Abstract is missing.
- Reliability Function of the Connected-(2,2)-out-of-(m,n): F Linear and Circular System Using Markov ChainImad I. H. Nashwan. 1-6 [doi]
- Digital Forensic Analysis of Hologram Projection FansAlsharifHasan Mohamad Aburbeian, Majdi Owda, Amani Yousef Owda. 7-12 [doi]
- Analysis of Critical Factors Influencing E-Learning Platforms SecurityEssohanam Djeki, Jules R. Dégila, Muhtar Hanif Alhassan. 13-18 [doi]
- Personalizing Product Recommendations using Collaborative Filtering in Online Retail: A Machine Learning ApproachManal Loukili, Fayçal Messaoudi, Mohammed El Ghazi. 19-24 [doi]
- Electrical Load Forecasting Based on Random Forest, XGBoost, and Linear Regression AlgorithmsMobarak A. Abu Mohsen, Amani Yousef Owda, Majdi Owda. 25-31 [doi]
- In-Vehicles Infotainment System Forensics Case StudyAmmar Dawabsheh, Majdi Owda. 32-37 [doi]
- Facilitating Metaverse Integration in Education via Extended Reality and the Internet of Things: AN OVERVIEWAwf Alhalaybeh, Ahmad Alkhatib, Rand Albustanji, Shorouq Elmanaseer, Tarek Kanan, Rashed Alsakarnah. 38-42 [doi]
- A Survey on Cyber Security in Smart Grids using Internet of ThingsHeba Alamereah, Ahmad Alkhatib, Shorouq Elmanaseer, Rand Albustanji, Hani Al-Mimi, Mohammad Al-Rawajbeh. 43-46 [doi]
- The Impact of Operational Characteristics on the Total Risk Management: Evidence from the Industrial FirmsAbdul Razzak Alshehadeh, Haneen A. Al-Khawaja, Mohammad A. Alia, Farid Kourtel, Ehab Injadat, Iqbal H. Jebril. 47-50 [doi]
- FastText Embedding and LSTM for Sentiment Analysis: An Empirical Study on Algerian TweetsLamia Ouchene, Sadik Bessou. 51-55 [doi]
- Study on Green Cloud Computing-A SurveySameer Mehra, Laxmi Ahuja. 56-61 [doi]
- Decision Support System in Healthcare for Predicting Blood Pressure DisordersMarwa Mustafa Owess, Amani Yousef Owda, Majdi Owda. 62-67 [doi]
- Improving Energy Consumption in Content-Addressable Memory Through PrecomputationHanaa Alrushood, Sa'ed Abed, Asmaa Alabdulhadi. 68-72 [doi]
- Water Quality Classification Decision Support SystemNoura Abulail, Amani Yousef Owda, Majdi Owda. 73-78 [doi]
- A Survey of IoT Healthcare ApplicationsSara Albakhit, Ahmad Alkhatib, Rand Albustanji, Shorouq Elmanaseer, Mosa Salah, Reem Amro. 79-82 [doi]
- VGG16-Based Deep Learning Architectures for Classification of Lung Sounds into Normal, Crackles, and Wheezes using GammatonegramsZakaria Neili, Kenneth Sundaraj. 83-88 [doi]
- A Comprehensive Review of Digital Forensics Frameworks for Internet of Things (IoT) DevicesYaman Salem, Majdi Owda, Amani Yousef Owda. 89-96 [doi]
- Sound Noise Monitoring using Wireless Sensor Networks in Annaba CityMohamed Fezari, Ali Al-Dahoud, Mohamed Arif, Ahmad Al-dahoud, Hani M. Al-Mimi. 97-101 [doi]
- Security Challenges Review in Agile and DevOps PracticesSuha Afaneh, Mohammad Rasmi Al-Mousa, Hilal Shrif Al-hamid, Bara'h Suliman AL-Awasa, Mohammad Alia, Hani Almimi, Ahmad A Alkhatib. 102-107 [doi]
- Smart Irrigation System Using LoRaWANMoustafa M. Kurdi. 108-113 [doi]
- Towards Better Software Development Effort Estimation with Analogy-based Approach and Nature-based AlgorithmsMona Mona Mona Najafi Sarpiri, Mohammadreza Soltan Aghaei, Taghi Javdani Gandomani. 114-117 [doi]
