- Sentiment Analysis and Opinion Mining
- E-Government and Public Services
- Organizational and Employee Performance
- Cloud Data Security Solutions
- Anomaly Detection Techniques and Applications
- Internet Traffic Analysis and Secure E-voting
- Network Security and Intrusion Detection
- Consumer Retail Behavior Studies
- Cloud Computing and Resource Management
- Technology Adoption and User Behaviour
- Blockchain Technology Applications and Security
- Online and Blended Learning
- ICT Impact and Policies
- Spam and Phishing Detection
- Consumer Market Behavior and Pricing
- Advanced Text Analysis Techniques
- Customer churn and segmentation
- Software Reliability and Analysis Research
- Leaf Properties and Growth Measurement
- Sports Analytics and Performance
- Organizational Leadership and Management Strategies
- Mobile Learning in Education
- Advanced Malware Detection Techniques
- Data Mining Algorithms and Applications
- ERP Systems Implementation and Impact
Higher Colleges of Technology
2024
University of Jordan
2013-2024
Dhahran Health Center
2021
Prince Mohammad bin Fahd University
2020
Online media has an increasing presence on the restaurants' activities through social websites, coinciding with increase in customers' reviews of these restaurants. These become main source information for both customers and decision-makers this field. Any customer who is seeking such places will check their first, which usually affect final choice. In addition, experiences can be enhanced by utilizing other suggestions. Consequently, influence success restaurant business since it considered...
Recently sentiment analysis in Arabic has attracted much attention from researchers. A modest number of studies have been conducted on analysis. However, due to the vast increase users’ comments and reviews social media e-commerce websites, necessity detect sentence-level aspect-level sentiments also increased. The aspect-based emerged at aspect level. Few attempted perform texts because natural language processing is a challenging task lack available annotated corpora. In this paper, we...
The term "customer churn" is used in the industry of information and communication technology (ICT) to indicate those customers who are about leave for a new competitor, or end their subscription. Predicting this behavior very important real life market competition, it essential manage it. In paper, three hybrid models investigated develop an accurate efficient churn prediction model. based on two phases; clustering phase phase. first phase, customer data filtered. second predicts behavior....
The purpose of this study is to examine the different factors that are expected influence intention hospitals adopt cloud computing in Jordan. This conducted using quatititative methodology. 223 questionnaires were distributed IT departments evaluate their ability and willingness computing. data tested multiple regression order determine whether Technology, Organizational, Environmental (TOE) played a role hospitals' decision consider as beneficial investment. findings showed all had...
E-government aims to offer services the countrys' communities both in public or private sectors by using ICT tools reduce cost and times eradication of manifestations routines bureaucracy. All countries around world are seeking implement diffuse e-government services, especially developing countries, do that they have overcome a range factors prevent effective implementation countries.
 This paper discusses analyzes topics revolves most important behind success this program, tries...
The Sentimental Analysis (SA) is a widely known and used technique in the natural language processing realm. It often determining sentiment of text. can be to perform social media analytics. This study sought compare two algorithms; Logistic Regression, Support Vector Machine (SVM) using Microsoft Azure Learning. was demonstrated by performing series experiments on three Twitter datasets (TD). Accordingly, data sourced from microblogging platform. Data were obtained form individuals’...
The world has witnessed recently a global outbreak of coronavirus disease (COVID-19). This pandemic affected many countries and resulted in worldwide health concerns, thus governments are attempting to reduce its spread impact on different aspects life such as health, economics, education, politics by making emergent decisions policies (e.g., lockdown social distancing). These new regulations influenced people’s daily cast significant burdens, disparities various population groups. Taking...
Lately, skeleton-based action recognition has drawn remarkable attention to graph convolutional networks (GCNs). Recent methods have focused on learning because topology is the key GCNs. We propose align channel level by introducing convolution with enriched based careful channel-wise correlations, namely attentive correlation (ACC-GC). For model learn topologies, ACC-GC learns a shared spanning many channels and enhances it correlations. Encoding intra-correlation between various nodes...
Cloud computing is a set of Information Technology services offered to users over the web on rented base. Such enable organizations scale-up or scale-down their in-house foundations. Generally, cloud are provided by third-party supplier who possesses arrangement. has many advantages such as flexibility, efficiency, scalability, integration, and capital reduction. Moreover, it provides an advanced virtual space for deploy applications run operations. With disregard possible benefits services,...
The purpose of this study is to evaluate the effectiveness blended learning on academic achievement students in University Jordan. To gain depth understanding phenomena under investigation, survey method employed collect natural data. For sake respondent convince all questions asked are directed Arabic language. Conventional sampling technique due subjectivity issue. A sample (427) from King Abdulla II School for Information Technology at Jordan randomly selected. SPSS10 software used make...
