1121
Research Title: Virulence of root-knot nematodes, Meloidogyne spp., on tomato bearing the Mi gene for resistance.
Author: Sameer Masoud, Published Year: 2005
Phytopathologia Mediterranea, 44
Faculty: Science

Abstract: Three species of root-knot nematodes, Meloidogyne javanica, M. incognita races 1 and 2, and M. arenaria race 2 occur in Jordan. These species and their races were identified using morphological characters, the North Carolina differential host test, and SCARPCR. The virulence of 83 isolates belonging to Meloidogyne species and races was assayed. The virulence assay was based on the isolate reproduction rate on a resistant tomato cultivar Betterboy bearing the Mi gene for resistance, and was compared with that on the susceptible tomato cultivar Rutgers. Three M. javanica isolates were highly virulent on the resistant cv. Betterboy as indicated by their high root gall index (4.73) and high reproduction factor (3.73). The horticultural parameters (shoot and root fresh weights and root dry weight) were negatively correlated with the reproduction factor

Keywords: root-knot nematodes

1122
Research Title: عقد تأمين مصاريف دعاوى الملكية الفكرية: نموذج مستحدث في عقود التأمين
Author: Bassam Hamad Al-Tarawneh, Published Year: 2018
,
Faculty: Law

Abstract: إن الأمر المتعارف عليه في حماية حقوق الملكية الفكرية وإنفاذها في حال الاعتداء عليها يكون باللجوء إلى التقاضي، إلا أن ارتفاع تكاليف التقاضي في هذا المجال يشكل عقبة حقيقية أمام أصحاب هذه الحقوق، فالكثير من أصحاب هذه الحقوق لا يملكون القدرة المالية على تحمل تكاليف التقاضي المرتفعة، ولذلك وجدت الحاجة إلى إيجاد حل لهذه المعضلة، فكان الحل هو التوصل إلى صيغة مبتكرة تتضمن إيجاد غطاء تأميني خاص تتعهده وتتكفل به شركات التأمين، لا يتم بموجبه التزام المؤمن لأن يؤدي إلى المؤمن له ا أو أي تعويض مالي آخر في حال وقوع الحادث، أو حادث ًا مرتبًا من المال أو إيرادًمبلغ الاعتداء، أو تحقق الخطر، وإنما يتضمن فقط تكاليف التقاضي، وذلك لتمكين أصحاب هذه الحقوق من ممارسة حقهم في حمايتها والدفاع عنها، وبالتالي يعتبر عقد تأمين على ً يقوم أساساً خاصاً تأمينياًتكاليف التقاضي المتعلقة بحقوق الملكية الفكرية غطاء تأمين مصاريف التقاضي بكافة أشكالها خلال مراحل الدعوى. ؛ فقد جاء هذا ً ومضموناًا لكون هذا العقد غير معروف في بلادنا العربية شكلاًونظر البحث لدراسة هذا النوع من العقود، وبيان خصائصه، وتوضيح طبيعته القانونية وذلك من خلال دراسة نشأة هذه العقد، وتطوره، وتعريفه وأحكامه، وخصائصه، وآثاره، وفوائده العملية، وتأصيله كنوع مستحدث من أنواع التأمين الأكثر أهمية، وتناول جوانبه الفنية، والقانونية، وصوره، ومقدار اختلافه، أو اقترابه من عقود التأمين المعروفة، وطبيعة الخطر المؤمن عليه. إن ميزة هذا البحث–بالإضافة إلى كونه الأول في تناوله لهذا الموضوع –انه عمل على ربط موضوعين هامين علميا واكاديميا معا وهما: حقوق الملكية الفكرية والتأمين، فهو ًا معًا وأكاديميًربط موضوعين هامين علمي موضوع يساهم في تطور الفكر التأميني، إلى جانب تقديم الحماية الحقيقية لأصحاب حقوق الملكية الفكرية.

Keywords: حماية حقوق الملكية الفكرية، تأمين مصاريف التقاضي، براءات الاختراع، الإبداع، الابتكار، حقوق المؤلف

1123
Research Title: Consent in Cloud Computing Contracts: Some Legal Issues under the Jordanian Law
Author: Bassam Hamad Al-Tarawneh, Published Year: 2016
,
Faculty: Law

Abstract: In the electronic era of globalization, the world has changed dramatically. Consequently, cloud computing has attracted considerable attention from many legal scholars. Although numerous legal issues arise when discussing cloud computing, this article describes and analyzes one of the most important elements in contract law. In order to obtain the desired service from the provider of the cloud, a contract has to be formed between the end-use customer and the provider. The service offered to the customer is based on an agreement reached between the two parties. The current paper highlights how mutual consent could be reached. In doing so, this paper will focus on the Jordanian approach on mutual assent in the case of electronic contracts in general and cloud computing contracts in particular. The authors reached to the conclusion that the current provisions of the Jordanian Civil Law are incapable in its current form to provide the maximum protection for online users.