- A Blockchain-Based Solution for Defining and Enforcing Personal Data Access PoliciesMichael Lescisin, Qusay H. Mahmoud. 118-124 [doi]
- Mobile Object Detection and Tracking Using DRONESMalek Mahmoud Barhoush, Ameera Saleh Jaradat, Najla'a Saleh, Isra'a Saleh. 125-129 [doi]
- A Survey: Threat Hunting for the OT SystemsAshraf Abzakh, Ahmad Alkhatib, Omar Rabayah, Shorouq Elmanaseer, Rand Albustanji, Nagham Almadi. 130-134 [doi]
- A Novel Machine Learning Cyber Approach for Detecting WannaLocker Ransomware Attack on Android DevicesMahmoud AlJamal, Rabee Alqura'n, Issa AL-Aiash, Ala Mughaid, Shadi AlZu'bi, Ala A. Abutabanjeh. 135-142 [doi]
- Using Of Multivariate Linear Regression and Exponential Smoothing Model to Predict the Gross Domestic Product in JordanShahed Nabeel Al-khateeb, Ameera Saleh Jaradat. 143-148 [doi]
- Bayes Estimators of the Log-Normal Distribution Parameters Using Lindley's ApproximationSiham Ali Abrikah, Ghadeer Farraj, Ma'mon Abu Hammad. 149-152 [doi]
- Distribution of Shannon Statistic from Exponential SampleMa'mon Abu Hammad, Azezah Al Abdallah, Siham Ali Abrikah, Ghadeer Farraj. 153-155 [doi]
- Properties of Conformable Fractional Half-Normal DistributionAfaf Mohammad Al Sous, Ma'mon Abu Hammad. 156-158 [doi]
- Distribution of Shannon Statistic from Nakagami SampleAfaf Mohammad Al Sous, Ma'mon Abu Hammad. 159-162 [doi]
- Towards the Application of Test Driven Development in Big Data EngineeringDaniel Staegemann, Matthias Volk 0002, Mohammad Abdallah, Klaus Turowski. 163-167 [doi]
- A Data Collection Quality Model for Big Data SystemsMohammad Abdallah, Alaa Hammad, Daniel Staegemann. 168-172 [doi]
- Blockchain Based Identity Management System Using Cryptography and SteganographyPraditi Rede, Sahaana Iyer, Sheetal Sharma, Sujata Deshmukh. 173-177 [doi]
- Predicting Patient's Willingness for Colorectal Cancer Screening Practices Using Machine Learning ClassifiersAhmad Abdel-Aziz Sharieh, Nesreen A. Hamad, Heba I. Abu Kaf, Fuad H. Abuadas. 178-183 [doi]
- ChatGPT in Education: SWOT analysis approachHamzeh Mohammad Alabool. 184-189 [doi]
- DMEgrader: Android Mobile Application for Diabetic Macular Edema Grading PredictionHamada R. H. Al-Absi, Gilbert Njihia Muchori, Saleh Musleh, Mohammad Tariqul Islam 0002, Anant Pai, Tanvir Alam. 190-195 [doi]
- Feature Selection for High-Dimensional Imbalanced Malware Data Using Filter and Wrapper Selection MethodsMai AbuJazoh, Duha Al-Darras, Nesreen A. Hamad, Saleh Al-Sharaeh. 196-201 [doi]
- Factors Influencing University Students' Adoption of digital educational technologies in Higher EducationManal A. Altawalbeh, Sultan Alshourah, Fadi Bani Ahmad, Sabah Jamil Al Nawaiseh. 202-207 [doi]
- Properties of Conformable Fractional Maxwell-Boltzmann Probability DistributionSalemah Almutlak, Ghadeer Farraj, Amjad Zraigat, Azezah Al Abdallah, Siham Ali Abrikah, Bayan Alkhalaileh. 208-213 [doi]
- Human Body Action Recognition based on 3D Feature Fusion over RGB ScenesHeba Nsour, Zaid Mustafa, Maria Al-Sendah. 214-219 [doi]
