Faculty Research 

.No

Name

1

 A Review of Nonlinear Image-Denoising Techniques

2

 A simple flexible cryptosystem for meshed 3D objects and images

3

 Using Clause Slicing as Program Robustness Measurement Technique

4

Implementing the Unique Existential Quantifier in Digital Logic Design

5

Framework for Query Optimization Algorithms for Biological Data

6

A novel method for localizing a randomly distributed wireless sensor network

7

AN IMPROVED AUTHENTICATION SCHEME BASED ON GRAPHICAL PASSWORDS

8

Implementing the Unique Existential Quantifier in Digital Logic Design

9

A Proposed Virtual Private Cloud-Based Disaster Recovery Strategy

10

QUALITY EFFECTS OF USING ADVANCED TECHNOLOGIES IN LEARNING PROCESS AT UNIVERSITIES

11

AN IMPROVED AUTHENTICATION SCHEME BASED ON GRAPHICAL PASSWORDS

12

A MULTI-AGENT SYSTEM MODEL FOR CONTROLLING TRAFFIC CONGESTIONSAN IMPROVED AUTHENTICATION SCHEME BASED ON GRAPHICAL PASSWORDS 

 13

A System for the Detection and Identification of Objects and Their Distances to Aid Blind People

 14

VERIFYING THE VALIDITY OF IMPLICATIONS THAT INVOLVE QUANTIFIERS USING THE SIMPLIFICATION AND LOGICAL INFERENCE METHODS

 15

Methods and evaluations of decision tree algorithms on GPUS: AN OVERVIEW

16

Multiprocessing scalable string matching algorithm for network intrusion detection system

17

A New Framework Simulation for Developing and Designing a Smart Campus Application

18

PERFORMANCE EVALUATION OF A COMPUTER NETWORK IN A CLOUD COMPUTING ENVIRONMENT

19

An Efficient Cold Start Solution Based on Group Interests for Recommender Systems

20

A STRUCTURED-POPULATION HUMAN COMMUNITY BASED GENETIC ALGORITHM (HCBGA) IN A COMPARISON WITH BOTH THE STANDARD GENETIC ALGORITHM (SGA) AND THE CELLULAR GENETIC ALGORITHM (CGA)

21

DO AGENTS IN BUSINESS INFORMATION SYSTEM IS BENEFICIAL

22

A novel method for localizing a randomly distributed wireless sensor network

23

Using phase shift fingerprints and inertial measurements in support of precise localization in urban areas

24

AN IMPROVED AUTHENTICATION SCHEME BASED ON GRAPHICAL PASSWORDS

25

Proposed Simple System for Road Traffic Counting

26

Smart Agents in the Business Information System

27

Multiprocessing scalable string matching algorithm for network intrusion detection system

28

EC and Lattice Key Exchange performance study based Public-Key Cryptographic Protocols

29

Improved Steganography Scheme based on Fractal Set

30

Forest Fire Monitoring

31

7E: A PROPOSED CHANGE MANAGEMENT MODEL INTEGRATED WITH SOFTWARE DEVELOPMENT LIFECYCLE

32

An efficient hybrid similarity measure based on user interests for recommender systems

33

A Proposed Java Static Slicing Approach

34

USER ACCEPTANCE CRITERIA FOR ENTERPRISE RESOURCE PLANNING SOFTWARE SYSTEMS

35

Measuring the Acceptance of Using Enterprise Resource Planning (ERP) System in Private Jordanian Universities Using TAM Model

36

AN EMPIRICAL STUDY FOR THE CURRENT PRACTICE OF COTS SOFTWARE SELECTION IN THE JORDAN ORGANIZATIONS

37

Regression test selection model: a comparison between ReTSE and pythia

38

Towards a new framework of program quality measurement based on programming language standards

39

DYNAMIC INTRUSION DETECTION TECHNIQUE FOR DYNAMIC  MOBILE AD HOC NETWORK

40

User acceptance model of open source software: an integrated model of OSS characteristics and UTAUT

41 

Looking Inside and Outside the System: Examining the Factors Influencing Distance Learners Satisfaction in Learning Management System

42

An Automated Approach to Generate Test Cases From Use Case Description Model

43

A Proposed Cloud Computing Quality Model: S3MQual (Service Measurement Metrics Model)

44

A Proposed Forward Clause Slicing Application

45

Inclusion And Equivalence Relations Between Absolute N¨orlund And Absolute Weighted Mean Summability Methods

46

Fast Computation of Polynomial Data Points over Simplified Face Values

47

A Certain Class of Deferred Weighted Statistical B-Suability Involving (p; q)-Integers and Analogous Approximation Theorems

48

Application of Power Series Method for Solving Obstacle Problem of Fractional Order

49

Solving Fuzzy Fractional IVPs of order 2􀟚 by Residual Power Series Algorithm

50

Geometric meaning of conformable derivative via fractional cords

51

Stability of mixed type functional equation in normed spaces using a fuzzy concept

52

Numerical solutions of linear time-fractional Klein-Gordon equation by using power series approach

53

LAGUERRE EQUATION AND FRACTIONAL LAGUERRE POLYNOMIALS

54

Conformable Fractional Bernoulli Differential Equation with Applications

55

SEEPAGE RATE FROM CERAMIC PITCHERS UNDER POSITIVE AND NEGATIVE HYDRAULIC HEAD

56

 ON THE ZEROS OF A CLASS OF BIVARIATE FIBONACCI POLYNOMIALS

57

 Analysis of Air Pollutants’ Concentration in Terms of Traffic Conditions and Road Gradient in an Urban Area

 58

ON FINDING THE EIGENVALUES OF CERTAIN TRIDIAGONAL MATRICES

 59

 Minimization and Positivity of the Tonsorial Rational Bernstein Form

 60

 An Active Set Method for Solving Certain Support Vector Machine Problems

 61

REDUCTION OF ORDER OF FRACTIONAL DIFFERENTIAL EQUATIONS

 62

RULED SURFACES OF FINITE II-TYPE

 63

A New Impulsive Sequential Multi-Orders Fractional Deferential Equation Involving Multipoint Fractional Integral Boundary Conditions

 64

Differential calculus on multiple products

 65

Conformable Fractional Bernoulli Differential Equation with Applications

 66

 Algorithm for Bernstein Polynomial Control Design 

 67

Some Properties of Fuzzy D-Complication

 68

 The Barycentric Bernstein Form for Control Design

 69

 Conformable Fractional Bernoulli Differential Equation with Applications