Mohammad Muhairat
About University
Al-Zaytoonah Private University of Jordan (henceforth, Al-Zaytoonah) was established in 1993 after receiving its license and general accreditation by Decision No. 848 on March 6, 1993. Instruction began on September 6, 1993, and since then Al-Zaytoonah has witnessed ... Read more
Academic & Administrative Staff
There are 300 faculty members of various ranks distributed among the six faculties of the University, and 80 teaching and research assistants and lab technicians. In addition, there are 210 administrative employees and 260 workers.

Al Zaytoonah University of Jordan

Blog

A NEW REVERSE ENGINEERING APPROACH TO CONVERT FORM FILL FORMAT DOCUMENT INTO UML CLASS DIAGRAM

Abstract

This paper propose a new reverse engineering approach to convert a form fill format document into a set of related tables that can be used to generate the entity relationship  diagram. A relationship between the set of tables is generated. In addition, the entity relationship diagram will be converted into a UML class diagram. However, this approach will be very helpful for researchers and practitioners in Software Engineering field, since most of the reverse engineering approaches are based on source code. This approach is tested by using several word form fill format documents and the results show a high accuracy rates comparing with the forward engineering.

The Analytical Hierarchy Process as a Tool to Select Open Source Software

Abstract: – Due to a high number of open source software over the internet, it is a challenge to determine which one –
over a verity of alternatives – is the most appropriate for our intended needs. In this paper, the Analytical Hierarchy
Process (AHP) technique along with the ISO 9126 will be integrated and applied to the selection process of open
source software products. Thus, the intended features (i.e. the ISO 9126 quality characteristics) need to be identified in
order to be taken into account to give a set of ranks for the intended open source software, that is, ‘rank one’ will be
given to the most appropriate open source software product based on its intended features against the other alternatives
of open source software products.

An Approach to Derive the Use Case Diagrams from an Event Table

Abstract:- Building the use-case diagram is a very important task since it represents a transition between the
requirements and design phases. However, building such diagram is a time consuming process and needs a
complete understanding of the requirements. In this paper, we introduce an approach to derive use case
diagrams from an event table. This new approach will facilitate and speed the generation process of the use
case diagrams. However, this approach will completely depends on the availability of a comprehensive event
table which to be built from the available requirements.

Classification of Software Testing Tools Based on the Software Testing Methods

Abstract
During the software development life cycle,
testing is highly needed to assure the
quality of the software process and product.
For many years, researchers and
practitioners came-up with a variety of
software tools to automate the testing
process.
In this paper, we will classify and distribute
a set of testing tools over the types
of testing (testing methods) for three
types of software products (web application,
application software, and network
protocol). However, the outcomes of this
classification are dedicated to the researchers
and practitioners in software
testing to know which types of testing
have no or limited automated tools.

Evaluating the Quality of Software in ERP Systems Using the ISO 9126 Model

Abstract This paper presents the quality model of enterprise resource planning (ERP) systems by
adapting the ISO9126 standard. This model is used to verify that whether the implementation of ERP
systems will succeed or fail in higher educational institutions. Six quality characteristics are suggested to
be minimum requirements for creating the quality model of ERP systems, including functionality,
reliability, usability, efficiency, maintainability, and portability of ERP systems. The quality
characteristics could not be measured directly. Thus in this study, they are divided into twenty seven subcharacteristics.

FACTORS AFFECTING ACCEPTANCE OF WEB-BASED TRAINING SYSTEM: USING EXTENDED UTAUT AND STRUCTURAL EQUATION MODELING

ABSTRACT
Advancement in information system leads organizations to apply e-learning system to train their employees
in order to enhance its performance. In this respect, applying web based training will enable the
organization to train their employees quickly, efficiently and effectively anywhere at any time. This
research aims to extend Unified Theory of Acceptance and Use Technology (UTAUT) using some factors
such flexibility of web based training system, system interactivity and system enjoyment, in order to explain
the employees’ intention to use web based training system. A total of 290 employees have participated in
this study. The findings of the study revealed that performance expectancy, facilitating conditions, social
influence and system flexibility have direct effect on the employees’ intention to use web based training
system, while effort expectancy, system enjoyment and system interactivity have indirect effect on
employees’ intention to use the system.

