Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Association of Arab Universities

Discipline
Keyword
Publication Year
Publication

Articles 1 - 30 of 244

Full-Text Articles in Entire DC Network

Effect Of User Satisfaction Between Cloud Learning Applications & University Education Agility, Nader Mohammad Aljawarneh May 2024

Effect Of User Satisfaction Between Cloud Learning Applications & University Education Agility, Nader Mohammad Aljawarneh

Journal of Statistics Applications & Probability

University agility has been a critical issue for higher education institutions, little research has focused on university agility and user satisfaction. Drawing on technology acceptance, process, and expectation theories, this paper investigates the mediating role of user satisfaction between cloud learning applications and university education agility. Variance-based structure in the northern region, results show that user satisfaction mediates the link between cloud learning applications and university agility. Implications for practice are discussed.


Performance Analysis Of Mobile Edge Computing Deployment Models In 5g Networks, Safaa Alali, Abdulkaim Assalem Mar 2024

Performance Analysis Of Mobile Edge Computing Deployment Models In 5g Networks, Safaa Alali, Abdulkaim Assalem

Jerash for Research and Studies Journal مجلة جرش للبحوث والدراسات

5G networks and Mobile Edge Computing (MEC) are two main pillars of the next technological revolution. The first pillar provides ultra-reliable, high-bandwidth connectivity with ultra-low latency, while the second pillar gives mobile networks cloud computing capabilities at the edge of the network, enabling compute-dense, context-aware services for mobile users. So the next generation of mobile networks will see close integration between computing and communication. Therefore, it was necessary to study the different deployment options for edge hosts in 5G network, to know the effect of those options on the overall performance of the network. In this research, (Omnetpp 6.0) network …


The Impact Of E-Learning On Faculty Members’ Performance: The Mediating Role Of Sustainable Development At Police Science Academy In Sharjah, Ghassan Alomari, Fakhri Bani Doumi, Mohammed Al-Kasasbeh, Imad Rabee, Haitham Alzoubi Mar 2024

The Impact Of E-Learning On Faculty Members’ Performance: The Mediating Role Of Sustainable Development At Police Science Academy In Sharjah, Ghassan Alomari, Fakhri Bani Doumi, Mohammed Al-Kasasbeh, Imad Rabee, Haitham Alzoubi

Jerash for Research and Studies Journal مجلة جرش للبحوث والدراسات

The objective of the research was to assess the influence of electronic education (e-learning) on faculty members’ performance through sustainable development at the Police Science Academy (PSA) in Sharjah.

The analysis unit of the study consisted of all full and part-time faculty members at PSA in Sharjah. Thirty-three questionnaires were distributed by Google Forms, and 30 questionnaires were retrieved. The study is explanatory, and it is quantitative in nature.

The study revealed that e-learning and its dimensions (human resources, technological infrastructure, electronic curriculum, electronic exam, electronic legislation, privacy and security, and organizational culture) are significantly associated with faculty member performance. …


Exploring Code Vulnerabilities Through Code Reviews: An Empirical Study On Openstack Nova, Taleb Fahmawi, Ahmad Nabot, Issam Jebreen, Ahmad Al-Qerem Mar 2024

Exploring Code Vulnerabilities Through Code Reviews: An Empirical Study On Openstack Nova, Taleb Fahmawi, Ahmad Nabot, Issam Jebreen, Ahmad Al-Qerem

Journal of Statistics Applications & Probability

Effective code review is a critical aspect of software quality assurance, requiring a meticulous examination of code snippets to identify weaknesses and other quality issues. Unfortunately, the biggest threat to software quality is developers’ disregard for code-writing standards, which leads to code smells. Despite their importance, code smells are not always identified during code review, creating a need for an empirical study to uncover vulnerabilities in code reviews. This study aimed to explore vulnerabilities in code reviews by examining the OpenStack project, Nova. After analyzing 4873 review comments, we identified 187 comments related to possible vulnerabilities, and a pilot study …


Blockchain Technology Trends In Different Sectors: A Review, Afaf M. Bugawa Mar 2024

