![](https://dblp.uni-trier.de./img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de./img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de./img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
ICIT 2021: Amman, Jordan
- International Conference on Information Technology, ICIT 2021, Amman, Jordan, July 14-15, 2021. IEEE 2021, ISBN 978-1-6654-2870-5
- Maroua Ahmid
, Okba Kazar:
A Cloud-IoT Health Monitoring System Based on Smart Agent for Cardiovascular Patients. 1-6 - Layth Abu Arram, Mohammed Moreb
:
Cyber Security In Mobile Apps And User CIA. 7-12 - Ma'mon Abu Hammad
, Iqbal H. Jebril
, Duha AbuJudeh, Yousef Dalahmeh, Siham Ali Abrikah:
Properties of Conformable Fractional Rayleigh Probability Distribution. 13-15 - Iqbal H. Jebril
, Ma'mon Abu Hammad
, Eman Nouh, Rahaf Hamidi, Yousef Dalahmeh, Salemah Almutlak:
Properties of Conformable Fractional Gamma with two Parameters Probability Distribution. 16-18 - Amer Dababneh
, Ma'mon Abu Hammad
, Amjed Zreqat
, Bilal Albarmawi, Siham Ali Abrikah:
Conformable Fractional of Euler Type Equation. 19-20 - Yaman Salem
, Mohammed Moreb
, Khalid S. Rabayah:
Evaluation of Information Security Awareness among Palestinian Learners. 21-26 - Mohammad Shadeed, Mohammed Moreb
:
Lightweight Encryption for Multimedia in the Internet of thing(iot). 27-32 - Mohammad J. Hamayel
, Mobarak A. Abu Mohsen, Mohammed Moreb
:
Improvement of personal loans granting methods in banks using machine learning methods and approaches in Palestine. 33-37 - Zoubir Dahmani, Ahmed Anber, Yazid Gouari, Mohamed Kaid, Iqbal H. Jebril
:
Extension of a Method for Solving Nonlinear Evolution Equations Via Conformable Fractional Approach. 38-42 - Firas Abuhasan, Mohammed Moreb
:
The Impact of the Digital Transformation on Customer Experience in Palestine Banks. 43-48 - Sara El-Switi, Mohammad Qatawneh:
Application of Blockchain Technology in Used Vehicle Market: A Review. 49-54 - Zbigniew Szadkowski, Krzysztof Pytel:
Trigger Support based on Discrete Cosine Transform for a Detection of Very Inclined Showers in Water Cherenkov Detectors. 55-60 - Gerardo Javier Kuri-Monge, Marco Antonio Aceves-Fernández
, Julio Alberto Ramírez Montañez, Jesús Carlos Pedraza Ortega
:
Capability of a Recurrent Deep Neural Network Optimized by Swarm Intelligence Techniques to Predict Exceedances of Airborne Pollution (PMx) in Largely Populated Areas. 61-68 - Manal Al-Labadi, Eman Mohammad Almuhur, Anwar Alboustanji:
Independence Number and Covering Vertex Number of Γ(R(+)M). 69-73 - Md. Rahatur Rahman, Md. Abdullah Al Forhad, Salah Uddin Ahmed, Shamim Akhter:
Design and Development of An ASP.NET Based ITM Data Center To Support Open Data. 74-79 - Eman Almuhur, Manal Al-Labadi, Amani Shatarah, Sarah Khamis, Nosaiba Omar:
Almost, Weakly and Nearly L-closed topological spaces. 80-84 - Hassan Al-Zoubi
, Tareq Hamadneh, Hamza Alzaareer, Mutaz Al-Sabbagh:
Tubes in the Euclidean 3-space with coordinate finite type Gauss map. 85-88 - Khaled Mustafa Aljamal, Ahmad Termimi Ab Ghani
, Khaled A. Al-Sharo:
Finite groups whose every p-subgroup is nearly S-permutably Embedded. 89-91 - N. Roopesh, Akarsh M. S, C. Narendra Babu:
An Optimal Data Entry Method, Using Web Scraping and Text Recognition. 92-97 - Lidiya S. Ivanova, Danila A. Sokolov, Oleg A. Zmeev:
UML Representation of Object-Oriented Design Antipatterns. 98-103 - Shahadat Hossain
