11
Thesis Title: النكتة في الأردن من منظور تداولي وتواصلي
Author: عمر عوّاد عبدالله الردّاد, Supervisor: الدكتور يوسف الربابعة, Year: 2020
Faculty: Arts, Department: Arabic Language and Literature

Abstract: سعت الدراسة للوقوف على تحوّلات النكتة بوصفها خطاباً جديداً، تمرّد على مؤسسة الإضحاك والتسلّي، ما أفضى إلى تشكّل خطابٍ يحقّق علوّاً على الخطاب التقليدية بسلطاته، فنُزعت سلطة النّاص لصالح سلطتي المتلقّي والرسالة، مستفيداً مما وفّرته التكنولوجيا الحديثة من أدوات تواصلية جديدة ومتشعبة. ولأنّ النكتة نصٌ مطاوعٌ في تشكّله كانت تشاركيته مع أجناس أدبية أخرى إحدى أهم ميزاته التي وفّرت له مرونةً عاليةً، كان لا بدّ من دراسته في إطار المعنى وأنساقه، فكان المنهج التداولي بسعته وإطلالته على النّص من داخله وخارجه وتقاطعه مع العلوم الإنسانية الأخرى طريقَ الباحث لتلمّس خطاب النكتة، فتوقفت الدراسة عند مفاهيم: النكتة، التداولية وإشكالياتها عبر محطتين الأولى: بنية النكتة ومكوناتها وتقنياتها، والثانية: تأصيل النكتة في الأردن سيسيوثقافياً ورصد تحولاتها بالتركيز على النكتة الناجزة التي يجري تداولها في إطار المسكوت عنه. وقد خلصت الدراسة إلى أنّ خطاب النكتة لا يخضع لمقاييس الشكل والمضمون، لأنّه خطاب متمرد يولّد المعنى وفق معطيات زمانية ومكانية وفّرت له مفاهيم المنهج التداولي ومعاييره صيرورة مختلفة وتلقياً جديداً.

Keywords: النكتة، الأردن، منظور، تداولي، تواصلي

12
Thesis Title: البدائل الإيقاعية في قصيدة النثر العربية - شعر أمجد ناصر، عباس بيضون، سيف الرحبي
Author: رقية محمد علي كندي, Supervisor: الدكتور عمر الكفاوين, Year: 2020
Faculty: Arts, Department: Arabic Language and Literature

Abstract: This study scrutinizes and addressing the rhythmic alternatives in the Arabic prose poem, based on the poetry of three poets, Amjad Nasser, Abbas Beydoun, Saif Al Rahbi. Taking some of their prose poems as models to be analyzed and processed in accordance with systems and new rhythmic alternatives. The study aimed at analyzing the rhythmic alternatives in the prose poem, and how to form the text in accordance with the prose poem. Additionally, the study focused on disclosing the particularity of these alternatives and their diversity from traditional rhythms, as well as, shedding the light on the most important ones such as, visual and phonological rhythms. The study demonstrated the concept of each of: the vocal rhythm and its specificity in the prose poem, the visual rhythm and its significance and forms, such as calligraphy and its structure and so on. The study addressed some of the poetic models of the three poets, which have been processed according to the systems of phonological and visual rhythms. The study followed the descriptive analytical approach in dealing with rhythmic alternatives in the texts of prose poem, in addition to the technical method that was used to reveal the aesthetics of artistic texts of poetry.

Keywords: prose poem, rhythmic alternatives, sound rhythm, visual rhythm

13
Thesis Title: Wheelchair Neuro-Fuzzy Control Using Brain-Computer Interface
Author: Mokhles M Abdulghani, Supervisor: Prof. Kasim Al-Aubidy, Year: 2020
Faculty: Engineering, Department: Mechatronics Engineering