- Revolutionizing Cyberbullying Prevention: A Cutting-Edge Natural Language Processing-Based ApproachTarek Kanan, Samar Hendawi, Shadi AlZu'bi, Mohammed W. Elbes, Ala Mughaid. 220-225 [doi]
- Geospatial Analysis of COVID-19 Lockdown Effects on Air Quality in Jordan and Surrounding CountriesMarwan Al-Tawil, Moh'd Belal Al-Zoubi, Yousef Majdalawi, Tamara Almarabeh, Ali Al-Dahoud. 226-229 [doi]
- Training Machine Learning Classifiers on Differentiating Major Depressive Disorder and Parkinson's Disease Using Cognitive PerformanceAya Mousa, Ashar Y. Natsheh, Rashid Jayousi, Mohammad M. Herzallah. 230-235 [doi]
- A Reinforcement Learning Model of Temporal Difference Variations for Action-Selection and Action-Execution in the Human BrainAshar Y. Natsheh, Joman Y. Natsheh, Aya H. Mousa, Mahmoud H. Al-Saheb, Ahmed A. Moustafa, Mohammad M. Herzallah. 236-243 [doi]
- Factors Influencing The Adoption of E-commerce in Jordanian SMEsDiala Othman Qatanani, Abdallah Qusef. 244-249 [doi]
- A Study of Human Fitness Pose Classification Using Artificial Neural NetworksSijie Shang, Rong Jin 0003, Kevin Desai. 250-255 [doi]
- Enhancing Password Security via Supervised LearningYaser Alkurdi, Mustafa Al-Fayoumi, Amer Al-Badarneh, Qasem Abu Al-Haija. 256-259 [doi]
- Enhancing Financial System Resilience Against Cyber Threats via SWIFT Customer Security FrameworkKhawla Shalabi, Mustafa Al-Fayoumi, Qasem Abu Al-Haija. 260-265 [doi]
- The Current State of Research on Malware Written in the Rust Programming LanguageMeghna Praveen, Wesam Almobaideen. 266-270 [doi]
- Applying A* Search Algorithm in Mobile Game-Based Learning for Malay ProverbsMuhammad Nazif Firdaus Mazlan, Norzilah Musa, Norzehan Sakamat, Afiza Ismail. 271-275 [doi]
- Unleashing the Full Potential of Artificial Intelligence and Machine Learning in Cybersecurity Vulnerability ManagementMohammed W. Elbes, Samar Hendawi, Shadi AlZu'bi, Tarek Kanan, Ala Mughaid. 276-283 [doi]
- Towards a Sustainable Future: Exploring Key Features, Challenges, and Global Examples of Building Smart CitiesShadi AlZu'bi, Samar Hendawi, Mohammed W. Elbes, Tarek Kanan, Ala Mughaid. 284-291 [doi]
- The Effectiveness of Nearpod in Developing Online Interactive Lesson Design Skills for Mathematics and Computer TeachersFadi Bani Ahmad, Haitham Qawaqneh, Amjed Zraiqat, Sabah Jamil Al Nawaiseh. 292-294 [doi]
- Developing an LTE Learning Material: Experiences from a University in a Developing CountryLeinard C. Lontoc, Marjorie H. Basco, Vannesa Ann P. Sulit, Genesis Aubrey M. Magpantay, Mirasol C. Dilay, Ralph Gerard B. Sangalang. 295-299 [doi]
- FPGA-Based Radio Transceiver Using the TV White Space for Disaster Response OperationKhryzz Lyden G. Cueto, Ricky Mae V. Santos, Claudette Jane C. Hilario, John Carl V. Aggari, Ralph Gerard B. Sangalang. 300-304 [doi]
- Statistical Differences Between the Experimental and Control Groups and the Role of the Counseling Program to Reduce Aggressive Behavior Among Primary School StudentsOla Yahia Aljamal, Najihah Abd Wahid, Hafsah Yahia Aljamal. 305-308 [doi]
- Building a Counseling Program Based on Islamic Culture and Social Learning Theory to Reduce the Aggressive Behavior of Students in the Primary StageOla Yahia Aljamal, Najihah Abd Wahid, Hafsah Yahia Aljamal. 309-313 [doi]