Keywords: cloud computing; consent; European Union

1124
Research Title: The Impact Of Joining Jordan To The International Agreement For The Protection Of New Varieties Of Plants (UPOV)
Author: Bassam Hamad Al-Tarawneh, Published Year: 2016
,
Faculty: Law

Abstract: The subject of legal protection of the new varieties has got lots of attention especially at the international and national level because of the great impact in developing and increasing the agricultural crops. This research sheds the lights on the aspects of the legal protection of the new varieties of plants in the different legal systems, whether by joining the UPOV agreement ( the convention to the protection of the new varieties of plant – UPOV) or through the patent protection by mentioning the new varieties of plant as a patent protection , or by dual protection, by integration between the legal protection for the patent and the law of protection the new varieties of plant. And it concentrating on the legal protection for the new varieties of plant in Jordanian law in a particular, and the development of this protection and showing the impact of joining Jordan to the UPOV convention in the two sides ( positiv

Keywords: new varieties of plant, plant patent invention, the plant of genetic principles, UPOV convention and TRPS convention

1125
Research Title: The Electronic Signature and the Problems of its Practical Applicable
Author: Bassam Hamad Al-Tarawneh, Published Year: 2016
International Journal of Humanities and Social Science, Vol. 6, No. 12; Dece
Faculty: Law

Abstract: This research mention the subject of electronic signature in the Jordanian electronic transaction No 15 for year 2015 so it consider on the concept of electronic signature , characteristics and the conditions of the electronic signature as a gateway to the research , then it talks about the authentic legal of electronic signature in the Jordanian law, and legal provision in this area, also the research mentioned the division which was depend by the Jordanian legislator in the authentic electronic record in which the legislator based on the quality of electronic signature which facilities to the electronic record. Then the subject of legal and technical problems that raised the practical application of the law of the Jordanian electronic transactions in general and electronic signature in particular, and at the end of the research, the researcher signs to the recommendations on expanding the results of application of electronic contracts and transactions and the need to make appropriate adjustments rather than electronic transactions law, but the system Jordanian laws related to this subject.

Keywords: electronic signature, electronic commerce, electronic transaction

1126
Research Title: Legal Protection Of Geographical Indications Under The Jordanian Law
Author: Bassam Hamad Al-Tarawneh, Published Year: 2018
Faculty: Law

Abstract: Geographical indications are an important tool to identify the geographical origin of goods. It is the link between the product and geographic region, given that the special characteristics and features of goods and products genuinely return to that special area which are uncommon other areas. Many work has been conducted at the national and international level to protect geographical indications because of its great importance especially for countries rich in natural, industrial, agricultural wealth and traditional industries .The Jordanian legislator has published the Geographical Indications Act N. 8 of 2000. This paper covers the definitions of geographical indications, in addition to the international and national efforts for its legal protection, and the scope of that protection and the exceptions of its application. The paper also evaluates this legal protection under the Jordanian law, compared with the international conventions and some laws of some Arab countries. At the end of this paper the researcher identifies some results and recommendations on the protection of geographical indications law.

Keywords: geographical indications, intellectual properties, Trips ,unfair competition

1127
Research Title: Differences between leaders and non-leaders in their perceptions of the organizational commitment to quality
Author: Atef Al-Raoush, Published Year: 2015
European Scientific Institute, Vol 11, No 10 (2015
Faculty: Business

Abstract: The objective of this study was to determine if there were any significant differences between hospital leaders and non-leaders in their perceptions of the organizational commitment to quality in the governmental accredited hospitals in Jordan. A survey instrument, designed to measure the level of organizational commitment to quality, questionnaire, was administered to the healthcare professionals in the five governmental accredited hospitals in Jordan. Study sample included 1290 employees. The response rate was 83.6 % of the total questionnaires distributed. Of the1079 respondents, 141 were leaders and 938 were non-leaders. Two sample T test was used to compare the responses between these groups. There were significant differences found between leaders and non-leaders in their perceptions of organization’s commitment to quality.

