Evon Abu-taieh

Evon Abu-taieh
  • PhD
  • Professor (Full) at University of Jordan

About

105
Publications
61,117
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
544
Citations
Current institution
University of Jordan
Current position
  • Professor (Full)
Additional affiliations
October 2010 - December 2011
Arab International University
Position
  • Professor (Assistant)
September 2005 - August 2008
Arab Academy for Management, Banking and Financial Sciences
Position
  • Professor (Assistant)
September 2014 - present
University of Jordan
Position
  • Acting Dean, Assoc. Prof
Education
September 2002 - March 2005
September 1992 - May 1994
September 1984 - September 1989

Publications

Publications (105)
Article
Full-text available
Arrhythmia is a heart condition that poses a severe threat to life and requires prompt medical attention. One of the challenges in detecting arrhythmias accurately is that incorrect diagnoses can have severe consequences. In light of this, it is critical to develop a solution that is both effective and reliable. In this study, we propose a residual...
Article
Full-text available
The expression "social media" refers to a software-based platform developed for users' benefit. People use it to gain social power, market their products, conduct online business, and share information and ideas. This digital ecosystem has become helpful in various ways, but research indicates that it does not come for free. Addiction, depression,...
Article
Full-text available
This study investigates the factors that influence the sharing of information on social media platforms and examines the effects of perceived security, perceived privacy, and user awareness on users' trust in social media platforms, as well as the moderating effects of age, gender, educational attainment, and internet proficiency on information sha...
Article
Full-text available
Previous research has found support for depression and anxiety associated with social networks. However, little research has explored parents’ depression and anxiety constructs as mediators that may account for children’s depression and anxiety. The purpose of this paper is to test the influence of different factors on children’s depression and anx...
Article
Full-text available
The purpose of this research paper is to identify and test the factors influencing the perceived usefulness and perceived effectiveness of adopting an e-learning system from the perspective of teachers in public and private schools as well as the United Nations Relief and Works Agency for Palestinian Refugees in the Near East (UNRWA) in Jordan duri...
Article
Full-text available
Smartphone addiction has become a major problem for everyone. According to recent studies, a considerable number of children and adolescents are more attracted to smartphones and exhibit addictive behavioral indicators, which are emerging as serious social problems. The main goal of this study is to identify the determinants that influence children...
Article
Full-text available
Mobile banking is a service provided by a bank that allows full remote control of customers’ financial data and transactions with a variety of options to serve their needs. With m-banking, the banks can cut down on operational costs whilst maintaining client satisfaction. This research examined the most crucial factors that could predict the Jordan...
Article
Full-text available
Using mobile applications in e-government for the purpose of health protection is a new idea during COVID-19 epidemic. Hence, the goal of this study is to examine the various factors that influence the use of SANAD App As a health protection tool. The factors were adopted from well-established models like UTAUT, TAM, and extended PBT. Using survey...
Article
Full-text available
YouTube usage as a learning tool is evident among students. Hence, the goal of this study is to examine the various factors that influence the use of YouTube as a learning tool, which influences academic achievement in a bilingual academic context. Using survey data from 704 YouTube users from Jordan’s bilingual academic institutes, the research mo...
Article
Full-text available
E-textbooks are becoming increasingly important in the learning and teaching environments as the globe shifts to online learning. The key topic is what elements influence students’ behavioral desire to use e-textbooks, and how the whole operation affects academic achievement when using e-textbooks. This research aims to investigate the various fact...
Article
Full-text available
COVID-19 is a highly contagious and lethal virus-based disease. Social distancing is the only way to stop the virus from spreading. In this context, the researchers suggest a social distancing application named SDA-COVID-19. The suggested App (SDA-COVID-19) will help individuals maintain social distancing by the exchange of data among phones about...
Article
Full-text available
Service-oriented architecture (SOA) has emerged as a flexible software design style. SOA focuses on the development, use, and reuse of small, self-contained, independent blocks of code called web services that communicate over the network to perform a certain set of simple tasks. Web services are integrated as composite services to offer complex ta...
Chapter
Service Oriented Architecture (SOA) introduced the web services as distributed computing components that can be independently deployed and invoked by other services or software to execute composite services that represent an end-to-end business process. An important problem in the SOA is the web service selection and composition problem which invol...