Blockchain Technology Trends In Different Sectors: A Review, Afaf M. Bugawa

Journal of Statistics Applications & Probability

Purpose: Currency transactions between companies or people are often controlled and characterized by third- party organizations. To make any such transaction or set up any digital payment transaction, a credit card company or bank acts as a middleman who helps to complete the transaction. The service provider charges a fee for this. Such transaction systems tend to be centralized, as the information involved in the process is managed and controlled by a third party, not the transacting parties. Blockchain technology innovates upon the transaction mechanism because it helps decentralize the environment by eliminating the third party in the transaction process. …


Cloud Services Selection On The Base Of Decision Support System, Berik Akhmetov, Lyazzat Atymtayeva, Yevheniy Nikitenko, Valery Lakhno, Bakhytzhan Akhmetov, Bagdat Yagaliyeva Jan 2024

Cloud Services Selection On The Base Of Decision Support System, Berik Akhmetov, Lyazzat Atymtayeva, Yevheniy Nikitenko, Valery Lakhno, Bakhytzhan Akhmetov, Bagdat Yagaliyeva

Information Sciences Letters

Recently, enterprises are increasingly using cloud services for efficient work, including decision making. This paper proposes a non-classical version of the Decision Support System (DSS), which provides the choice of the best IT service when migrating an enterprise to a cloud environment. This should increase the efficiency of management decisions in the development of an enterprise’s IT strategy. We have studied the problems of effective implementation of a cloud IT environment in an enterprise (organization), considering information security (IS) risks. At the same time, we have proposed modern approaches to the development of models for the migration of enterprises (organizations) …


Fintech Security Challenges In The Financial Services Industry: A Systematic Literature Review (2018-2022), Afaf Bugawa, Manar Baher, Mohamed Al Zayani Jan 2024

Fintech Security Challenges In The Financial Services Industry: A Systematic Literature Review (2018-2022), Afaf Bugawa, Manar Baher, Mohamed Al Zayani

Information Sciences Letters

Over the past year, financial technology (Fintech) has attracted more and more attention to practice and research. The emergence of financial technology is one of the major modifications to the financial environment caused by technical breakthroughs and the global financial crisis. Studies of financial technology have recently expanded into a number of areas, to the practical side. In addition to helping the Financial Services Industry enhance security, a clear understanding of uses of the fintech ecosystem will be instrumental in developing the most popular and secure fintech application. In order to identify topics for the financial technology research agenda, this …


Improved Henry Gas Optimization For Predicting High-Income Factors, S. El-Gazzar, H. Abdel-Kader, A. Haroon Jan 2024

Improved Henry Gas Optimization For Predicting High-Income Factors, S. El-Gazzar, H. Abdel-Kader, A. Haroon

Information Sciences Letters

The Henry gas solubility optimization (HGSO) is a meta-heuristic algorithm based on Henry’s law. In this paper, β–hill climbing operator is introduced to enhance the ability of the local search, which improves the shortcoming of the original HGSO algorithm. The improved Henry gas solubility optimization algorithm (βHC-HGSO) is based on the β -hill climbing local search, which is used for selecting a subset of relevant features for high income to improve the classification accuracy. The random forest (RF) expert system was employed to explain the performance of the proposed algorithm. According to empirical research, the performance of the improved Henry …


The Reality Of Smart Tourism Applications In The City Of Aqaba According To The Perspective Of Local Tourists: Case Study, Fesail Albahrat, Nidal Alzboun, Hamzah Khawaldah Jan 2024

The Reality Of Smart Tourism Applications In The City Of Aqaba According To The Perspective Of Local Tourists: Case Study, Fesail Albahrat, Nidal Alzboun, Hamzah Khawaldah

An-Najah University Journal for Research - B (Humanities)

The study aimed to identify the characteristics of the tourist movement of tourists who use tourist applications in the city of Aqaba, and to know the tourist motives of tourists who use these smart applications, in addition to knowing the challenges and obstacles facing tourists while using smart applications in the study area. To achieve the objectives of the study, an electronic questionnaire was designed and distributed to a random sample of Jordanian tourists who use smart tourism applications in the city of Aqaba using social media. The results of the study showed a high percentage of males in the …