Keywords: Total quality management, organizational commitment to quality, Accreditation, Jordan

1128
Research Title: Is the organizational leadership commitment principle the most significant TQM Principle on hospital effectiveness
Author: Atef Al-Raoush, Published Year: 2015
European Scientific Institute, ESI, April 2015 edition v
Faculty: Business

Abstract: Total Quality management (TQM) has many principles, and the objective of this study was to determine highest TQM principle which has the greater impact on overall hospital effectiveness as perceived by healthcare professionals working in accredited governmental hospitals in Jordan. A study survey instrument, designed to measure the impact of applying TQM principles on overall hospital effectiveness, then to find out the greater TQM principle which influence more the overall hospital effectiveness, Study questionnaire was administered to the healthcare professionals in the five governmental accredited hospitals in Jordan, The data collection where 1290 questionnaires. The response rate was 83.6% of the total questionnaires distributed. TQM principles were: Leadership commitment to quality, Customer focus, Continuous improvement, Teamwork, Employee involvement, and education and training. Multiple regression analysis using Beta Coefficient conducted, the result shows that the greater TQM principle which affects the overall hospital effectiveness organization leadership commitment to quality and the least was education and training.

Keywords: Total quality management, organization leadership commitment to quality, Accreditation, Jordan

1129
Research Title: ‎A Genetic Framework model for Self-Adaptive software
Author: Said Ahmad Ammar Ghoul, Published Year: 2017
JSE, 11
Faculty: Information Technology

Abstract: ‎ Background: Self-adaptive software changes its behavior at runtime without affecting the ‎running system. It has recently been a rich research area. Lots of organizations have adopted it in ‎their environments to accommodate with changing requirements. Lots of bio-inspired research ‎works, which are better than the conventional ones, have been conducted in the area of self-‎adaptive software. All of them have focused on the external behavior of biological entities (like ‎birds, ants, immunity, etc.) without going in depth into their genetic material that causes this ‎behavior and constitutes the challenge the work presented in this paper dealt with. Materials and ‎Methods: This paper proposes a solution to the above current challenge by developing a ‎framework model for self-adaptive software; inspired by the adaptation (evolution) of biological ‎entities and taking into consideration the role of genetic material in the adaptation process. Its scope ‎is limited to changes that take place at runtime but that are known at design. Results: The obtained ‎framework model was evaluated through its reuse in software objects evolution. The practical and ‎theoretical obtained results were valuable in the object-oriented paradigm. The proposed framework ‎completes the others bio-inspired research current works by providing a natural implementing way. ‎The integration of the current bio-inspired approaches (which deal with natural entities behaviors ‎external modeling) with the proposed framework (which deals with genetics-inspired internal ‎modeling of these behaviors) will lead to homogenous and coherent bio-inspired approaches to ‎self-adaptive software. Conclusion: The proposed framework is limited to self-adaptations ‎predicted at the requirements and design steps in self-adaptive software engineering, which is ‎significant in practice. However, the unpredicted adaptation (to unpredicted errors, environment ‎requirements, etc.) will be a genetics-inspired approach real challenge. Separate evaluation of the ‎proposed framework performance is not determinant. However, the performance evaluation of the ‎actual bio-inspired hybrid approaches against the proposed integrated ones (which is impossible to ‎achieve actually) will be valuable. It might be expected that the integrated ones will be better (in the ‎whole self-adaptive software engineering processes) than the hybrid current ones. The homogeneity ‎of approaches has its important impact. ‎

Keywords: Self-adaptive software, Bio-inspired self-adaptive software, Genetics-inspired software modelling.‎

1130
Research Title: ‎A Feature Based Methodology for Variable Requirements Reverse Engineering
Author: Said Ahmad Ammar Ghoul, Published Year: 2019
AJSEA‎, 8
Faculty: Information Technology

Abstract: In the past years, software reverse engineering dealt with source code understanding. Nowadays, it is levered ‎to software requirements abstract level, supported by feature model notations, language independent, and ‎simpler than the source code reading. The recent relevant approaches face the following insufficiencies: lack ‎of a complete integrated methodology, adapted feature model, feature patterns recognition, and Graph based ‎slicing. This work aims to provide some solutions to the above challenges through an integrated ‎methodology.‎ The following results are unique. Elementary and configuration features are specified in a uniform way by ‎introducing semantics specific attributes. The reverse engineering supports feature pattern recognition and ‎requirements feature model graph-based slicing. The slicing criteria are rich enough to allow answering ‎questions of software requirements maintainers. A comparison of this proposed methodology, based on ‎effective criteria, with the similar works, seems to be valuable and competitive: the enrichment of the ‎feature model and feature pattern recognition were never approached and the proposed slicing technique is ‎more general, effective, and practical. ‎

Keywords: Requirements Engineering, Reverse Engineering, Requirements Variability, Feature Model, Pattern Recognition, Graph-Based ‎Slicing