Conference Paper
Full-text available
Matching and multi-criteria multi-alternative problems are two well-known problems in decision science. Over the years, many solutions, tools, and techniques have been developed to solve each problem. When a situation arises where both problems intersect, then one may use approaches developed for each to tackle it. Given the competitive and dynamic...
Book
Parallel to the physical space in our world, there exists cyberspace. In the physical space, there are human and nature interactions that produce products and services. On the other hand, in cyberspace there are interactions between humans and computer that also produce products and services. Yet, the products and services in cyberspace don’t mater...
Article
Full-text available
The cyber world reinvented a need for an age-old quest of safety. This research discussed 211 network security software environment according to 12 features. The paper first presented related research conducted on this topic. Next, the paper presented the 12 suggested features: paper showed the most popular features according to network security so...
Article
Full-text available
This paper has four primary goals. First, to examine the number of Computer Science documents published from 1996 to 2017, which has shown the rise and fall of some countries. Second, to examine differences between countries, using gap analysis, to enable a country classification to be introduced according to each countries’ computer science docume...
Chapter
Full-text available
The goal of this chapter is to give researchers, practitioners, and students a pedestal to get a comprehensive look at the new technology of communication named 5G. The chapter will present an introduction that shows the importance of 5G to the different uses of the Internet. Then, the chapter will present two essential aspects: (1) 5G research in...
Preprint
Full-text available
UNSTRUCTURED COVID-19 is a highly contagious and lethal virus-based disease. Social distancing is the only way to stop the virus from spreading. In this context, the researchers suggest a social distancing application named SDA-COVID-19. The suggested App (SDA-COVID-19) will help individuals maintain social distancing by the exchange of data among...
Article
Full-text available
The rapid growth of technology and related fields has led to creation in academia to match the expansion demand for IT professionals. One of the current majors that attract attention in industry is cybersecurity. There is a great need for individuals who are skilled in cybersecurity to protect IT infrastructure. Coaching a security-focused workforc...
Conference Paper
Full-text available
Service Oriented Architecture (SOA) has emerged as an active research area that extends to different domains for achieving the Service Level Agreement (SLA) and also to guarantee the web services Quality of Service (QoS) level. This paper provides DyOrch approach to improve the processes of web service composition and service scalability to satisfy...
Chapter
Cyberspace and the existence of the internet allows different types of crimes to appear. Hence, there is a need for new laws to be set with a collective, comprehensive, view of crime and a global understanding. This article studies 5 different countries' laws pertaining to cybercrimes namely: Jordan, Oman, Kuwait, Qatar, and Saudi Arabia. These dif...
Chapter
Cyberspace and the existence of the internet allows different types of crimes to appear. Hence, there is a need for new laws to be set with a collective, comprehensive, view of crime and a global understanding. This article studies 5 different countries' laws pertaining to cybercrimes namely: Jordan, Oman, Kuwait, Qatar, and Saudi Arabia. These dif...
Chapter
Full-text available
Cyberspace and the existence of the internet allows different types of crimes to appear. Hence, there is a need for new laws to be set with a collective, comprehensive, view of crime and a global understanding. This article studies 5 different countries' laws pertaining to cybercrimes namely: Jordan, Oman, Kuwait, Qatar, and Saudi Arabia. These dif...
Article
Full-text available
Research on tree based static multi hop leach energy efficient routing protocol focused on efficiency and effectiveness of data dissemination. Furthermore, previous research work on wireless sensor network mainly focused on homogeneous wireless sensor networks where all wireless sensor networks have the same capabilities. It was learnt that homogen...
Article
Full-text available
Research on tree based static multi hop leach energy efficient routing protocol focused on efficiency and effectiveness of data dissemination. Furthermore, previous research work on wireless sensor network mainly focused on homogeneous wireless sensor networks where all wireless sensor networks have the same capabilities. It was learnt that homogen...
Thesis
Full-text available
Research on tree based static multi hop leach energy efficient routing protocol focused on efficiency and effectiveness of data dissemination. Furthermore, previous research work on wireless sensor network mainly focused on homogeneous wireless sensor networks where all wireless sensor networks have the same capabilities. It was learnt that homogen...