Website Phishing Detection Using Machine Learning Techniques, R. Alazaidah, A. Al-Shaikh, M. R. Al-Mousa, H. Khafajah, G. Samara, M. Alzyoud Jan 2024

Website Phishing Detection Using Machine Learning Techniques, R. Alazaidah, A. Al-Shaikh, M. R. Al-Mousa, H. Khafajah, G. Samara, M. Alzyoud

Journal of Statistics Applications & Probability

Phishing is a cybercrime that is constantly increasing in the recent years due to the increased use of the Internet and its applications. It is one of the most common types of social engineering that aims to disclose or steel users sensitive or personal information. In this paper, two main objectives are considered. The first is to identify the best classifier that can detect phishing among twenty-four different classifiers that represent six learning strategies. The second objective aims to identify the best feature selection method for websites phishing datasets. Using two datasets that are related to Phishing with different characteristics …


Challenges Of Cloud Computing In Jordanian Govt.: Insights From Telcos, Issam Jebreen, Mouath Alqaisi, Ahmad Al-Qerem, Amer Abu Salem Jan 2024

Challenges Of Cloud Computing In Jordanian Govt.: Insights From Telcos, Issam Jebreen, Mouath Alqaisi, Ahmad Al-Qerem, Amer Abu Salem

Journal of Statistics Applications & Probability

Cloud computing offers many benefits to governments, including increased efficiency, flexibility, and cost savings. However, there are also significant challenges to adopting cloud computing services. In the case of the Jordanian government, some of these challenges include concerns about data security and privacy, lack of technical expertise, limited funding and resources, and cultural resistance to change. This paper examines the challenges faced by the Jordanian government in adopting cloud computing services and evaluates their impact on government institutions. The study collected data from three local telecommunications companies in Jordan to identify potential challenges and assess their significance through a questionnaire. …


Development Of A Secure Model For Mobile Government Applications In Jordan, Ala’A Saeb Al-Sherideh, Roesnita Ismail, Mohammad Rasmi Al-Mousa, Khaled Al-Qawasmi, Alaa Al-Shaikh, Hebatullah Awwad Jan 2024

Development Of A Secure Model For Mobile Government Applications In Jordan, Ala’A Saeb Al-Sherideh, Roesnita Ismail, Mohammad Rasmi Al-Mousa, Khaled Al-Qawasmi, Alaa Al-Shaikh, Hebatullah Awwad

Journal of Statistics Applications & Probability

This paper develops a secure model for mobile government (M-G) applications using effective privacy methods and validates the model through semi-structured interviews with eight Jordanian e-government experts. The experts emphasized the importance of M-G applications in enhancing services such as bill payments, civil services, civil defense, and police services. To improve privacy, the experts suggested methods such as strong textual passwords, data encryption, login tracking, SMS login confirmation, and signup confirmation. Based on these suggestions, a prototype with suggested privacy features was developed using Android programming, and a questionnaire was administered to 150 Jordanian citizens who confirmed the ease of …


فاعلية تطبيق التحول الرقمي ممارسة للحوكمة الرقمية دراسة استطالعية في المصارف األهلية في محافظة بغداد, Ahmad Ali Salih, Lamia Salah El-Din El-Salihi, Azzam Abou-Moghli Dec 2023

فاعلية تطبيق التحول الرقمي ممارسة للحوكمة الرقمية دراسة استطالعية في المصارف األهلية في محافظة بغداد, Ahmad Ali Salih, Lamia Salah El-Din El-Salihi, Azzam Abou-Moghli

Journal of the Association of Arab Universities for Research in Higher Education (مجلة اتحاد الجامعات العربية (للبحوث في التعليم العالي

