Abstract is missing.
- A Cloud-IoT Health Monitoring System Based on Smart Agent for Cardiovascular PatientsMaroua Ahmid, Okba Kazar. 1-6 [doi]
- Cyber Security In Mobile Apps And User CIALayth Abu Arram, Mohammed Moreb. 7-12 [doi]
- Properties of Conformable Fractional Rayleigh Probability DistributionMa'mon Abu Hammad, Iqbal H. Jebril, Duha AbuJudeh, Yousef Dalahmeh, Siham Ali Abrikah. 13-15 [doi]
- Properties of Conformable Fractional Gamma with two Parameters Probability DistributionIqbal H. Jebril, Ma'mon Abu Hammad, Eman Nouh, Rahaf Hamidi, Yousef Dalahmeh, Salemah Almutlak. 16-18 [doi]
- Conformable Fractional of Euler Type EquationAmer Dababneh, Ma'mon Abu Hammad, Amjed Zreqat, Bilal Albarmawi, Siham Ali Abrikah. 19-20 [doi]
- Evaluation of Information Security Awareness among Palestinian LearnersYaman Salem, Mohammed Moreb, Khalid S. Rabayah. 21-26 [doi]
- Lightweight Encryption for Multimedia in the Internet of thing(iot)Mohammad Shadeed, Mohammed Moreb. 27-32 [doi]
- Improvement of personal loans granting methods in banks using machine learning methods and approaches in PalestineMohammad J. Hamayel, Mobarak A. Abu Mohsen, Mohammed Moreb. 33-37 [doi]
- Extension of a Method for Solving Nonlinear Evolution Equations Via Conformable Fractional ApproachZoubir Dahmani, Ahmed Anber, Yazid Gouari, Mohamed Kaid, Iqbal Jebril. 38-42 [doi]
- The Impact of the Digital Transformation on Customer Experience in Palestine BanksFiras Abuhasan, Mohammed Moreb. 43-48 [doi]
- Application of Blockchain Technology in Used Vehicle Market: A ReviewSara El-Switi, Mohammad Qatawneh. 49-54 [doi]
- Trigger Support based on Discrete Cosine Transform for a Detection of Very Inclined Showers in Water Cherenkov DetectorsZbigniew Szadkowski, Krzysztof Pytel. 55-60 [doi]
- Capability of a Recurrent Deep Neural Network Optimized by Swarm Intelligence Techniques to Predict Exceedances of Airborne Pollution (PMx) in Largely Populated AreasGerardo Javier Kuri-Monge, Marco Antonio Aceves-Fernández, Julio Alberto Ramírez Montañez, Jesús Carlos Pedraza Ortega. 61-68 [doi]
- Independence Number and Covering Vertex Number of Γ(R(+)M)Manal Al-Labadi, Eman Mohammad Almuhur, Anwar Alboustanji. 69-73 [doi]
- Design and Development of An ASP.NET Based ITM Data Center To Support Open DataMd. Rahatur Rahman, Md. Abdullah Al Forhad, Salah U. Ahmed, Shamim Akhter. 74-79 [doi]
- Almost, Weakly and Nearly L-closed topological spacesEman Almuhur, Manal Al-Labadi, Amani Shatarah, Sarah Khamis, Nosaiba Omar. 80-84 [doi]
- Tubes in the Euclidean 3-space with coordinate finite type Gauss mapHassan Al-Zoubi, Tareq Hamadneh, Hamza Alzaareer, Mutaz Al-Sabbagh. 85-88 [doi]
- Finite groups whose every p-subgroup is nearly S-permutably EmbeddedKhaled Mustafa Aljamal, Ahmad Termimi Ab Ghani, Khaled A. Al-Sharo. 89-91 [doi]
- An Optimal Data Entry Method, Using Web Scraping and Text RecognitionN. Roopesh, Akarsh M. S, C. Narendra Babu. 92-97 [doi]
- UML Representation of Object-Oriented Design AntipatternsLidiya S. Ivanova, Danila A. Sokolov, Oleg A. Zmeev. 98-103 [doi]
- Realtime Person Identification using Ear BiometricsShahadat Hossain, Shamim Akhter. 104-108 [doi]
- Eigenvalues of Self Complementary and Compound Magic Squares with an Application in Image CryptographySaleem Al-Ashhab, Majdi Al-Qdah. 109-114 [doi]