Article
Full-text available
Multimedia is highly competitive world, one of the properties that is reflected is speed of download and upload of multimedia elements: text, sound, pictures, animation. This paper presents CRUSH algorithm which is a lossless compression algorithm. CRUSH algorithm can be used to compress files. CRUSH method is fast and simple with time complexity O...
Article
Full-text available
Service Oriented Architecture (SOA) introduced the web services as distributed computing components that can be independently deployed and invoked by other services or software to provide simple or complex tasks. In this paper we propose a novel approach to solve the problem of the business processes execution engine web service selection and servi...
Article
Full-text available
Multimedia is highly competitive world, one of the properties that is reflected is speed of download and upload of multimedia elements: text, sound, pictures, animation. This paper presents CRUSH algorithm which is a lossless compression algorithm. CRUSH algorithm can be used to compress files. CRUSH method is fast and simple with time complexity O...
Article
Full-text available
Service Oriented Architecture (SOA) introduced the web services as distributed computing components that can be independently deployed and invoked by other services or software to provide simple or complex tasks. In this paper we propose a novel approach to solve the problem of the business processes execution engine web service selection and servi...
Chapter
Full-text available
The cyber world is an ever-changing world, cyber security is most importance and touches the lives of everyone on the cyber world including: researchers, students, businesses, academia, and novice user. The paper suggests a body of knowledge that incorporates the view of academia as well as practitioners. This research attempts to put basic step an...
Chapter
This chapter illustrates the difficulties facing e-publishing over cloud computing pertaining to scientifically oriented social network services from three axioms: the life cycle of the research document, an explanation of what a researcher juggles to conduct proper research, and the researcher knowledge pertaining to both scholarly search engines...
Chapter
Full-text available
This research provides more than 35 measurements rules derived from the perspectives of Vitruvian Man and Neufert and their basis of the golden proportion, to build a human body model on computers for the use of multimedia. The measurements are based on 25 proportional rules derived from 15 proportions given by Vitruvian Man and 29 golden proportio...
Article
Full-text available
Cyberspaceandtheexistenceoftheinternetallowsdifferenttypesofcrimestoappear.Hence,there is a need for new laws to beset with a collective,comprehensive,view of crime and a global understanding. This article studies 5 different countries’ laws pertaining to cybercrimes namely: Jordan, Oman, Kuwait, Qatar, and Saudi Arabia. These different countries i...
Chapter
Full-text available
Handheld devices are looding the market, and their use is becoming essential among people. Hence, the need for fast and accurate character recognition methods that ease the data entry process for users arises. There are many methods developed for handwriting character recognition especially for Latin-based languages. On the other hand, character re...
Article
Full-text available
Natural resources are fundamentally substances having an impact on the surrounding environments. This paper proposes a framework that utilizes performance Indicators for monitoring and measuring environmental state of such natural resources. These performance Indicators improve the quality of monitoring and reporting processes deployed for the natu...
Conference Paper
Full-text available
Natural resources are fundamentally substances having an impact on the surrounding environments. This paper proposes a framework that utilizes performance Indicators for monitoring and measuring environmental state of such natural resources. These performance Indicators improve the quality of monitoring and reporting processes deployed for the natu...
Article
Full-text available
This paper presents the pillars of lossless compression algorithms, methods and techniques. The paper counted more than 40 compression algorithms. Although each algorithm is an independent in its own right, still; these algorithms interrelate genealogically and chronologically. The paper then presents the genealogy tree suggested by researcher. The...
Article
Full-text available
The paper presents Mirrored Vedic Vertically and Crosswise Multiplication Technique (MVVCMT) which is an algorithm based on Vedic Vertically and Crosswise Multiplication Technique. Vedic Vertically and Crosswise Multiplication Technique is an ancient Indian technique used to shorten the process of mental multiplication especially for big numbers. I...
Conference Paper
Full-text available
The cyber world is an ever-changing world, cyber security is most importance and touches the lives of everyone on the cyber world including: Researchers, students, businesses, academia, and novice user. The paper suggests a body of knowledge that incorporate the view of academia as well as practitioners. This research attempts to put basic step and...