هدف المقال تحري فاعلية تطبيق التحول الرقمي في المصارف العراقية، تألف مجتمع الدراسة من )5000( فرد من شاغلي الوظائف اإلدارية، سحبت منه عينة بالطريقة العشوائية الطبقية المتساوية، بمجموع كلي )406( استمارة إال ان االستبانات المعادة والصالحة للتحليل كانت )197( استبانة وتشكل نسبة )%49( من مجموع االستمارات الموزعة، واعتمدت االستبانة أداة رئيسة في جمع البيانات واستخدمت وسائل اإلحصاء الوصفي )الوسط الحسابي، واالنحراف المعياري، واختبار t )في تحليل البيانات . أظهرت نتائج الدراسة ان مستوى التحّول الرقمي جاء متوسطا ًبشكل عام، وهذا ما يشير إلى أن المصارف األهلية العراقية تهتم بجانب فاعلية عمليات التفاعل االجتماعي بمستوى

متوسط بحيث أن المصرف يمتلك خبرات …


درجة امتالك طلبة الجامعات األردنية لمهارات الثقافة الرقمية في ضوء مهارات القرن الحادي والعشرين من وجهة نظرهم, Insaf Mohammed Abdeldaem, Mohammad Mahmoud Al Hileh Prof., Shaden Mohammed Abdeldaem Dec 2023

درجة امتالك طلبة الجامعات األردنية لمهارات الثقافة الرقمية في ضوء مهارات القرن الحادي والعشرين من وجهة نظرهم, Insaf Mohammed Abdeldaem, Mohammad Mahmoud Al Hileh Prof., Shaden Mohammed Abdeldaem

Journal of the Association of Arab Universities for Research in Higher Education (مجلة اتحاد الجامعات العربية (للبحوث في التعليم العالي

هدف المقال قياس درجة امتالك طلبة الجامعات األردنية لمهارات الثقافة الرقمية في ضوء مهارات القرن الحادي والعشرين من وجهة نظرهم، واتبعت الباحثة المنهج الوصفي للتحقق من هدف الدراسة، وتألفت عينة الدراسة من )395( طالبا وطالبة من طلبة الجامعات األردنية الحكومية والخاصة في ً المملكة األردنية الهاشمية، حيث طبقت عليهم أداة االستبانة التي تكونت من )37( فقرة توزعت على ثالثة مجاالت على النحو التالي: )مهارات الثقافة المعلوماتية، مهارات ثقافة وسائل اإلعالم، مهارات ثقافة تكنولوجيا المعلومات واالتصاالت(. وأظهرت نتائج الدراسة ما يلي: بلغت درجة امتالك طلبة الجامعات األردنية لمهارات الثقافة المعلوماتية وثقافة وسائل اإلعالم بدرجة مرتفعة، وبلغت درجة امتالك لمهارات ثقافة تكنولوجيا …


أثر تكاليف المحاسبة السحابية على األداء المالي في البنوك األردنية, Rana Mohammed Amin Habayeb, Asmaa Ibrahim Alamarneh Dec 2023

أثر تكاليف المحاسبة السحابية على األداء المالي في البنوك األردنية, Rana Mohammed Amin Habayeb, Asmaa Ibrahim Alamarneh

Journal of the Association of Arab Universities for Research in Higher Education (مجلة اتحاد الجامعات العربية (للبحوث في التعليم العالي

هدف المقال التعرف إلى دور المنصات التعليمية اإللكترونية في تعزيز هدف المقال التعرف الى تأثير تكاليف المحاسبة السحابية تخدمت في هذه الدراسة

على األداء المالي للبنوك األردنية. اسُ التكاليف المباشرة وغير المباشرة التي انفقت على البرامج تخدمت والتطبيقات كمؤشر لتطبيق المحاسبة السحابية، واسُ مؤشرات العائد على األصول والعائد على حقوق الملكية وهامش الربح الصافي وهامش الربح اإلجمالي كمؤشرات لألداء المالي للبنوك عينة الدراسة. وتم تحديد حجم البنك ونسبة الرافعة المالية ونسبة السيولة كمتغيرات ضابطة. تم جمع البيانات المتعلقة بهذه بن تجارًيا و3 ًك بن أردنًيا، بما في ذلك 13 ا ًك المتغيرات من 16 ا بنوك إسالمية، خالل الفترة من …