- Water Preservation Using IoT: A proposed IoT System for Detecting Water Pipeline LeakageAhmad Abusukhon, Fadel AlTamimi. 115-119 [doi]
- Network Intrusion Detection on the IoT Edge Using Adversarial AutoencodersFadi A. Aloul, Imran A. Zualkernan, Nada Abdalgawad, Lana Alhaj Hussain, Dara Sakhnini. 120-125 [doi]
- K-Means Clustering-Based Market Basket Analysis: U.K. Online E-Commerce RetailerTristan Lim. 126-131 [doi]
- Machine Learning Algorithms for The Classification of Cardiovascular Disease- A Comparative StudyWada Mohammed Jinjri, Pantea Keikhosrokiani, Nasuha Lee Abdullah. 132-138 [doi]
- identical Chua's circuits application using hybrid dislocated synchronization schemeRamzi B. AlBadarneh, Adel Ouannas, Iqbal M. Batiha. 139-142 [doi]
- Reducing Counterfeit Drugs with Blockchains: A SurveyAbdullah Quzmar, Mohammad Qatawneh, Sarah Al-Maaitah. 143-148 [doi]
- Big Data, Classification, Clustering and Generate Rules: An inevitably intertwined for PredictionWael Jumah Alzyadat, Aysh M. Alhroob, Ikhlas Hassan Almukahel, Mohammad I. Muhairat, Mohammad Abdallah, Ahmad Althunibat. 149-155 [doi]
- Predicting Accounts Receivable with Machine Learning: A Case in MalaysiaThangeswariy a-p Ramanei, Nasuha Lee Abdullah, Pang Tong Khim. 156-161 [doi]
- Comparing the Behaviors of Various Transportation Modes in Vehicular Social NetworksElmer R. Magsino. 162-167 [doi]
- A Genetic Programming Based Pollutant Concentration Predictor Design for Urban Pollution Monitoring Based on Multi-Sensor Electronic NoseDavut Ari, Baris Baykant Alagöz. 168-172 [doi]
- Diabetic Retinopathy Detection using Ensemble Machine LearningIsraa Odeh, Mouhammd Alkasassbeh 0001, Mohammad Alauthman. 173-178 [doi]
- Detecting Flaws on Railways Using Semantic SegmentationMehmet Sevi, Ilhan Aydin. 179-183 [doi]
- IoT Based Intelligent Computer-Aided Diagnosis and Decision Making System for Health CareChannabasava Chola, Md Belal Bin Heyat, Faijan Akhtar, Omar Al Shorman, J. V. Bibal Benifa, Abdulla Yahya Mohammed Muaad, Mahmoud Masadeh, Fahad Alkahatni. 184-189 [doi]
- Graph Traversal-based Solutions for Trip Planning in Public Transportation GraphFaruk Serin, Süleyman Mete, Eren Özceylan. 190-194 [doi]
- The Quotient Homotopy Analysis Method for Solving Nonlinear Initial Value ProblemsJamal Oudetallah, Ghenaiet Bahia, Adel Ouannas, Iqbal M. Batiha. 195-199 [doi]
- E-Voting System Based on Blockchain Technology: A SurveySarah Al-Maaitah, Mohammad Qatawneh, Abdullah Quzmar. 200-205 [doi]
- Empirical Investigation of the Impact of the Adapter Design Pattern on Software MaintainabilityMohammed Ghazi Al-Obeidallah, Dimah Ghaleb Al-Fraihat, Ahmad Mohammad Khasawneh, Ashraf Mousa Saleh, Hayfa Addous. 206-211 [doi]
- Improving Monitoring Greenhouse System using Smart wireless Sensors Actuators NetworkAli Al-Dahoud, Mohamed Fezari. 212-217 [doi]
- Cryptanalysis of a Tightly-Secure Authenticated Key Exchange without NAXOS Approach Based on Decision Linear ProblemZeyad Mohammad, Ahmad A. A. Alkhatib, Mohammed Lafi, Ahmad Abusukhon, Dheeb Albashish, Jaffar Atwan. 218-223 [doi]
- Management of Shared Customers Through Pool Collaboration in Last-Mile TransportationAmina Antit, Safa Bhar Layeb, Amel Jaoua, Chefi Triki. 224-229 [doi]
- Pubic Cloud Computing: Big Three VendorsAhmad Alkhatib, Abeer Al Sabbagh, Randa Maraqa. 230-237 [doi]