, Shamim Akhter:
Realtime Person Identification using Ear Biometrics. 104-108 - Saleem Al-Ashhab, Majdi Al-Qdah:
Eigenvalues of Self Complementary and Compound Magic Squares with an Application in Image Cryptography. 109-114 - Ahmad Abusukhon
, Fadel AlTamimi:
Water Preservation Using IoT: A proposed IoT System for Detecting Water Pipeline Leakage. 115-119 - Fadi A. Aloul, Imran A. Zualkernan
, Nada Abdalgawad
, Lana Alhaj Hussain
, Dara Sakhnini:
Network Intrusion Detection on the IoT Edge Using Adversarial Autoencoders. 120-125 - Tristan Lim
:
K-Means Clustering-Based Market Basket Analysis: U.K. Online E-Commerce Retailer. 126-131 - Wada Mohammed Jinjri, Pantea Keikhosrokiani
, Nasuha Lee Abdullah:
Machine Learning Algorithms for The Classification of Cardiovascular Disease- A Comparative Study. 132-138 - Ramzi B. AlBadarneh
, Adel Ouannas
, Iqbal M. Batiha
:
identical Chua's circuits application using hybrid dislocated synchronization scheme. 139-142 - Abdullah Quzmar, Mohammad Qatawneh, Sarah Al-Maaitah:
Reducing Counterfeit Drugs with Blockchains: A Survey. 143-148 - Wael Jumah Alzyadat
, Aysh M. Alhroob
, Ikhlas Hassan Almukahel, Mohammad I. Muhairat, Mohammad Abdallah
, Ahmad Althunibat
:
Big Data, Classification, Clustering and Generate Rules: An inevitably intertwined for Prediction. 149-155 - Thangeswariy a-p Ramanei, Nasuha Lee Abdullah, Pang Tong Khim:
Predicting Accounts Receivable with Machine Learning: A Case in Malaysia. 156-161 - Elmer R. Magsino:
Comparing the Behaviors of Various Transportation Modes in Vehicular Social Networks. 162-167 - Davut Ari
, Baris Baykant Alagöz:
A Genetic Programming Based Pollutant Concentration Predictor Design for Urban Pollution Monitoring Based on Multi-Sensor Electronic Nose. 168-172 - Israa Odeh, Mouhammd Alkasassbeh, Mohammad Alauthman
:
Diabetic Retinopathy Detection using Ensemble Machine Learning. 173-178 - Mehmet Sevi
, Ilhan Aydin:
Detecting Flaws on Railways Using Semantic Segmentation. 179-183 - Channabasava Chola
, Md Belal Bin Heyat, Faijan Akhtar, Omar AlShorman, J. V. Bibal Benifa, Abdulla Yahya Mohammed Muaad, Mahmoud Masadeh
, Fahad Alkahatni:
IoT Based Intelligent Computer-Aided Diagnosis and Decision Making System for Health Care. 184-189 - Faruk Serin, Süleyman Mete, Eren Özceylan
:
Graph Traversal-based Solutions for Trip Planning in Public Transportation Graph. 190-194 - Jamal Oudetallah, Ghenaiet Bahia, Adel Ouannas
, Iqbal M. Batiha
:
The Quotient Homotopy Analysis Method for Solving Nonlinear Initial Value Problems. 195-199 - Sarah Al-Maaitah, Mohammad Qatawneh, Abdullah Quzmar:
E-Voting System Based on Blockchain Technology: A Survey. 200-205 - Mohammed Ghazi Al-Obeidallah, Dimah Ghaleb Al-Fraihat, Ahmad Mohammad Khasawneh, Ashraf Mousa Saleh, Hayfa Addous:
Empirical Investigation of the Impact of the Adapter Design Pattern on Software Maintainability. 206-211 - Ali Al-Dahoud, Mohamed Fezari:
Improving Monitoring Greenhouse System using Smart wireless Sensors Actuators Network. 212-217 - Zeyad Mohammad, Ahmad A. A. Alkhatib, Mohammed Lafi
, Ahmad Abusukhon
, Dheeb Albashish, Jaffar Atwan:
Cryptanalysis of a Tightly-Secure Authenticated Key Exchange without NAXOS Approach Based on Decision Linear Problem. 218-223 - Amina Antit, Safa Bhar Layeb
, Amel Jaoua, Chefi Triki:
Management of Shared Customers Through Pool Collaboration in Last-Mile Transportation. 224-229 - Ahmad Alkhatib, Abeer Al Sabbagh, Randa Maraqa:
Pubic Cloud Computing: Big Three Vendors. 230-237 - Adel Ouannas
, Iqbal M. Batiha
, Amina-Aicha Khennaoui, Amjed Zraiqat
, Abeer A. Al-Nana:
Novel Control Law for the Fractional-order Chaotic Duffing Map. 238-241 - Adel Ouannas
, Iqbal M. Batiha
, Amina-Aicha Khennaoui, Iqbal H. Jebril
:
On the 0-1 Test for Chaos Applied to the Generalized Fractional-order Arnold Map. 242-245 - Elmer R. Magsino:
Investigating the Operational Dynamics of Different Transportation Modes in Vehicular Networks. 246-250 - Tibra Alsmadi, Nour Alqudah, Hassan Najadat
:
Prediction of Covid-19 patients states using Data mining techniques. 251-256 - Abdul Razzak Alshehadeh
:
The Relationship Between Liquidity Risk And Profitability In The Commercial Banks Listed In Amman Stock Exchange. 257-261 - Nesreen A. Hamad
, Maher A. Nabulsi:
Additional New Logical Identities Related to Propositional Logic. 262-267 - Fajer Almudaires, M. M. Hafizur Rahman
, Motaz Almudaires:
An Overview of Cybersecurity, Data Size and Cloud Computing in light of Saudi Arabia 2030 Vision. 268-273 - Fajer Almudaires, M. M. Hafizur Rahman, Motaz Almudaires:
A Systematic Literature Review of Software Defined Optical Network for Cloud Computing. 274-279 - Mobasshir Mahbub, Bobby Barua:
The measurements for optimal small cell base station positioning considering 5G cellular network. 280-283 - Girish Chandra, Arunabha Mukhopadhayay:
Industry Standards and Standardization: An Expert Survey on Opportunities and Challenges. 284-289 - Mohammad Almseidin, Jamil Al-Sawwa, Mouhammd Alkasassbeh:
Anomaly-based Intrusion Detection System Using Fuzzy Logic. 290-295 - Zanear Sh. Ahmed, Nigar M. Shafiq Surameery
, Rasber Dh. Rashid, Shadman Q. Salih, Hawre Kh. Abdulla:
CNN-based Transfer Learning for Covid-19 Diagnosis. 296-301 - Md. Nazmul Alam, Abu Shufian
, Riadul Islam, Md. Asraful Islam, S. M. Minhazur Rahman, Minul Khan Rahat:
Design and Implementation of Efficient Electric Vehicle with Clean Energy. 302-307 - Mohd Taib Shatnawi, Omar Shatnawi
:
An Integrated Analytical Approach to Mathematical Modelling the Stochastic Behaviour of Software Debugging Phenomenon. 308-313 - Shaima Salah Alhashim, M. M. Hafizur Rahman:
Cybersecurity Threats in Line with Awareness in Saudi Arabia. 314-319 - Zeyad Mohammad, Vincent Omollo Nyangaresi
, Ahmad Abusukhon
:
On the Security of the Standardized MQV Protocol and Its Based Evolution Protocols. 320-325 - Mohammad Hamad Allaymoun, Omer Awad Hag Hamid:
Business Intelligence Model to Analyze Social network Advertising. 326-330 - Haitham Qawaqneh
, Mohd Salmi Md Noorani, Habes Alsamir:
On fixed points results in b-multiplicative metric spaces having simulation function. 331-333 - Abdelmalek Bouguettaya
, Hafed Zarzour
, Ahmed Kechida, Amine Mohammed Taberkit
:
Recent Advances on UAV and Deep Learning for Early Crop Diseases Identification: A Short Review. 334-339 - Khaled Mustafa Aljamal, Ahmad Termimi Ab Ghani
, Rasheed Mahmood Saleh:
On preimages of the quasi-treed HNN groups. 340-343 - Hasan Dibas, Khair Eddin Sabri:
A comprehensive performance empirical study of the symmetric algorithms: AES, 3DES, Blowfish and Twofish. 344-349 - Nour Abdulhadi, Amjed A. Al-Mousa:
Diabetes Detection Using Machine Learning Classification Methods. 350-354 - Ozlem Imik Simsek, Baris Baykant Alagöz:
Daily Forecasting of Demand Orders With Optimal Architecture Artificial Neural Network Learning Models. 355-360 - Ozlem Imik Simsek, Baris Baykant Alagöz:
A Computational Intelligent Analysis Scheme for Optimal Engine Behavior by Using Artificial Neural Network Learning Models and Harris Hawk Optimization. 361-365 - Ahmad M. Manasrah
, Mohammad Z. Masoud, Yousef Jaradat
:
Short Videos, or Long Videos? A Study on the Ideal Video Length in Online Learning. 366-370 - Tibra Alsmadi, Nour Alqudah:
A Survey on malware detection techniques. 371-376 - Arar Al Tawil, Khair Eddin Sabri:
A feature selection algorithm for intrusion detection system based on Moth Flame Optimization. 377-381 - Davut Ari
, Baris Baykant Alagöz:
Modeling Daily Financial Market Data by Using Tree-Based Genetic Programming. 382-386 - Doaa M. Bamasoud, Atheer Salem Al-Dossary, Nouf Mubarak Al-Harthy, Rudaina Abdullah Al-Shomrany, Ghaida Saeed Alghamdi, Rawan Othman Algahmdi:
Privacy and Security Issues in Cloud Computing: A Survey Paper. 387-392 - Shafya Abdullah Alshahrani, Doaa M. Bamasoud:
Implementation of Software Product Line with .NET. 393-395 - Shahnaz Alkhalil, Ahmad M. Manasrah
, Mohammad Z. Masoud:
Let's Learn with a Jigsaw! Implementing a Unique Collaborative Online Learning in an Engineering Course. 396-399 - Qazawat Zirak, Dmitriy Shashev, Stanislav Shidlovskiy:
Swarm of Drones Using LoRa Flying Ad-Hoc Network. 400-405 - Fatimah Shamsulddin Abdulsattar
:
On the Effectiveness of Using Wavelet-based LBP Features for Melanoma Recognition in Dermoscopic Images. 406-411 - Ayham Shahoud, Dmitriy Shashev, Stanislav Shidlovskiy:
Design of a Navigation System Based on Scene Matching and Software in the Loop Simulation. 412-417 - Sultan Badran, Nabil Arman, Mousa Farajallah:
An Efficient Approach for Secure Data Outsourcing using Hybrid Data Partitioning. 418-423 - Süleyman Mete, Faruk Serin:
A Reinforcement Learning Approach for Disassembly Line Balancing Problem. 424-427 - Eman Karajah, Nabil Arman, Mustafa Jarrar
:
Current Trends and Approaches in Synonyms Extraction: Potential Adaptation to Arabic. 428-434 - Rafat Ashraf Joy
:
An Interpretable Catboost Model to Predict the Power of Combined Cycle Power Plants. 435-439 - Omar Almomani, Mohammed Amin Almaiah
, Adeeb Alsaaidah
, Sami Smadi
, Adel Hamdan Mohammad, Ahmad Althunibat
:
Machine Learning Classifiers for Network Intrusion Detection System: Comparative Study. 440-445 - Asif Newaz
, Sabiq Muhtadi
:
Performance Improvement of Heart Disease Prediction by Identifying Optimal Feature Sets Using Feature Selection Technique. 446-450 - Mainak Mondal
, Stanislav Shidlovskiy, Dmitriy Shashev, Moutayam Khaddour:
Non-GNSS Navigation Systems in Aerial Vehicles (Multi-rotors). 451-455 - Emre Güçlü, Ilhan Aydin, Erhan Akin:
Fuzzy PID Based Autonomous UAV Design for Railway Tracking. 456-461 - MS. Suhail Razeeth, Rkar. Kariapper, S. Sabraz Nawaz:
Accident Mitigation System with Drowsiness Detection: A Machine Learning and Iot with Hybrid Approach. 462-465 - Wadlkur Kurniawan Sedano, Muhammad Salman:
Auditing Linux Operating System with Center for Internet Security (CIS) Standard. 466-471 - William O'Keefe, Boubacar Ide, Mahmood Al-Khassaweneh