أثر استخدام التطبيقات الحاسوبية على تنمية المفاهيم العلمية لمساقات إدارة الكوارث والأزمات لدى طلبة البكالوريوس بالجامعات الأردنية, Saad Kamal Hakouz, Mohammad Habib Samkari Middle East University, Jordan Dec 2023

أثر استخدام التطبيقات الحاسوبية على تنمية المفاهيم العلمية لمساقات إدارة الكوارث والأزمات لدى طلبة البكالوريوس بالجامعات الأردنية, Saad Kamal Hakouz, Mohammad Habib Samkari Middle East University, Jordan

Journal of the Association of Arab Universities for Research in Higher Education (مجلة اتحاد الجامعات العربية (للبحوث في التعليم العالي

هدف المقال إلى معرفة "أثر استخدام التطبيقات الحاسوبية على تنمية المفاهيم العلمية لمساقات إدارة الكوارث والأزمات لدى طلبة البكالوريوس بالجامعات الأردنية"، وكذلك معرفة الصعوبات التي واجهت الطلبة في استخدام التطبيقات الحاسوبية، ولتحقيق الهدف من الدراسة،ـ تم الإستناد على المنهج المختلط، ولقد استخدمت الدراسة الإختبار التحصيلي لتنمية المفاهيم العلمية واستبانة الأسئلة المفتوحة لبيان الصعوبات، وتكونت عينة الدراسة من طلبة البكالوريوس في مادة التطبيقات الحاسوبية وعددهم (26) طالباً، ومن أبرز النتائج التي توصلت لها الدراسة وجود أثر لاستخدام التطبيقات الحاسوبية على تنمية المفاهيم العلمية، ولقد كان رضا الطلبة عن استخدام التطبيقات بدرجة متوسطة، ولقد كانت أبرز الصعوبات التي واجهت الطلبة هو الحاجة …


A Tiered Approach To Markov Models When Future Events Are Not Independent Of The Past: An Application In Web Analytics, Judah Soobramoney, Retius Chifurira, Knowledge Chinhamu, Temesgen Zewotir Dec 2023

A Tiered Approach To Markov Models When Future Events Are Not Independent Of The Past: An Application In Web Analytics, Judah Soobramoney, Retius Chifurira, Knowledge Chinhamu, Temesgen Zewotir

Journal of Statistics Applications & Probability

The internet has become a digital marketplace that offers goods and services globally. Thereby, compelling enterprises to optimize their websites and online strategies. This paper sought to employ Markov chain models to predict the most likely next webpage viewed. A website comprises several pages (such as “Home”, “About-Us”) and visitors would transition from one page to another by clicking on respective links. The study was conducted on the website of a South African engineering and engineering training company “TEKmation”. The transition probabilities therefore represent the likelihood of moving to a certain webpage, given that the visitor is on a specific …


Strategic Fit And Its Impact On Business Continuity Management: The Mediating Role Of Strategic Agility In Jordanian Commercial Banks, Shereen Al-Nimri, Khaled Al-Shawabkeh Nov 2023

Strategic Fit And Its Impact On Business Continuity Management: The Mediating Role Of Strategic Agility In Jordanian Commercial Banks, Shereen Al-Nimri, Khaled Al-Shawabkeh

Jordan Journal of Applied Science-Humanities Series

This study aimed to identify the impact of f strategic fit on business continuity management in Jordanian commercial banks with the mediating role of strategic agility, the study used sampling strategy by selecting an appropriate sample from the study population; the descriptive analytical approach was used, through the development of (a questionnaire) as a main tool for data collection. This study was applied to a sample of (254) managers, and multiple regression analysis and simple regression analysis were adopted.

