Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Engineering (24)
- Computer Engineering (21)
- Education (14)
- Business (7)
- Social and Behavioral Sciences (7)
-
- Arts and Humanities (6)
- Computer and Systems Architecture (6)
- Data Storage Systems (4)
- Digital Communications and Networking (3)
- Educational Assessment, Evaluation, and Research (3)
- Educational Administration and Supervision (2)
- Accounting (1)
- Applied Mathematics (1)
- Biomedical (1)
- Business Administration, Management, and Operations (1)
- Chemical Engineering (1)
- Computer Sciences (1)
- Curriculum and Instruction (1)
- Curriculum and Social Inquiry (1)
- Educational Leadership (1)
- Educational Methods (1)
- Electrical and Computer Engineering (1)
- Geography (1)
- Health Information Technology (1)
- Higher Education (1)
- Higher Education Administration (1)
- Human Geography (1)
- Mathematics (1)
- Medicine and Health Sciences (1)
- Operational Research (1)
- Keyword
-
- Cloud Computing (14)
- Cloud computing (14)
- Security (6)
- Machine Learning (5)
- Privacy (5)
-
- Internet of Things (4)
- Task scheduling (4)
- Banking (3)
- Big Data (3)
- Blockchain (3)
- Classification (3)
- Cloud Storage (3)
- Cloud computing. (3)
- Clustering (3)
- Energy consumption (3)
- Healthcare (3)
- IoT (3)
- Jordan (3)
- LEACH (3)
- WSN (3)
- Web service (3)
- Wireless sensor network (3)
- الحوسبة السحابية (3)
- Alive nodes (2)
- Artificial Neural Networks (2)
- Artificial bee colony optimization algorithm (2)
- Bayesian network (2)
- COVID-19; E-Learning; Lower usage; TAM; Blackboard system. (2)
- Cloud Computing. (2)
- Cryptocurrency (2)
- Publication Year
- Publication
-
- Applied Mathematics & Information Sciences (139)
- Information Sciences Letters (37)
- Future Computing and Informatics Journal (21)
- Journal of Statistics Applications & Probability (11)
- Journal of Engineering Research (8)
-
- Journal of the Association of Arab Universities for Research in Higher Education (مجلة اتحاد الجامعات العربية (للبحوث في التعليم العالي (8)
- An-Najah University Journal for Research - B (Humanities) (5)
- Jerash for Research and Studies Journal مجلة جرش للبحوث والدراسات (4)
- Association of Arab Universities Journal for Education and Psychology (2)
- Jordan Journal of Applied Science-Humanities Series (2)
- Jordanian Educational Journal (2)
- Palestine Technical University Research Journal (2)
- Association of Arab Universities Journal for Arts مجلة اتحاد الجامعات العربية للآداب (1)
- International Journal of Thin Film Science and Technology (1)
- Journal of the Arab American University مجلة الجامعة العربية الامريكية للبحوث (1)
Articles 1 - 30 of 244
Full-Text Articles in Entire DC Network
Effect Of User Satisfaction Between Cloud Learning Applications & University Education Agility, Nader Mohammad Aljawarneh
Effect Of User Satisfaction Between Cloud Learning Applications & University Education Agility, Nader Mohammad Aljawarneh
Journal of Statistics Applications & Probability
University agility has been a critical issue for higher education institutions, little research has focused on university agility and user satisfaction. Drawing on technology acceptance, process, and expectation theories, this paper investigates the mediating role of user satisfaction between cloud learning applications and university education agility. Variance-based structure in the northern region, results show that user satisfaction mediates the link between cloud learning applications and university agility. Implications for practice are discussed.
