate Interest in Processing Personal Data to Operate Autonomous CarShuq Hussein. 1-7 [doi]
- Impact of User Innovativeness on Metaverse AdoptionSaid A. Salloum, Rana Saeed Al-Maroof, Khalaf Naser Tahat, Raghad Alfaisal, Dina Naser Tahat. 1-7 [doi]
- Unraveling the 'Safe Harbor ': A Crucial Balance between Liability and Expression in Social Media NetworksAli Hadi Al-Obeidi, Shuq Hussein. 1-4 [doi]
- ESG Risk Management, Sustainability-Oriented Firms and Financial Distress in the Financial Industry: an AI-aided approachMohamed Elmaghrabi. 1-3 [doi]
- Criteria-based Unsupervised Feature Selection Techniques: A Comparative Study Over Chest CT ScanShrouq Al-Daja, Ala' Alyabrodi, Abdallah Moubayed, MohammadNoor Injadat, Ali Elrashidi. 1-8 [doi]
- Cloud Security: Analyzing Threats and ChallengesMahmoud Rajallah Asassfeh, Esraa Abu Elsoud, Sultan Mohammed Albilasi, Abdullah Al-Qammaz, Ala'a Al-Shaikh, Suha Afaneh, Ahmad Bany Doumi, Ali Elrashidi, Ghassan Samara. 1-8 [doi]
- Diabetic Retinopathy Detection and Classification Using Deep-wavelet and multiple classifiersHuda Dhari, Nidhal K. El Abbadi. 1-8 [doi]
- Investigates the Impact of AI-generated Code Tools on Software Readability Code Quality FactorHamed Fawareh, Hazim M. Al-Shdaifat, Al-Refai M, Faid AlNoor Fawareh, Mohammed Khouj. 1-5 [doi]
- Carbon Dioxide Emission Forecasting using Machine Learning and Time Series Statistical ModelsTahir Hassan, Khalid Mansour, Waseemullah Waseemullah, Muhammad Qasim Memon. 1-6 [doi]
- Smart Logistics Services: How Artificial Intelligence Transforms Decision-MakingAhmad Y. A. Bani Ahmad, Mahmoud Allahham, Wasef Ibrahim Almajali, Firas Tayseer Ayasrah, Samar Sabra. 1-4 [doi]
- Continuous Wavelet Transform Spectral Image Based Epileptic Episode ClassificationMd. Nuhi-Alamin, Ajay Krishno Sarkar, Md. Simul Hasan Talukder, Mohammad Aljaidi, Safkat Shahrier Swapnil. 1-6 [doi]
- Semantic Textual Similarity (STS) in Arabic using Lexical-Semantic AnalysisNedhal A. Al-Saiyd, Intisar A. Al Sayed. 1-6 [doi]
- Exploring Digital Twins in Higher Education: Redefining Educational Technology in Jordanian UniversitiesRida S. M. Al-Mawadieh, Mohammad F. Al-Abdallat, Mohammad Noor Injadat, Rawia Zuod, Ruaa Binsaddig. 1-11 [doi]
- The Ethical Considerations of Using Artificial Intelligence (AI) Tools for Professional Diploma Students/Case StudyAbdellateef Abdelhafez Alqawasmi, Asmaa Jumah Almahdawi, Najeh Rajeh Ibrahim Alsalhi, Ibtehal Mahmoud Aburezeq, Munther Balawi. 1-6 [doi]
- Decision Support in Goal-Oriented Requirements EngineeringZina Houhamdi, Mohamed Raid Athamena, Belkacem Athamena, Ghaleb Elrefae. 1-4 [doi]
- Leveraging Knowledge Distillation in Vision Transformers for Binary Classification of Kidney Tumors from CT Radiography ImagesMouhamed Laid Abimouloud, Khaled Bensid, Mohamed Elleuch, Oussama Aiadi, Monji Kherallah. 1-7 [doi]
- Big Data Potentials to Reduce Uncertainty in Strategic Decision-Making ProcessZina Houhamdi, Belkacem Athamena. 1-8 [doi]
- Exploring Healthcare Students' Perspectives on Artificial Intelligence in HealthcareZaitoun Eman, Alamassi Sherin, Labib Bayan. 1-6 [doi]
- Security Risk Assessment of Humanoid Robotics: DARWIN-OP2 as Case StudyKhalil M. Ahmad Yousef, Bassam Jamil Mohd, Mohammad Amra, Yazeed Kamel, Anas AlMajali. 1-5 [doi]
- Civil Liability of The Data Controller For Data Storage: A General Perspective In Light of The UAE Personal Data Protection LawFayez Alnusair, Mouza Al Ameri, Moustafa Elmetwaly Kandeel, Ghaleb Elrefae. 1-5 [doi]
- Two-Stage Archive Evolutionary Algorithm for Multimodal MultiObjective OptimizationZhengwei Qiao, Kai Zhang, Ni Wu, Ling Zhang. 1-8 [doi]