- Assessing the Maturity of Online Service Delivery by Applying Local Online Service Index (LOSI) Methodology in Selected Indian CitiesSaumya Mehta, Gayatri Doctor. 314-318 [doi]
- Towards Leveraging Explainable Artificial Intelligent (XAI) in Requirements Engineering (RE) to Identify Aspect (Crosscutting Concern): A Systematic Literature Review (SLR) and Bibliometric AnalysisAws A. Magableh. 319-326 [doi]
- The Role of Smart Technologies in Reducing Energy Consumption and Promoting Sustainable Practices in Households and BusinessesBelal Mahmoud Al-Wadi, Varadaraj Aravamudhan, K. Mohanasundaram, Mohammad Abduljawad. 327-334 [doi]
- Applications to Conformable $\alpha$ - Log-Normal DistributionMaha S. Alsaoudi, Ahlam Guiatni, Sondos Rasem. 335-338 [doi]
- Bayesian Estimation for Inverse-Gaussian Distribution under Square Error Loss FunctionSondos Rasem, Amjed M. Zraiqat, Waseem Ghazi Alshanti, Abdulkarim Farah, Ma'mon Abu Hammad. 339-342 [doi]
- An XAI Approach to Predictive Analytics of Pancreatic CancerSrinidhi B, M. S. Bhargavi. 343-348 [doi]
- Applications of Artificial Intelligence Methods in MedicineMirjana Ivanovic, Dragan Macos. 349-354 [doi]
- Towards a Conceptual Model for Assessing User Satisfaction in Metaverse-Based LearningAwf Alhalaybeh, Ahmad Althunibat, Bassam M. Al-Mahadeen, Khaldoun Khalil Habashneh, Ali Mohammad Daradkeh. 355-360 [doi]
- Measuring Acceptance of Adoption Metaverse in eLearning by Using TAM ModelAwf Alhalaybeh, Ahmad Althunibat. 361-366 [doi]
- Intelligent Detecting of Emergency Vehicles on the Road Networks: Available Datasets AssessmentMo'ath Shatnawi, Maram Bani Younes. 367-372 [doi]
- A Survey of Internet of Things (IoT) Forensics Frameworks and ChallengesFarhan Abdel-Fattah, Seraj Fayyad, Abdullah Mubarak Heyari, Hassan Al-Zoubi. 373-377 [doi]
- Blockchain Based Voting Framework With Non-Transferable Non-Fungible TokensMusan Eltuhami, Munaisyah Abdullah, Bazilah A. Talip, Nik Azlina Nik Ahmad. 378-383 [doi]
- Approximate Bayes Estimators of Laplace Distribution under Linex Loss FunctionMa'mon Abu Hammad, Maysoon Mustafa Mohmmad Qousini, Zakrea Mohmmad Rabab'h. 384-386 [doi]
- Bayes Estimation of the Parameters of the Kumaraswamy Probability DistributionMa'mon Abu Hammad, Hassan Al-Zoubi, Azezah Al Abdallah. 387-390 [doi]
- Feature Extraction with Differential Evolution AlgorithmSalam Hamdan, Manal A. Mizher, Hani Mimi, Eman Abu Maria, Abdullah Mubarak Heyari. 391-396 [doi]
- A New Lightweight AES for IoTLiana Qabajeh, Radwan Tahboub, Mohammed AbuJoodeh. 397-404 [doi]
- Correcting Wide-Range of Arabic Spelling Mistakes Using Machine Learning and TransformersRaghda Diab Hasan, Gheith A. Abandah. 405-410 [doi]
- An Enhanced UNet Model to Detect Water Bodies From Remote Sensing DataMina Al-Saad, Nour Aburaed, Mohammed Q. Alkhatib, Mohammad Sami Zitouni, Hussain Al-Ahmad. 411-415 [doi]
- Interactive, Visual-Learning based Tool for Hearing Impaired Children to Improve Language and Cognitive SkillsSaluka Udbhasa, Parami Lelkada, Modeesha Priyanka, Esala Senarathna, Samitha Vidhanaarachchi, Jagath Wickramarathne, Janaka L. Wijekoon. 416-421 [doi]