- Novel Control Law for the Fractional-order Chaotic Duffing MapAdel Ouannas, Iqbal M. Batiha, Amina-Aicha Khennaoui, Amjed Zraiqat, Abeer A. Al-Nana. 238-241 [doi]
- On the 0-1 Test for Chaos Applied to the Generalized Fractional-order Arnold MapAdel Ouannas, Iqbal M. Batiha, Amina-Aicha Khennaoui, Iqbal H. Jebril. 242-245 [doi]
- Investigating the Operational Dynamics of Different Transportation Modes in Vehicular NetworksElmer R. Magsino. 246-250 [doi]
- Prediction of Covid-19 patients states using Data mining techniquesTibra Alsmadi, Nour Alqudah, Hassan Najadat. 251-256 [doi]
- The Relationship Between Liquidity Risk And Profitability In The Commercial Banks Listed In Amman Stock ExchangeAbdul Razzak Alshehadeh. 257-261 [doi]
- Additional New Logical Identities Related to Propositional LogicNesreen A. Hamad, Maher Nabulsi. 262-267 [doi]
- An Overview of Cybersecurity, Data Size and Cloud Computing in light of Saudi Arabia 2030 VisionFajer Almudaires, M. M. Hafizur Rahman, Motaz Almudaires. 268-273 [doi]
- A Systematic Literature Review of Software Defined Optical Network for Cloud ComputingFajer Almudaires, M. M. Hafizur Rahman, Motaz Almudaires. 274-279 [doi]
- The measurements for optimal small cell base station positioning considering 5G cellular networkMobasshir Mahbub, Bobby Barua. 280-283 [doi]
- Industry Standards and Standardization: An Expert Survey on Opportunities and ChallengesGirish Chandra, Arunabha Mukhopadhayay. 284-289 [doi]
- Anomaly-based Intrusion Detection System Using Fuzzy LogicMohammad Almseidin, Jamil Al-Sawwa, Mouhammd Alkasassbeh 0001. 290-295 [doi]
- CNN-based Transfer Learning for Covid-19 DiagnosisZanear Sh. Ahmed, Nigar M. Shafiq Surameery, Rasber Dh. Rashid, Shadman Q. Salih, Hawre Kh. Abdulla. 296-301 [doi]
- Design and Implementation of Efficient Electric Vehicle with Clean EnergyMd. Nazmul Alam, Abu Shufian, Riadul Islam, Md. Asraful Islam, S. M. Minhazur Rahman, Minul Khan Rahat. 302-307 [doi]
- An Integrated Analytical Approach to Mathematical Modelling the Stochastic Behaviour of Software Debugging PhenomenonMohd Taib Shatnawi, Omar Shatnawi. 308-313 [doi]
- Cybersecurity Threats in Line with Awareness in Saudi ArabiaShaima Salah Alhashim, M. M. Hafizur Rahman. 314-319 [doi]
- On the Security of the Standardized MQV Protocol and Its Based Evolution ProtocolsZeyad Mohammad, Vincent O. Nyangaresi, Ahmad Abusukhon. 320-325 [doi]
- Business Intelligence Model to Analyze Social network AdvertisingMohammad Hamad Allaymoun, Omer Awad Hag Hamid. 326-330 [doi]
- On fixed points results in b-multiplicative metric spaces having simulation functionHaitham Qawaqneh, Mohd Salmi Md Noorani, Habes Alsamir. 331-333 [doi]
- Recent Advances on UAV and Deep Learning for Early Crop Diseases Identification: A Short ReviewAbdelmalek Bouguettaya, Hafed Zarzour, Ahmed Kechida, Amine Mohammed Taberkit. 334-339 [doi]
- On preimages of the quasi-treed HNN groupsKhaled Mustafa Aljamal, Ahmad Termimi Ab Ghani, Rasheed Mahmood Saleh. 340-343 [doi]
- A comprehensive performance empirical study of the symmetric algorithms: AES, 3DES, Blowfish and TwofishHasan Dibas, Khair Eddin Sabri. 344-349 [doi]
- Diabetes Detection Using Machine Learning Classification MethodsNour Abdulhadi, Amjed Al-mousa. 350-354 [doi]
- Daily Forecasting of Demand Orders With Optimal Architecture Artificial Neural Network Learning ModelsOzlem Imik Simsek, Baris Baykant Alagöz. 355-360 [doi]