- A Comparative Evaluation of Retrieval-Augmented Generation For Arabic DocumentsBassam Jamil Mohd, Khalil M. Ahmad Yousef, Salah Abu Ghalyon. 1-6 [doi]
- Main Confidentiality Challenges in Network Security: A Literature ReviewMahmoud Asassfeh, Mohammad Rasmi Al-Mousa, Waleed Amer, Adai Mohammad Almomani, Ala'a Al-Shaikh, Suha Afaneh, Mohammed Nayef Alrefai, Ali Elrashidi, Ghassan Samara. 1-9 [doi]
- Controlling DC Motor Speed with FoPID-ControllersRania Saadeh, Iqbal M. Batiha, Ahmad Qazza, Iqbal H. Jebril, Ali Elrashidi, Shaher Momani. 1-7 [doi]
- Advanced Machine Learning Models for Real-Time Drone and Bird Differentiation in Aerial Surveillance SystemsMuhyeeddin Alqaraleh, Mowafaq Salem Alzboon, Mohammad Al-Batah, Oqeili Saleh, Hatim Solayman Migdadi, Ali Elrashidi, Raed Alazaidah. 1-8 [doi]
- An Overview of Tools and Techniques in Network ForensicsMahmoud Asassfeh, Mohammad Rasmi Al-Mousa, Hasan Al-Dweikat, Malak Hamad Al-Mashagbeh, Suha Afaneh, Ghassan Samara, Ali Abu Zaid, Mohammed Khouj, Essam Al-Daoud. 1-7 [doi]
- Proactive Insider Threat Detection Using Facial and Behavioral BiometricsHanay Almomani, Ayoub Alsarhan, Mahmoud AlJamal, Mohammad Aljaidi, Tamam Alsarhan, Bashar Khassawneh, Ghassan Samara, Manish Kumar Singla, Ahmed BaniMustafa. 1-7 [doi]
- VSK - A Tripartite Development Model based on the V-Model, the Scrum, and the Kanban MethodologiesAdnan Shaout, Thomas Kyer. 1-6 [doi]
- Enhanced accuracy of deep learning method for fruit images classificationMohammad Arabiat, Suhaila Abuowaida, Nawaf Alshdaifat, Ahmad Aburomman, Esraa Al Henawi, Mohmmad Dmour, Ali Elrashidi. 1-9 [doi]
- A Review study on Utilizing Deep Learning in Arabic Text ClassificationMusab Mustafa Hijazi, Qutaibah Althebyan. 1-3 [doi]
- Unveiling Android Malware: A Deep Learning Perspective Using RNN and LSTMAbdullah AlQammaz, Mohammad Rasmi Al-Mousa, Ali Abu Zaid, Mahmoud Asassfeh, Mohammad Abdulrazzaq Rajab, Sherien Dajah, Abdulla M. F. Alali, Mohammed Khouj. 1-4 [doi]
- Machine Learning as the Shield: Mitigating ARP Poisoning Attacks in Software Defined NetworksRabee Alqura'n, Mahmoud AlJamal, Mohammad Aljaidi, Mohammad AlJamal, Bashar Khassawneh, Ayoub Alsarhan, Omar Alidmat, Ghassan Samara, Sattam Almatarneh. 1-8 [doi]
- Design and Simulation of a Network Infrastructure for a Multi-Branch Organization Using Cisco Packet TracerOsama S. AlJamal, Mahmoud AlJamal, Ayoub Alsarhan, Mohammad Aljaidi, Saif Okour, Issa AL-Aiash, Ahmad Al-Qerem, Essam Al-Daoud, Ali Elrashidi. 1-10 [doi]
- Escape Rooms and E-Learning Unite for Smart Cities Education EntertainmentRagad M. Tawafak, Roy Mathew, Ghaliya Al Farsi, Abir Al-Sideiri, Sohail Iqbal Malik. 1-6 [doi]
- A Sensitive Analysis for Teacher Burnout Identification using Machine Learning Method: Jordan Case StudyKhaleel Rabih AlJohany, Ola Mohammad Surakhi. 1-10 [doi]
- From Monochrome to Technicolor: A Comprehensive Review of Video ColorizationZahoor M. Aydam, Nidhal K. El Abbadi. 1-13 [doi]
- Sustainability in Three Dimensions: Mapping the Metaverse's Blueprint on Sustainable Development Goals (SDGs) through a Bibliometric JourneySuzan Al Abidi, Khaleel Alarabi, Othman Abu Khurma, Aktham Alarabi, Razan Taani. 1-7 [doi]
- An Empirical Study on Measuring the Impact of Code Smells on Web ApplicationsHamed Fawareh, Yazan Al-Smadi, Hamzeh Aljawawdeh, Faid AlNoor Fawareh, Fuad Alshraiedeh, Mohammed Khouj. 1-5 [doi]
- Real-time vehicle detection and classification using deep-transfer learningBengoud Kenza, Taoui Ranya, Hadni Meryeme, Hamza Machiche Alami. 1-6 [doi]
- A Novel Cellular Automaton Model for Optimized Multi-Exit Crowd Evacuation in High-Density EnvironmentsOmar Khair Alla Alidmat, Suhaila Abuowaida, Esraa Alhenawi, Hebatullah Khattab Awwad, Adai Al-Momani, Umi Kalsom Yusof, Ali Elrashidi. 1-10 [doi]