Fault Detection and Isolation in Dynamic Systems using Statistical Local Approach and Hybrid Least Squares Algorithm

Abstract: A fault detection and isolation (FDI) scheme for dynamic system proposed. This study deals
with the design of discrete-time linear system using delta operator approach and the hybrid least
squares (HLS) algorithm. A third residual generation based on statistical local approach and the
derivative of the normalized residual on a small temporal window investigated. This new technique
meets the desired FDI performance specifications by increasing the faults magnitude and decreasing
the noise effects. Some simulation results were provided to evaluate the design.

DEA-RTA: A Dynamic Encryption Algorithm for the Real-Time Applications

Abstract— The Internet and it is applications are hungry for high
level of Quality of Service (QoS), and most of the Internet
applications seek to minimize packets delay, especially, the Real-
Time Applications (RTA). QoS is considered as a major issue in the
Internet, where RTA services like IPTelephony and XoIP become a
successful business in the world, call distribution may result in big
money loss, for this reason researchers put their efforts to build
applications that can deal with different levels of QoS. In addition to
the basic QoS some customers ask to preserve confidentiality which
makes it more complicated and may result in higher delay time.
Delay is very complex issue specially in RTA, and it consists of
many types of delays, such as, Packetization delay (sampling, coderdecoder
(codec),compression and encryption), and end-to-end delay
(processing, queuing, serialization and propagation delays), our
research try to achieve better encryption delay at the user machine
CPU level while maintain confidentiality. The proposed algorithm is
a new symmetric encryption technique that allows users to choose
using new different key for each single packet if they wish. The
encryption key is flexible in length, the plain text is flexible in size,
the encryption process is very simple, the transposition table is
simple too, the shifted transposition table is easy to initiate and
complex to regenerate. These properties results in better encryption
delay while maintaining confidentiality, the algorithm is 15 times
faster and 10 times faster than AES algorithm.

Constructing a New Communication System by Integrating the GSM to the Satellites Infrastructure

Abstract: – The current researches and industries are looking forward to integrate different technologies to get a
global technology that offers all of the intended services in a simple way. In this paper, a new communications
system is proposed to integrate the use of GSM over the available satellites infrastructures. The proposed
communications system could be used to facilitates and get benefits of both systems (the GSM and Satellites)
to achieve competitive services over the world. The proposed system is concentrated on a global
communications system that served all over the world and gives some specialization and privacy for each
country. Furthermore, this paper shows an algorithm on how to implement the GSM over satellite systems in an
efficient, flexible, and cost-effective manner.

Innovative Algorithms for the Header Processing Transition from IPv4 to IPv6 and Vice Versa

Abstract: The huge numbers of computers, devices and networks that connected to the Internet in the networking industry,
that require more address space, better Quality of Services support, greater security, and an increasing number of media types
and Internet-capable devices have all contributed to drive the development of new IPv6 protocol. The major importance
during the development of IPv6 has been how to do the transition away from IPv4 towards IPv6 and vice versa. The work on
transition strategies, tools, and mechanisms has been part of the basic IPv6 design effort from the beginning. The transition
process from the current IPv4 to the future IPv6 is probably one of the most important subjects during the next generation
protocols. This paper reviews the basics of IPv4 and IPv6 headers, and the methods for managing the transformation between
IPv4 and IPv6. The proposed algorithms deal with header processing transformation transition between IPv4/IPv6 and vice
versa depending on the bi-directional identification and recognition processes of the two distinct headers.

Contact

Please don’t hesitate to contact me for more information about my work.

Tel: +962-6-4291511
Fax: +962-6-4291432

No more, where are you going?

Go back to top or use the menu to your left to navigate.

Thanks for downloading!

Top