Author: Mohammad Taye, Published Year: 2016
Computer Applications: An International Journal (CAIJ), Vol.3, No.1
Faculty: Information Technology

Abstract: People who have problems with talking, in general, are facing difficulty in communication with others, these disabilities may cause embarrassment to them. Therefore, we have developed a new tool that could help speechless people to share their ideas and conversations with others. This tool will overcome these problems by turning sign language into spoken words, allowing easier communication with others. This project based on hardware device that convert Sign Language to voice. So, the person who cannot speck could be able to use it to transfer his sign to voice. The tool can be used by wearing the special hardware which consists of the smart gloves, a speaker and the interpreter box. Indeed, the sign language only used by speechless people so it’s not clear to anyone , so this tool convert the sign language to voice throw smart gloves that will understand the sign, and generate voice throw speaker .

Keywords: sign language, smart gloves, speaker, interpreter

Research Title: Social RE-PBL: An Approach for Teaching Requirements Engineering Using PBL, SNSs, and Cloud Storages and File-Sharing Services
Author: Lamis Al-Qoran, Published Year: 2021
International Journal of Information and Education Technology, 11
Faculty: Information Technology

Abstract: Requirements engineering process showed that it has the potential to affect software development process and consequently cause unexpected problems in the produced software. Reducing the likelihood of such issues requires proper preparation for software engineering students during their undergraduate studies to reduce the gap between theory and practice. Students must develop the soft skills that are needed to practice software engineering activities, especially requirements engineering. Accordingly, encouraging students to learn and practice requirements engineering concepts and activities are required. Students undertake the requirements engineering course in one semester, where the lecturer focuses on delivering the theoretical concepts to students which creates teacher-centred learning. It is difficult for students to develop the required critical thinking and communication skills that enable them to solve real-world problems in such a teacher-centred environment. This study uses Project-Based Learning (PBL), Social Networking Sites (SNSs) and cloud enhanced communication to design a non-traditional teaching approach to improve students’ learning and to achieve a learner-centred learning environment in a requirements engineering course. The developed approach was applied to a requirements engineering course at our university to investigate its effectiveness and its impact on students’ learning ability. The students in the investigational group learned with the new method; however, the students in the control group learned with the traditional learning method. The results of our experiment show that the proposed approach significantly improved the achievement, motivation and attitude of our students as well as their ability to approach and solve real-world problems.

Keywords: Project-based learning, RE education, social networks sites (SNSs) for education, teaching requirements engineering.

Research Title: Education for Sustainable Development: A Qualitative Analytical Study on the Impact of the Jordanian Universities’ Role in Supporting Innovation among University Students
Author: Amani Ghazi Jarrar, Published Year: 2021
International Journal of Higher Education, 10
Faculty: Arts

Abstract: This study aimed at exploring and theorizing the role of Jordanian Universities in supporting innovation among university students within the context of education for sustainable development from the point of view of Jordanian University students. For that, the researcher adopted the grounded theory methodology by Strauss and Corbin. The study was conducted at two Jordanian Universities: the University of Jordan and Philadelphia University in the academic year (2019-2020), and the study population consisted of students from the two universities. The researcher chose (300) students from both genders from different faculties and academic years. By applying the grounded theory, the study concluded that the key category that emerged after analyzing the student’s responses describing the impact of the Jordanian Universities’ role in supporting innovation among university students for educational sustainable development is the emphasis on the need for developing proper University innovation ecosystems in their educational systems. Also, the respondents- through online interviews - have emphasized this concept of proper University innovation ecosystems. The key category of this study found that positive and negative impacts could result from applying or neglecting to apply this concept, which generated behaviors toward the concept, which could be considered as the phenomena in the current research.

Keywords: Education; Sustainable Development; Jordanian Universities; Innovation.

Research Title: A Genetic Framework model for Self-Adaptive software
Author: Enas Tawfiq Al-Naffar, Published Year: 2017
Faculty: Information Technology