- Harnessing ML and NLP for Enhanced Cybersecurity: A Comprehensive Approach for Phishing Email DetectionMahmoud AlJamal, Rabee Alqura'n, Mohammad Aljaidi, Osama S. AlJamal, Ayoub Alsarhan, Issa AL-Aiash, Ghassan Samara, Mohammad BaniSalman, Mohammad Khouj. 1-9 [doi]
- Heart Diseases Prediction Using Machine Learning Techniques: A Case Study from JordanRaed Alazaidah, Mohammed Abu Safaqah, Haneen Alzoubi, Hani Omar, Maram Y. Al-Safarini, Esraa Abu Elsoud, Ali Elrashidi, Mo'ath Alluwaici, Suhaila Abu Owaida. 1-6 [doi]
- Unveiling Deception: Different Strategies for Combatting Arabic Fake NewsNada Khattab, Ahmad Al-Qerem, Shadi Nashwan, Issam Jebreen, Mohammed Rajab, Mohammad Alauthman, Mohammad Jeadi, Ali Elrashidi. 1-9 [doi]
- IoT-Integrated Cashless Sanitary Pad Vending Machine for Sustainable Menstrual Hygiene Management in BangladeshMd. Sabit Shahriar Haque, Kazi Aklima Sultana, Mohammad Sarwar Morshed. 1-10 [doi]
- Intelligent System for Classifying of Acoustic Endoscopic Images of the Pancreas Based the Analysis of Walsh Spectra of Local WindowsRiad Taha Al-Kasasbeh, Sergey Filist, Olga Vladimirovna Shatalova, Dmitry Sergeevich Kondrashov, Ashraf Shaqadan, Nikolay Alexeyevich Korenevskiy, Osama M. Al-Habahbeh, Emad Saleh Tarawneh, Evgeny Starkov. 1-6 [doi]
- Classifying Psychiatric Patients Using Machine LearningHmmam M. Alrjoob, Raed Alazaidah, Radwan Batyha, Hayel Khafajeh, Esraa Abu Elsoud, Ala'a Saeb Al-Sherideh, Ali Elrashidi, Muhyeeddin Alqaraleh, Waleed Amer. 1-9 [doi]
- Intelligent Farm Irrigation and Safety SystemAdnan Al-Smadi, Murar Al-Nusairat, Ammar Erjoub, Laith Freitekh, Mohammed Khouj. 1-4 [doi]
- Smart Contract Security Vulnerability Through The NIST Cybersecurity Framework 2.0 PerspectiveCharles Gomarga, Gregorius Jason Winata, Joshiah Elroi Thungriallu, Richard Wiputra. 1-8 [doi]
- Evaluation of Chest CT-Scan Anomaly Detection Models Using Principal Component AnalysisAla' Alyabrodi, Shrouq Al-Daja, MohammadNoor Injadat, Abdallah Moubayed, Ali Elrashidi. 1-6 [doi]
- Supply Chain Innovation on Acceleration Decision-Making, The Mediating Role of Tech and Integration in the Retail SectorAhmad Y. A. Bani Ahmad, Mahmoud Allahham, Wasef Ibrahim Almajali, Firas Tayseer Ayasrah, Samar Sabra. 1-6 [doi]
- Offline signature verification using lightweight deep learningFatima Alhadidi, Hazeem Hiary. 1-10 [doi]
- Ethical Considerations in AI-Driven HCI Systems in Software EngineeringHamzeh Aljawawdeh, Hamed Fawareh, Mohammed Al-Refai, Fuad Alshraideh, Randa Salman, Sara Abu Dabaa't, Heba Alazzeh, Hazim Al-Shdaifat, Mohammed Khouj. 1-6 [doi]
- Using Artificial Intelligence Techniques in Law Enforcement: A SurveyAla'a Al-Shaikh, Ashraf Hasan AlAlfi, Esam Y. A. Al-Nsour, Suha Afaneh, Ghassan Samara, Khaled AlQawasmi, Nabeel Al-Milli, Mohammed Khouj, Amer Abu Salem. 1-7 [doi]
- Multi Label Classification Based on Ensemble Learning: Investigative StudyOla Nasir, Raed Alazaidah, Wael Hadi, Ghassan Samara, Essam Al-Daoud, Suhaila Abu Owaida, Ali Elrashidi, Esraa Abu Elsoud, Haneen Alzoubi. 1-8 [doi]
- Utilization of Machine Learning in Breast Cancer DetectionMu'taz Momani, Nidal Yousef, Qotadeh Aljawazneh, A. T. Issa, Suhaila Abuowaida, Raed Alazaidah, Mohammed Talat Khouj, Radwan Batyha, Esraa Abu Elsoud. 1-10 [doi]
- COVID-19 Infection Detection in X-Ray Images Using Enhanced Image Segmentation and Machine Learning ModelsKhalid M. O. Nahar, Mohammad Ebrahim Megdad, Rabia Emhamed Al Mamlook, Mohammad Aljaidi, Besan K. M. Nahar, Mohammad K. M. Nahar, Samar Hussni Anbarkhan, Hayel Khafajeh, Waleed Amer. 1-7 [doi]