- A Computational Intelligent Analysis Scheme for Optimal Engine Behavior by Using Artificial Neural Network Learning Models and Harris Hawk OptimizationOzlem Imik Simsek, Baris Baykant Alagöz. 361-365 [doi]
- Short Videos, or Long Videos? A Study on the Ideal Video Length in Online LearningAhmad M. Manasrah, Mohammad Z. Masoud, Yousef Jaradat. 366-370 [doi]
- A Survey on malware detection techniquesTibra Alsmadi, Nour Alqudah. 371-376 [doi]
- A feature selection algorithm for intrusion detection system based on Moth Flame OptimizationArar Al Tawil, Khair Eddin Sabri. 377-381 [doi]
- Modeling Daily Financial Market Data by Using Tree-Based Genetic ProgrammingDavut Ari, Baris Baykant Alagöz. 382-386 [doi]
- Privacy and Security Issues in Cloud Computing: A Survey PaperDoaa M. Bamasoud, Atheer Salem Al-Dossary, Nouf Mubarak Al-Harthy, Rudaina Abdullah Al-Shomrany, Ghaida Saeed Alghamdi, Rawan Othman Algahmdi. 387-392 [doi]
- Implementation of Software Product Line with .NETShafya Abdullah Alshahrani, Doaa M. Bamasoud. 393-395 [doi]
- Let's Learn with a Jigsaw! Implementing a Unique Collaborative Online Learning in an Engineering CourseShahnaz Alkhalil, Ahmad M. Manasrah, Mohammad Z. Masoud. 396-399 [doi]
- Swarm of Drones Using LoRa Flying Ad-Hoc NetworkQazawat Zirak, Dmitriy Shashev, Stanislav Shidlovskiy. 400-405 [doi]
- On the Effectiveness of Using Wavelet-based LBP Features for Melanoma Recognition in Dermoscopic ImagesFatimah Shamsulddin Abdulsattar. 406-411 [doi]
- Design of a Navigation System Based on Scene Matching and Software in the Loop SimulationAyham Shahoud, Dmitriy Shashev, Stanislav Shidlovskiy. 412-417 [doi]
- An Efficient Approach for Secure Data Outsourcing using Hybrid Data PartitioningSultan Badran, Nabil Arman, Mousa Farajallah. 418-423 [doi]
- A Reinforcement Learning Approach for Disassembly Line Balancing ProblemSüleyman Mete, Faruk Serin. 424-427 [doi]
- Current Trends and Approaches in Synonyms Extraction: Potential Adaptation to ArabicEman Karajah, Nabil Arman, Mustafa Jarrar. 428-434 [doi]
- An Interpretable Catboost Model to Predict the Power of Combined Cycle Power PlantsRafat Ashraf Joy. 435-439 [doi]
- Machine Learning Classifiers for Network Intrusion Detection System: Comparative StudyOmar Almomani, Mohammed Amin Almaiah, Adeeb Alsaaidah, Sami Smadi, Adel Hamdan Mohammad, Ahmad Althunibat. 440-445 [doi]
- Performance Improvement of Heart Disease Prediction by Identifying Optimal Feature Sets Using Feature Selection TechniqueAsif Newaz, Sabiq Muhtadi. 446-450 [doi]
- Non-GNSS Navigation Systems in Aerial Vehicles (Multi-rotors)Mainak Mondal, Stanislav Shidlovskiy, Dmitriy Shashev, Moutayam Khaddour. 451-455 [doi]
- Fuzzy PID Based Autonomous UAV Design for Railway TrackingEmre Güçlü, Ilhan Aydin, Erhan Akin. 456-461 [doi]
- Accident Mitigation System with Drowsiness Detection: A Machine Learning and Iot with Hybrid ApproachMs. Suhail Razeeth, Rkar. Kariapper, S. Sabraz Nawaz. 462-465 [doi]
- Auditing Linux Operating System with Center for Internet Security (CIS) StandardWadlkur Kurniawan Sedano, Muhammad Salman. 466-471 [doi]
- A CNN Approach for Skin Cancer ClassificationWilliam O'Keefe, Boubacar Ide, Mahmood Al-khassaweneh, Osama Abuomar, Piotr Szczurek. 472-475 [doi]