The study results indicated that there is a statistically Significant impact of strategic fit with its dimensions in business continuity management …


The Degree Of Using Cloud Computing Applications In The E-Learning Environment And Its Obstacles For Secondary School Students In The Capital Amman Governorate From The Point View Of Their Teachers, Rehab Ibrahim, Fawaz Shehadeh Nov 2023

The Degree Of Using Cloud Computing Applications In The E-Learning Environment And Its Obstacles For Secondary School Students In The Capital Amman Governorate From The Point View Of Their Teachers, Rehab Ibrahim, Fawaz Shehadeh

Jordan Journal of Applied Science-Humanities Series

This study aimed to reveal the degree of use of cloud computing applications in the e-learning environment and the obstacles facing secondary school students in the Capital Governorate of Amman from the point of view of their teachers. The study adopted the descriptive survey method, and to collect data, a questionnaire was developed in the form of a scale consisting of (30) items, consisting of two parts, the first to measure the degree of use of cloud computing applications in the e-learning environment for secondary school students in the Amman governorate, and the second to measure the obstacles of cloud …


Path Planning For A 6 Dof Robotic Arm Based On Whale Optimization Algorithm And Genetic Algorithm, Mahmoud A. A. Mousa, Abdelrahman Tarek Elgohr, Hatem Khater Nov 2023

Path Planning For A 6 Dof Robotic Arm Based On Whale Optimization Algorithm And Genetic Algorithm, Mahmoud A. A. Mousa, Abdelrahman Tarek Elgohr, Hatem Khater

Journal of Engineering Research

The trajectory planning for robotic arms is a significant area of research, given its role in facilitating seamless trajectory execution and enhancing movement efficiency and accuracy. This paper focuses on the development of path planning algorithms for a robotic arm with six degrees of freedom. Specifically, three alternative approaches are explored: polynomial (cubic and quantic), Whale Optimization Algorithm (WOA), and Genetic Algorithm (GA). The comparison of outcomes between different methods revealed that polynomial methods were found to be more straightforward to implement, albeit constrained by the intricacy of the pathway. Upon examining the functioning of the WOA, it has been …


Path Planning For A 6 Dof Robotic Arm Based On Whale Optimization Algorithm And Genetic Algorithm, Mahmoud A. A. Mousa, Abdelrahman Tarek Elgohr, Hatem Khater Nov 2023

Path Planning For A 6 Dof Robotic Arm Based On Whale Optimization Algorithm And Genetic Algorithm, Mahmoud A. A. Mousa, Abdelrahman Tarek Elgohr, Hatem Khater

Journal of Engineering Research

The trajectory planning for robotic arms is a significant area of research, given its role in facilitating seamless trajectory execution and enhancing movement efficiency and accuracy. This paper focuses on the development of path planning algorithms for a robotic arm with six degrees of freedom. Specifically, three alternative approaches are explored: polynomial (cubic and quantic), Whale Optimization Algorithm (WOA), and Genetic Algorithm (GA). The comparison of outcomes between different methods revealed that polynomial methods were found to be more straightforward to implement, albeit constrained by the intricacy of the pathway. Upon examining the functioning of the WOA, it has been …


Authentication Solutions In Industrial Internet Of Things: A Survey, Noura S. Aldossary, Rachid Zagrouba Nov 2023

Authentication Solutions In Industrial Internet Of Things: A Survey, Noura S. Aldossary, Rachid Zagrouba

Applied Mathematics & Information Sciences

With the rapid growth of industry 4.0, the Industrial Internet of Things (IIoT) is considered to be a promising solution for converting normal operations to ‘smart’ operations in industrial sectors and systems. The well-known characteristics of IIoT has greatly improved the productivity and quality of many industrial sectors. IIoT allows the connectivity of many industrial smart devices such as, sensors, actuators and gateways. The connectivity feature makes this critical environment vulnerable to various cybersecurity attacks. Subsequently, maintaining the security of IIoT sys-tems remains a challenge to ensure their success. In particular, authenticating the connected IIoT devices is a must to …


Conveyor Belt Object Identification: Mathematical, Algorithmic, And Software Support, Vladyslav V. Yevsieiev, Igor S. Nevliudov, Svitlana S. Maksymova, Murad A. O. Omarov, Oleksandr M. Klymenko Nov 2023

Conveyor Belt Object Identification: Mathematical, Algorithmic, And Software Support, Vladyslav V. Yevsieiev, Igor S. Nevliudov, Svitlana S. Maksymova, Murad A. O. Omarov, Oleksandr M. Klymenko