- A Systematic Review of the use of Virtual Reality in EducationAhmad A. Mazhar, Mustafa M. Al Rifaee. 422-427 [doi]
- An Employment of the Evolutionary Algorithms in Training of Neuro Fuzzy Inference System for Forecasting Personnel Radiation ExposureArmin Kobilica, Anas Ahmad Abudaqa, Mustafa Ghaleb. 428-434 [doi]
- Three Dimensional Objects Encryption Algorithms: A ReviewManal A. Mizher, Salam Hamdan, Manar Abduljabbar Ahmad Mizher, Ahmad A. Mazhar, Hani Mimi, Abdullah Mubarak Heyari. 435-440 [doi]
- Green and Network-Aware Smart IoT Logistics ApplicationsHatem A. Alharbi. 441-446 [doi]
- Fixed point results using cyclic (ρ - θ)-admissible mapping and extended simulation function concept in rectangular b-metric spaceHabes Alsamir, Haitham Qawaqneh. 447-452 [doi]
- A Crop Recommendation System Based on Nutrients and Environmental Factors Using Machine Learning Models and IoTAnishka Chauhan, Anuraag Tsunduru, Kishwar Parveen, Srilatha Tokala, Koduru Hajarathaiah, Murali Krishna Enduri. 453-458 [doi]
- The Effectiveness of E-Learning System on Students' of Al-Zaytoonah university of Jordan: A Case StudyAreej Derbas, Nancy Al-Ramahi, Adnan Hnaif, Thamer A. Alrawashdeh, Rasha Adnan Mubaideen. 459-463 [doi]
- Degree of Employing Distance Learning Technology by Faculty Members and its Role in Students' Acquisition of Self-Learning SkillsTahani Fawaz Abu Jraiban. 464-469 [doi]
- Predicting Students' Performance Using Machine LearningSabreen Abulhaija, Shyma Hattab, Wael Etaiwi. 470-475 [doi]
- Detection of Fabricated Survey Data using Clustering AnalysisLamia AbedNoor Muhammed, Ban Abdnoor Mohammed. 476-482 [doi]
- Arabic User Requirements Classification Using Machine LearningReem Amro, Ahmad Althunibat, Bilal Hawashin. 483-488 [doi]
- Arabic Non-Functional Requirements Extraction Using Machine LearningReem Amro, Ahmad Althunibat, Bilal Hawashin. 489-494 [doi]
- Quadrics of Coordinate Finite TypeMohammad Al-kafaween, Hamza Alzaareer, Hassan Al-Zoubi. 495-500 [doi]
- The Disclosure Governance and its Role in the Operational Risk Management: Evidence from Commercial BanksAbdul Razzak Alshehadeh, Kamel Rezig, Haneen A. Al-Khawaja, Iqbal H. Jebril, Ehab Injadat, Abeer fouzan Aref Al-Abbadi. 501-505 [doi]
- Digital Certificate Validation Using Blockchain: A SurveyYazan Abu Hammoudeh, Mohammad Qatawneh, Orieb AbuAlghanam, Mohammed Amin Almaiah. 506-510 [doi]
- Unmasking the Truth: A Deep Learning Approach to Detecting Deepfake Audio Through MFCC FeaturesIslam AlTalahin, Shadi AlZu'bi, Assal Alqudah, Ala Mughaid. 511-518 [doi]
- Using of Blockchain in the Context of Automotive Industry: A SurveyYazeed Alhajjaj, Mohammad Qatawneh, Orieb AbuAlghanam, Mohammed Amin Almaiah. 519-523 [doi]
- A Dynamic Locality Sensitive Hashing Algorithm for Efficient Security ApplicationsMohammad Y. Alkhanafseh, Ola M. Surakhi. 524-530 [doi]
- The Journey of E-Learning Technology From Application to Challenges: Evidence From JordanMohammad Altarawneh, Saif Al-Deen Al-Ghammaz. 531-536 [doi]