- Automated Detection of Alzheimer's Disease Using EfficientNet-B3 Architecture with Transfer LearningAhmad Aburomman, Suhaila Abuowaida, Adai Al-Momani, Esraa Al Henawi, Esraa Abu Elsoud, Zaher Salah, Haneen Alzoubi, Huah Yong Chan, Mohammed Khouj. 1-6 [doi]
- Predicting Students' Performance using Machine Learning ClassifiersGheed Mufied Alsalem, Noor Sarhan, Mustafa Hammad, Bayan Zawaideh. 1-5 [doi]
- Real-Time VPN Anomaly Detection SystemAmneh Alamleh, Ola Nasir, Ayman Abu Hannoun, Mustafa Darwish, Bashar Alallawi, Zaid Alshurafa, Mohammed Khouj. 1-7 [doi]
- Automating the Diagnosis of Cucumber Plant Diseases Using Machine LearningAhmed BaniMustafa, Hazem Qattouz, Sattam Almatarneh, Khalid Mansour, Raed Alazaidah, Olla Bulkrock. 1-6 [doi]
- Detecting Spam and Malware Using BERT and LLMsShahad Altamimi, Mohammad Ababneh. 1-6 [doi]
- Bridging Machine Learning and Formal Concept Analysis for Effective Crowd DetectionAnas M. Al-Oraiqat, Oleksandr Drieiev, Ghassan Samara, Sattam Almatarneh, Karim A. Al-Oraiqat, Hazim Alrawashdeh, Hanna Drieieva, Ali Elrashidi, Yassin M. Y. Hasan. 1-9 [doi]
- A secure IoT limited Devices by applying Multi-Round Lightweight CryptographyMohammad Rasmi Al-Mousa, Mohammad Abdulqawi, Hazem Jihad Badarneh, Ala'a Al-Shaikh, Mahmoud Asassfeh, Ala'a Saeb Al-Sherideh, Ghassan Samara, Ali Elrashidi, Raed Alazaidah. 1-8 [doi]
- Enhancing Printed Document Security with QR Code-Based Digital SignaturesJehad Nasereddin, Amer Abu Salem. 1-6 [doi]
- A Comparative Study between Agile and Waterfall Methodologies during Software Development ProcessHamed Fawareh, Yazan Al-Smadi, Rania Saadeh, Faid AlNoor Fawareh, Ali Elrashidi, Hazim M. Al-Shdaifat. 1-5 [doi]
- The Impact of Artificial Intelligence Tools on the Quality of Financial Reports in Service CompaniesBintang Annisa Bagustari, Abdul Razzak Alshehadeh, Haneen A. Al-Khawaja, Ihab El Qirem, Ghaleb A. Elrefae, Ayman Abdalmajeed Alsmadi. 1-5 [doi]
- Digital Evidence and Forensic Tools in Cyber Law: A Comprehensive AnalysisAla'a Saeb Al-Sherideh, Samah Suleiman Al-Zou'Bi, Fuad Alshraiedeh, Esraa Abu Elsoud, Suha Afaneh, Mohammad Rasmi Al-Mousa, Raed Alazaidah, Mohammed Khouj, Ghassan Samara. 1-6 [doi]
- Software Code De-Compilation Techniques and Approaches: A Comparative StudyHamed Fawareh, Yazan Al-Smadi, Mohammad A. Hassan, Faid AlNoor Fawareh, Ali Elrashidi. 1-4 [doi]
- "Breaking Bad": Ranking Bot's Malevolence in TwitterNoor Abu-El-Rub, Nikan Chavoshi, Abdullah Mueen. 1-8 [doi]
- Guidelines to Develop a Cybersecurity Policy in Schools, Perspectives Informed from Jordanian Cybercrime LawAhmad Ghandour, Brendon J. Woodford. 1-6 [doi]
- Applying Extended Reality Technology in Teaching New Languages: A Study from Academics' Perspective in Australian UniversitiesNoura Tegoan, Srimannarayana Grandhi, Santoso Wibowo, Rongbin Yang. 1-6 [doi]
- Usage of Blockchain Technology for Improving Computer SecurityAdai Almomani, Al Refai Mohammed N, Ahmad Aburomman, Omar Khair Alla Alidmat, Qotadeh Saber, Fuad Alshariedeh, Mohammed Khouj. 1-6 [doi]
- Filling the Gaps: A Comprehensive Review of Image InpaintingTuqa S. Al Bshibsh, Nidhal K. El Abbadi. 1-9 [doi]
- Fingerprint Authentication Method using Two Steps Verification AlgorithmRamy M. Bahy, Jafar Ababneh, Hani Attar, Mohammad Alhihi, Mohamed Hafez, Ahmed A. A. Solyman 0001. 1-5 [doi]
- From Interaction to Action: How User Input Shapes Logistics and Decisions in Jordan's E-IndustryAhmad Y. A. Bani Ahmad, Mahmoud Allahham, Wasef Ibrahim Almajali, Firas Tayseer Ayasrah, Samar Sabra. 1-6 [doi]