Performance Analysis Of Mobile Edge Computing Deployment Models In 5g Networks, Safaa Alali, Abdulkaim Assalem
Performance Analysis Of Mobile Edge Computing Deployment Models In 5g Networks, Safaa Alali, Abdulkaim Assalem
Jerash for Research and Studies Journal مجلة جرش للبحوث والدراسات
5G networks and Mobile Edge Computing (MEC) are two main pillars of the next technological revolution. The first pillar provides ultra-reliable, high-bandwidth connectivity with ultra-low latency, while the second pillar gives mobile networks cloud computing capabilities at the edge of the network, enabling compute-dense, context-aware services for mobile users. So the next generation of mobile networks will see close integration between computing and communication. Therefore, it was necessary to study the different deployment options for edge hosts in 5G network, to know the effect of those options on the overall performance of the network. In this research, (Omnetpp 6.0) network …
The Impact Of E-Learning On Faculty Members’ Performance: The Mediating Role Of Sustainable Development At Police Science Academy In Sharjah, Ghassan Alomari, Fakhri Bani Doumi, Mohammed Al-Kasasbeh, Imad Rabee, Haitham Alzoubi
The Impact Of E-Learning On Faculty Members’ Performance: The Mediating Role Of Sustainable Development At Police Science Academy In Sharjah, Ghassan Alomari, Fakhri Bani Doumi, Mohammed Al-Kasasbeh, Imad Rabee, Haitham Alzoubi
Jerash for Research and Studies Journal مجلة جرش للبحوث والدراسات
The objective of the research was to assess the influence of electronic education (e-learning) on faculty members’ performance through sustainable development at the Police Science Academy (PSA) in Sharjah.
The analysis unit of the study consisted of all full and part-time faculty members at PSA in Sharjah. Thirty-three questionnaires were distributed by Google Forms, and 30 questionnaires were retrieved. The study is explanatory, and it is quantitative in nature.
The study revealed that e-learning and its dimensions (human resources, technological infrastructure, electronic curriculum, electronic exam, electronic legislation, privacy and security, and organizational culture) are significantly associated with faculty member performance. …
Exploring Code Vulnerabilities Through Code Reviews: An Empirical Study On Openstack Nova, Taleb Fahmawi, Ahmad Nabot, Issam Jebreen, Ahmad Al-Qerem
Exploring Code Vulnerabilities Through Code Reviews: An Empirical Study On Openstack Nova, Taleb Fahmawi, Ahmad Nabot, Issam Jebreen, Ahmad Al-Qerem
Journal of Statistics Applications & Probability
Effective code review is a critical aspect of software quality assurance, requiring a meticulous examination of code snippets to identify weaknesses and other quality issues. Unfortunately, the biggest threat to software quality is developers’ disregard for code-writing standards, which leads to code smells. Despite their importance, code smells are not always identified during code review, creating a need for an empirical study to uncover vulnerabilities in code reviews. This study aimed to explore vulnerabilities in code reviews by examining the OpenStack project, Nova. After analyzing 4873 review comments, we identified 187 comments related to possible vulnerabilities, and a pilot study …
Blockchain Technology Trends In Different Sectors: A Review, Afaf M. Bugawa
Blockchain Technology Trends In Different Sectors: A Review, Afaf M. Bugawa
Journal of Statistics Applications & Probability
Purpose: Currency transactions between companies or people are often controlled and characterized by third- party organizations. To make any such transaction or set up any digital payment transaction, a credit card company or bank acts as a middleman who helps to complete the transaction. The service provider charges a fee for this. Such transaction systems tend to be centralized, as the information involved in the process is managed and controlled by a third party, not the transacting parties. Blockchain technology innovates upon the transaction mechanism because it helps decentralize the environment by eliminating the third party in the transaction process. …
Cloud Services Selection On The Base Of Decision Support System, Berik Akhmetov, Lyazzat Atymtayeva, Yevheniy Nikitenko, Valery Lakhno, Bakhytzhan Akhmetov, Bagdat Yagaliyeva
Cloud Services Selection On The Base Of Decision Support System, Berik Akhmetov, Lyazzat Atymtayeva, Yevheniy Nikitenko, Valery Lakhno, Bakhytzhan Akhmetov, Bagdat Yagaliyeva