, Osama Abuomar, Piotr Szczurek:
A CNN Approach for Skin Cancer Classification. 472-475 - Mark E. Earle, Mahmood Al-Khassaweneh
:
Estimating Lung Capacity in Pulmonary Fibrosis Patients via Computerized Tomography (CT) Scan Data and Machine Learning. 476-481 - Rashidul Hasan Hridoy
, Fatema Akter, Aniruddha Rakshit
:
Computer Vision Based Skin Disorder Recognition using EfficientNet: A Transfer Learning Approach. 482-487 - Rahmeh Fawaz Ibrahim, Aseel Mohammad Elian, Mohammed Ababneh:
Illicit Account Detection in the Ethereum Blockchain Using Machine Learning. 488-493 - Anatoly A. Nazarov, Alexander N. Moiseev, Ivan Lapatin
, Svetlana Paul, Olga Lizyura
, Pavel Pristupa, Xi Peng, Li Chen, Bo Bai:
Mathematical Model of Scheduler with Semi-Markov Input and Bandwidth Sharing Discipline. 494-498 - Jamal Hussien
, Mansoor Abdullateef
, Hasan Kahtan
, Riza Sulaiman:
Revisiting Knowledge Transfer for Success Enterprise System Project. 499-504 - Jean Claude Tuyisenge, Viviane Ishimwe
, Jean Paul Iradukunda, Didacienne Mukanyiligira
:
Development of Security Starting System for Vehicles Based on IoT. 505-510 - Daniel Staegemann, Matthias Volk, Erik Lautenschläger, Matthias Pohl, Mohammad Abdallah
, Klaus Turowski:
Applying Test Driven Development in the Big Data Domain - Lessons From the Literature. 511-516 - Seham Nasr, Muhannad Quwaider, Rizwan Qureshi
:
Text-independent Speaker Recognition using Deep Neural Networks. 517-521 - Lilas Qawasmeh, Fahed Awad:
Tracking a Mobile Rouge Access Point. 522-526 - Karmel Shehadeh, Nabil Arman, Faisal Khamayseh:
Semi-Automated Classification of Arabic User Requirements into Functional and Non-Functional Requirements using NLP Tools. 527-532 - Jawad Qammar, Waqar Ahmad:
Resolution Representation Based Person Re-Identification for Smart Cities Using Deep Neural Networks (DNNs). 533-537 - Habes Alsamir, Haitham Qawaqneh
, Hassen Aydi, Wasfi A. Shatanawi:
Fixed point of ϱ - ℨ - contraction type mapping in b-metric like spaces. 538-542 - Rashidul Hasan Hridoy
, Fatema Akter, Md. Mahfuzullah, Faria Ferdowsy:
A Computer Vision Based Food Recognition Approach for Controlling Inflammation to Enhance Quality of Life of Psoriasis Patients. 543-548 - Haitham Qawaqneh
, Fadi Bani Ahmad
, Amjed Zraiqat
:
The Effect of Using Cyber Hunt Strategy on Developing the Mathematical Academic Achievement for Jordanian Universities Students. 549-552 - Mohammad Abdallah, Khalid Mohammad Jaber, Mousa Salah, Mohammad Abdul Jawad, Naji AlQbailat, Ayman M. Abdalla
:
An E-learning Portal Quality Model: from Al-Zaytoonah University Students' Perspective. 553-557 - Ahmad A. A. Alkhatib, Zeyad Mohammad, Eman M. Abu Maria:
ROAD TRAFFIC Management SOLUTIONS. 558-564 - Majid Riaz, Muhammad Majid
, Junaid Mir:
Emotion Recognition using Electroencephalography in Response to High Dynamic Range Videos. 565-570 - Samia A. Abushanap, Ayman M. Abdalla
, Abdelfatah Aref Tamimi, Shadi AlZu'bi:
A Survey of Human Face Recognition for Partial Face View. 571-576 - Amani Shatarah:
Slant Toeplitz like Operators on The Lebesgue Space of The Torus. 577-581 - Iqbal H. Jebril
, Nityagopal Biswas, Sanjib Kumar Datta
:
On the growth analysis of meromorphic solutions of finite logarithmic order of linear difference equations in the unit disc. 582-588 - Majed AbuSafiya:
A Text Search Algorithm in Compressed Text. 589-591 - Nagham A. Al-Madi, Khulood Abu Maria, Mohammad Azmi Al-Madi, Mohammad Ahmad Alia, Eman M. Abu Maria:
An Intelligent Arabic Chatbot System Proposed Framework. 592-597 - Qasem H. Makki, Ayman M. Abdalla
, Abdelfatah Aref Tamimi:
A Survey of Image Encryption Algorithms. 598-602 - Tasnim Ferdous Dima, Md. Eleas Ahmed:
Using YOLOv5 Algorithm to Detect and Recognize American Sign Language. 603-607 - Hamza Abutaleb, Abdelfatah Aref Tamimi, Thamer A. Alrawashdeh:
Empirical Study of Most Popular PHP Framework. 608-611 - Mobasshir Mahbub, Bobby Barua:
Optimal Coverage and Bandwidth-Aware Transmission Planning for Augmented Reality/Virtual Reality. 612-615 - Samar A. Said
, El Sayed M. Saad, Sameh A. Salem, Shahira M. Habashy
:
A Speculative Execution Framework for Big Data Processing Systems. 616-621 - Ayman M. Abdalla
, Iyad H. Ghaith, Abdelfatah Aref Tamimi:
Deep Learning Weather Forecasting Techniques: Literature Survey. 622-626 - Hani AlNaaji, Abdallah Qusef:
A Conceptual Framework for Representing Business Functions and Their Role in the Quality of E-Banking Services. 627-633 - Bushra Fatima, Aasim Raheel, Aamir Arsalan, Muhammad Majid
, Muhammad Ehatisham-ul-Haq, Syed Muhammad Anwar:
Gender Recognition using EEG during Mobile Game Play. 634-639 - Motaz AlMedires, Mohammed AlMaiah:
Cybersecurity in Industrial Control System (ICS). 640-647 - Hania Al Omari, Sawsan Barham, Abdallah Qusef:
Data Strategy and Its Impact on Open Government Data Quality. 648-653 - Mohammad Rasmi Al-Mousa:
Generic Proactive IoT Cybercrime Evidence Analysis Model for Digital Forensics. 654-659 - Sam Ansari
, Khawla A. Alnajjar, Saeed Abdallah, Mohamed Saad, Ali A. El-Moursy:
Parameter Tuning of MLP, RBF, and ANFIS Models Using Genetic Algorithm in Modeling and Classification Applications. 660-666 - Amin Karimi Dastgerdi
, Taghi Javdani Gandomani
:
On the Appropriate Methodologies for Data Science Projects. 667-673 - Bilal Hawashin
, Ayman Mansour
, Farshad Fotouhi, Shadi AlZu'bi, Tarek Kanan:
A Novel Recommender System Using Interest Extracting Agents and User Feedback. 674-678 - Shadi AlZu'bi, Darah Aqel, Ala Mughaid
:
Recent intelligent Approaches for Managing and Optimizing smart Blood Donation process. 679-684 - Gaith Y. Quba, Hadeel Al Qaisi, Ahmad Althunibat
, Shadi AlZu'bi:
Software Requirements Classification using Machine Learning algorithm's. 685-690 - Ala Mughaid
, Ahmed Al-Arjan, Mohammad Rasmi, Shadi AlZu'bi:
Intelligent security in the era of AI: The key vulnerability of RC4 algorithm. 691-694 - Khadija Abu Ali, Sarah Alyounis:
CyberSecurity in Healthcare Industry. 695-701 - Ali Abdullah Hassan, Mansoor Abdullateef Abdulgabber Abdulhak
, Riza Bin Sulaiman, Hasan Kahtan
:
User centric explanations: a breakthrough for explainable models. 702-707 - Abeer Abusobaih, Martin Havránek, Mansoor Abdullateef Abdulgabber
:
Unified Theory of Acceptance and Use of Technology (UTAUT) LEGO Sets in Education. 708-713 - Iyad H. Ghaith, Aseel Rawashdeh, Shadi AlZu'bi:
Transfer Learning in Data Fusion at Autonomous Driving. 714-718 - Maryam Alamer, Mohammed Amin Almaiah
:
Cybersecurity in Smart City: A Systematic Mapping Study. 719-724 - Maryam Abdulaziz Saad Bubukayr, Mohammed Amin Almaiah
:
Cybersecurity Concerns in Smart-phones and applications: A survey. 725-731 - Fajer Almudaires, Mohammed AlMaiah:
Data an Overview of Cybersecurity Threats on Credit Card Companies and Credit Card Risk Mitigation. 732-738 - Tarek Kanan
, Amani AbedAlghafer, Ghassan G. Kanaan
, Riyad Al-Shalabi, Mohammad W. Elbes, Shadi AlZu'bi:
Arabic Text Categorization: A Comparison Survey. 739-742 - Tarek Kanan, Woruod Rathi, Bilal Hawashin
:
A Comparison between Machine Learning Researches that use Arabic Text: A Case Study of Social Media Datasets. 743-747 - Mohammad A. Obeidat, Ayman M. Mansour
, Tareq Hamadneh, Jalal Abdullah:
Remotely Controlled Smart Home System using GSM and IOT. 748-753 - Md. Eleas Ahmed, Tasnim Ferdous Dima:
Using Prefix Reversals To Looplessly Generate O(1) Time Multiset Permutation By Boustrophedon Linked List. 754-757 - Mohammad Z. Masoud, Yousef Jaradat
, Ahmad M. Manasrah
, Ismael Jannoud, Mohammad Ahmad Alia
:
May I Know your IBAN? Cracking the Short Message Service (SMS) as a Second Factor Authentication for Online Payments. 758-762 - Asad Ullah, Syed Irfan Ullah, Abdul Salam:
Internal DoS Attack Detection and Prevention in Fog Computing. 763-768 - Yousef Jaradat
, Mohammad Z. Masoud, Ismael Jannoud, Ahmad M. Manasrah
, Mohammad Ahmad Alia
:
A Tutorial on Singular Value Decomposition with Applications on Image Compression and Dimensionality Reduction. 769-772 - Imad H. Tahini, Alex K. Dadykin
:
Mobile App Development Through Designing Structural Visual Method for Effective Learning Foreign Language. 773-778 - Roaa Al Nafea, Mohammed Amin Almaiah
:
Cyber Security Threats in Cloud: Literature Review. 779-786 - Moutayam Khaddour, Stanislav Shidlovskiy, Dmitriy Shashev, Mainak Mondal
:
Survey of Denoising Methods for Inertial Sensor Measurements. 787-790 - Manar Abduljabbar Ahmad Mizher, Mei Choo Ang, Siti Norul Huda Sheikh Abdullah
, Kok Weng Ng
, Ahmad A. Mazhar, Manal Abd-Aljabbar Mizher:
Passive Object-based Video Authentication Using Stereo Statistical Descriptor on Wavelet Decomposition. 791-798 - Nazmus Shakib Shadin
, Silvia Sanjana
, Nusrat Jahan Lisa:
COVID-19 Diagnosis from Chest X-ray Images Using Convolutional Neural Network(CNN) and InceptionV3. 799-804 - Dheeb Albashish, Rizik M. H. Al-Sayyed, Azizi Abdullah, Mohammad Hashem Ryalat
, Nedaa Ahmad Almansour:
Deep CNN Model based on VGG16 for Breast Cancer Classification. 805-810 - Waleed Hattawi, Sameeh Shaban, Aon Al Shawabkah, Shadi AlZu'bi:
Recent Quality Models in BigData Applications. 811-815 - Zetra Hainul Putra, Neni Hermita, Jesi Alexander Alim
, Gustimal Witri:
Prospective elementary teachers' experience with GeoGebra on the area of a triangle. 816-819 - Mohammed Mahmod Shuaib
, Osama Moh'd Alia:
Modeling Individuals Instinctive Reaction Against Dangerous Source when the Occurrence of Unexpected Contact. 820-825 - Rania Daraghmeh, Raymond Brown:
A Big Data Maturity Model for Electronic Health Records in Hospitals. 826-833 - Mahmood Alzubaidi, Dena Al-Thani:
Finding the safest path: the case of Yemen. 834-841 - Vladislav Shatravin, Dmitriy Shashev, Stanislav Shidlovskiy:
Applying the Reconfigurable Computing Environment Concept to the Deep Neural Network Accelerators Development. 842-845 - Malik Waqar Aziz, Imran Fareed Nizami, Muhammad Majid
:
Blind Quality Assessment of Super-Resolution Images using Relative Gradient Statistics of Salient and Non-salient Objects. 846-851 - Mohammed Lafi
