Research Title: ‎A Feature Model Based Configuration Reuse for Context-aware Systems‎
Author: Said Ahmad Ammar Ghoul, Published Year: 2021
Computers, Materials & Continua ‎, Under press
Faculty: Information Technology

Abstract: Most of Self-Adaptive Systems (SAS) use Feature Models (FMs) to represent their complex ‎architecture and benefit from reusing commonalities and variability information. However ‎triggering SAS reconfiguration process, each time a system needs to be adapted, continues to ‎cost time and effort. Current FM techniques have modelled SAS concepts, focusing on ‎representing and reusing elementary features without taking into consideration modelling and ‎reusing configurations. This work presents an extension to the FM in order to remedy this ‎important problem by introducing and managing the configuration feature. Evaluation shows that ‎the reuse of configuration feature reduces reconfiguration process effort and time during the run ‎time in order to meet the required scenario according to the context. ‎

Keywords: Self-Adaptive system, Feature Model, System reuse, Configuration management, Variability ‎modelling‎

Research Title: جريمة غسيل الأموال بين التشريعات الداخلية والمواثيق الدولية : دراسة مقارنة
Author: Enas Mohammad Qutieshat, Published Year: 2015
مجلة المنارة, 21
Faculty: Law

Abstract: ان جرائم غسيل الاموال خطر يهدد كيان الدول وسيادتها على اراضيها ، بما تسببه من ضرر فادح للاقتصاد الوطني والدولي وما ينتج عنه من ثراء غير مشروع واستثمار للاموال المتحصلة لاضفاءالشرعية عليها وسهولة تحريكها دون التعرض للمصادرة . فتأتي اهمية البحث كونه ينسجم مع اتجاهات الفكر الامني المعاصر الذي اصبح يولي اهتماماً بالغاً بمختلف الموضوعات المتعلقة بعائدات الجريمة بوجه عام ، وجريمة غسيل الاموال بوجه خاص ، وذلك بالنظر الى الاثار الخطيرة والمدمرة المترتبة عليها . حيث سيتناول الباحثان التعرف على الاطار العام لجريمة غسيل الاموال وتحديد معوقات التحقيق فيها وبيان اشكاليات تنسيق الجهود الدولية لمواجهتها وذلك من استخدام المنهج الوصفي التحليلي من خلال الاعتماد على بعض الدراسات والبوث السابقة والقوانين والاتفاقيات الدولية ذات الصلة.

Keywords: غسيل الاموال ، الجهود الدولية ، الاردن

Research Title: 3-D Printers and Copyright Issues with Particular Reference to the Jordanian Law
Author: Enas Mohammad Qutieshat, Published Year: 2019
Shari'a and Law Sciences ,
Faculty: Law

Abstract: 3D printing is relatively new and innovative technology that is changing the manufacturing market or dynamics at least at the consumer level. By clicking a button, a person who has a 3D printing machine can be able to download a computer-aided design (CAD) file, which instructs the printer to make a three-dimensional object . 3D printing allows people to become creators of things that they desire as long as they have access to the CAD file. Due to the capabilities of this new technology, it has been seen as a threat to big businesses and designers due to the fact that if a potential consumer of a certain product, gains access to the CAD file of that product and has access to a 3D printing machine, then he or she will not see the need to purchase that product due to the ease of production at home. This paper will highlight some relevant on copyright issues under the Jordanian law related to 3d printers.

Keywords: 3d printers, copyright, patent, CAD files.

Research Title: المسؤولية المدنية المترتبة على عمليات فصل التوائم الملتصقة من منظور شرعيّ وقانوني (Womb-Lease Contracts With Particular Reference To The Jordanian Law: Comparative Research)
Author: Enas Mohammad Qutieshat, Published Year: 2020
Faculty: Law