Information Sciences Letters
Recently, enterprises are increasingly using cloud services for efficient work, including decision making. This paper proposes a non-classical version of the Decision Support System (DSS), which provides the choice of the best IT service when migrating an enterprise to a cloud environment. This should increase the efficiency of management decisions in the development of an enterprise’s IT strategy. We have studied the problems of effective implementation of a cloud IT environment in an enterprise (organization), considering information security (IS) risks. At the same time, we have proposed modern approaches to the development of models for the migration of enterprises (organizations) …
Fintech Security Challenges In The Financial Services Industry: A Systematic Literature Review (2018-2022), Afaf Bugawa, Manar Baher, Mohamed Al Zayani
Fintech Security Challenges In The Financial Services Industry: A Systematic Literature Review (2018-2022), Afaf Bugawa, Manar Baher, Mohamed Al Zayani
Information Sciences Letters
Over the past year, financial technology (Fintech) has attracted more and more attention to practice and research. The emergence of financial technology is one of the major modifications to the financial environment caused by technical breakthroughs and the global financial crisis. Studies of financial technology have recently expanded into a number of areas, to the practical side. In addition to helping the Financial Services Industry enhance security, a clear understanding of uses of the fintech ecosystem will be instrumental in developing the most popular and secure fintech application. In order to identify topics for the financial technology research agenda, this …
Improved Henry Gas Optimization For Predicting High-Income Factors, S. El-Gazzar, H. Abdel-Kader, A. Haroon
Improved Henry Gas Optimization For Predicting High-Income Factors, S. El-Gazzar, H. Abdel-Kader, A. Haroon
Information Sciences Letters
The Henry gas solubility optimization (HGSO) is a meta-heuristic algorithm based on Henry’s law. In this paper, β–hill climbing operator is introduced to enhance the ability of the local search, which improves the shortcoming of the original HGSO algorithm. The improved Henry gas solubility optimization algorithm (βHC-HGSO) is based on the β -hill climbing local search, which is used for selecting a subset of relevant features for high income to improve the classification accuracy. The random forest (RF) expert system was employed to explain the performance of the proposed algorithm. According to empirical research, the performance of the improved Henry …
The Reality Of Smart Tourism Applications In The City Of Aqaba According To The Perspective Of Local Tourists: Case Study, Fesail Albahrat, Nidal Alzboun, Hamzah Khawaldah
The Reality Of Smart Tourism Applications In The City Of Aqaba According To The Perspective Of Local Tourists: Case Study, Fesail Albahrat, Nidal Alzboun, Hamzah Khawaldah
An-Najah University Journal for Research - B (Humanities)
The study aimed to identify the characteristics of the tourist movement of tourists who use tourist applications in the city of Aqaba, and to know the tourist motives of tourists who use these smart applications, in addition to knowing the challenges and obstacles facing tourists while using smart applications in the study area. To achieve the objectives of the study, an electronic questionnaire was designed and distributed to a random sample of Jordanian tourists who use smart tourism applications in the city of Aqaba using social media. The results of the study showed a high percentage of males in the …
Website Phishing Detection Using Machine Learning Techniques, R. Alazaidah, A. Al-Shaikh, M. R. Al-Mousa, H. Khafajah, G. Samara, M. Alzyoud
Website Phishing Detection Using Machine Learning Techniques, R. Alazaidah, A. Al-Shaikh, M. R. Al-Mousa, H. Khafajah, G. Samara, M. Alzyoud
Journal of Statistics Applications & Probability
Phishing is a cybercrime that is constantly increasing in the recent years due to the increased use of the Internet and its applications. It is one of the most common types of social engineering that aims to disclose or steel users sensitive or personal information. In this paper, two main objectives are considered. The first is to identify the best classifier that can detect phishing among twenty-four different classifiers that represent six learning strategies. The second objective aims to identify the best feature selection method for websites phishing datasets. Using two datasets that are related to Phishing with different characteristics …
