Ja’far Alqatawna
YOU?
Author Swipe
View article: Challenges Faced by Undergraduates in the Online Classroom of an English Medium Higher Education Institution in the UAE
Challenges Faced by Undergraduates in the Online Classroom of an English Medium Higher Education Institution in the UAE Open
Jaggars, 2014), self-efficacy, self-esteem and preference (Jaggars, 2014), issues with technology skills (Milheim, 2012), technical problems (Jaggars, 2014), suitability of online delivery (Milheim, 2012), and replication of the Face-to-Fa…
View article: The Impact of Social Engineer Attack Phases on Improved Security Countermeasures
The Impact of Social Engineer Attack Phases on Improved Security Countermeasures Open
The objective of this paper is to examine a model to identify Social Engineer Attack Phases to improve the security countermeasures by Social-Engineer Involvement. A questionnaire was developed and distributed to a sample of 243 respondent…
View article: Violence Detection over Online Social Networks: An Arabic Sentiment Analysis Approach
Violence Detection over Online Social Networks: An Arabic Sentiment Analysis Approach Open
Today, the influence of the social media on different aspects of our lives is increasing, many scholars from various disciplines and majors looking at the social media networks as the ongoing revolution. In Social media networks, many bond…
View article: Modeling Employee Flexible Work Scheduling As A Classification Problem
Modeling Employee Flexible Work Scheduling As A Classification Problem Open
Many organizations have adapted flexible working arrangements during COVID19 pandemic because of restrictions on the number of employees required on site at any time. Unfortunately, current employee scheduling methods are more suited for c…
View article: Towards Automated Comprehensive Feature Engineering for Spam Detection
Towards Automated Comprehensive Feature Engineering for Spam Detection Open
View article: Towards Service Integration In Electronic Government Implementations
Towards Service Integration In Electronic Government Implementations Open
Service integration is the ultimate goal of electronic government projects all over the world where governments seek to provide integrated services to the public in more efficient and effective ways using “one stop portal". The general aim…
View article: EMFET: E-mail Features Extraction Tool
EMFET: E-mail Features Extraction Tool Open
EMFET is an open source and flexible tool that can be used to extract a large number of features from any email corpus with emails saved in EML format. The extracted features can be categorized into three main groups: header features, payl…
View article: Optimizing Feedforward Neural Networks Using Biogeography Based Optimization for E-Mail Spam Identification
Optimizing Feedforward Neural Networks Using Biogeography Based Optimization for E-Mail Spam Identification Open
Spam e-mail has a significant negative impact on individuals and organizations, and is considered as a serious waste of resources, time and efforts. Spam detection is a complex and challenging task to solve. In literature, researchers and …
View article: Pattern Recognition of Thermal Images for Monitoring of Breathing Function
Pattern Recognition of Thermal Images for Monitoring of Breathing Function Open
Breathing is a crucial human process that requires easy and accurate monitoring.There are several available breathing monitoring methods which are based on strapping subjects with special sensors for monitoring their breathing rate.The res…
View article: Section Based Hex-Cell Routing ALGORITHM (SBHCR)
Section Based Hex-Cell Routing ALGORITHM (SBHCR) Open
A Hex-Cell network topology can be constructed using units of hexagon cells.It has been introduced in the literature as interconnection network suitable for large parallel computers, which can connect large number of nodes with three links…
View article: Improving Knowledge Based Spam Detection Methods: The Effect of Malicious Related Features in Imbalance Data Distribution
Improving Knowledge Based Spam Detection Methods: The Effect of Malicious Related Features in Imbalance Data Distribution Open
Spam is no longer just commercial unsolicited email messages that waste our time, it consumes network traffic and mail servers’ storage. Furthermore, spam has become a major component of several attack vectors including attacks such as phi…