- Efficient Road Status Monitoring in Vehicular Ad-Hoc Networks: An Optimization FrameworkGhassan Samara, Hussain Mohammed Turki, Mahmoud Odeh, Anas Al-Oraiqat, Mohammad Aljaidi, Raed Alazaidah, Mohammad Rasmi Al-Mousa, Ahmed BaniMustafa, Mohammad Kanan. 1-5 [doi]
- A Comparative Analysis of Goal-Oriented Requirements Engineering and Model-Based Systems Engineering Frameworks for Managing Requirements of Systems of SystemsSuhair AlHajHassan, Samer Murrar, Ahmad Samhan, Mohammed Odeh, Ali Elrashidi. 1-12 [doi]
- Optimizing One-Stage Object Detection for URLLC: A Two-Stage Pipeline with Oculi SPUAdam Bou Moghlebey, Abdallah Moubayed, MohammadNoor Injadat. 1-8 [doi]
- Evaluation of Three Different Operators for Object Highlighting in Medical RGB Images: Canny, Roberts, and LoG in Independent Color SpacesJafar Ababneh, Amer Abu-Jassar, Suhaila Abuowaida, Valentyn Liubchenko, Vyacheslav V. Lyashenko. 1-7 [doi]
- A Comprehensive Review of VANET Attacks: Predictive Models, Vulnerability Management, and Defense SelectionAbeer Al-Mohtaseb, Ali Qasim Hanoon, Ghassan Samara, Essam Al-Daoud, Omar Alidmat, Radwan Batyha, Mohammad Aljaidi, Raed Alazaidah, Ali Elrashidi. 1-9 [doi]
- Using Monte Carlo Simulation for Real Estate Price ValuationShorouq F. Eletter, Ghaleb A. Elrefae, Saad Ghaleb Yaseen, Abdul Razzak Alshehadeh. 1-4 [doi]
- Adaptive Parameter Tuning with Double Layer Genetic Algorithm for Solving TSPQingxi Chen, Gu Gong. 1-7 [doi]
- Automatic Diagnosis of Sarcoidosis Stage Using Machine Learning AlgorithmsHani Attar, Jafar Ababneh, Mohamed A. Hafez, Waleed Alomoush, Hussein Al-Faiz, Mohanad A. Deif. 1-9 [doi]
- Transformer-based Text Classification on Unified Bangla Multi-class Emotion CorpusMd Sakib Ullah Sourav, Mohammad Sultan Mahmud, Hua Zheng, Mohammad Aljaidi, Md. Simul Hasan Talukder, Rejwan Bin Sulaiman, Abdullah Hafez Nur, Ahmad Al-Qerem. 1-7 [doi]
- Advancing Stroke Prediction: Explainable Machine Learning Models and Data Augmentation StrategiesRahma Abu Salma, Ahmad Al-Qerem, Abedalhakeam Iessa, Mohammed Rajab, Mohammad Alauthman, Mohammad Jeadi, Ali Elrashidi. 1-8 [doi]
- Feature Selection for Geomagnetic Storm Forecasting Using Particle Swarm OptimisationZiad Algendi, Hani Attar, Mohamed A. Hafez, Hussein Al-Faiz, Jafar Ababneh, Mohanad A. Deif. 1-7 [doi]
- Evolutionary Insulin Management: A Digital Health Solutions for Type 1 Diabetes SupportHamzeh Aljawawdeh, Randa Salman, Rasha Alzaben, Ragae Dughmosh, Mohammed Khouj. 1-7 [doi]
- State of the Art on Auto ElectrificationAdnan Shaout, Abdullah Albadi, Abdel-Rahman Shaout. 1-8 [doi]
- Analyzing Chaotic Jerk System with Hyperbolic Sine: a new algorithm for Engineering ApplicationsRaed M. Khalil, Rania Saadeh, Mohamed A. Abdoon, Mohammed Berir, Ahmad Qazza, Ali Elrashidi. 1-6 [doi]
- Enhancing Wireless Communication with Compact SIW Resonator-based UWB Fork Monopole AntennaAhmed Samir, Samir Bendoukha, Hani Attar, Jafar Ababneh, Mohammad Alhihi, Mohamed Hafez. 1-9 [doi]
- A Data-Driven Approach Towards Software Regression Testing Quality OptimizationAbdallah Moubayed, Nouh Alhindawi, Jamal Alsakran, MohammadNoor Injadat, Mohammad Kanan. 1-8 [doi]
- A Blockchain-Based Framework for Efficient and Secure E-Certification Sharing and VerificationMahmoud Obaid, Allam Abumwais, Rami Hodrob, Suhail Odeh. 1-6 [doi]
- Navigating Artificial Intelligence in Strategic Management in Schools and OrganizationsKhawlah M. Al-Tkhayneh, Abdulrasheed Olowoselu, Mona Kamal Ibrahim, Ibrahim Suleiman Al Qatawneh, Tamim Ahmed Jabarah. 1-5 [doi]
- IoT Security Based On Lightewight Cryptographic (LWC) Algorithms: A surveyMohammad Rasmi Al-Mousa, Samah Suleiman Al-Zou'Bi, Sami Askar, Khaled E. Al-Qawasmi, Ala'a Saeb Al-Sherideh, Ghassan Samara, Rami Almatarneh, Mohammed Khouj, Mahmoud Odeh. 1-9 [doi]