Challenges Of Cloud Computing In Jordanian Govt.: Insights From Telcos, Issam Jebreen, Mouath Alqaisi, Ahmad Al-Qerem, Amer Abu Salem
Challenges Of Cloud Computing In Jordanian Govt.: Insights From Telcos, Issam Jebreen, Mouath Alqaisi, Ahmad Al-Qerem, Amer Abu Salem
Journal of Statistics Applications & Probability
Cloud computing offers many benefits to governments, including increased efficiency, flexibility, and cost savings. However, there are also significant challenges to adopting cloud computing services. In the case of the Jordanian government, some of these challenges include concerns about data security and privacy, lack of technical expertise, limited funding and resources, and cultural resistance to change. This paper examines the challenges faced by the Jordanian government in adopting cloud computing services and evaluates their impact on government institutions. The study collected data from three local telecommunications companies in Jordan to identify potential challenges and assess their significance through a questionnaire. …
Development Of A Secure Model For Mobile Government Applications In Jordan, Ala’A Saeb Al-Sherideh, Roesnita Ismail, Mohammad Rasmi Al-Mousa, Khaled Al-Qawasmi, Alaa Al-Shaikh, Hebatullah Awwad
Development Of A Secure Model For Mobile Government Applications In Jordan, Ala’A Saeb Al-Sherideh, Roesnita Ismail, Mohammad Rasmi Al-Mousa, Khaled Al-Qawasmi, Alaa Al-Shaikh, Hebatullah Awwad
Journal of Statistics Applications & Probability
This paper develops a secure model for mobile government (M-G) applications using effective privacy methods and validates the model through semi-structured interviews with eight Jordanian e-government experts. The experts emphasized the importance of M-G applications in enhancing services such as bill payments, civil services, civil defense, and police services. To improve privacy, the experts suggested methods such as strong textual passwords, data encryption, login tracking, SMS login confirmation, and signup confirmation. Based on these suggestions, a prototype with suggested privacy features was developed using Android programming, and a questionnaire was administered to 150 Jordanian citizens who confirmed the ease of …
فاعلية تطبيق التحول الرقمي ممارسة للحوكمة الرقمية دراسة استطالعية في المصارف األهلية في محافظة بغداد, Ahmad Ali Salih, Lamia Salah El-Din El-Salihi, Azzam Abou-Moghli
فاعلية تطبيق التحول الرقمي ممارسة للحوكمة الرقمية دراسة استطالعية في المصارف األهلية في محافظة بغداد, Ahmad Ali Salih, Lamia Salah El-Din El-Salihi, Azzam Abou-Moghli
Journal of the Association of Arab Universities for Research in Higher Education (مجلة اتحاد الجامعات العربية (للبحوث في التعليم العالي
هدف المقال تحري فاعلية تطبيق التحول الرقمي في المصارف العراقية، تألف مجتمع الدراسة من )5000( فرد من شاغلي الوظائف اإلدارية، سحبت منه عينة بالطريقة العشوائية الطبقية المتساوية، بمجموع كلي )406( استمارة إال ان االستبانات المعادة والصالحة للتحليل كانت )197( استبانة وتشكل نسبة )%49( من مجموع االستمارات الموزعة، واعتمدت االستبانة أداة رئيسة في جمع البيانات واستخدمت وسائل اإلحصاء الوصفي )الوسط الحسابي، واالنحراف المعياري، واختبار t )في تحليل البيانات . أظهرت نتائج الدراسة ان مستوى التحّول الرقمي جاء متوسطا ًبشكل عام، وهذا ما يشير إلى أن المصارف األهلية العراقية تهتم بجانب فاعلية عمليات التفاعل االجتماعي بمستوى
متوسط بحيث أن المصرف يمتلك خبرات …
درجة امتالك طلبة الجامعات األردنية لمهارات الثقافة الرقمية في ضوء مهارات القرن الحادي والعشرين من وجهة نظرهم, Insaf Mohammed Abdeldaem, Mohammad Mahmoud Al Hileh Prof., Shaden Mohammed Abdeldaem
درجة امتالك طلبة الجامعات األردنية لمهارات الثقافة الرقمية في ضوء مهارات القرن الحادي والعشرين من وجهة نظرهم, Insaf Mohammed Abdeldaem, Mohammad Mahmoud Al Hileh Prof., Shaden Mohammed Abdeldaem
Journal of the Association of Arab Universities for Research in Higher Education (مجلة اتحاد الجامعات العربية (للبحوث في التعليم العالي
هدف المقال قياس درجة امتالك طلبة الجامعات األردنية لمهارات الثقافة الرقمية في ضوء مهارات القرن الحادي والعشرين من وجهة نظرهم، واتبعت الباحثة المنهج الوصفي للتحقق من هدف الدراسة، وتألفت عينة الدراسة من )395( طالبا وطالبة من طلبة الجامعات األردنية الحكومية والخاصة في ً المملكة األردنية الهاشمية، حيث طبقت عليهم أداة االستبانة التي تكونت من )37( فقرة توزعت على ثالثة مجاالت على النحو التالي: )مهارات الثقافة المعلوماتية، مهارات ثقافة وسائل اإلعالم، مهارات ثقافة تكنولوجيا المعلومات واالتصاالت(. وأظهرت نتائج الدراسة ما يلي: بلغت درجة امتالك طلبة الجامعات األردنية لمهارات الثقافة المعلوماتية وثقافة وسائل اإلعالم بدرجة مرتفعة، وبلغت درجة امتالك لمهارات ثقافة تكنولوجيا …