- Customer Personality Segmentation Using K-Means ClusteringLana Al-Dabbas, Hassan Al-Tarawneh 0001, Thamer A. Alrawashdeh. 537-543 [doi]
- Improving Routing Decision Algorithm for RPL NetworksAbdullah Al-Hasanat, Omar Almomani, Malek Ahmad Theeb Almomani, Adeeb Alsaaidah, Ahmad Adel Abu Shareha, Ahmad Althunibat. 544-549 [doi]
- From Data to Narrative: Automating and Engineering the Art of Data StorytellingMohammad Daradkeh 0001, Shadi Atalla. 550-555 [doi]
- Intelligent Model for Optimizing Gantt Chart in the Planning StageNoor Bdair, Wael Alzyadat, Shadi AlZu'bi. 556-560 [doi]
- Requirements Elicitation and Stakeholder Communications for Explainable Machine Learning Systems: State of the ArtSaikat Das, Mazharul Hossain, Sajjan G. Shiva. 561-566 [doi]
- On the Optimization of Bi-variate Logarithmic Functions Using Bernstein-Lagrange MethodFatima S. Al-Sha'ar, Abdelrahman Aloudat, Tareq Hamadneh. 567-571 [doi]
- A Proposed Technique for Business Process Modeling Diagram Using Natural Language ProcessingShorouq Elmanaseer, Ahmad Alkhatib, Rand Albustanji. 572-576 [doi]
- Demand Prediction Using Sequential Deep Learning ModelFayçal Messaoudi, Manal Loukili, Mohammed El Ghazi. 577-582 [doi]
- The Role of the Internet of Things in Monitoring Air Pollution-A SurveyAhmad Abusukhon, Bareeq Alghannam. 583-585 [doi]
- Sequentially compact and compactly generated groupsOmar Ghanam, Hamza Alzaareer. 586-588 [doi]
- A Review: Human Factor and CybersecurityAshraf Abzakh, Ahmad Althunibat. 589-592 [doi]
- Image Splicing Localization Using Superpixel and Wavelet Mean Squared ErrorSeiga Al Ghifari, Hudan Studiawan. 593-598 [doi]
- An Analysis of Width Feedline of Ice Cream Cone Antenna in 5G Technology for Internet of Things (IoT) ApplicationsS. Ismail, Mohd Azlishah Othman, M. H. Misran, Maizatul Alice Meor Said, A. S. Jaafar, R. Abdul Manap, Y. T. Nugraha, N. M. Hassan, S. Suhaimi. 599-603 [doi]
- Internet of Things - Enabled Stress Surveillance When Pandemic Lockdown: Revolutionizing ResilienceA. H. Hasanudin, M. A. Othman, A. A. Azwan, A. A. F. Mohd Roki, S. Ismail, Y. T. Nugraha, S. Suhaimi, N. M. Hassan. 604-608 [doi]
- Analyzing Data Format Interoperability in API Ecosystems Using Big Data ArchitectureWael Jumah Alzyadat, Suleyman Al-Showarah. 609-612 [doi]
- Integrated Boolean Sensing and Event Radius Model on Data Aggregation in Wireless Sensor NetworksMohammad Adawy, Omar Almomani, Muhannad Tahboush, Ahmad Althunibat. 613-619 [doi]
- Examining the Validity of Inference Rules: Utilizing Truth Tables and Contrapositive AnalysisFatima M. D. Quiam, Assal A. M. Alqudah, Maher A. Nabulsi, Shadi AlZu'bi. 620-624 [doi]
- Design and Research of Temperature Sensor Based on Single Split Ring ResonatorBo Wang, Bei Han, Youwei Li, Fei Gao, Chaohui Chen, Junqiang He. 625-630 [doi]
- Classification of Arabic Software Requirements Using Machine Learning TechniquesBayan Alsawareah, Ahmad Althunibat, Bilal Hawashin. 631-636 [doi]
- Stable Clustering Algorithms for VANETs: A SurveyOmar Baradia, Liana Jalalaltamimi. 637-642 [doi]
- Analysing Vehicle Routing in Urban Pest Control Using a Cluster-First Route-Second ApproachYigit Alisan, Faruk Serin, Süleyman Mete, Eren Özceylan. 643-646 [doi]
