Papers by Ahmad Al-Khasawneh
A Method for Classification Using Data Mining Technique for Diabetes: A Study of Health Care Information System
International Journal of Healthcare Information Systems and Informatics, 2015
Diagnosis of Breast Cancer Using Intelligent Information Systems Techniques
International Journal of E-Health and Medical Communications, 2016
Factors Contributing to E-Learning Success
International Journal of Information and Communication Technology Education, 2015
Challenges to the Successful Implementation of Online Voting for E-Democracy in Developing Countries' Initiatives
International Journal of Sociotechnology and Knowledge Development, 2014

A standards–based framework of software configuration derived from system requirements
International Journal of Computer Applications in Technology, Mar 20, 2015
ABSTRACT The European ECSS series of standards for the aerospace industry includes system configu... more ABSTRACT The European ECSS series of standards for the aerospace industry includes system configuration requirements as one of sixteen types of Non-Functional Requirement NFR for embedded and real time software. A number of concepts are provided in the ECSS, ISO standards to describe the various types of candidate configuration requirements at the system, software and hardware levels. This paper organises these dispersed configuration concepts into a standards-based framework of system configuration requirements allocated to software. The availability of this framework at the functional and service levels can facilitate the early identification, specification and measurement of the system configuration-NFR and their detailed allocation as specific configuration functions to be handled by the specified allocation to hardware or software or in a specific combination of both. In the absence of such standards-based framework and detailed model, such NFR requirements are typically handled in practice much later on in the software development life cycle when at system testing time, users and developers find out that a number of configuration requirements have been overlooked and additional work has to be expanded to implement them.
We report in this paper on the project VITELS (Virtual Internet and Telecommunications Laboratory... more We report in this paper on the project VITELS (Virtual Internet and Telecommunications Laboratory of Switzerland), funded by the Swiss government in the SVC (Swiss Virtual Campus) programme. VITELS provides an extensible practical telecommunications course. It uses WebCT to prepare the content of each module and provides web interfaces to the various practical exercises. To date, there are 7 core modules completed, with several others under development. The core modules are: "Simulation of IP Network Configuration", "Client/Server Concepts", "IP Security", "Firewall Management", "Sockets and Remote Procedure Calls", "Remote Method Invocation", "Application Server".
Resource trading in cloud environments for utility maximisation using game theoretic modelling approach
International Journal of Parallel, Emergent and Distributed Systems, 2015
International Journal of Management in Education
Information and Communication Technologies (ICTs) have been diffused in higher education slower t... more Information and Communication Technologies (ICTs) have been diffused in higher education slower than it has been expected. Especially for developing countries, using ICT in the most efficient and effective ways has crucial importance for the sustainable development and effective use of resources. This paper presents a theory-based design framework for e-learning that emphasises the transformative interaction between technology readiness and innovativeness. This study is a theory-building investigation and offers a theory-into-practice framework that characterises the implications of innovativeness and motivation in the recent trend of the higher education use of internet technology to facilitate its own operations, in the form of e-learning.
Towards improving the performance of distributed virtual memory based reversal cache approach
International Journal of Computer Applications in Technology, 2015
International Journal of Security and Networks, 2015
Three-dimensional watermarking is very useful for copyright protection, verification, and indexin... more Three-dimensional watermarking is very useful for copyright protection, verification, and indexing. In this paper we propose a robust computationally inexpensive 3D polygonal mesh watermarking methodology. The new algorithm is based on vertex distribution and skewness measure. The core idea behind our algorithm is to modify the skewness measure based on a predefined secret message. The proposed algorithm is slightly altering the skewness distribution of several intervals extracted from a 3D model. The main attractive features of this approach is the improved performance of the data embedding system, perceptual invisibility and it is resistant to a variety of the most common attacks. (2015) 'A blind 3D watermarking technique using spherical coordinates and skewness measure', Int.