Abstract: إن التوائم الملتصقة حقلًا خصبًا للدراسات الطبية، في محاولة الوقوف على الأسباب الكامنة وراء تكونها والمشكلات الطبية المرافقة لها منذ لحظات الحمل والوضع وما بعد ذلك. وقد أصبحت مسألة فصل هذه التوائم مثيرة للجدل القانوني أيضًا خصوصًا عند الحديث المسؤولية المدنية المترتبة على عمليات فصل هذه التوائم. تتناول هذه الدراسة التعريف بالتوائم الملتصقة والوقوف على مدى مشروعية إجراء عمليات فصل هذه التوائم وشرعيتها انطلاقًا من التساؤل الآتي: هل الحديث عن هذه التوائم حديث عن شخص واحد بأعضاء إضافية أم شخصين التصقت أعضاؤهما معًا ويتوجب فصلهما، بحيث يستطيع كل منهما ممارسة حياته بشكل طبيعي، وعليه تحديد الآثار القانونية المترتبة على عمليات فصل هذه التوائم إذا ما كان لا بد من التضحية بأحدها. عمليات فصل التوائم الملتصقة مدار جدل قانوني واسع بين مؤيد ومعارض، إلا أنه وفي التشريع الأردني لا نجد نصًّا يسعفنا في تحديد مسؤولية الطبيب أو الجراح عن حالات الوفاة والتعطل التي قد تصيب أحد الجنينين أو كليهما نتيجة عملية الفصل، باستثناء ما هو موجود في القواعد التقليدية المنظمة للمسؤولية التقصيرية، وذلك على ضوء النصوص القانونيّة لقانون العقوبات الأردني، والقوانين المنظمة للعمل الطبي. إلا أن هذه القواعد بوضعها الحالي تحتاج وفي مجملها إلى إدخال بعض التعديلات حتى يتمكن القاضي من تقرير المسؤولية المدنية المترتبة على عمليات فصل التوائم الملتصقة.

Keywords: التوائم الملتصقة، خطأ طبي، المسؤولية العقدية، المسؤولية التقصيرية، عمليات جراحية

Research Title: The Impact of the Corona Pandemic on the Performance of Contractual Obligations under the Provisions of Jordanian Defense and Civil Laws
Author: Enas Mohammad Qutieshat, Published Year: 2021
Faculty: Law

Abstract: Contractual obligations in Jordan have been affected by the worldwide outbreak of coronavirus and the restrictive measures it has adopted, such as the announcement of the Defense Law. The enforcement of the Defense Law led in some cases to the impossibility to perform the contractual obligations that were previously established which triggered the parties to the contract-the debtor in particular-to invoke the application of force majeure or the doctrine of exceptional circumstances, and in both cases either demand contract frustration or mitigation of the contract. This research addresses the impact of applying the doctrine of unexpected circumstances and force majeure on contractual obligations following the provisions of Jordanian law and considering the legal texts of the defense and civil laws in force in Jordan. To achieve the goals of this research, the relevant legal texts were covered with explanation and detail, supported by the jurisprudence of the Jordanian courts.

Keywords: Corana, Contract, Civil Law

Research Title: Psychological Impact of COVID-19 Epidemic among the General Population in Jordan
Author: Fadwa Al-Halaiqa, Published Year: 2021
Frontiers in Psychiatry, 12:618993.
Faculty: Nursing

Abstract: Objective: Pandemics are claimed to result in certain stressors. However, the potential psychological impact of a pandemic is often overlooked. The current study aimed to assess the psychological impact of the COVID-19 pandemic on Jordanians and to evaluate the influence of the socio-demographic variables on this impact. Method: The current study employed a descriptive cross-sectional design using the Impact of Event Scale-Revised (IES-R) via a web-based questionnaire. The researchers utilized convenience sampling which led to a total of 2,854 participants from the 12 governorates of Jordan. Results: The average score of the participants' responses on the IES-R questionnaire turned out to be 22.5 ± 11.7. Females were found to have more than double the odds of having an increased IES-R score [odds ratio (OR) = 2.2, confidence interval (CI) = 1.76-2.67] and participants who were older than 65 years had triple the odds of having the same risk compared to young adults aged 18-25 years (OR = 3.1, CI = 1.3-7.4). Significantly, having a family member diagnosed with COVID-19 placed individuals at a 7-fold higher risk of having an increased IRS-R score compared to their counterparts who did not have a family member diagnosed with COVID-19 (OR = 7, CI = 3.7-13.3). Conclusion: COVID-19 pandemic has imposed significant level of psychological burden on Jordanians, especially among females. Governments should collaborate with psychiatrists, mental health professionals and local institutions to offer high-quality, timely crisis-oriented psychological services to the affected individuals for the duration of the COVID-19 pandemic.