- From Insights to Impact: Business Intelligence's Influence on Jordan's Industrial Decision-MakingAhmad Y. A. Bani Ahmad, Mahmoud Allahham, Wasef Ibrahim Almajali, Firas Tayseer Ayasrah, Samar Sabra. 1-5 [doi]
- The Challenges of Using Generative AI Applications in Electronic CommerceMustafa S. Al-Shaikh, Mohammad Rasmi Al-Mousa, Hassan Ali Al-Ababneh, Mofeed Wild Ali, Sabha Maria Alkaawneh, Fawaz Mohd Salim Barhoush, Ruaa Binsaddig. 1-5 [doi]
- Deep Learning content-based search in media filesLeila Benarous, Ihssene Khadidja Bendjazia. 1-6 [doi]
- Investigating Principle Component Analysis Impact on the Performance of Machine Learning Classifiers: A Health Informatics ApplicationAhmed BaniMustafa, Sattam Almatarneh, Olla Bulkrock, Raed Alazaidah, Hossam Almahasneh, Ghassan Samara. 1-6 [doi]
- An Intelligent Embedded Alcohol Detection System for DriversAdnan Shaout, Abdel-Rahman Shaout, Songhan Duan. 1-7 [doi]
- Innovative Machine Learning Solutions for Automated Kidney Tumor Detection in CT Imaging Through Comparative AnalysisMuhyeeddin Alqaraleh, Mowafaq Salem Alzboon, Mohammad Al-Batah, Hatim Solayman Migdadi, Oqeili Saleh, Raed Alazaidah, Ali Elrashidi. 1-9 [doi]
- Multi-class classification algorithm for ocular diseases classification based GLCM texture featuresMennatallah Sherif, Hani Attar, Mohamed A. Hafez, Jafar Ababneh, Hussein Al-Faiz, Mohanad A. Deif. 1-10 [doi]
- Enhanced Arabic Feature Selection using an Improved Whale Optimization AlgorithmMeryeme Hadni, Mounir Gouiouez, Hjiaj Hassane, Meryem Amane. 1-6 [doi]
- Application of Machine Learning in Mental Diseases DiagnosisRahaf Alsawi, Raed Alazaidah, Ghassan Samara, Haneen Alzoui, Omar Alidmat, Esraa Abu Elsoud, Mohammed Talat Khouj, Anwar Katrawi, Mo'ath Alluwaici. 1-6 [doi]
- A Review of AI-Assisted Impact Analysis for Software Requirements Change: Challenges and Future DirectionsAhmad Samhan, Suhair AlHajHassan, Sara Abu Dabaa't, Ali Elrashidi. 1-13 [doi]
- Securing Internet of Vehicles IoV Communications: A Biometric and Hash-Key Derivation Function HKDF-Based ApproachHanay Almomani, Ayoub Alsarhan, Mahmoud AlJamal, Mohammad Aljaidi, Tamam Alsarhan, Bashar Khassawneh, Abdelrahman Alfaqih, Ghassan Samara, Manish Kumar Singla. 1-7 [doi]
- Maximize Leader Election Algorithm Performance in Bi-Directional Ring Networks With Both Links Down Between Two NodesMohammed N. Al-Refai, Hamed Fawareh, Hamzeh Aljawawdeh, Fuad Sameh Alshraiedeh, Mohammad Al-Quraan, Hisham Al-Odat, Ahmed Ali Otoom, Zeyad M. Jamhawi, Mohammad Kanan. 1-6 [doi]
- Towards Combining Model Driven Engineering and Software Product Line Engineering Based on VariabilityBenselim Mohamed Salah, Djebar Yacine. 1-9 [doi]
- Enhancing Skin Cancer Detection Across Skin Tones with Style Transfer AugmentationKunwar Kalra, Vedant Iyer, Neil Patel. 1-9 [doi]
- Correlation-Driven Feature Selection and Penalty-Enhanced Autoencoder for Dimensionality ReductionBilal Mokhtari, Amani Massa, Karima Femmam. 1-11 [doi]
- Simulating a Finite-State Markov Chain for Rayleigh Block-Fading Channel based on its Mathematical Model, and Practical RepresentationHani Attar, Jafar Ababneh, Mohammad Al-Hihi, Ali Rachini, Ahmed A. A. Solyman 0001. 1-5 [doi]
- Heavy-Tailed Distributions: Their Impact on Noncontiguous Allocation and Job Scheduling in 2D Mesh NoCsBatool Zyoud, Saad Bani-Mohammad, Ismail Ababneh. 1-11 [doi]
- Building Trust: The Role of Strategic Decision-Making in Digital Market ConfidenceAhmad Y. A. Bani Ahmad, Mahmoud Allahham, Wasef Ibrahim Almajali, Firas Tayseer Ayasrah, Samar Sabra. 1-6 [doi]
