Search

Results: 93
A Silver Lining of Coronavirus
Jordan, like other countries in the world, is facing the Coronavirus pandemic and is making a great effort to continue education in Jordanian schools and universities through distance education. To evaluate this novel...
Approaches for Testing and Evaluation of XACML Policies
Izzat M. Alsmadi
Jan 01, 2014
Security services are provided through: The applications, operating systems, databases, and the network. There are many proposals to use policies to define, implement and evaluate security services. We discussed a full test...
Activities and Trends in Testing Graphical User Interfaces Automatically
Izzat M. Alsmadi
Jan 01, 2011
This study introduced some new approaches for software test automation in general and testing graphical user interfaces in particular. The study presented ideas in the different stages of the test automation framework. Test...
Measuring Defect Datasets Sensitivity to Attributes Variation
Izzat M. Alsmadi
Jan 01, 2012
The study of the correlation between software project and product attributes and its modules quality status (faulty or not) is the subject of several research papers in the software testing and maintenance fields. In this paper...
Activities and Trends in Testing Graphical User Interfaces Automatically
Izzat M. Alsmadi
Jan 01, 2011
This study introduced some new approaches for software test automation in general and testing graphical user interfaces in particular. The study presented ideas in the different stages of the test automation framework. Test...
Mental health and decisions under risk among refugees and the public in Lebanon
Abstract: Lebanon is rapidly adapting public services to meet local needs as well as those of refugees from conflict regions such as Syria. However, these challenges are complicated by high volumes of individuals with poor...
Published by:
Misconfiguration in Firewalls and Network Access Controls
Firewalls and network access controls play important roles in security control and protection. Those firewalls may create an incorrect sense or state of protection if they are improperly configured. One of the major...
Challenges of Utilizing E-Learning Systems in Public Universities in Jordan
This research paper lists and discusses major challenges and barriers that may face faculty members at the public universities in Jordan in employing e-Learning systems authoring tools in their instructions. It also proposes...
Evaluation of Spam Impact on Arabic Websites Popularity
The expansion of the Web and its information in all aspects of life raises the concern of how to trust information published on the Web especially in cases where publisher may not be known. Websites strive to be more popular and...
Using Data Analytics to Filter Insincere Posts from Online Social Networks. A case study
The internet in general and Online Social Networks (OSNs) in particular continue to play a significant role in our life where information is massively uploaded and exchanged. With such high importance and attention, abuses of...
Clustering and Classification of Email Contents
Izzat M. Alsmadi, I. Alhami
Jan 01, 2015
Information users depend heavily on emails' system as one of the major sources of communication. Its importance and usage are continuously growing despite the evolution of mobile applications, social networks, etc. Emails are...
Enhance Rule Based Detection for Software Fault Prone Modules
Software quality assurance is necessary to increase the level of confidence in the developed software and reduce the overall cost for developing software projects. The problem addressed in this research is the prediction of...
Enhance Rule Based Detection for Software Fault Prone Modules
Software quality assurance is necessary to increase the level of confidence in the developed software and reduce the overall cost for developing software projects. The problem addressed in this research is the prediction of...
Activities and Trends in Testing Graphical User Interfaces Automatically
Izzat M. Alsmadi
Jan 01, 2011
This study introduced some new approaches for software test automation in general and testing graphical user interfaces in particular. The study presented ideas in the different stages of the test automation framework. Test...
Approaches for Testing and Evaluation of XACML Policies
Izzat M. Alsmadi
Jan 01, 2014
Security services are provided through: The applications, operating systems, databases, and the network. There are many proposals to use policies to define, implement and evaluate security services. We discussed a full test...
Rating News Claims
News claims that travel the Internet and online social networks (OSNs) originate from different, sometimes unknown sources, which raises issues related to the credibility of those claims and the drivers behind them....
Rating News Claims
News claims that travel the Internet and online social networks (OSNs) originate from different, sometimes unknown sources, which raises issues related to the credibility of those claims and the drivers behind them....
Call Graph Based Metrics to Evaluate Software Design Quality
Software defects prediction was introduced to support development and maintenance activities such as improving the software quality through finding errors or patterns of errors early in the software development process. Software...

|<

<

1

2

3

4

>

>|