أثر تكاليف المحاسبة السحابية على األداء المالي في البنوك األردنية, Rana Mohammed Amin Habayeb, Asmaa Ibrahim Alamarneh
أثر تكاليف المحاسبة السحابية على األداء المالي في البنوك األردنية, Rana Mohammed Amin Habayeb, Asmaa Ibrahim Alamarneh
Journal of the Association of Arab Universities for Research in Higher Education (مجلة اتحاد الجامعات العربية (للبحوث في التعليم العالي
هدف المقال التعرف إلى دور المنصات التعليمية اإللكترونية في تعزيز هدف المقال التعرف الى تأثير تكاليف المحاسبة السحابية تخدمت في هذه الدراسة
على األداء المالي للبنوك األردنية. اسُ التكاليف المباشرة وغير المباشرة التي انفقت على البرامج تخدمت والتطبيقات كمؤشر لتطبيق المحاسبة السحابية، واسُ مؤشرات العائد على األصول والعائد على حقوق الملكية وهامش الربح الصافي وهامش الربح اإلجمالي كمؤشرات لألداء المالي للبنوك عينة الدراسة. وتم تحديد حجم البنك ونسبة الرافعة المالية ونسبة السيولة كمتغيرات ضابطة. تم جمع البيانات المتعلقة بهذه بن تجارًيا و3 ًك بن أردنًيا، بما في ذلك 13 ا ًك المتغيرات من 16 ا بنوك إسالمية، خالل الفترة من …
أثر استخدام التطبيقات الحاسوبية على تنمية المفاهيم العلمية لمساقات إدارة الكوارث والأزمات لدى طلبة البكالوريوس بالجامعات الأردنية, Saad Kamal Hakouz, Mohammad Habib Samkari Middle East University, Jordan
أثر استخدام التطبيقات الحاسوبية على تنمية المفاهيم العلمية لمساقات إدارة الكوارث والأزمات لدى طلبة البكالوريوس بالجامعات الأردنية, Saad Kamal Hakouz, Mohammad Habib Samkari Middle East University, Jordan
Journal of the Association of Arab Universities for Research in Higher Education (مجلة اتحاد الجامعات العربية (للبحوث في التعليم العالي
هدف المقال إلى معرفة "أثر استخدام التطبيقات الحاسوبية على تنمية المفاهيم العلمية لمساقات إدارة الكوارث والأزمات لدى طلبة البكالوريوس بالجامعات الأردنية"، وكذلك معرفة الصعوبات التي واجهت الطلبة في استخدام التطبيقات الحاسوبية، ولتحقيق الهدف من الدراسة،ـ تم الإستناد على المنهج المختلط، ولقد استخدمت الدراسة الإختبار التحصيلي لتنمية المفاهيم العلمية واستبانة الأسئلة المفتوحة لبيان الصعوبات، وتكونت عينة الدراسة من طلبة البكالوريوس في مادة التطبيقات الحاسوبية وعددهم (26) طالباً، ومن أبرز النتائج التي توصلت لها الدراسة وجود أثر لاستخدام التطبيقات الحاسوبية على تنمية المفاهيم العلمية، ولقد كان رضا الطلبة عن استخدام التطبيقات بدرجة متوسطة، ولقد كانت أبرز الصعوبات التي واجهت الطلبة هو الحاجة …
A Tiered Approach To Markov Models When Future Events Are Not Independent Of The Past: An Application In Web Analytics, Judah Soobramoney, Retius Chifurira, Knowledge Chinhamu, Temesgen Zewotir
A Tiered Approach To Markov Models When Future Events Are Not Independent Of The Past: An Application In Web Analytics, Judah Soobramoney, Retius Chifurira, Knowledge Chinhamu, Temesgen Zewotir
Journal of Statistics Applications & Probability
The internet has become a digital marketplace that offers goods and services globally. Thereby, compelling enterprises to optimize their websites and online strategies. This paper sought to employ Markov chain models to predict the most likely next webpage viewed. A website comprises several pages (such as “Home”, “About-Us”) and visitors would transition from one page to another by clicking on respective links. The study was conducted on the website of a South African engineering and engineering training company “TEKmation”. The transition probabilities therefore represent the likelihood of moving to a certain webpage, given that the visitor is on a specific …
Strategic Fit And Its Impact On Business Continuity Management: The Mediating Role Of Strategic Agility In Jordanian Commercial Banks, Shereen Al-Nimri, Khaled Al-Shawabkeh
Strategic Fit And Its Impact On Business Continuity Management: The Mediating Role Of Strategic Agility In Jordanian Commercial Banks, Shereen Al-Nimri, Khaled Al-Shawabkeh
Jordan Journal of Applied Science-Humanities Series
This study aimed to identify the impact of f strategic fit on business continuity management in Jordanian commercial banks with the mediating role of strategic agility, the study used sampling strategy by selecting an appropriate sample from the study population; the descriptive analytical approach was used, through the development of (a questionnaire) as a main tool for data collection. This study was applied to a sample of (254) managers, and multiple regression analysis and simple regression analysis were adopted.
