The International Arab Journal of Information Technology (IAJIT)

..............................
..............................
..............................
..............................
..............................

Critical Proficiencies for Requirements Analysts: Reflect a Real-world Needs

Abstract: Requirements Determination (RD) is regarded as a critical phase of software development, In particular, the

Aware-Routing Protocol using Best First Search Algorithm in Wireless Sensor

and areas; this led to ubiquity wireless sensor networks everywhere. Energy consumption is considered as the biggest
#

A new Model of Multi-Key Generation for RFID Access Control System

handling modern security threats, with access decisions influenced by several factors, including situational, environmental

A Machine Learning System for Distinguishing Nominal and Verbal Arabic Sentences

structures than other languages. Thus, it is important to learn about the specialty and the structure of this language to deal

Security-aware CoAP Application Layer Protocol for the Internet of Things using Elliptic-Curve

University, Jordan 3Department of Information Technology, Al-Balqa Applied University, Jordan

Building a Syntactic-Semantic Interface for aSemi- Automatically Generated TAG for Arabic

providing information about the correct structural representations of the sentences and their meaning. To date, there is not a

RNN-LSTM Based Beta-Elliptic Model for Online Handwriting Script Identification

dealing with sequential input data. In this context, the proposed system aims to classify the online handwriting scripts based on

A Quality-Aware Context Information Selection Based Fuzzy Logic in IoT Environment

Things (IoT). An important issue in such systems is faced by context data distribution with a sufficient level of quality i.e.,

Using the MQTT Protocol in Real Time for

Electrical and Computer Engineering Department, University of Michigan, Dearborn