Abstract: The main aim of this research is to find a mobility solution for physically disabled people using human brain signals, where they can’t move their muscles. The classification algorithm of the brain activities will be presented. A real-time computer control system of an electric wheelchair has been designed and implemented. This design is based on a brain-computer interface that receives and processes the electroencephalographic (EEG) signals to classify the required commands to drive the wheelchair. An adaptive Neuro-Fuzzy Inference System (ANFIS) technique will be used in the controller design for actuating motors of the wheelchair. A modified method has been presented to design Multiple-Input, Multiple-Output (MIMO) ANFIS using only MATLAB. This controller depends on real data received from obstacle avoidance sensors and the brain-computer interface. By combining the concepts of soft computing and mechatronics, the implemented wheelchair will be more sophisticated and gives people more mobility. The wheelchair has been equipped with GPS tracking and battery level monitoring to guaranty more safety for the user. The resulting system has been tested on 3D simulation software (V-REP) using a modified method to interface V-REP with MATLAB. The obtained results from wheelchair prototype and 3D simulation model demonstrated the performance of the proposed real-time controller in dealing with user requirements and working environment constraints. The cost of the proposed smart wheelchair is suitable with user case.

Keywords: wheelchair, Neuro-Fuzzy, Brain-Computer Interface

14
Thesis Title: Intelligent Scheduling of Mobile Robots in Flexible Manufacturing Systems
Author: Hana Al-Momani, Supervisor: Prof. Kasim Al-Aubidy, Year: 2020
Faculty: Engineering, Department: Mechatronics Engineering

Abstract: The main objective of this research work is to design and evaluate intelligent scheduling algorithms for mobile robots and CNC machines, all are working in a flexible manufacturing system (FMS). Load and unload stations and robot charge station are also existing in this FMS. The goal of this scheduling is to minimize the production cycle time (Makespan). Each machine, station and robot is considered as a node in a wireless sensor network. Information between FMS components are transferred through a wireless sensor network and used by the main controller. Fuzzy–based decision makers are required to manage and control the FMS environment for operations sequencing, tasks sequencing, and robot routing. A simulated study will be considered to test and verify the flexibility of the proposed system and the capability of sequencing and scheduling algorithms to use effectively available machines and mobile robots. Two scenarios are considered: the first is that each machine performs only one specified operation, and the second scenario is that each machine can perform one of two operations. The proposed scheduling algorithms have been tested to check system performance in reaching the best solution within relatively minimum processing time. The performance of the implemented FMS has been compared with others given in literature and the obtained results demonstrate features of the scheduling algorithms.

Keywords: Scheduling, Mobile, Robots

15
Thesis Title: An Enhanced User Authentication and Authorization Framework in the Internet of Things Protocols
Author: Ammar Ahmad Mohammad, Supervisor: Dr. Hasan Al-Refai, Year: 2020
Faculty: Information Technology, Department: Computer Science

Abstract: Internet of things (IoT) has become one of the most attractive domains nowadays, and this is due to the concept of IoT that depends on creating a special network between physical devices such as vehicles, home appliances, and many other items. Common protocols such as Wi-Fi and 2G/3G/4G cellular became insufficient for the IoT networks since they already designed to serve appliance with huge processing capabilities like laptops and PCs. Also, most of these protocols are centralized and depend on existing infrastructure. Newly developed protocol dedicated to the IoT had been developed to meet IoT network requirements such as (Z-Wave, 6LowPAN, and Thread) that can handle many factors like range, data requirements, security, and power demands, and battery life. Security issues on the developed protocols were a major concern as vulnerabilities in such systems may reflect on fatal catastrophes. However, the security procedures supported by the IoT protocols were not sufficient to protect IoT networks from security breaches. In this thesis, an enhanced IoT security framework for authentication and authorization was proposed and implemented to protect the IoT protocols from different types of attacks like Man in the middle attack, reply attack, and brute force attack. The proposed framework combines an enhanced token authentication that has identity verification capabilities, with a new sender verification mechanism on the IoT device-side based on timestamp, which cancels the need for local identity verification methods on the IoT devices. The testing of the presented IoT security framework was done using security analysis over different types of attacks compared with previous related frameworks. The analysis shows a high capability of the proposed framework to protect IoT networks against many types of attacks compared with currently available security frameworks. Finally, the proposed framework was developed using windows application that simulates the framework phases in order to check its validity over a real network and calculate the payload time added by the proposed security framework.

Keywords: IoT, Authentication, Authorization, Framework