- Estimating Lung Capacity in Pulmonary Fibrosis Patients via Computerized Tomography (CT) Scan Data and Machine LearningMark E. Earle, Mahmood Al-khassaweneh. 476-481 [doi]
- Computer Vision Based Skin Disorder Recognition using EfficientNet: A Transfer Learning ApproachRashidul Hasan Hridoy, Fatema Akter, Aniruddha Rakshit. 482-487 [doi]
- Illicit Account Detection in the Ethereum Blockchain Using Machine LearningRahmeh Fawaz Ibrahim, Aseel Mohammad Elian, Mohammed Ababneh. 488-493 [doi]
- Mathematical Model of Scheduler with Semi-Markov Input and Bandwidth Sharing DisciplineAnatoly A. Nazarov, Alexander N. Moiseev, Ivan Lapatin, Svetlana Paul, Olga Lizyura, Pavel Pristupa, Xi Peng, Li Chen, Bo Bai. 494-498 [doi]
- Revisiting Knowledge Transfer for Success Enterprise System ProjectJamal Hussien, Mansoor Abdullateef, Hasan Kahtan, Riza Sulaiman. 499-504 [doi]
- Development of Security Starting System for Vehicles Based on IoTJean Claude Tuyisenge, Viviane Ishimwe, Jean Paul Iradukunda, Didacienne Mukanyiligira. 505-510 [doi]
- Applying Test Driven Development in the Big Data Domain - Lessons From the LiteratureDaniel Staegemann, Matthias Volk 0002, Erik Lautenschläger, Matthias Pohl, Mohammad Abdallah, Klaus Turowski. 511-516 [doi]
- Text-independent Speaker Recognition using Deep Neural NetworksSeham Nasr, Muhannad Quwaider, Rizwan Qureshi. 517-521 [doi]
- Tracking a Mobile Rouge Access PointLilas Qawasmeh, Fahed Awad. 522-526 [doi]
- Semi-Automated Classification of Arabic User Requirements into Functional and Non-Functional Requirements using NLP ToolsKarmel Shehadeh, Nabil Arman, Faisal Khamayseh. 527-532 [doi]
- Resolution Representation Based Person Re-Identification for Smart Cities Using Deep Neural Networks (DNNs)Jawad Qammar, Waqar Ahmad. 533-537 [doi]
- Fixed point of ϱ - ℨ - contraction type mapping in b-metric like spacesHabes Alsamir, Haitham Qawaqneh, Hassen Aydi 0001, Wasfi A. Shatanawi. 538-542 [doi]
- A Computer Vision Based Food Recognition Approach for Controlling Inflammation to Enhance Quality of Life of Psoriasis PatientsRashidul Hasan Hridoy, Fatema Akter, Md. Mahfuzullah, Faria Ferdowsy. 543-548 [doi]
- The Effect of Using Cyber Hunt Strategy on Developing the Mathematical Academic Achievement for Jordanian Universities StudentsHaitham Qawaqneh, Fadi Bani Ahmad, Amjed Zraiqat. 549-552 [doi]
- An E-learning Portal Quality Model: from Al-Zaytoonah University Students' PerspectiveMohammad Abdallah, Khalid Mohammad Jaber, Mousa Salah, Mohammad Abdul Jawad, Naji AlQbailat, Ayman Abdalla. 553-557 [doi]
- ROAD TRAFFIC Management SOLUTIONSAhmad A. A. Alkhatib, Zeyad Mohammad, Eman M. Abu Maria. 558-564 [doi]
- Emotion Recognition using Electroencephalography in Response to High Dynamic Range VideosMajid Riaz, Muhammad Majid, Junaid Mir. 565-570 [doi]
- A Survey of Human Face Recognition for Partial Face ViewSamia A. Abushanap, Ayman M. Abdalla, Abdelfatah Aref Tamimi, Shadi AlZu'bi. 571-576 [doi]
- Slant Toeplitz like Operators on The Lebesgue Space of The TorusAmani Shatarah. 577-581 [doi]
- On the growth analysis of meromorphic solutions of finite logarithmic order of linear difference equations in the unit discIqbal H. Jebril, Nityagopal Biswas, Sanjib Kumar Datta. 582-588 [doi]
- A Text Search Algorithm in Compressed TextMajed AbuSafiya. 589-591 [doi]