- Detection of Thyroid Disease Through Machine Learning TechniqueMutaz AlMomani, Ahmad Al-Qerem, Shadi Nashwan, Issam Jebreen, Mohammed Rajab, Mohammad Alauthman, Mohammad Jeadi, Ali Elrashidi. 1-17 [doi]
- Multi Label Classification Algorithm Based on Conditional Local Correlations among Labels and Ensemble LearningRaed Alazaidah, Ola Nasir, Wael Hadi, Ghassan Samara, Essam Al-Daoud, Mohammad Aljaidi, Mohammed Talat Khouj, Esraa Abu Elsoud, Haneen Alzoubi. 1-8 [doi]
- A Comparative Analysis of Steganography in Formats of Digital ImagesYusra Al Najjar, Ali Elrashidi, Nada Salamah. 1-6 [doi]
- Dynamic Exit Selection and Counting Area Adjustment for Efficient Crowd Evacuation in Asymmetrical LayoutsOmar Khair Alla Alidmat, Raed Alazaidah, Mohammad Arabiat, Hayel Khafajeh, Mohammad Aljaidi, Umi Kalsom Yusof, Ali Elrashidi. 1-10 [doi]
- TKG-RAG: A Retrieval-Augmented Generation Framework with Text-chunk Knowledge GraphWei Xiao, Yu Liu, Xianglong Li, Feng Gao, Jinguang Gu. 1-9 [doi]
- Solar Panel Soiling Classification Using Machine Learning AlgorithmsAla' Khalifeh, Rami Ghanem. 1-5 [doi]
- A Comparative Study of Gaze Estimation ModelsAbdallah Moubayed, MohammadNoor Injadat, Mohammad Kanan. 1-10 [doi]
- Deep Learning Approaches for Malware Detection in the Industrial Internet of Things: A Comprehensive AnalysisGhassan Samara, Mohammad Abu Fadda, Abeer Al-Mohtaseb, Raed Alazaidah, Alrefai Mohamed N., Mahmoud Odeh, Mohammad Aljaidi, Mohammed Mahmod Shuaib, Mohammad Kanan. 1-7 [doi]
- A New ECG Denoising Technique based on WATV and Convex Fused-LassoAbdallah Rezgui, Brahim Nasraoui, Arij Alfaidi, Mourad Talbi. 1-6 [doi]
- Deepfake Video Detection: Analysis for Deep Learning models using Transfer LearningShahad Altamimi, Walid A. Salameh. 1-9 [doi]
- Machine Learning in Higher Education: Predicting and Mitigating Student DropoutSana Abouelnour, Aneesa Al Redhaei, Mohammed Azmi Al-Betar, Ghazi Al-Naymat. 1-7 [doi]
- Fractional Fourier Transform-Based OFDM System with low complexity equalizer for Underwater Acoustic CommunicationsHani Attar, Jafar Ababneh, Ali Rachini, Ramy M. Bahy, Mohamed Hafez, Ahmed A. A. Solyman 0001. 1-6 [doi]
- Classification of Sleep-Related Disorders Using Machine Learning TechniquesOla Nasir, Raed Alazaidah, Maram Y. Al-Safarini, Amneh Alamleh, Ali Abu Zaid, Hasan Mansur, Ali Elrashidi, Haneen Alzoubi, Alaa Bani-Bakr. 1-11 [doi]
- Prediction of Hypertension Disease Using Machine Learning Techniques: Case Study from JordanRaed Alazaidah, Ghassan Samara, Anwar Katrawi, Wael Hadi, Maram Y. Al-Safarini, Farah Al-Mamoori, Ali Elrashidi, Muhyeeddin Alqaraleh, Haneen Alzoubi. 1-6 [doi]
- The Values of Digital Citizenship Among Social Media Users in Jordan: A Case Study of FacebookHala Khaled AlMasri, Reda S. M. Al-Mawadieh, Eissa Abdul Wahab Al-Tarawneh, Mohammad F. Al-Abdallat, Luma Fakhir Abdul Razzak, Mohammad Kanan. 1-5 [doi]
- Retinal Blood Vessels Segmentation Using Classical Edge Detection Filters and the WatershedHuda Dhari, Nidhal K. El Abbadi. 1-7 [doi]
- An Adaptive Two-Stage MOEA/D For Solving Constrained Multi-Objective ProblemHangyu Fan, Kai Zhang, Ling Zhang, Ni Wu. 1-7 [doi]
- Research into the accuracy of complex sensorimotor responses of operators to joystick-run technological equipmentIgor Petukhov, Luydmila Steshina, Ilya Tanryverdiev, Ilya Steshin, Pavel Kurasov, Danil Galkin. 1-6 [doi]
- Diabetes Prediction Using Machine Learning Techniques: A Case Study from JordanRaed Alazaidah, Radwan Batyha, Ghassan Samara, Esraa Al Henawi, Maram Y. Al-Safarini, Ahmad A. Samhan, Ali Elrashidi, Mo'ath Alluwaici, Deana Al-Omari. 1-6 [doi]