Abstract: Self-adaptive software changes its behavior at runtime without affecting the ‎running system. It has recently been a rich research area. Lots of organizations have adopted it in ‎their environments to accommodate with changing requirements. Lots of bio-inspired research ‎works, which are better than the conventional ones, have been conducted in the area of self-‎adaptive software. All of them have focused on the external behavior of biological entities (like ‎birds, ants, immunity, etc.) without going in depth into their genetic material that causes this ‎behavior and constitutes the challenge the work presented in this paper dealt with. Materials and ‎Methods: This paper proposes a solution to the above current challenge by developing a ‎framework model for self-adaptive software; inspired by the adaptation (evolution) of biological ‎entities and taking into consideration the role of genetic material in the adaptation process. Its scope ‎is limited to changes that take place at runtime but that are known at design. Results: The obtained ‎framework model was evaluated through its reuse in software objects evolution. The practical and ‎theoretical obtained results were valuable in the object-oriented paradigm. The proposed framework ‎completes the others bio-inspired research current works by providing a natural implementing way. ‎The integration of the current bio-inspired approaches (which deal with natural entities behaviors ‎external modeling) with the proposed framework (which deals with genetics-inspired internal ‎modeling of these behaviors) will lead to homogenous and coherent bio-inspired approaches to ‎self-adaptive software. Conclusion: The proposed framework is limited to self-adaptations ‎predicted at the requirements and design steps in self-adaptive software engineering, which is ‎significant in practice. However, the unpredicted adaptation (to unpredicted errors, environment ‎requirements, etc.) will be a genetics-inspired approach real challenge. Separate evaluation of the ‎proposed framework performance is not determinant. However, the performance evaluation of the ‎actual bio-inspired hybrid approaches against the proposed integrated ones (which is impossible to ‎achieve actually) will be valuable. It might be expected that the integrated ones will be better (in the ‎whole self-adaptive software engineering processes) than the hybrid current ones. The homogeneity ‎of approaches has its important impact. ‎

Keywords: Self-adaptive software, Bio-inspired self-adaptive software, Genetics-inspired software modelling

Research Title: Classification and Prediction of Bee Honey Indirect Adulteration Using Physiochemical Properties Coupled with K-Means Clustering and Simulated Annealing-Artificial Neural Networks (SA-ANNs)
Author: Ahmad Jobran Al-Mahasneh, Published Year: 2021
Journal of Food Quality, 2021
Faculty: Engineering and Technology

Abstract: The higher demand and limited availability of honey led to different forms of honey adulteration. Honey adulteration is either direct by addition of various syrups to natural honey or indirect by feeding honey bees with sugar syrups. Therefore, a need has emerged for reliable and cost-effective quality control methods to detect honey adulteration in order to ensure both safety and quality of honey. In this study, honey is adulterated by feeding honey bees with various proportions of sucrose syrup (0 to 100%). Various physiochemical properties of the adulterated honey are studied including sugar profile, pH, acidity, moisture, and color. The results showed that increasing sucrose syrup in the feed resulted in a decrease in glucose and fructose contents significantly, from 33.4 to 29.1% and 45.2 to 35.9%, respectively. Sucrose content, however, increased significantly from 0.19 to 1.8%. The pH value increased significantly from 3.04 to 4.63 with increase in sucrose feed. Acidity decreased slightly but nonsignificantly with increase in sucrose feed and varied between 7.0 and 4.00 meq/kg for 0% and 100% sucrose, respectively. Honey’s lightness (L value) also increased significantly from 59.3 to 68.84 as sucrose feed increased. Other color parameters were not significantly changed by sucrose feed. K-means clustering is used to classify the level of honey adulteration by using the above physiological properties. The classification results showed that both glucose content and total sugar content provided 100?curate classification while pH values provided the worst results with 52% classification accuracy. To further predict the percent honey adulteration, simulated annealing coupled with artificial neural networks (SA-ANNs) was used with sugar profile as an input. RBF-ANN was found to provide the best prediction results with SSE = 0.073, RE = 0.021, and overall R2 = 0.992. It is concluded that honey sugar profile can provide an accurate and reliable tool for detecting indirect honey adulteration by sucrose solution.

Keywords: classification, prediction, k-means

Research Title: Stemming Effects on Sentiment Analysis using Large Arabic Multi-Domain Resources
Author: Said Ahmad Ammar Ghoul, Published Year: 2019
2019 Sixth International Conference on Social Networks Analysis, Management and Security (SNAMS),
Faculty: Information Technology

Abstract: Sentiment analysis is an area of great interest in research because of its importance and advantages in many different domains. Different approaches and techniques are used to classify the sentiment of texts, and there are different algorithms proposed to improve the performance through text preprocessing. Stemming is one of preprocessing step that is used in many research to enhance the performance of sentiment classification. In this research, we provide new comparative experiments on the impacts and effects of using two of the most commonly used stemmers in the Arabic language; light stemmer and Khoja stemmer in the preprocessing phase of sentiment analysis. We used large Arabic multi-domain datasets that include positive and negative reviews across multiple domains. Five classifiers are used; Naïve Bayes, support vector machines, k-nearest neighbors, decision trees, and logistic regression. The results indicate that Khoja stemmer outperformed that light stemmer Khoja stemmer in terms of precision, recall, f-measure, and accuracy, and it has an advantage in minimizing training time.