Article
In the last decade's several page replacement algorithms had been implemented such as Least Recently Used (LRU), First Income First Out (FIFO) and optimal. Each of them has its own advantages and disadvantages. The process of page selection is time-consuming and depends on many factors: operating system and architecture as well as algorithms that w...
Data
Full-text available
Article
Full-text available
This paper illustrated the difficulties facing e-publishing over cloud computing pertaining to social network service for scientists from three axioms: the life cycle of the research document, an explanation of what a researcher juggles during the course of the production of the document related to research. Then this paper discussed discovering st...
Conference Paper
Full-text available
Is beauty only art and not science? This paper proposes the use of golden proportions in modeling human body in modeling software. Golden ratio was used thousands of years in art, architecture, sculpture, anatomy. The paper explains the golden ratio for human modeling in information technology from the perspectives of Vitruvian Man and Neufert. The...
Article
Full-text available
Grid computing is the form of distributed computing where the resources of various computers are shared to solve a particular problem. Grid can be used for a variety of purposes. Job scheduling is used to schedule the user jobs to appropriate resources in grid environment. The resources in the Grid are heterogeneous and geographically distributed w...
Article
Full-text available
This paper is an analysis for proportion of women using social media, namely Facebook, and the effect of literacy rate, GDP (PPP) and country location. The study included 162 countries with a total of 957,358,940Facebook users of whom451,477, 260 are women, which amounts to 47 percent are female users. The research found that the 162 countries f...
Conference Paper
Full-text available
Professionals, practitioners, students, and novice users are overwhelmed with the different image file formats. This paper, proposes taxonomy for image file formats after reviewing 82 different image file formats based on the following attributes: raster/vector, compression, number of dimensions represented in the image. Still, these attributes are...
Article
The Cloud has become a significant topic in computing; however, the trend has established a new range of security issues that need to be addressed. In Cloud, the data and associated software are not under their control. In addition, with the growing demands for Cloud networks communication, it becomes increasingly important to secure the data flow...
Chapter
Information Technology project management lingers between science and art. Many will not dwell on such a thought, and define the information technology project manager as the one person that gets the information technology project done. This paper introduces 74 best practices and traits for the novice information systems project manager. The 74 per...
Book
Discrete event simulation environments have desirable features and components now driving researchers to develop and enhance existing environments. The Handbook of Research on Discrete Event Simulation Environments: Technologies and Applications provides a comprehensive overview of theory and practice in simulation systems. A leading publication in...
Chapter
Full-text available
This chapter introduces the different aviation and airport Information Technology systems. Also, this chapter provides architecture based on the Service Oriented Architecture (SOA) that improves the information accessibility and sharing across the different airport departments, integrating the existing legacy systems with other applications, and im...
Chapter
Full-text available
Congestion in networks is considered a serious problem; in order to manage and control this phenomena in early stages before it occurs, a derivation of a new discrete-time queuing network analytical model based on dynamic random early drop (DRED) algorithm is derived to present analytical expressions to calculate three performance measures: average...
Chapter
Full-text available
Reducing stress and weight of structures are most important to structural designers. Most engineering structures are an assembly of different parts. On most of these structures, parts are assembled by bolts, rivets, et cetera; this riveted and bolted structure is highly used in aerospace industry. Defense hole theory deals with introducing auxiliar...
Article
Full-text available
Information Technology project management lingers between science and art. Many will not dwell on such a thought, and define the information technology project manager as the one person that gets the information technology project done. This paper introduces 74 best practices and traits for the novice information systems project manager. The 74 per...
Chapter
This paper investigates over 50 simulation packages and simulators used in vocational and course training in many fields. Accordingly, the 50 simulation packages were categorized in the following fields: Pilot Training, Chemistry, Physics, Mathematics, Environment and ecological systems, Cosmology and astrophysics, Medicine and Surgery training, Co...
Chapter
This paper investigates over 50 simulation packages and simulators used in vocational and course training in many fields. Accordingly, the 50 simulation packages were categorized in the following fields: Pilot Training, Chemistry, Physics, Mathematics, Environment and ecological systems, Cosmology and astrophysics, Medicine and Surgery training, Co...