Information technology (IT) course support plays an important role in modern classrooms. Developi... more Information technology (IT) course support plays an important role in modern classrooms. Developing nations have rather more at stake in the diffusion of IT support in the classrooms of higher education than do advanced nations, as this technology diffusion process is often the economic level upon which national competitive advantage will reside. This study compares perceptions of students in an American university information systems program with Jordanian students enrolled in similar programs, and determines that the expectations developed from over a decade of research on the nature of technology diffusion and educational support in the developing world do not necessarily support predictions about key differences be-tween American and Jordanian IT students. Though this research is an initial exploratory foray into the nature of emerging economies and their use of IT support in technology education, important implications for future research are uncovered as part of the process.
A Predictive E-Health Information System
International Journal of Decision Support System Technology, 2014

International Journal of Economics and Finance, 2013
This study tends to fill a gap in the literature as it considers a small open developing country ... more This study tends to fill a gap in the literature as it considers a small open developing country in a region that takes the attention of the world. The main aim of this study is to examine the factors that determine commercial banks excess reserve holdings in Jordan banking system. Vector Autoregressive with explanatory variables (VARX) technique is used. The empirical results suggest that excess reserve in Jordan banking system tend to reach its long term level after four quarters and the correction process occurs every six months. Another finding, as banks customers' prefer to hold currency banks prefer to hold less excess reserve. Moreover, banks tend to hold more excess reserve in booming economies. Finally, monetary policy tools seem to be affecting factors in banks excess reserve holding preferences. However, fiscal policy does not seem to be within the factors that affect excess reserve holdings.

Toward power consumption in wireless sensor networks routing technique
International Journal of Networking and Virtual Organisations, 2013
ABSTRACT A wireless sensor network consists of a large number of distributed independent sensors.... more ABSTRACT A wireless sensor network consists of a large number of distributed independent sensors. One of the major challenges is to use energy conserving routing algorithms that can find paths which consume the minimum energy. Recent researches on maximising the lifetime of WSN, like the online maximum lifetime (OML), and capacity maximisation (CMAX) heuristic were intended to do so. Others applied a new method for power management to increase the node lifetime by focusing on the node level. In this paper, we propose a realistic power consumption technique using realistic variables to compute the power consumption on each node using the shortest path. The result shows that our technique has the best result. Also, it shows that when applying the realistic consumption technique on the wireless sensor system, it has a higher lifetime when using the uniform distribution than the Poisson distribution.

Economic model for routing and spectrum management in cognitive wireless mesh network
International Journal of Networking and Virtual Organisations, 2013
ABSTRACT In cognitive radio networks CRNs, unlicensed users secondary users - SUs lease free spec... more ABSTRACT In cognitive radio networks CRNs, unlicensed users secondary users - SUs lease free spectrum with quality of service QoS guarantees from a multitude of spectrum owners primary users, PUs based on service level agreements SLA. Free spectrum is used to establish the links of secondary network. The amount of leased spectrum influences the admitted number of SU's requests, PUs' profits, and the cost of renting spectrum. Hence, the PU can maximise its profit by adapting its resources to the changes in the traffic load and SLA costs conditions. We propose a novel approach that maximises PU's profit using economic model. Our economic model integrates the network routing with the adaptation of the capacity of secondary network links. For SUs, QoS should be maintained while adapting the secondary network capacity. Our adaptation scheme is based on the profit maximisation. The Markov decision process MDP is used to derive the adaption scheme. Numerical results show the ability of the proposed scheme to attain the optimal profit under different conditions and constraints.
Diffusion of innovation: analysis of internet cellular phone adoption by users in Jordan
International Journal of Electronic Business, 2011
Prince Al-Hussein bin Abdullah II Faculty of Information Technology, School of Information Comput... more Prince Al-Hussein bin Abdullah II Faculty of Information Technology, School of Information Computer Systems, Hashemite University, PO Box 150459, Zarqa 13115, Jordan Fax: +00962-5382-6613 E-mail: [email protected] *Corresponding author ... Faculty of Science and ...
Technology Fears
International Journal of Information Systems in the Service Sector, 2010
Resource allocation strategies for the economic computational grid
International Journal of Networking and Virtual Organisations, 2009
ABSTRACT

International Journal of Networking and Virtual Organisations, 2013
Due to the limited lifetime of the nodes in ad hoc and sensor networks, energy efficiency needs t... more Due to the limited lifetime of the nodes in ad hoc and sensor networks, energy efficiency needs to be an important design consideration in any routing algorithm. It is known that by employing a virtual backbone in a wireless network, the efficiency of any routing scheme for the network can be improved. Most of the current algorithms for electing the virtual backbone mainly focused on the energy balance among the network nodes without considering the nodes distribution in the real environment. In this paper, we use the node's geometric locations to introduce a first secure algorithm that can construct the virtual backbone structure locally in 3D environment; we have proofed that our new algorithm construction time is constant. . (2013) 'Secure local algorithm for establishing a virtual backbone in 3D ad hoc network', Int.
Uploads
Papers by Ahmad Al-Khasawneh