A churn consumer can be defined as a customer who transfers from one service provider to another provider. Recently, business operators have investigated many techniques that identify the since rates leads serious loss. In this paper, hybrid technique has been used which combines K-means clustering with Genetic Programming predict churners in telecommunication companies. First, is filter training dataset outliers and non representative behaviors then applied order build classification trees...
In the rapidly evolving landscape of Internet Things (IoT), cybersecurity remains a critical challenge due to diverse and complex nature network traffic increasing sophistication cyber threats. This study investigates application Artificial Bee Colony (ABC) algorithm for hyperparameter optimization (HPO) in machine learning classifiers, specifically focusing on Decision Trees, Support Vector Machines (SVM), K-Nearest Neighbors (KNN) IoT analysis malware detection. Initially, basic models...
Many educational institutions have adopted E-Learning system or are thinking to adopt it in their systems. As a nearly recent system, many do not know the exact meaning of E-Learning, why should be used? After using it, will institution face any problems? And what best solutions for these This paper aims answer all above questions. In addition, discusses ways transform traditional learning systems and how measure advantages this transformation. Finally, students' views show that they prefer...
Quality is a key factor to ensuring success of e-government websites. Therefore, definition for high-quality website required, as well as, an system’s quality evaluation methodology. This paper identifies attributes that are required assess the website, which should be considered by developers during development applications. The primary goals identifying, qualifying, categorizing, and ranking these factors, then defining interrelations among factors.
The stimulus to carry out this research is investigate the relationship between internet advertisement and its features on total E-commerce sales of top five countries Europe. units analysis are individuals UK, France, Italy, Germany Netherland. Secondary data collected from reports [1] (ADEX, 2010) [2] (Eurostats, 2011). To empirically determine independent variable dependent in European context, study uses various statistical techniques, including OLS regression correlation techniques....
E-training is considered nowadays as a very important issue for business organization because of the benefits it can bring. Unfortunately, e-training not fit well in most Jordanian organization. In order to implement successfully an organization, you need right people at place using resources. Furthermore, essential measure organizationâ??s acceptance new system before implementing gain its full potential. This research proposes model system. has been developed from various previous studies...
Cloud computing is the delivery of resources over Internet. Examples include, among others, servers, storage, big data, databases, networking, software, and analytics. Institutes that provide cloud services are called providers. were primarily developed to help IT professionals through application development, data storage recovery, website hosting, on-demand software delivery, analysis significant patterns could compromise a system’s security. Given widespread availability computing, many...
Due to the accelerated growth of symmetrical sentiment data across different platforms, experimenting with analysis (SA) techniques allows for better decision-making and strategic planning sectors. Specifically, emergence COVID-19 has enriched people’s opinions feelings about medical products. In this paper, we analyze sentiments products a well-known e-commerce website named Alibaba.com. People’s are experimented using novel evolutionary approach by applying advanced pre-trained word...
The objective of this research is to build a complete e-Learning adoption model which can be used increase the acceptance e-learning inside Jordanian organizations. This achieved through analysis process in two different case studies.
Developments in service oriented architecture (SOA) have taken us near to the once fictional dream of forming and running an online business, such commercial activity which most or all its roles are outsourced services. The novel concept cloud computing gives a understanding SOA Information Technology assets provided as services that extra flexible, inexpensive striking activities. In this paper, we concisely study developments computing, debate advantages using for activities trade-offs...
Recently, there has been an increasing attention towards the use machine learning platforms notably Amazon Machine and Microsoft Azure (ML) to undertake sentiment analysis.The present experimental study compared ML against as for performing evaluation was done d using metrics: accuracy, reliability, precision, F-score Recall.Data sourced from Twitter a microblogging platform.The analytics model created based on Logistic regression analysis algorithms.Results confirmed that is more accurate...
This research aims to classify simulated players in a multi-agent game for the best position and role they may play according their abilities. Three approaches were investigated this purpose, C4.5 classification algorithm, backpropagation neural network radial basis function network. work depends on video that uses 28 attributes distinguish every player from another. The applied techniques examine abilities of them one four major positions/roles. three compared by applying data set collected...
At present, the use of middleware technologies has been observed to be used by companies for successful enterprise application integration (EAI). The EAI can helps in integrating data and information relating systems. Thus, study focuses on highlighting a brief overview along with its architecture. also focused providing concise description all frameworks cloud computing. In addition, research using qualitative approach collecting obtaining respect computing alignment EAI. it stated that...