Keywords: Stemming, Sentiment Analysis, Arabic light stemmer, Khoja's stemmer

Research Title: ‎A Holystic Self-adaptive systems model‎
Author: Said Ahmad Ammar Ghoul, Published Year: 2021
International Journal of Software Engineering & Applications ‎, ‎12, 2/3, May 2021‎
Faculty: Information Technology

Abstract: The recent self-adaptive software systematic literature reviews stated clearly the following ‎insufficiencies: (1) the need for a holistic self-adaptive software model to integrate its different ‎aspects (2) The limitation of adaptations to context changes (3) The absence of a general and ‎complete adaptations’ picture allowing its understandability, maintainability, evaluation, reuse, and ‎variability. (4) The need for an explicit and a detailed link with resources, and (5) a usual limitation ‎to known events. ‎ In order to metigate these insufficiencies, this paper is proposing a holistic model that integrates the ‎operating, adaptations, and adaptations’ manager aspects. The proposed model covers all possible ‎adaptations: operating (dealing with software functions failures), lifecycle (handling adaptations ‎required by some software lifecycle steps), and context (facing context changes events). The ‎presented work introduces the concept of software adaptations process integrating the ‎specifications of all the above kind of adaptations. In fact, this work shows an explicit trace to its ‎pure bio-inspired origin. ‎ An application of the proposed approach on a “car industry case study” demonstrated its feasibility ‎in comparison with similar works that proved its meaningful added value and its promising research ‎perspectives.‎

Keywords: Self-adaptive software, bio-inspired approach, adaptation events, immune system.‎

Research Title: ‎A Feature Model Based Configuration Reuse for Context-aware Systems‎
Author: Said Ahmad Ammar Ghoul, Published Year: 2021
Computers, Materials & Continua ‎, Under press
Faculty: Information Technology

Abstract: Most of Self-Adaptive Systems (SAS) use Feature Models (FMs) to represent their complex ‎architecture and benefit from reusing commonalities and variability information. However ‎triggering SAS reconfiguration process, each time a system needs to be adapted, continues to ‎cost time and effort. Current FM techniques have modelled SAS concepts, focusing on ‎representing and reusing elementary features without taking into consideration modelling and ‎reusing configurations. This work presents an extension to the FM in order to remedy this ‎important problem by introducing and managing the configuration feature. Evaluation shows that ‎the reuse of configuration feature reduces reconfiguration process effort and time during the run ‎time in order to meet the required scenario according to the context. ‎

Keywords: Self-Adaptive system, Feature Model, System reuse, Configuration management, Variability ‎modelling‎

Research Title: Cybersecurity: Ambient Technologies, IoT, and Industry: Privacy Preservation tools and Techniques in Artificial Intelligence
Author: Nameer Nadhem El-Emam, Published Year: 2021
Faculty: Information Technology

Abstract: Privacy preservation tools using particle swarm optimization (PSO) is one of the most common metaheuristics swarm intelligence algorithms [1]. It has been widely used for a large portion of optimization problems, as its implementation is scalable, robust, flexible, and simple [2]. It also strikes a balance between exploratory and exploitative behavior, to provide a high quality of results. On the other hand, intrusion detection is a hot topic, since the security of the data is a critical issue in today’s life. Thus, the application of intrusion detection, considering the classification algorithms that are optimized by PSO, is covered extensively in the literature. In this chapter, several approaches combining classification techniques with PSO for intrusion detection are reviewed and summarized. A general presentation of the PSO algorithm is provided. PSO-based techniques for intrusion detection are introduced and detailed. The most common datasets and evaluation measures are discussed. Finally, a summary discussion of PSO-based intrusion detection techniques is provided, along with possible directions and insights.

Keywords: Privacy preservation Particle swarm optimization Support vector Neural network

Research Title: Cybersecurity: Ambient Technologies, IoT, and Industry: Digital Right Management in Computing Environment
Author: Nameer Nadhem El-Emam, Published Year: 2021
Faculty: Information Technology

Abstract: In this chapter, we define the ethics and technoethics concepts. The main challenges and issues of ethics in technology are investigated, as well. The technology of cybersecurity is then investigated and its definition, management, and impact are discussed. After that, the main applications of cybersecurity are explained, considering two main types of applications: secure web applications and secure mobile applications. Finally, ethics for cybersecurity applications are explored. This includes the privacy of users, freedom of speech, intellectual property rights, law protection, and responsible crimes

Keywords: Digital right management Technoethics Cybersecurity Intellectual property rights Privacy