Keywords: COVID-19; anxiety; mental health; psychological; stress.

Research Title: Cybersecurity: Ambient Technologies, IoT, and Industry: Privacy Preservation tools and Techniques in Artificial Intelligence
Author: Nameer Nadhem El-Emam, Published Year: 2021
Faculty: Information Technology

Abstract: Privacy preservation tools using particle swarm optimization (PSO) is one of the most common metaheuristics swarm intelligence algorithms [1]. It has been widely used for a large portion of optimization problems, as its implementation is scalable, robust, flexible, and simple [2]. It also strikes a balance between exploratory and exploitative behavior, to provide a high quality of results. On the other hand, intrusion detection is a hot topic, since the security of the data is a critical issue in today’s life. Thus, the application of intrusion detection, considering the classification algorithms that are optimized by PSO, is covered extensively in the literature. In this chapter, several approaches combining classification techniques with PSO for intrusion detection are reviewed and summarized. A general presentation of the PSO algorithm is provided. PSO-based techniques for intrusion detection are introduced and detailed. The most common datasets and evaluation measures are discussed. Finally, a summary discussion of PSO-based intrusion detection techniques is provided, along with possible directions and insights.

Keywords: Privacy preservation Particle swarm optimization Support vector Neural network

Research Title: Cybersecurity: Ambient Technologies, IoT, and Industry: Digital Right Management in Computing Environment
Author: Nameer Nadhem El-Emam, Published Year: 2021
Faculty: Information Technology

Abstract: In this chapter, we define the ethics and technoethics concepts. The main challenges and issues of ethics in technology are investigated, as well. The technology of cybersecurity is then investigated and its definition, management, and impact are discussed. After that, the main applications of cybersecurity are explained, considering two main types of applications: secure web applications and secure mobile applications. Finally, ethics for cybersecurity applications are explored. This includes the privacy of users, freedom of speech, intellectual property rights, law protection, and responsible crimes

Keywords: Digital right management Technoethics Cybersecurity Intellectual property rights Privacy

Research Title: Enhancing the Software Engineering Curriculum, a Case Study for the Jordanian Universities
Author: Samer Odeh Hanna, Published Year: 2014
Faculty: Information Technology

Abstract: Software Engineering is about creating high-quality software in a systematic, controlled, and efficient manner. Although the Software Engineering discipline had been recognized since 1968, there is still no agreement among the Universities worldwide about what should be included in the Software Engineering curriculums or study plans. This problem has resulted in that different knowledge areas are being taught to the Software Engineering students in different universities. Also this problem has resulted in that many universities now include courses in the Software Engineering curriculum that are not related to Software Engineering. A case study of the Jordanian Universities had proved that more than 60% of the courses taught at the Software Engineering departments of the Jordanian Universities are non Software Engineering related courses. An analysis had been conducted to compare the current Software Engineering courses taught at the different Jordanian Universities and the guidance provided by the ACM/IEEE about what should constitute an undergraduate Software Engineering education. Also an analysis of the Software Engineering courses taught at different countries such as UK and USA had been conducted where these countries were chosen because they contain many of the top ranked Universities in the world. The analysis had resulted in determining the knowledge areas that should be added to the curriculum of each Jordanian University. Enhancing the curriculum will result in a SE graduates that are equipped with the needed knowledge to join the software market.

Keywords: Software Engineering Curriculum

Research Title: An Approach for Web Applications Test Data Generation Based on Analyzing Client Side User Input Fields
Author: Samer Odeh Hanna, Published Year: 2019
International Conference on New Trends in Computing Sciences (ICTCS 2019), Amman, Jordan
Faculty: Information Technology

Abstract: Since it is time consuming to manually generate test data for Web applications, automating this task is of great important for both practitioners and researchers in this domain. To achieve this goal, the research in this paper depends on an ontology that categorizes Web applications inputs according to input types such as number, text, and date. This research presents rules for Test Data Generation for Web Applications (TDGWA) based on the input categories specified by the ontology. Following the approach in this paper, Web applications testers will need shorter time to accomplish the task of TDGWA. The approach had successfully been used to generate test data for different experimental and real-life Web applications.

Keywords: Test Data Generation for Web Applications, Ontology, and Web Applications inputs types