The study results indicated that there is a statistically Significant impact of strategic fit with its dimensions in business continuity management …
The Degree Of Using Cloud Computing Applications In The E-Learning Environment And Its Obstacles For Secondary School Students In The Capital Amman Governorate From The Point View Of Their Teachers, Rehab Ibrahim, Fawaz Shehadeh
The Degree Of Using Cloud Computing Applications In The E-Learning Environment And Its Obstacles For Secondary School Students In The Capital Amman Governorate From The Point View Of Their Teachers, Rehab Ibrahim, Fawaz Shehadeh
Jordan Journal of Applied Science-Humanities Series
This study aimed to reveal the degree of use of cloud computing applications in the e-learning environment and the obstacles facing secondary school students in the Capital Governorate of Amman from the point of view of their teachers. The study adopted the descriptive survey method, and to collect data, a questionnaire was developed in the form of a scale consisting of (30) items, consisting of two parts, the first to measure the degree of use of cloud computing applications in the e-learning environment for secondary school students in the Amman governorate, and the second to measure the obstacles of cloud …
Path Planning For A 6 Dof Robotic Arm Based On Whale Optimization Algorithm And Genetic Algorithm, Mahmoud A. A. Mousa, Abdelrahman Tarek Elgohr, Hatem Khater
Path Planning For A 6 Dof Robotic Arm Based On Whale Optimization Algorithm And Genetic Algorithm, Mahmoud A. A. Mousa, Abdelrahman Tarek Elgohr, Hatem Khater
Journal of Engineering Research
The trajectory planning for robotic arms is a significant area of research, given its role in facilitating seamless trajectory execution and enhancing movement efficiency and accuracy. This paper focuses on the development of path planning algorithms for a robotic arm with six degrees of freedom. Specifically, three alternative approaches are explored: polynomial (cubic and quantic), Whale Optimization Algorithm (WOA), and Genetic Algorithm (GA). The comparison of outcomes between different methods revealed that polynomial methods were found to be more straightforward to implement, albeit constrained by the intricacy of the pathway. Upon examining the functioning of the WOA, it has been …
Path Planning For A 6 Dof Robotic Arm Based On Whale Optimization Algorithm And Genetic Algorithm, Mahmoud A. A. Mousa, Abdelrahman Tarek Elgohr, Hatem Khater
Path Planning For A 6 Dof Robotic Arm Based On Whale Optimization Algorithm And Genetic Algorithm, Mahmoud A. A. Mousa, Abdelrahman Tarek Elgohr, Hatem Khater
Journal of Engineering Research
The trajectory planning for robotic arms is a significant area of research, given its role in facilitating seamless trajectory execution and enhancing movement efficiency and accuracy. This paper focuses on the development of path planning algorithms for a robotic arm with six degrees of freedom. Specifically, three alternative approaches are explored: polynomial (cubic and quantic), Whale Optimization Algorithm (WOA), and Genetic Algorithm (GA). The comparison of outcomes between different methods revealed that polynomial methods were found to be more straightforward to implement, albeit constrained by the intricacy of the pathway. Upon examining the functioning of the WOA, it has been …
Authentication Solutions In Industrial Internet Of Things: A Survey, Noura S. Aldossary, Rachid Zagrouba
Authentication Solutions In Industrial Internet Of Things: A Survey, Noura S. Aldossary, Rachid Zagrouba
Applied Mathematics & Information Sciences
With the rapid growth of industry 4.0, the Industrial Internet of Things (IIoT) is considered to be a promising solution for converting normal operations to ‘smart’ operations in industrial sectors and systems. The well-known characteristics of IIoT has greatly improved the productivity and quality of many industrial sectors. IIoT allows the connectivity of many industrial smart devices such as, sensors, actuators and gateways. The connectivity feature makes this critical environment vulnerable to various cybersecurity attacks. Subsequently, maintaining the security of IIoT sys-tems remains a challenge to ensure their success. In particular, authenticating the connected IIoT devices is a must to …