Applied Mathematics & Information Sciences

This article is devoted to the development of a package identification system on a mixed conveyor sorting line with a vertical lift from Kapelou. In the conditions of modern Warehouse 4.0 systems requirements, a tasks number arise associated with automatic objects sorting in real time. One of the most common is QR codes using, as it is the most cost- effective. But the introduction of automated systems for identifying objects on a conveyor line based on QR codes causes a number of tasks that are associated with the dynamic parameters of identifying the location of the package in the recognition …


Data Mining In Internet Of Things Systems: A Literature Review, Amany M. Sarhan Oct 2023

Data Mining In Internet Of Things Systems: A Literature Review, Amany M. Sarhan

Journal of Engineering Research

The Internet of Things (IoT) and cloud technologies have been the main focus of recent research, allowing for the accumulation of a vast amount of data generated from this diverse environment. These data include without any doubt priceless knowledge if could correctly discovered and correlated in an efficient manner. Data mining algorithms can be applied to the Internet of Things (IoT) to extract hidden information from the massive amounts of data that are generated by IoT and are thought to have high business value. In this paper, the most important data mining approaches covering classification, clustering, association analysis, time series …


Deeplab V3+ Based Semantic Segmentation Of Covid -19 Lesions In Computed Tomography Images, Merihan Mohamed Abdalwahab Eissa Abdalwahab, Sameh Napoleon, Amira S. Ashour Oct 2023

Deeplab V3+ Based Semantic Segmentation Of Covid -19 Lesions In Computed Tomography Images, Merihan Mohamed Abdalwahab Eissa Abdalwahab, Sameh Napoleon, Amira S. Ashour

Journal of Engineering Research

Abstract- Coronavirus 2019 spreads rapidly worldwide causing a global epidemic. Early detection and diagnosis of COVID-19 is critical for treatment as it causes respiratory syndrome appears in the chest medical images, such as computed tomography (CT) images, and X-ray images. The CT images are more sensitive and have more details compared to the X-ray images. Thus, automated segmentation plays an imperative role in detecting, diagnosing, and determining the spreading of COVID-19. In this paper, the DeepLabV3+ combined with MobileNet-V2 model was implemented. To validate this combination, we conducted a comparative study between the DeepLabV3+ variants by its combination with MobileNet-V2 …


التقنيات الرقمية لإحكام الجداول الزمنية لمشاريع التشييد تحليل مبنى على المراجعات الأدبية للإتجاهات والتحديات Digital Technologies To Enhance Construction Schedules Literature-Based Analysis For Trends And Challenges, Ahmed Ahmed Omar M.S. Mostafa, Solyman Elgar Allah Oct 2023

التقنيات الرقمية لإحكام الجداول الزمنية لمشاريع التشييد تحليل مبنى على المراجعات الأدبية للإتجاهات والتحديات Digital Technologies To Enhance Construction Schedules Literature-Based Analysis For Trends And Challenges, Ahmed Ahmed Omar M.S. Mostafa, Solyman Elgar Allah

Journal of Engineering Research

على الرغم من الجهود الكبيرة التي تبذلها الجهات الحكومية السعودية لتجنب تأخير وتعثر مشاريع التشييد، الا ان أغلب الدراسات المعاصرة أظهرت أنه مازال هناك نسبة كبيرة من المشاريع متأخرة ومتعثرة نتيجة لعوامل متعددة منها ضعف إعداد الجدول الزمني للمشروع، وذلك على الرغم من توافر العديد من التقنيات الرقمية التي يمكنها دعم تطوير وإحكام هذه الجداول لتحقيق أهداف المشاريع، وهو ما يمثل الإشكالية الرئيسية لهذه الدراسة التي تستهدف دراسة الإتجاهات المعاصرة للتقنيات الرقمية ذات العلاقة بالجداول الزمنية لمشاريع التشييد، والتحديات التي تواجه تطبيقها، والوصول إلى إطار لتوظيفها في إحكام الجداول الزمنية لمشاريع التشييد. ولتحقيق هذه الأهداف تبنت الدراسة المنهج البحثي الوصفي …


