The International Arab Journal of Information Technology (IAJIT)

New Prototype of Hybrid 3D-Biometric Facial

Haitham Issa1, Sali Issa2, and Mohammad Issa3 1 Department of Communications and Electronics Engin eering, Isra University, Jordan 2, 3Department of Electronics and Information Engineering, Huazhong University of Science and 
#

Security-aware CoAP Application Layer Protocol for the Internet of Things using Elliptic-Curve

University, Jordan 3Department of Information Technology, Al-Balqa Applied University, Jordan

An Automated Real-Time People Tracking System Based on KLT Features Detection

Information Technology Department, Al-Balqa Applied  University, Jordan 2Department of Computer Science, Princess Sumaya Uni versity for Technology, Jordan 3Department of Computer Science, Loughborough Univer sity, UK 

Query Dispatching Tool Supporting Fast Access to Data Warehouse

1Computer Science Department, University of Technolo gy, Iraq 2Computer Science and Informatics College, Amman Ara b University, Jordan 3Computer Science Department, Al'Balqa’ Applied University, Jordan

Performance Evaluation of Industrial Firms Using DEA and DECORATE Ensemble Method

Hassan Najadat1, Ibrahim Al-Daher2, and Khaled Alkhatib1 1Computer Information Systems Department, Jordan University of Science and Technology, Jordan 2Computer Science Department, Jordan University of Science and Technology, Jordan

DoS and DDoS Attack Detection Using Deep Learning and IDS

Mohammad Shurman1, Rami Khrais2, and Abdulrahman Yateem1 1Jordan University of Science and Technology, Network Engineering and Security Department, Jordan 2Jordan University of Science and Technology, Computer Engineering Department, Jordan

Discovery of Arbitrary-Shapes Clusters Using DENCLUE Algorithm

Mariam Khader1 and Ghazi Al-Naymat2,1 1Departmentof Computer Science, Princess Sumaya University for Technology, Jordan 2Department of IT, Ajman University, UAE

Mitigating Insider Threats on the Edge: A Knowledgebase Approach

Qutaibah Althebyan1,2 1College of Engineering, Al Ain University, UAE 2Software Engineering Department, Jordan University of Science and Technology, Jordan

Intelligent Association Classification Technique for Phishing Website Detection

Mustafa Al-Fayoumi1, Jaber Alwidian2, and Mohammad Abusaif2 1Computer Science Department, Princess Sumaya University for Technology, Jordan 2Big Data Department, Intrasoft Middle East, Jordan

Direct Text Classifier for Thematic Arabic Discourse Documents

Khalid Nahar1, Ra’ed Al-Khatib1, Moy'awiah Al-Shannaq1, Mohammad Daradkeh2, and Rami Malkawi3 1Department of Computer Sciences, Yarmouk University, Jordan 2Department of Management Information System, Yarmouk University, Jordan 3Department of Computer Information System, Yarmouk University, Jordan

A Fog Computing-based Framework for Privacy Preserving IoT Environments

Dhiah el Diehn Abou-Tair1, Simon Büchsenstein2, and Ala’ Khalifeh1 1School of Electrical Engineering and Information Technology, German Jordanian University, Jordan 2Embedded Systems Engineering, University of Freiburg, Germany

Improved Steganography Scheme based on Fractal Set

Mohammad Alia1 and Khaled Suwais2 1Faculty of Sciences and Information Technology, Al-Zaytoonah University of Jordan, Jordan 2Faculty of Computer Studies, Arab Open University, Saudi Arabia