- Design and Characterization of a Passive Wireless Chipless RFID Humidity SensorBo Wang, Youwei Li, Fei Gao, Bei Han, Chaohui Chen, Junqiang He. 647-651 [doi]
- Numerical Solution for Incommensurate System of Fractional Order Differential EquationsIqbal M. Batiha, Shameseddin Alshorm, Amjed Zraiqat, Mohammad Alia, Iqbal H. Jebril. 652-656 [doi]
- Handling Systems of Incommensurate Fractional Order Equations Using Improved Fractional Euler MethodShameseddin Alshorm, Iqbal M. Batiha, Iqbal H. Jebril, Amer Dababneh. 657-660 [doi]
- A Brief Review For Separation Axioms In Bitopological SpacesMaysoon Qousini, Omar Ghanam. 661-663 [doi]
- Arcaboard: An Overview of the SElectromagnetic HoverBoardNagham A. Al-Madi, Mohammad Azmi Al-Madi, Wael Alzyadat, Khulood Abu Maria, Ahmed Alkhateeb, Fanan Al-Madi. 664-666 [doi]
- Arabic Automatic Speech Recognition for Speakers With Speech Disorders: A Comprehensive ReviewAssal A. M. Alqudah, Mohammad A. M. Alshraideh, Ahmad A. S. Sharieh, Mohammad A. M. Abushariah, Fatima M. D. Quiam. 667-673 [doi]
- A Reliable Analytical Method for Solving Klein-Gordan Equation by Tensor Product Theory of Banach SpacesWaseem Ghazi Alshanti, Ahmad Alshanty, Bashar Aljawarneh, Roshdi Khalil. 674-676 [doi]
- On α-Homogeneous Fractional Differential EquationsWaseem Ghazi Alshanti, Ahmad Alshanty, Roshdi Khalil. 677-679 [doi]
- Knowledge Transfer to Solve Split and RephraseAlMotasem Bellah AlAjlouni, Jinlong Li. 680-685 [doi]
- Predicting the Helpfulness of Online Customer ReviewsHamzah Zureigat, Omar AlQudah, Bushra Alhijawi. 686-689 [doi]
- Improving Arabic Fake News Detection Using Optimized Feature SelectionBilal Hawashin, Ahmad Althunibat, Tarek Kanan, Shadi AlZu'bi, Yousef Sharrab. 690-694 [doi]
- A Proposed Cloud Quality Model (IaaSQual) for "Infrastructure as a Service (IaaS)" from User's PerspectiveHussain Aletabi, Mohammad Abdallah. 695-699 [doi]
- An Image Encryption Algorithm Based on XOR, Flipping, Expansion Permutation and ShiftingQasem H. Makki, Ayman M. Abdalla. 700-704 [doi]
- Helicoidal Surfaces Satisfying $\boldsymbol{\varDelta}^{\boldsymbol{III}} \boldsymbol{r}=\boldsymbol{Ar}$Hassan Alzoubi, Waseem Al-Mashaleh, Haitham Qawaqneh, Mohammad Al-kafaween. 705-708 [doi]
- How Data can Mislead Machine Learning Prediction Process: Case Study of Building Cooling and Heating LoadsMohammad Z. Masoud, Ahmad M. Manasrah, Yousef Jaradat, Nabeel A. Abu Shaban. 709-714 [doi]
- A Proposed Quality Model For Social Media WebsitesGana Sawalhi, Mohammad Abdallah. 715-718 [doi]
- The Bernstein Expansion for Rational Differentiable Functions in Newton Divided Differences FormAbdelrahman Aloudat, Fatima S. Al-Sha'ar, Haitham Al-Qawaqneh, Amer Dababneh. 719-723 [doi]
- Transfer Efficiency Enhancement on Wireless Power Transfer Using MetamaterialMuhammad Sukriyllah Yusri, Mohamad Harris Misran, Norbayah Yusop, Maizatul Alice Meor Said, Mohd Azlishah Othman, Shadia Suhaimi. 724-729 [doi]
- Cooperative Spectrum Sensing Using Bat Algorithm in Cognitive RadioNecmi Taspinar, Burcu Ketenci. 730-733 [doi]