- An Intelligent Arabic Chatbot System Proposed FrameworkNagham A. Al-Madi, Khulood Abu Maria, Mohammad Azmi Al-Madi, Mohammad Ahmad Alia, Eman M. Abu Maria. 592-597 [doi]
- A Survey of Image Encryption AlgorithmsQasem H. Makki, Ayman M. Abdalla, Abdelfatah Aref Tamimi. 598-602 [doi]
- Using YOLOv5 Algorithm to Detect and Recognize American Sign LanguageTasnim Ferdous Dima, Md. Eleas Ahmed. 603-607 [doi]
- Empirical Study of Most Popular PHP FrameworkHamza Abutaleb, Abdelfatah Tamimi, Thamer A. Alrawashdeh. 608-611 [doi]
- Optimal Coverage and Bandwidth-Aware Transmission Planning for Augmented Reality/Virtual RealityMobasshir Mahbub, Bobby Barua. 612-615 [doi]
- A Speculative Execution Framework for Big Data Processing SystemsSamar A. Said, El-Sayed M. Saad, Sameh A. Salem, Shahira M. Habashy. 616-621 [doi]
- Deep Learning Weather Forecasting Techniques: Literature SurveyAyman M. Abdalla, Iyad H. Ghaith, Abdelfatah Aref Tamimi. 622-626 [doi]
- A Conceptual Framework for Representing Business Functions and Their Role in the Quality of E-Banking ServicesHani AlNaaji, Abdallah Qusef. 627-633 [doi]
- Gender Recognition using EEG during Mobile Game PlayBushra Fatima, Aasim Raheel, Aamir Arsalan, Muhammad Majid, Muhammad Ehatisham-ul-Haq, Syed Muhammad Anwar. 634-639 [doi]
- Cybersecurity in Industrial Control System (ICS)Motaz AlMedires, Mohammed AlMaiah. 640-647 [doi]
- Data Strategy and Its Impact on Open Government Data QualityHania Al Omari, Sawsan Barham, Abdallah Qusef. 648-653 [doi]
- Generic Proactive IoT Cybercrime Evidence Analysis Model for Digital ForensicsMohammad Rasmi Al-Mousa. 654-659 [doi]
- Parameter Tuning of MLP, RBF, and ANFIS Models Using Genetic Algorithm in Modeling and Classification ApplicationsSam Ansari, Khawla A. Alnajjar, Saeed Abdallah, Mohamed Saad 0001, Ali A. El-Moursy. 660-666 [doi]
- On the Appropriate Methodologies for Data Science ProjectsAmin Karimi Dastgerdi, Taghi Javdani Gandomani. 667-673 [doi]
- A Novel Recommender System Using Interest Extracting Agents and User FeedbackBilal Hawashin, Ayman Mansour, Farshad Fotouhi, Shadi AlZu'bi, Tarek Kanan. 674-678 [doi]
- Recent intelligent Approaches for Managing and Optimizing smart Blood Donation processShadi AlZu'bi, Darah Aqel, Ala Mughaid. 679-684 [doi]
- Software Requirements Classification using Machine Learning algorithm'sGaith Y. Quba, Hadeel Al Qaisi, Ahmad Althunibat, Shadi AlZu'bi. 685-690 [doi]
- Intelligent security in the era of AI: The key vulnerability of RC4 algorithmAla Mughaid, Ahmed Al-Arjan, Mohammad Rasmi, Shadi AlZu'bi. 691-694 [doi]
- CyberSecurity in Healthcare IndustryKhadija Abu Ali, Sarah Alyounis. 695-701 [doi]
- User centric explanations: a breakthrough for explainable modelsAli Hassan, Mansoor Abdullateef Abdulgabber Abdulhak, Riza Bin Sulaiman, Hasan Kahtan. 702-707 [doi]
- Unified Theory of Acceptance and Use of Technology (UTAUT) LEGO Sets in EducationAbeer Abusobaih, Martin Havranek, Mansoor Abdullateef Abdulgabber. 708-713 [doi]
- Transfer Learning in Data Fusion at Autonomous DrivingIyad H. Ghaith, Aseel Rawashdeh, Shadi Al Zubi. 714-718 [doi]
- Cybersecurity in Smart City: A Systematic Mapping StudyMaryam Alamer, Mohammed Amin Almaiah. 719-724 [doi]
- Cybersecurity Concerns in Smart-phones and applications: A surveyMaryam Abdulaziz Saad Bubukayr, Mohammed Amin Almaiah. 725-731 [doi]