, Thamer Alrawashed, Ahmad Munir Hammad:
Automated Test Cases Generation From Requirements Specification. 852-857 - Raneem Qaddoura, Ala' M. Al-Zoubi, Iman M. Almomani
, Hossam Faris:
Predicting Different Types of Imbalanced Intrusion Activities Based on a Multi-Stage Deep Learning Approach. 858-863 - Siham Zroug, Ikram Remadna, Laïd Kahloul, Saber Benharzallah, Labib Sadek Terrissa:
Leveraging the Power of Machine Learning for Performance Evaluation Prediction in Wireless Sensor Networks. 864-869 - Hadeel Al Qaisi, Gaith Y. Quba, Ahmad Althunibat
, Ayman M. Abdalla
, Shadi AlZu'bi:
An Intelligent Prototype for Requirements Validation Process Using Machine Learning Algorithms. 870-875 - Moh'd Khaled Yousef Shambour:
Assessing the Usability of Hajj and Umrah Websites. 876-881 - Sadhvi Mehra, Sumedha Seniaray
:
An Analysis on Abrupt Fall of Indian Stock Markets. 882-887 - Cheong Suk Fun, Zarul Fitri Zaaba, Auwal Shehu Ali
:
Usable Tourism Application: Malaysia Attraction Travel Application (MATA). 888-892 - Malak Hamad Al-Mashagbeh, Mohammad Ababneh:
Tor Detection using a Machine Learning Approach Using Correlation based Feature Selection with Best First and Random Forest. 893-898 - Krishno Dey
, Md. Mustahid Hassan, Md. Masud Rana, Mst. Hasna Hena:
Bangladeshi Indigenous Fish Classification using Convolutional Neural Networks. 899-904 - Auwal Shehu Ali
, Zarul Fitri Zaaba:
Mental Models Review for Security and Privacy Policy: An approach. 905-909 - Shams-Ul-Haq, Aasim Raheel, Muhammad Majid
:
Emotion Recognition in Response to Haptic Enhanced Multimedia Using EEG. 910-913 - Ayman M. Mansour
, Mohammad A. Obeidat:
ÓImpact of Infertility Factors on IVF Success Rate using Fuzzy Inference System. 914-918 - Sultan M. Al Khatib
:
Optimization of Path Selection and Code-Coverage in Regression Testing Using Dragonfly Algorithm. 919-923 - Viktor V. Zhukovskyy, Damon Printz, Nataliia A. Zhukovska, Maksym Hubach, Hesham Rajab:
IoT based Intelligent Information-Analytical System Architecture for Water Tank Monitoring. 924-928 - Trung T. Nguyen
:
On the Edge and Cloud: Recommendation Systems with Distributed Machine Learning. 929-934 - Baker Alhasan, Mohammad Qatawneh, Wesam Almobaideen:
Blockchain Technology for Preventing Counterfeit in Health Insurance. 935-941 - Ahmad Althunibat
, Basem Alokush, Raneem Dawood, Saeed M. Z. A. Tarabieh, Ignácio Gil-Pechuan:
Modeling the factors that influence digital economy services acceptance. 942-945 - Hiba Wasmi, Mustafa Alrifaee, Ahmad Thunibat
, Bassam Al-Mahadeen:
Comparison between proposed Convolutional Neural Network and KNN For Finger Vein and Palm Print. 946-951 - Farhan Abdel-Fattah, Fadel AlTamimi, Khalid A. Farhan:
Machine Learning and Data Mining in Cybersecurty. 952-956 - Zain Marashdeh, Khaled Suwais, Mohammad Ahmad Alia
:
A Survey on SQL Injection Attack: Detection and Challenges. 957-962 - Wassan S. Aldolimi, Adnan A. Hnaif, Mohammad Ahmad Alia
:
Light Fidelity to Transfer Secure Data Using Advanced Encryption Standard Algorithm. 963-967 - Shadi AlZu'bi, Qasem H. Makki, Yazan Abdul Ghani, Hussein Ali:
Intelligent Distribution for COVID-19 Vaccine Based on Economical Impacts. 968-973 - Geoffrey Attard, Clifford De Raffaele, Serengul Smith
:
Designing a Marker Set for Vertical Tangible User Interfaces. 974
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.