201
Research Title: Stemming Effects on Sentiment Analysis using Large Arabic Multi-Domain Resources
Author: Said Ahmad Ammar Ghoul, Published Year: 2019
2019 Sixth International Conference on Social Networks Analysis, Management and Security (SNAMS),
Faculty: Information Technology

Abstract: Sentiment analysis is an area of great interest in research because of its importance and advantages in many different domains. Different approaches and techniques are used to classify the sentiment of texts, and there are different algorithms proposed to improve the performance through text preprocessing. Stemming is one of preprocessing step that is used in many research to enhance the performance of sentiment classification. In this research, we provide new comparative experiments on the impacts and effects of using two of the most commonly used stemmers in the Arabic language; light stemmer and Khoja stemmer in the preprocessing phase of sentiment analysis. We used large Arabic multi-domain datasets that include positive and negative reviews across multiple domains. Five classifiers are used; Naïve Bayes, support vector machines, k-nearest neighbors, decision trees, and logistic regression. The results indicate that Khoja stemmer outperformed that light stemmer Khoja stemmer in terms of precision, recall, f-measure, and accuracy, and it has an advantage in minimizing training time.

Keywords: Stemming, Sentiment Analysis, Arabic light stemmer, Khoja's stemmer

202
Research Title: Knowledge, Attitudes, and Practices of Oral Care in Mechanical Ventilated Patients.
Author: Fadwa Al-Halaiqa, Published Year: 2020
General Practitioner /Prakticky Lekar, 20
Faculty: Nursing

Abstract: Aim: To identify the intensive care unit nurses' (ICU) knowledge, attitudes, and practices of oral care in orally intubated patients. Method: A descriptive, cross--sectional, correlational design was used to describe the current knowledge, attitudes, and practice of oral care among ICU nurses' in two university-affiliated teaching hospitals, using a self-administered questionnaire that was developed by Lin et al., (2011) and Soh et al., (2011). Results: A total of 135 questionnaires were analyzed and showed that the mean percentages of critical care unit nurses' knowledge, attitudes, and practices of oral care were 53.6%, 67.5%, and 43.25% respectively. The main source of learning regarding oral care for intubated patients was the senior nurses in their units followed by nursing school, also, nurses who had more than one source for learning about oral care had greater knowledge regarding oral care, and performed oral care practices more frequently. The results also indicated that the nurses did not have adequate knowledge and clear perception about the characteristics of various oral cleaning solutions and the effective equipment that is used to remove dental plaque. Conclusion: The study results provide insight into oral care in ICU nurses' and the need for protocol development, implementation, and evaluation; moreover, enhancing nurses to get knowledge about oral care from different educational sources to improve their practices.

Keywords: Knowledge, attitudes, nursing practice, oral care, Jordan.

203
Research Title: ‎A Holystic Self-adaptive systems model‎
Author: Said Ahmad Ammar Ghoul, Published Year: 2021
International Journal of Software Engineering & Applications ‎, ‎12, 2/3, May 2021‎
Faculty: Information Technology

Abstract: The recent self-adaptive software systematic literature reviews stated clearly the following ‎insufficiencies: (1) the need for a holistic self-adaptive software model to integrate its different ‎aspects (2) The limitation of adaptations to context changes (3) The absence of a general and ‎complete adaptations’ picture allowing its understandability, maintainability, evaluation, reuse, and ‎variability. (4) The need for an explicit and a detailed link with resources, and (5) a usual limitation ‎to known events. ‎ In order to metigate these insufficiencies, this paper is proposing a holistic model that integrates the ‎operating, adaptations, and adaptations’ manager aspects. The proposed model covers all possible ‎adaptations: operating (dealing with software functions failures), lifecycle (handling adaptations ‎required by some software lifecycle steps), and context (facing context changes events). The ‎presented work introduces the concept of software adaptations process integrating the ‎specifications of all the above kind of adaptations. In fact, this work shows an explicit trace to its ‎pure bio-inspired origin. ‎ An application of the proposed approach on a “car industry case study” demonstrated its feasibility ‎in comparison with similar works that proved its meaningful added value and its promising research ‎perspectives.‎

Keywords: Self-adaptive software, bio-inspired approach, adaptation events, immune system.‎

204
Research Title: ‎A Feature Model Based Configuration Reuse for Context-aware Systems‎
Author: Said Ahmad Ammar Ghoul, Published Year: 2021
Computers, Materials & Continua ‎, Under press
Faculty: Information Technology