- Data an Overview of Cybersecurity Threats on Credit Card Companies and Credit Card Risk MitigationFajer Almudaires, Mohammed AlMaiah. 732-738 [doi]
- Arabic Text Categorization: A Comparison SurveyTarek Kanan, Amani AbedAlghafer, Ghassan G. Kanaan, Riyad Al-Shalabi, Mohammed Elbes, Shadi AlZu'bi. 739-742 [doi]
- A Comparison between Machine Learning Researches that use Arabic Text: A Case Study of Social Media DatasetsTarek Kanan, Woruod Rathi, Bilal Hawashin. 743-747 [doi]
- Remotely Controlled Smart Home System using GSM and IOTMohammad A. Obeidat, Ayman M. Mansour, Tareq Hamadneh, Jalal Abdullah. 748-753 [doi]
- Using Prefix Reversals To Looplessly Generate O(1) Time Multiset Permutation By Boustrophedon Linked ListEleas Ahmed, Tasnim Ferdous Dima. 754-757 [doi]
- May I Know your IBAN? Cracking the Short Message Service (SMS) as a Second Factor Authentication for Online PaymentsMohamamd Z. Masoud, Yousef Jaradat, Ahmad M. Manasrah, Ismael Jannoud, Mohammad Alia. 758-762 [doi]
- Internal DoS Attack Detection and Prevention in Fog ComputingAsad Ullah, Syed Irfan Ullah, Abdul Salam. 763-768 [doi]
- A Tutorial on Singular Value Decomposition with Applications on Image Compression and Dimensionality ReductionYousef Jaradat, Mohammad Z. Masoud, Ismael Jannoud, Ahmad M. Manasrah, Mohammad Alia. 769-772 [doi]
- Mobile App Development Through Designing Structural Visual Method for Effective Learning Foreign LanguageImad H. Tahini, Alex K. Dadykin. 773-778 [doi]
- Cyber Security Threats in Cloud: Literature ReviewRoaa Al Nafea, Mohammed Amin Almaiah. 779-786 [doi]
- Survey of Denoising Methods for Inertial Sensor MeasurementsMoutayam Khaddour, Stanislav Shidlovskiy, Dmitriy Shashev, Mainak Mondal. 787-790 [doi]
- Passive Object-based Video Authentication Using Stereo Statistical Descriptor on Wavelet DecompositionManar Abduljabbar Ahmad Mizher, Mei Choo Ang, Siti Norul Huda Sheikh Abdullah, Kok Weng Ng, Ahmad A. Mazhar, Manal Abd-Aljabbar Mizher. 791-798 [doi]
- COVID-19 Diagnosis from Chest X-ray Images Using Convolutional Neural Network(CNN) and InceptionV3Nazmus Shakib Shadin, Silvia Sanjana, Nusrat Jahan Lisa. 799-804 [doi]
- Deep CNN Model based on VGG16 for Breast Cancer ClassificationDheeb Albashish, Rizik Al-Sayyed, Azizi Abdullah, Mohammad Hashem Ryalat, Nedaa Ahmad Almansour. 805-810 [doi]
- Recent Quality Models in BigData ApplicationsWaleed Hattawi, Sameeh Shaban, Aon Al Shawabkah, Shadi AlZu'bi. 811-815 [doi]
- Prospective elementary teachers' experience with GeoGebra on the area of a triangleZetra Hainul Putra, Neni Hermita, Jesi Alexander Alim, Gustimal Witri. 816-819 [doi]
- Modeling Individuals Instinctive Reaction Against Dangerous Source when the Occurrence of Unexpected ContactMohammed Mahmod Shuaib, Osama Moh'd Alia. 820-825 [doi]
- A Big Data Maturity Model for Electronic Health Records in HospitalsRania Daraghmeh, Raymond Brown. 826-833 [doi]
- Finding the safest path: the case of YemenMahmood Alzubaidi, Dena Al-Thani. 834-841 [doi]
- Applying the Reconfigurable Computing Environment Concept to the Deep Neural Network Accelerators DevelopmentVladislav Shatravin, Dmitriy Shashev, Stanislav Shidlovskiy. 842-845 [doi]
- Blind Quality Assessment of Super-Resolution Images using Relative Gradient Statistics of Salient and Non-salient ObjectsMalik Waqar Aziz, Imran Fareed Nizami, Muhammad Majid. 846-851 [doi]
