Follow

Submissions from 2020

PDF

Using Data Analytics to Filter Insincere Posts from Online Social Networks. A case study: Quora Insincere Questions, Mohammad A. Al-Ramahi and Izzat Alsmadi

Submissions from 2017

PDF

Online Integrity and Authentication Checking for Quran Electronic Versions, Izzat M. Alsmadi and M. Zarour

PDF

Evaluating Network Test Scenarios for Network Simulators Systems, A. Zarrad and Izzat M. Alsmadi

Submissions from 2016

PDF

Experimental Comparison of Simulation Tools for Efficient Cloud and Mobile Cloud Computing Applications, K. Bahwaireth, Lo'ai A. Tawalbeh, E. Benkhelifa, Y. Jararweh, and M. A. Tawalbeh

PDF

Greener and Smarter Phones for Future Cities: Characterizing the Impact of GPS Signal Strength on Power Consumption, Lo'ai A. Tawalbeh, A. Basalamah, R. Mehmood, and H. Tawalbeh

PDF

Mobile Cloud Computing Model and Big Data Analysis for Healthcare Applications, Lo'ai A. Tawalbeh, R. Mehmood, E. Benkhlifa, and H. Song

Submissions from 2015

PDF

Evaluation of Spam Impact on Arabic Websites Popularity, M. N. Al-Kabi, Izzat M. Alsmadi, and H. A. Wahsheh

PDF

A Novel Root Based Arabic Stemmer, M. N. Al-Kabi, S. A. Kazakzeh, B. M. Abu Ata, S. A. Al-Rababah, and Izzat M. Alsmadi

PDF

Clustering and Classification of Email Contents, Izzat M. Alsmadi and I. Alhami

PDF

Building an Islamic Financial Information System Based on Policy Managements, Izzat M. Alsmadi and M. Zarour

Submissions from 2014

PDF

MQVC: Measuring Quranic Verses Similarity and Sura Classification Using N-Gram, M. Akour, Izzat M. Alsmadi, and I. Alazzam

PDF

Test Cases Selection Based on Source Code Features Extraction, I. Alazzam, Izzat M. Alsmadi, and M. Akour

PDF

Approaches for Testing and Evaluation of XACML Policies, Izzat M. Alsmadi

PDF

Issues Related to the Detection of Source Code Plagiarism in Students Assignments, Izzat M. Alsmadi, I. AlHami, and S. Kazakzeh

Submissions from 2013

PDF

Call Graph Based Metrics to Evaluate Software Design Quality, H. Abandah and Izzat M. Alsmadi

PDF

Efficient Assessment and Evaluation for Websites Vulnerabilities Using SNORT, M. Dabbour, Izzat M. Alsmadi, and E. Alsukhni

PDF

Impact of Programming Features on Code Readability, Y. Tashtoush, Z. Odat, Izzat M. Alsmadi, and M. Yatim

Submissions from 2012

PDF

Measuring Defect Datasets Sensitivity to Attributes Variation, Izzat M. Alsmadi

PDF

Enhance Rule Based Detection for Software Fault Prone Modules, H. Najadat and Izzat M. Alsmadi

Submissions from 2011

PDF

Automatic Code Homework Grading Based on Concept Extraction, I. Alhami and Izzat Alsmadi

PDF

Activities and Trends in Testing Graphical User Interfaces Automatically, Izzat M. Alsmadi

Submissions from 2010

PDF

Challenges of Utilizing E-Learning Systems in Public Universities in Jordan, M. Al-Shboul and Izzat M. Alsmadi

PDF

Applying Hessian Curves in Parallel to Improve Elliptic Curve Scalar Multiplication Hardware, F. B. Muhaya, Q. A. Al-Haijá, and Lo'ai A. Tawalbeh