ابحاث الكلية

Name

.No

 A Review of Nonlinear Image-Denoising Techniques

1

 A simple flexible cryptosystem for meshed 3D objects and images

2

 Using Clause Slicing as Program Robustness Measurement Technique

3

Implementing the Unique Existential Quantifier in Digital Logic Design

4

Framework for Query Optimization Algorithms for Biological Data

5

A novel method for localizing a randomly distributed wireless sensor network

6

AN IMPROVED AUTHENTICATION SCHEME BASED ON GRAPHICAL PASSWORDS

7

Implementing the Unique Existential Quantifier in Digital Logic Design

8

A Proposed Virtual Private Cloud-Based Disaster Recovery Strategy

9

QUALITY EFFECTS OF USING ADVANCED TECHNOLOGIES IN LEARNING PROCESS AT UNIVERSITIES

10

AN IMPROVED AUTHENTICATION SCHEME BASED ON GRAPHICAL PASSWORDS

11

A MULTI-AGENT SYSTEM MODEL FOR CONTROLLING TRAFFIC CONGESTIONSAN IMPROVED AUTHENTICATION SCHEME BASED ON GRAPHICAL PASSWORDS 

12 

A System for the Detection and Identification of Objects and Their Distances to Aid Blind People

13

VERIFYING THE VALIDITY OF IMPLICATIONS THAT INVOLVE QUANTIFIERS USING THE SIMPLIFICATION AND LOGICAL INFERENCE METHODS

14

Methods and evaluations of decision tree algorithms on GPUS: AN OVERVIEW

15

Multiprocessing scalable string matching algorithm for network intrusion detection system

16

A New Framework Simulation for Developing and Designing a Smart Campus Application

17

PERFORMANCE EVALUATION OF A COMPUTER NETWORK IN A CLOUD COMPUTING ENVIRONMENT

18

An Efficient Cold Start Solution Based on Group Interests for Recommender Systems

19

A STRUCTURED-POPULATION HUMAN COMMUNITY BASED GENETIC ALGORITHM (HCBGA) IN A COMPARISON WITH BOTH THE STANDARD GENETIC ALGORITHM (SGA) AND THE CELLULAR GENETIC ALGORITHM (CGA)

20

DO AGENTS IN BUSINESS INFORMATION SYSTEM IS BENEFICIAL

21

A novel method for localizing a randomly distributed wireless sensor network

22

Using phase shift fingerprints and inertial measurements in support of precise localization in urban areas

23

AN IMPROVED AUTHENTICATION SCHEME BASED ON GRAPHICAL PASSWORDS

24

Proposed Simple System for Road Traffic Counting

25

Smart Agents in the Business Information System

26

Multiprocessing scalable string matching algorithm for network intrusion detection system

27

EC and Lattice Key Exchange performance study based Public-Key Cryptographic Protocols

28

Improved Steganography Scheme based on Fractal Set

29

Forest Fire Monitoring

30

7E: A PROPOSED CHANGE MANAGEMENT MODEL INTEGRATED WITH SOFTWARE DEVELOPMENT LIFECYCLE

31

An efficient hybrid similarity measure based on user interests for recommender systems

32

A Proposed Java Static Slicing Approach

33

USER ACCEPTANCE CRITERIA FOR ENTERPRISE RESOURCE PLANNING SOFTWARE SYSTEMS

34

Measuring the Acceptance of Using Enterprise Resource Planning (ERP) System in Private Jordanian Universities Using TAM Model

35

AN EMPIRICAL STUDY FOR THE CURRENT PRACTICE OF COTS SOFTWARE SELECTION IN THE JORDAN ORGANIZATIONS

36

Regression test selection model: a comparison between ReTSE and pythia

37

Towards a new framework of program quality measurement based on programming language standards

38

DYNAMIC INTRUSION DETECTION TECHNIQUE FOR DYNAMIC  MOBILE AD HOC NETWORK

39

User acceptance model of open source software: an integrated model of OSS characteristics and UTAUT

40

Looking Inside and Outside the System: Examining the Factors Influencing Distance Learners Satisfaction in Learning Management System

 41

An Automated Approach to Generate Test Cases From Use Case Description Model

42 

A Proposed Cloud Computing Quality Model: S3MQual (Service Measurement Metrics Model)

43

A Proposed Forward Clause Slicing Application

44

Inclusion And Equivalence Relations Between Absolute N¨orlund And Absolute Weighted Mean Summability Methods

45

Fast Computation of Polynomial Data Points over Simplified Face Values

46

A Certain Class of Deferred Weighted Statistical B-Suability Involving (p; q)-Integers and Analogous Approximation Theorems

47

Application of Power Series Method for Solving Obstacle Problem of Fractional Order

48

Solving Fuzzy Fractional IVPs of order 2􀟚 by Residual Power Series Algorithm

49

Geometric meaning of conformable derivative via fractional cords

50

Stability of mixed type functional equation in normed spaces using a fuzzy concept

51

Numerical solutions of linear time-fractional Klein-Gordon equation by using power series approach

52

LAGUERRE EQUATION AND FRACTIONAL LAGUERRE POLYNOMIALS

53

Conformable Fractional Bernoulli Differential Equation with Applications

54

SEEPAGE RATE FROM CERAMIC PITCHERS UNDER POSITIVE AND NEGATIVE HYDRAULIC HEAD

55

 ON THE ZEROS OF A CLASS OF BIVARIATE FIBONACCI POLYNOMIALS

56

 Analysis of Air Pollutants’ Concentration in Terms of Traffic Conditions and Road Gradient in an Urban Area

57

 ON FINDING THE EIGENVALUES OF CERTAIN TRIDIAGONAL MATRICES

58

 Minimization and Positivity of the Tonsorial Rational Bernstein Form

59

 An Active Set Method for Solving Certain Support Vector Machine Problems

60

 REDUCTION OF ORDER OF FRACTIONAL DIFFERENTIAL EQUATIONS

61

 RULED SURFACES OF FINITE II-TYPE

62

 A New Impulsive Sequential Multi-Orders Fractional Deferential Equation Involving Multipoint Fractional Integral Boundary Conditions

63

 Differential calculus on multiple products

64

 Conformable Fractional Bernoulli Differential Equation with Applications

65

 Algorithm for Bernstein Polynomial Control Design 

66

 Some Properties of Fuzzy D-Complication

67

 The Barycentric Bernstein Form for Control Design

68

 Conformable Fractional Bernoulli Differential Equation with Applications

69