كتابة النص: الأستاذ الدكتور يوسف أبو العدوس - جامعة جرش قراءة النص: الدكتور أحمد أبو دلو - جامعة اليرموك مونتاج وإخراج : الدكتور محمد أبوشقير، حمزة الناطور، علي ميّاس تصوير : الأستاذ أحمد الصمادي الإشراف العام: الأستاذ الدكتور يوسف أبو العدوس
فيديو بمناسبة الإسراء والمعراج - إحتفال كلية الشريعة بجامعة جرش 2019 - 1440
فيديو بمناسبة ذكرى المولد النبوي الشريف- مونتاج وإخراج الدكتور محمد أبوشقير- كلية تكنولوجيا المعلومات
التميز في مجالات التعليم والبحث العلمي، وخدمة المجتمع، والارتقاء لمصاف الجامعات المرموقة محليا واقليميا وعالميا.
المساهمة في بناء مجتمع المعرفة وتطوره من خلال إيجاد بيئة جامعية، وشراكة مجتمعية محفزة للابداع، وحرية الفكر والتعبير، ومواكبة التطورات التقنية في مجال التعليم، ومن ثم رفد المجتمع بما يحتاجه من موارد بشرية مؤهلة وملائمة لاحتياجات سوق العمل.
تلتزم الجامعة بترسيخ القيم الجوهرية التالية: الإلتزام الإجتماعي والأخلاقي، الإنتماء،العدالة والمساواة، الإبداع، الجودة والتميّز، الشفافية والمحاسبة، الحرية المنظبطة والمستقبلية.
I studied in my home country of Jordan for my undergraduate degree and then worked before traveling to study and complete my postgraduate studies , In terms of creativity and innovation, I did many programming activities after each stage of study.
I have several research papers published in high-ranking journals. I'm always looking to innovate and develop, and I enjoy articulating ideas and perspectives clearly and persuasively. I am a lover of continuous learning and growth, and strive to improve my writing and communication skills.
I am characterized by my critical and creative thinking, and I love to express myself freely and honestly.
Quality assurance is one major concern for the faculty of Computer Science and Information Technology (FCSIT) at Jerash University. It involves eight standards including the strategic planning. SWOT analysis is a method meant for assisting the formulation of strategy and planning. An application to strategic planning process formulation for the FCSIT is described. This research studies the SWOT analysis with a major concern of drawing more conclusions using machine learning methods. Data mining is a subfield of machine learning, which focuses on exploratory data analysis using supervised or unsupervised learning. Data mining techniques help fetching required knowledge from raw data to make decisions more confidently interpreted and automated. In this study, regression, classification, clustering, association rules, attributes selection techniques are used to mine data from the SWOT analysis. Using Weka workbench, results of each technique is obtained and interpreted with the favor of the factors that have impact on the success of the strategic plan. The outcome presents a high level of satisfaction regarding employee, and a vibrant level of satisfaction regarding students. Therefore, the developed quality assurance framework is stable but needs more improvements to overcome the dissatisfaction of many students regarding services, supervision, awards and activities.
This study aims to compare the efficiency of Intuitionistic Fuzzy Neural Network with Genetic Algorithm (IFNN-GA) in detecting real-time traffic signs in different road conditions compared with the human eyes in order to prove that they are more efficient in understanding the surrounding environment, support safe driving, and overcome human defects. Highlighting the driver's obstacles such as weather conditions, uneven lighting, shadows everywhere, intensity and brightness fluctuations and contrast in shape and texture of traffic signs and time spent for entry and exit. In order to realize all aspects of the road, a model was proposed: Intuitionistic Fuzzy Neural Network with Genetic Algorithm (IFNN-GA).
The diversity and quality of high-quality and diverse-solution external memory of the hybrid Elitist-Ant System is examined in this study. The Elitist-Ant System incorporates an external memory for preserving search diversity while exploiting the solution space. Using this procedure, the effectiveness and efficiency of the search may be guaranteed which could consequently improve the performance of the algorithm and it could be well generalized across diverse problems of combinatorial optimization. The generality of this algorithm through its consistency and efficiency is tested using a Nurse-Rostering Problem. The outcomes demonstrate the competitiveness of the hybrid Elitist-Ant System’s performance within numerous datasets as opposed to those by other systems. The effectiveness of the external memory usage in search diversification is evidenced in this work. Subsequently, such usage improves the …
In this paper will discuss and examine message transmission from the attacker process within the scope of Delay Tolerance Networks (DTNs). DTNs are a new area of research that can be developed in networking. Delay-tolerant networks are those networks that may not have a complete path between networks end-to-end via direct links and may be under development for a long time. As part of the improvement, we will compare a survey of DTN routing protocols with a real region area, and then taking into account the possibilities of detecting the presence of areas of weakness that lead to penetration, which will occur in the nodes while on the move. In this study, we will use the ONE simulator to track messages within nodes
n this paper, we examined the effect on network performance of the various strategies an attacker could adopt to launch Man-In The Middle (MITM) attacks on the wireless network, such as fleet or random strategies. In particular, we're focusing on some of those goals for MITM attackers - message delay, message dropping. According to simulation data, these attacks have a significant effect on legitimate nodes in the network, causing vast amounts of infected packets, end-to-end delays, and significant packet loss.
The malware would offer the attacker or an un-legitimate user to access the device without authorization as a legitimate user. In this paper, we will discuss how malware hides inside images which can transfer between computers in the background of any system. Also, we will discuss how deep transfer learning will detect malware that hides under images. Lastly, we will make a comparison between deep transfer’s models to detect malware in images. We also conclude which model is the best to use in the system to detect malware.
In this paper, we will discuss prediction methods to restrict the spread of the disease by tracking contact individuals via mobile application to individuals infected with the COVID-19 virus. We will track individuals using bluetooth technology and then we will save information in the central database when they are in touch. Monitoring cases and avoiding the infected person help with social distance. We also propose that sensors used by people to obtain blood oxygen saturation level and their body temperature will be used besides bluetooth monitoring. The estimation of the frequency of the disease is based on the data entered by the patient and also on the data gathered from the users who entered the program on the state of the disease. In this study, we will also propose the best way to restrict the spread of COVID-19 by using methods of artificial intelligence to predict the disease in Jordan using Tensorflow.
كما هو في google scholar
https://scholar.google.com/citations?hl=en&user=WGZLuk8AAAAJ&view_op=list_works&sortby=pubdate
كما هو في scopus
https://www.scopus.com/authid/detail.uri?authorId=57222998732
شبكات حاسوب متقدمه
تحليل الادلة الجنائية
البرمجة المرئية
قواعد البيانات
All Rights Reseved © 2023 - Developed by: Prof. Mohammed M. Abu Shquier Editor: Ali Mayyas