Abstract: Most of Self-Adaptive Systems (SAS) use Feature Models (FMs) to represent their complex ‎architecture and benefit from reusing commonalities and variability information. However ‎triggering SAS reconfiguration process, each time a system needs to be adapted, continues to ‎cost time and effort. Current FM techniques have modelled SAS concepts, focusing on ‎representing and reusing elementary features without taking into consideration modelling and ‎reusing configurations. This work presents an extension to the FM in order to remedy this ‎important problem by introducing and managing the configuration feature. Evaluation shows that ‎the reuse of configuration feature reduces reconfiguration process effort and time during the run ‎time in order to meet the required scenario according to the context. ‎

Keywords: Self-Adaptive system, Feature Model, System reuse, Configuration management, Variability ‎modelling‎

205
Research Title: جريمة غسيل الأموال بين التشريعات الداخلية والمواثيق الدولية : دراسة مقارنة
Author: Enas Mohammad Qutieshat, Published Year: 2015
مجلة المنارة, 21
Faculty: Law

Abstract: ان جرائم غسيل الاموال خطر يهدد كيان الدول وسيادتها على اراضيها ، بما تسببه من ضرر فادح للاقتصاد الوطني والدولي وما ينتج عنه من ثراء غير مشروع واستثمار للاموال المتحصلة لاضفاءالشرعية عليها وسهولة تحريكها دون التعرض للمصادرة . فتأتي اهمية البحث كونه ينسجم مع اتجاهات الفكر الامني المعاصر الذي اصبح يولي اهتماماً بالغاً بمختلف الموضوعات المتعلقة بعائدات الجريمة بوجه عام ، وجريمة غسيل الاموال بوجه خاص ، وذلك بالنظر الى الاثار الخطيرة والمدمرة المترتبة عليها . حيث سيتناول الباحثان التعرف على الاطار العام لجريمة غسيل الاموال وتحديد معوقات التحقيق فيها وبيان اشكاليات تنسيق الجهود الدولية لمواجهتها وذلك من استخدام المنهج الوصفي التحليلي من خلال الاعتماد على بعض الدراسات والبوث السابقة والقوانين والاتفاقيات الدولية ذات الصلة.

Keywords: غسيل الاموال ، الجهود الدولية ، الاردن

206
Research Title: 3-D Printers and Copyright Issues with Particular Reference to the Jordanian Law
Author: Enas Mohammad Qutieshat, Published Year: 2019
Shari'a and Law Sciences ,
Faculty: Law

Abstract: 3D printing is relatively new and innovative technology that is changing the manufacturing market or dynamics at least at the consumer level. By clicking a button, a person who has a 3D printing machine can be able to download a computer-aided design (CAD) file, which instructs the printer to make a three-dimensional object . 3D printing allows people to become creators of things that they desire as long as they have access to the CAD file. Due to the capabilities of this new technology, it has been seen as a threat to big businesses and designers due to the fact that if a potential consumer of a certain product, gains access to the CAD file of that product and has access to a 3D printing machine, then he or she will not see the need to purchase that product due to the ease of production at home. This paper will highlight some relevant on copyright issues under the Jordanian law related to 3d printers.

Keywords: 3d printers, copyright, patent, CAD files.

207
Research Title: المسؤولية المدنية المترتبة على عمليات فصل التوائم الملتصقة من منظور شرعيّ وقانوني (Womb-Lease Contracts With Particular Reference To The Jordanian Law: Comparative Research)
Author: Enas Mohammad Qutieshat, Published Year: 2020
Faculty: Law

Abstract: إن التوائم الملتصقة حقلًا خصبًا للدراسات الطبية، في محاولة الوقوف على الأسباب الكامنة وراء تكونها والمشكلات الطبية المرافقة لها منذ لحظات الحمل والوضع وما بعد ذلك. وقد أصبحت مسألة فصل هذه التوائم مثيرة للجدل القانوني أيضًا خصوصًا عند الحديث المسؤولية المدنية المترتبة على عمليات فصل هذه التوائم. تتناول هذه الدراسة التعريف بالتوائم الملتصقة والوقوف على مدى مشروعية إجراء عمليات فصل هذه التوائم وشرعيتها انطلاقًا من التساؤل الآتي: هل الحديث عن هذه التوائم حديث عن شخص واحد بأعضاء إضافية أم شخصين التصقت أعضاؤهما معًا ويتوجب فصلهما، بحيث يستطيع كل منهما ممارسة حياته بشكل طبيعي، وعليه تحديد الآثار القانونية المترتبة على عمليات فصل هذه التوائم إذا ما كان لا بد من التضحية بأحدها. عمليات فصل التوائم الملتصقة مدار جدل قانوني واسع بين مؤيد ومعارض، إلا أنه وفي التشريع الأردني لا نجد نصًّا يسعفنا في تحديد مسؤولية الطبيب أو الجراح عن حالات الوفاة والتعطل التي قد تصيب أحد الجنينين أو كليهما نتيجة عملية الفصل، باستثناء ما هو موجود في القواعد التقليدية المنظمة للمسؤولية التقصيرية، وذلك على ضوء النصوص القانونيّة لقانون العقوبات الأردني، والقوانين المنظمة للعمل الطبي. إلا أن هذه القواعد بوضعها الحالي تحتاج وفي مجملها إلى إدخال بعض التعديلات حتى يتمكن القاضي من تقرير المسؤولية المدنية المترتبة على عمليات فصل التوائم الملتصقة.