التقنيات الرقمية لإحكام الجداول الزمنية لمشاريع التشييد تحليل مبنى على المراجعات الأدبية للإتجاهات والتحديات Digital Technologies To Enhance Construction Schedules Literature-Based Analysis For Trends And Challenges, Ahmed Ahmed Omar M.S. Mostafa, Solyman Elgar Allah Oct 2023

التقنيات الرقمية لإحكام الجداول الزمنية لمشاريع التشييد تحليل مبنى على المراجعات الأدبية للإتجاهات والتحديات Digital Technologies To Enhance Construction Schedules Literature-Based Analysis For Trends And Challenges, Ahmed Ahmed Omar M.S. Mostafa, Solyman Elgar Allah

Journal of Engineering Research

على الرغم من الجهود الكبيرة التي تبذلها الجهات الحكومية السعودية لتجنب تأخير وتعثر مشاريع التشييد، الا ان أغلب الدراسات المعاصرة أظهرت أنه مازال هناك نسبة كبيرة من المشاريع متأخرة ومتعثرة نتيجة لعوامل متعددة منها ضعف إعداد الجدول الزمني للمشروع، وذلك على الرغم من توافر العديد من التقنيات الرقمية التي يمكنها دعم تطوير وإحكام هذه الجداول لتحقيق أهداف المشاريع، وهو ما يمثل الإشكالية الرئيسية لهذه الدراسة التي تستهدف دراسة الإتجاهات المعاصرة للتقنيات الرقمية ذات العلاقة بالجداول الزمنية لمشاريع التشييد، والتحديات التي تواجه تطبيقها، والوصول إلى إطار لتوظيفها في إحكام الجداول الزمنية لمشاريع التشييد. ولتحقيق هذه الأهداف تبنت الدراسة المنهج البحثي الوصفي …


On Boosting Integrated Wlan & Zigbee Network Performance Via Load Balancing, Shahinaz Elkasrawy Oct 2023

On Boosting Integrated Wlan & Zigbee Network Performance Via Load Balancing, Shahinaz Elkasrawy

Journal of Engineering Research

Network traffic and overload are constantly increasing. This situation leads to congestion and packet losses at bottlenecks and across the different parts and devices of the network. Luckily, network technologies and techniques are developing rapidly. This paper is dedicated to applying and testing the impact of load balancing mechanisms on network performance. Two networking scenarios are considered: "server on-premise" and "server on cloud ."The research takes place in a vast scale network where two of the most popular technologies are spotted in an integrated multiprotocol scenario of Wireless Area networks (WLAN) with the Internet of Things (IoT) ZigBee. Previous studies …


The Effect Of Using Nanotechnology In Construction Processes Applied By Bim, Azza Haggag Oct 2023

The Effect Of Using Nanotechnology In Construction Processes Applied By Bim, Azza Haggag

Journal of Engineering Research

Artificial intelligence, programming, and cloud computing are the focus of attention and direction for students and workers in various applications of science these days. BIM is an example of one of these applications in the field of the construction industry. It has a great revolutionary impact on professionals' way of work, strategy of cooperation between construction parties, and business management. It is a practical approach that can manage the construction projects' life cycle activities and be used by the Architecture, Engineering, and Construction specialists (AEC) to ensure the projects' excellent quality, reduce cost, and facilitate communication among different contractors. And …


Jordanian Women’S Perceptions Of Using Social Media: Advantages And Drawbacks, Reema Sleit, Muhannad Al-Shboul Oct 2023

Jordanian Women’S Perceptions Of Using Social Media: Advantages And Drawbacks, Reema Sleit, Muhannad Al-Shboul

Information Sciences Letters

The main objective of this research is to consider the impact of social networking sites on Jordanian women, taking into account many factors such as social status, income, education, and others. A questionnaire was designed with seventy-three criteria varying between five basic economic, political, scientific, cultural, and social domains. The results ranged from the use of social networking sites for shopping, communicating with friends, and raising the level of culture and awareness. On the other hand, communication sites negatively affect women, as some women believe that they waste time and money, and there were no significant differences according to any …