- Hybrid ResNet-ViT Model for Lung Cancer Classification from Histopathology ImagesNaglaa F. Noaman, Ahmad Al Smadi, Bassam M. Kanber, Ahed Abugabah. 1-5 [doi]
- Improving WebRTC Quality-of-Service Using SDN and a Load Balancing StrategySanabil A. Mahmood, Naktal Moaid Edan, Monji Kherallah. 1-9 [doi]
- Two-Stage Dynamic Cooperative Evolution Algorithm for Constrained Multi-objective OptimizationJie Chen, Kai Zhang 0002, Ni Wu, Ling Zhang. 1-6 [doi]
- Enhanced Support Vectors based Oversampling MethodThabit Sabbah, Mahmoud Ashraf, Mohammad Abrar. 1-7 [doi]
- Student Teachers' Attitudes towards the Use of ChatGPT in TeachingMoath Kalef Al Omery, Salem Khalil Al Aqtash, Omran Ahmad Musleh, Mohammad Hussein Ahmad Faqeeh, Dima Ibrahim Farhat. 1-7 [doi]
- Machine Learning Approaches for Early Detection of Heart DiseasesAsalla M. Al-Sheyab, Msallam Kousa, Hanadi Bani Hamad, Adai Almomani, Ali Elrashidi. 1-7 [doi]
- The power of Network Penetration TestingHazem Jihad Badarneh, Loai Ahmad Attiany, Mahmoud Asassfeh, Ala'a Al-Shaikh, Suha Afaneh, Mohammed M. Abu Shquier, Nabeel Al-Milli, Ali Elrashidi, Ghassan Samara. 1-6 [doi]
- Evaluating the Impact of Multi-Layer Data on Machine Learning Classifiers for Predicting Student Academic PerformanceMohammad AlShaikh-Hasan, Gheorghita Ghinea. 1-6 [doi]
- Blockchain's Role in Emerging Markets: Accelerating Digital Supply Chain Management and Unlocking New OpportunitiesAhmad Y. A. Bani Ahmad, Mahmoud Allahham, Wasef Ibrahim Almajali, Firas Tayseer Ayasrah, Samar Sabra. 1-6 [doi]
- Enhancing Convergence Efficiency in Federated Learning ModelsGhassan Samara, Ala'Mazen Elhilo, Mohammad Aljaidi, Amneh Alamleh, Mohammad Rasmi Al-Mousa, Radwan Batyha, Raed Alazaidah, Alaa Bani-Bakr, Ali Elrashidi. 1-4 [doi]
- Facial Recognition Utilizing the CLM Model and Supervised Machine Learning: A Comparative AnalysisMusab Iqtait, Jafar Ababneh, Amer Abu-Jassar, Mohammad Al-Refai, Mohammad Dmour, Mohammad Arabiat, Ruaa Binsaddig. 1-6 [doi]
- A Proposed Approach for Risk Planning and ManagementMohammed N. Al-Refai, Yazan Al-Smadi, Adai Al-Momani, Zeyad M. Jamhawi, Ahmed Ali Otoom, Issa Atoum, Ahid Yaseen, Jafar Ababneh, Mohammad Kanan. 1-4 [doi]
- Theft Alarm and Notification System for Medical ApplicationsAdnan Shaout, Noah Beattie, Nicholas Kessey. 1-6 [doi]
- Social Media Transparency: How Digital Marketing Shapes Strategic DecisionsFiras Tayseer Mohammad Ayasrah, Khaleel Alarabi, Ibtehal Mahmoud Aburezeq, Ahmad Y. A. Bani Ahmad, Musab Mustafa Hijazi. 1-6 [doi]
- Energy-Efficient Parallel Approach for Cloud Service Broker SchedulingHebatullah Khattab, Ala'a Al-Shaikh, Ala'a Saeb Al-Sherideh, Ali Elrashidi. 1-6 [doi]
- Building Trustworthy AI systems for secure digital health servicesYazan Al Ahmed, Meryem Mazroub. 1-7 [doi]
- Design and Implementation of a Two-Stage Tiny Bootloader for Flash-Constrained Microcontrollers Using RAM ExecutionAdnan Shaout, Zachary Brauchler, Jacob Westerbeek. 1-7 [doi]
- Explainable AI for Epileptic Seizure Prediction: A SHAPE and LIME ApproachMd. Simul Hasan Talukder, Sohag Kumar Mondal, Oyshi Tabassum Aditi, Mohammad Aljaidi, Rejwan Bin Sulaiman, Ahmad Al-Qerem. 1-7 [doi]
- Leveraging Blockchain for Ethical Sourcing and Sustainability in Supply Chains: A Systematic ReviewHatem Mosa, Amro Saleh, Abdallah Qusef, Ahmad Altamimi, Mohammad Alnabhan. 1-7 [doi]
- Application of Big Data Analytics in Hashemite Kingdom of Jordan: Perspectives on the Mobile Telecommunications IndustryHazem Jihad Badarneh, Mohammad Al-Mousa, Fuad Alshraiedeh, Mohammed Khouj. 1-8 [doi]
- A MOEA/D Framework Based on Memory Differential Cooperation Mechanism for Dynamic Multiobjective OptimizationShaohuo Gao, Juanjuan He, Yi Liao, Hongwei Liu. 1-8 [doi]