Conveyor Belt Object Identification: Mathematical, Algorithmic, And Software Support, Vladyslav V. Yevsieiev, Igor S. Nevliudov, Svitlana S. Maksymova, Murad A. O. Omarov, Oleksandr M. Klymenko
Conveyor Belt Object Identification: Mathematical, Algorithmic, And Software Support, Vladyslav V. Yevsieiev, Igor S. Nevliudov, Svitlana S. Maksymova, Murad A. O. Omarov, Oleksandr M. Klymenko
Applied Mathematics & Information Sciences
This article is devoted to the development of a package identification system on a mixed conveyor sorting line with a vertical lift from Kapelou. In the conditions of modern Warehouse 4.0 systems requirements, a tasks number arise associated with automatic objects sorting in real time. One of the most common is QR codes using, as it is the most cost- effective. But the introduction of automated systems for identifying objects on a conveyor line based on QR codes causes a number of tasks that are associated with the dynamic parameters of identifying the location of the package in the recognition …
Data Mining In Internet Of Things Systems: A Literature Review, Amany M. Sarhan
Data Mining In Internet Of Things Systems: A Literature Review, Amany M. Sarhan
Journal of Engineering Research
The Internet of Things (IoT) and cloud technologies have been the main focus of recent research, allowing for the accumulation of a vast amount of data generated from this diverse environment. These data include without any doubt priceless knowledge if could correctly discovered and correlated in an efficient manner. Data mining algorithms can be applied to the Internet of Things (IoT) to extract hidden information from the massive amounts of data that are generated by IoT and are thought to have high business value. In this paper, the most important data mining approaches covering classification, clustering, association analysis, time series …
Deeplab V3+ Based Semantic Segmentation Of Covid -19 Lesions In Computed Tomography Images, Merihan Mohamed Abdalwahab Eissa Abdalwahab, Sameh Napoleon, Amira S. Ashour
Deeplab V3+ Based Semantic Segmentation Of Covid -19 Lesions In Computed Tomography Images, Merihan Mohamed Abdalwahab Eissa Abdalwahab, Sameh Napoleon, Amira S. Ashour
Journal of Engineering Research
Abstract- Coronavirus 2019 spreads rapidly worldwide causing a global epidemic. Early detection and diagnosis of COVID-19 is critical for treatment as it causes respiratory syndrome appears in the chest medical images, such as computed tomography (CT) images, and X-ray images. The CT images are more sensitive and have more details compared to the X-ray images. Thus, automated segmentation plays an imperative role in detecting, diagnosing, and determining the spreading of COVID-19. In this paper, the DeepLabV3+ combined with MobileNet-V2 model was implemented. To validate this combination, we conducted a comparative study between the DeepLabV3+ variants by its combination with MobileNet-V2 …
التقنيات الرقمية لإحكام الجداول الزمنية لمشاريع التشييد تحليل مبنى على المراجعات الأدبية للإتجاهات والتحديات Digital Technologies To Enhance Construction Schedules Literature-Based Analysis For Trends And Challenges, Ahmed Ahmed Omar M.S. Mostafa, Solyman Elgar Allah
التقنيات الرقمية لإحكام الجداول الزمنية لمشاريع التشييد تحليل مبنى على المراجعات الأدبية للإتجاهات والتحديات Digital Technologies To Enhance Construction Schedules Literature-Based Analysis For Trends And Challenges, Ahmed Ahmed Omar M.S. Mostafa, Solyman Elgar Allah
Journal of Engineering Research
على الرغم من الجهود الكبيرة التي تبذلها الجهات الحكومية السعودية لتجنب تأخير وتعثر مشاريع التشييد، الا ان أغلب الدراسات المعاصرة أظهرت أنه مازال هناك نسبة كبيرة من المشاريع متأخرة ومتعثرة نتيجة لعوامل متعددة منها ضعف إعداد الجدول الزمني للمشروع، وذلك على الرغم من توافر العديد من التقنيات الرقمية التي يمكنها دعم تطوير وإحكام هذه الجداول لتحقيق أهداف المشاريع، وهو ما يمثل الإشكالية الرئيسية لهذه الدراسة التي تستهدف دراسة الإتجاهات المعاصرة للتقنيات الرقمية ذات العلاقة بالجداول الزمنية لمشاريع التشييد، والتحديات التي تواجه تطبيقها، والوصول إلى إطار لتوظيفها في إحكام الجداول الزمنية لمشاريع التشييد. ولتحقيق هذه الأهداف تبنت الدراسة المنهج البحثي الوصفي …