- Automated Test Cases Generation From Requirements SpecificationMohammed Lafi, Thamer Alrawashed, Ahmad Munir Hammad. 852-857 [doi]
- Predicting Different Types of Imbalanced Intrusion Activities Based on a Multi-Stage Deep Learning ApproachRaneem Qaddoura, Ala' M. Al-Zoubi, Iman M. Almomani, Hossam Faris. 858-863 [doi]
- Leveraging the Power of Machine Learning for Performance Evaluation Prediction in Wireless Sensor NetworksSiham Zroug, Ikram Remadna, Laïd Kahloul, Saber Benharzallah, Labib Sadek Terrissa. 864-869 [doi]
- An Intelligent Prototype for Requirements Validation Process Using Machine Learning AlgorithmsHadeel Al Qaisi, Gaith Y. Quba, Ahmad Althunibat, Ayman Abdallah, Shadi AlZu'bi. 870-875 [doi]
- Assessing the Usability of Hajj and Umrah WebsitesMoh'd Khaled Yousef Shambour. 876-881 [doi]
- An Analysis on Abrupt Fall of Indian Stock MarketsSadhvi Mehra, Sumedha Seniaray. 882-887 [doi]
- Usable Tourism Application: Malaysia Attraction Travel Application (MATA)Cheong Suk Fun, Zarul Fitri Zaaba, Auwal Shehu Ali. 888-892 [doi]
- Tor Detection using a Machine Learning Approach Using Correlation based Feature Selection with Best First and Random ForestMalak Hamad Al-Mashagbeh, Mohammad Ababneh. 893-898 [doi]
- Bangladeshi Indigenous Fish Classification using Convolutional Neural NetworksKrishno Dey, Md. Mustahid Hassan, Md. Masud Rana 0004, Mst. Hasna Hena. 899-904 [doi]
- Mental Models Review for Security and Privacy Policy: An approachAuwal Shehu Ali, Zarul Fitri Zaaba. 905-909 [doi]
- Emotion Recognition in Response to Haptic Enhanced Multimedia Using EEGShams-ul-Haq, Aasim Raheel, Muhammad Majid. 910-913 [doi]
- ÓImpact of Infertility Factors on IVF Success Rate using Fuzzy Inference SystemAyman M. Mansour, Mohammad A. Obeidat. 914-918 [doi]
- Optimization of Path Selection and Code-Coverage in Regression Testing Using Dragonfly AlgorithmSultan M. Al Khatib. 919-923 [doi]
- IoT based Intelligent Information-Analytical System Architecture for Water Tank MonitoringViktor V. Zhukovskyy, Damon Printz, Nataliia A. Zhukovska, Maksym Hubach, Hesham Rajab. 924-928 [doi]
- On the Edge and Cloud: Recommendation Systems with Distributed Machine LearningTrung T. Nguyen. 929-934 [doi]
- Blockchain Technology for Preventing Counterfeit in Health InsuranceBaker Alhasan, Mohammad Qatawneh, Wesam Almobaideen. 935-941 [doi]
- Modeling the factors that influence digital economy services acceptanceAhmad Althunibat, Basem Alokush, Raneem Dawood, Saeed M. Z. A. Tarabieh, Ignácio Gil-Pechuan. 942-945 [doi]
- Comparison between proposed Convolutional Neural Network and KNN For Finger Vein and Palm PrintHiba Wasmi, Mustafa Al-Rifaee, Ahmad Thunibat, Bassam Al-Mahadeen. 946-951 [doi]
- Machine Learning and Data Mining in CybersecurtyFarhan Abdel-Fattah, Fadel AlTamimi, Khalid A. Farhan. 952-956 [doi]
- A Survey on SQL Injection Attack: Detection and ChallengesZain Marashdeh, Khaled Suwais, Mohammad Alia. 957-962 [doi]
- Light Fidelity to Transfer Secure Data Using Advanced Encryption Standard AlgorithmWassan S. Aldolimi, Adnan A. Hnaif, Mohammad A. Alia. 963-967 [doi]
- Intelligent Distribution for COVID-19 Vaccine Based on Economical ImpactsShadi AlZu'bi, Qasem H. Makki, Yazan Abdul Ghani, Hussein Ali. 968-973 [doi]
- Designing a Marker Set for Vertical Tangible User InterfacesGeoffrey Attard, Clifford De Raffaele, Serengul Smith. 974 [doi]