- Abstractive Multi-Document Summarization Using Sentence FusionSohini Roy Chowdhury, Kamal Sarkar. 734-741 [doi]
- Intelligent Agents and Neural Fuzzy Logic: Enhancing Agent Intelligence in Complex EnvironmentsShorouq Elmanaseer, Wael Alzyadat. 742-745 [doi]
- Exploring Scalable and Efficient Deployment of Machine Learning Models: A Comparative Analysis of Amazon SageMaker and HerokuRadhika V. Kulkarni, Arjun Thakur, Shravani Nalbalwar, Shubham Shah, Sankalp Chordia. 746-751 [doi]
- OSINT-Based Tool for Social Media User Impersonation Detection Through Machine LearningRajaa Alqudah, Mohammed Al-Qaisi, Rakan Ammari, Yazan Abu Ta'a. 752-757 [doi]
- Security of Cyber-Physical Systems Against Actuator Attacks through CryptographySamuel Oliveira, André B. Leal, Marcelo Teixeira, Yuri K. Lopes. 758-764 [doi]
- A Novel Virtual Cosmetics Recommender System Based On Pre-Trained Computer Vision ModelsSamia A. Abu-Shanab, Shadi AlZu'bi, Amjad Zraiqat. 765-770 [doi]
- Diameter-Constrained Minimum Spanning Tree Problems: A SurveySamar Hendawi, Islam AlTalahin, Shadi AlZu'bi, Ayman M. Abdalla. 771-774 [doi]
- Automated Business Rules Classification Using Machine Learning to Enhance Software Requirements ElicitationMohammed Lafi, Akram A. AbdelQader. 775-778 [doi]
- A Novel Approach to Elicit Software Requirements for IoT Systems Using SVM ClassifierAkram A. AbdelQader, Mohammed Lafi, Khalil Awad, Mohammad A. AbedelQader. 779-782 [doi]
- Prayer Sitting .. Is it a Biometric?Bassam M. Al-Mahadeen, Rufaydah Alhuweimel, Khalid Mohammad Jaber. 783-787 [doi]
- Score-based Diffusion Model for Conformer GenerationDang Cao Cuong. 788-793 [doi]
- A Roadmap for Artificial Intelligence Augmented Software Development Life Cycle: Aspects of Knowledge VaporizationWael Jumah Alzyadat, Mohammad Azmi Al-Madi, Mohammad I. Muhairat, Nagham A. Al-Madi, Feras Altarawneh. 794-799 [doi]
- IntelligentMonitor: Empowering DevOps Environments with Advanced Monitoring and ObservabilityPratik Thantharate. 800-805 [doi]
- Utilization of Information and Communication Technology (ICT) by Faculty Members at Information and Communication Technology College Al-Zaytoonah University in JordanMowafaq Muhammed Al-kassab, Haya Al-Masalha, Lina Ma'mon Abu Hammad, Ali Mohammad Daradkeh, Haneen Al-Khawaja. 806-810 [doi]
- A Perspective on the Application of Fintech as a Gateway for Financial LiteracyDeepa Pillai, Ardhendu Shekhar Singh, Trupti Bhosale, Adesh Doifode. 811-814 [doi]
- EASY E-VOTE: An Ethereum-based Voting System using IPFS and MetaMask for Student Government ElectionReineir S. Duran, Charven B. Balbon, Justine Zenon E. Balmes, Pol Brian G. Castro, Unice G. Lopez, Kobe A. Talosig, Ma. Elena A. Noriega, Orland D. Tubola. 815-820 [doi]
- Ethereum-Based Smart Contract and Traceability System for Food Bank OperationsMary Rachelle Anne F. Eliang, Rona Klarizz S. Del Rosario, Dorothy B. Matalang, Sam-Eduard T. Quintana, Aldem John E. Salvadora, Noel Irvin M. Titong, Ben B. Andres, Orland D. Tubola. 821-826 [doi]
- Web 2.0 Tools and Service Quality: The Key to Effective Customer Relationships in E-Commerce EnvironmentsRadwan Moh'd Al-Dwairi, Maali Al-Khataybeh. 827-831 [doi]