Keywords: التوائم الملتصقة، خطأ طبي، المسؤولية العقدية، المسؤولية التقصيرية، عمليات جراحية

208
Research Title: The Impact of the Corona Pandemic on the Performance of Contractual Obligations under the Provisions of Jordanian Defense and Civil Laws
Author: Enas Mohammad Qutieshat, Published Year: 2021
Faculty: Law

Abstract: Contractual obligations in Jordan have been affected by the worldwide outbreak of coronavirus and the restrictive measures it has adopted, such as the announcement of the Defense Law. The enforcement of the Defense Law led in some cases to the impossibility to perform the contractual obligations that were previously established which triggered the parties to the contract-the debtor in particular-to invoke the application of force majeure or the doctrine of exceptional circumstances, and in both cases either demand contract frustration or mitigation of the contract. This research addresses the impact of applying the doctrine of unexpected circumstances and force majeure on contractual obligations following the provisions of Jordanian law and considering the legal texts of the defense and civil laws in force in Jordan. To achieve the goals of this research, the relevant legal texts were covered with explanation and detail, supported by the jurisprudence of the Jordanian courts.

Keywords: Corana, Contract, Civil Law

209
Research Title: Psychological Impact of COVID-19 Epidemic among the General Population in Jordan
Author: Fadwa Al-Halaiqa, Published Year: 2021
Frontiers in Psychiatry, 12:618993.
Faculty: Nursing

Abstract: Objective: Pandemics are claimed to result in certain stressors. However, the potential psychological impact of a pandemic is often overlooked. The current study aimed to assess the psychological impact of the COVID-19 pandemic on Jordanians and to evaluate the influence of the socio-demographic variables on this impact. Method: The current study employed a descriptive cross-sectional design using the Impact of Event Scale-Revised (IES-R) via a web-based questionnaire. The researchers utilized convenience sampling which led to a total of 2,854 participants from the 12 governorates of Jordan. Results: The average score of the participants' responses on the IES-R questionnaire turned out to be 22.5 ± 11.7. Females were found to have more than double the odds of having an increased IES-R score [odds ratio (OR) = 2.2, confidence interval (CI) = 1.76-2.67] and participants who were older than 65 years had triple the odds of having the same risk compared to young adults aged 18-25 years (OR = 3.1, CI = 1.3-7.4). Significantly, having a family member diagnosed with COVID-19 placed individuals at a 7-fold higher risk of having an increased IRS-R score compared to their counterparts who did not have a family member diagnosed with COVID-19 (OR = 7, CI = 3.7-13.3). Conclusion: COVID-19 pandemic has imposed significant level of psychological burden on Jordanians, especially among females. Governments should collaborate with psychiatrists, mental health professionals and local institutions to offer high-quality, timely crisis-oriented psychological services to the affected individuals for the duration of the COVID-19 pandemic.

Keywords: COVID-19; anxiety; mental health; psychological; stress.

210
Research Title: Cybersecurity: Ambient Technologies, IoT, and Industry: Privacy Preservation tools and Techniques in Artificial Intelligence
Author: Nameer Nadhem El-Emam, Published Year: 2021
Faculty: Information Technology

Abstract: Privacy preservation tools using particle swarm optimization (PSO) is one of the most common metaheuristics swarm intelligence algorithms [1]. It has been widely used for a large portion of optimization problems, as its implementation is scalable, robust, flexible, and simple [2]. It also strikes a balance between exploratory and exploitative behavior, to provide a high quality of results. On the other hand, intrusion detection is a hot topic, since the security of the data is a critical issue in today’s life. Thus, the application of intrusion detection, considering the classification algorithms that are optimized by PSO, is covered extensively in the literature. In this chapter, several approaches combining classification techniques with PSO for intrusion detection are reviewed and summarized. A general presentation of the PSO algorithm is provided. PSO-based techniques for intrusion detection are introduced and detailed. The most common datasets and evaluation measures are discussed. Finally, a summary discussion of PSO-based intrusion detection techniques is provided, along with possible directions and insights.

Keywords: Privacy preservation Particle swarm optimization Support vector Neural network