التقنيات الرقمية لإحكام الجداول الزمنية لمشاريع التشييد تحليل مبنى على المراجعات الأدبية للإتجاهات والتحديات Digital Technologies To Enhance Construction Schedules Literature-Based Analysis For Trends And Challenges, Ahmed Ahmed Omar M.S. Mostafa, Solyman Elgar Allah
التقنيات الرقمية لإحكام الجداول الزمنية لمشاريع التشييد تحليل مبنى على المراجعات الأدبية للإتجاهات والتحديات Digital Technologies To Enhance Construction Schedules Literature-Based Analysis For Trends And Challenges, Ahmed Ahmed Omar M.S. Mostafa, Solyman Elgar Allah
Journal of Engineering Research
على الرغم من الجهود الكبيرة التي تبذلها الجهات الحكومية السعودية لتجنب تأخير وتعثر مشاريع التشييد، الا ان أغلب الدراسات المعاصرة أظهرت أنه مازال هناك نسبة كبيرة من المشاريع متأخرة ومتعثرة نتيجة لعوامل متعددة منها ضعف إعداد الجدول الزمني للمشروع، وذلك على الرغم من توافر العديد من التقنيات الرقمية التي يمكنها دعم تطوير وإحكام هذه الجداول لتحقيق أهداف المشاريع، وهو ما يمثل الإشكالية الرئيسية لهذه الدراسة التي تستهدف دراسة الإتجاهات المعاصرة للتقنيات الرقمية ذات العلاقة بالجداول الزمنية لمشاريع التشييد، والتحديات التي تواجه تطبيقها، والوصول إلى إطار لتوظيفها في إحكام الجداول الزمنية لمشاريع التشييد. ولتحقيق هذه الأهداف تبنت الدراسة المنهج البحثي الوصفي …
On Boosting Integrated Wlan & Zigbee Network Performance Via Load Balancing, Shahinaz Elkasrawy
On Boosting Integrated Wlan & Zigbee Network Performance Via Load Balancing, Shahinaz Elkasrawy
Journal of Engineering Research
Network traffic and overload are constantly increasing. This situation leads to congestion and packet losses at bottlenecks and across the different parts and devices of the network. Luckily, network technologies and techniques are developing rapidly. This paper is dedicated to applying and testing the impact of load balancing mechanisms on network performance. Two networking scenarios are considered: "server on-premise" and "server on cloud ."The research takes place in a vast scale network where two of the most popular technologies are spotted in an integrated multiprotocol scenario of Wireless Area networks (WLAN) with the Internet of Things (IoT) ZigBee. Previous studies …
The Effect Of Using Nanotechnology In Construction Processes Applied By Bim, Azza Haggag
The Effect Of Using Nanotechnology In Construction Processes Applied By Bim, Azza Haggag
Journal of Engineering Research
Artificial intelligence, programming, and cloud computing are the focus of attention and direction for students and workers in various applications of science these days. BIM is an example of one of these applications in the field of the construction industry. It has a great revolutionary impact on professionals' way of work, strategy of cooperation between construction parties, and business management. It is a practical approach that can manage the construction projects' life cycle activities and be used by the Architecture, Engineering, and Construction specialists (AEC) to ensure the projects' excellent quality, reduce cost, and facilitate communication among different contractors. And …
Jordanian Women’S Perceptions Of Using Social Media: Advantages And Drawbacks, Reema Sleit, Muhannad Al-Shboul
Jordanian Women’S Perceptions Of Using Social Media: Advantages And Drawbacks, Reema Sleit, Muhannad Al-Shboul
Information Sciences Letters
The main objective of this research is to consider the impact of social networking sites on Jordanian women, taking into account many factors such as social status, income, education, and others. A questionnaire was designed with seventy-three criteria varying between five basic economic, political, scientific, cultural, and social domains. The results ranged from the use of social networking sites for shopping, communicating with friends, and raising the level of culture and awareness. On the other hand, communication sites negatively affect women, as some women believe that they waste time and money, and there were no significant differences according to any …