Chapter
This chapter uses the Diffusion of Innovations (DOI) theory and examines a business case, highlighting certain gaps in the theory. First, confusion can be present between the innovation construct (in this instance, replacing the enterprise systems) and the diffusion construct (that is, selling that innovation to upper management). Second, the busin...
Article
This article pinpoints the affects of information technology on the aviation industry, specifically on the Airline ticket prices. The article first introduces the different costs that comprise the airline ticket. Then the article introduces the different information technology systems that are used in the aviation industry which in turn reduces the...
Book
With continual computer advances in the information technology age, information systems have become an integral part of many disciplines. Business, medicine, geography, aviation, forensics, agriculture, even traffic lights all have one thing in common computers. Utilizing Information Technology Systems Across Disciplines: Advancements in the Applic...
Chapter
The aim of this chapter is to give an elaborate reasoning for the motivation for Validation, Verification, and Testing (VV&T) in Simulation. Thereby, defining Simulation in its broadest aspect as embodying a certain model to represent the behavior of a system, whether that may be an economic or an engineering one, with which conducting experiments...
Chapter
This chapter will discuss more than 20 System development life cycles (SDLC) found in the Information Technology project management arena, whereby, a comprehensive overview of the SDLCs history as well as the trigger that instigated its development would be laid out. Subsequently, the chapter will discuss the advantages and disadvantages of using S...
Chapter
Full-text available
The chapter will present the challenges in implementing information technology plan pertaining to two dimensions: literature and practical. The chapter will also suggest ways to rectify and deflect the negative impact of the challenges. In addition, the chapter will show some of the challenges' manifestations shown in some case studies.
Chapter
The aim of this research is to discover the knowledge channels in the learning organization in Jordan. The research studied three aspects of the trusted knowledge channels: first studied the worker perspective and understanding of the TRUST issue. Second the research studied the worker perspectives of the knowledge channels, finding that the worker...
Article
This paper investigates over 50 simulation packages and simulators used in vocational and course training in many fields. Accordingly, the 50 simulation packages were categorized in the following fields: Pilot Training, Chemistry, Physics, Mathematics, Environment and ecological systems, Cosmology and astrophysics, Medicine and Surgery training, Co...
Chapter
This chapter pinpoints the affects of information technology on the aviation industry, specifically on the Airline ticket prices. The chapter first introduces the different costs that comprise the airline ticket. Then the chapter introduces the different information technology systems that are used in the aviation industry which in turn reduces the...
Chapter
The aim of this research is to discover the knowledge channels in the learning organization in Jordan. The research studied three aspects of the trusted knowledge channels: first studied the worker perspective and understanding of the TRUST issue. Second the research studied the worker perspectives of the knowledge channels, finding that the worker...
Chapter
Full-text available
This chapter presents enhanced, effective and simple approach to text classification. The approach uses an algorithm to automatically classifying documents. The main idea of the algorithm is to select feature words from each document; those words cover all the ideas in the document. The results of this algorithm are list of the main subjects founde...
Chapter
The chapter will present the challenges in implementing information technology plan pertaining to two dimensions: literature and practical. The chapter will also suggest ways to rectify and deflect the negative impact of the challenges. In addition, the chapter will show some of the challenges' manifestations shown in some case studies.
Article
This chapter aims to give a comprehensive explanatory platform of simulation background. As this chapter comprises of four sections, it reviews simulation definitions, forms of models, the need for simulation, simulation approaches and modeling notations. Simulation defini - tion is essential in order to set research boundaries. Moreover, the chapt...
Book
The science of simulation and modeling (SM) strives to showcase the highest possible level of reality in order to determine the conditions necessary for optimal performance. SM is a multifaceted and complex field due to the numerous applications involved, particularly since SM applications range from nuclear reaction to supermarket queuing. Simulat...
Chapter
This chapter presents an object-oriented approach for the development of an optical burst switching (OBS) simulator, called OBSim, built in Java. Optical burst switching (OBS) has been proposed to overcome the technical limitations of optical packet switching and optical circuit switching. Due to the high costs of an OBS network infrastructure and...
Article
Full-text available
This paper attempts to identify answers for numerous logically raised and thought out questions that are stumbled upon when using any given simulations package whether that may be commercially in the market or in the academic arena. For this purpose, the researchers have investigated 56 packages, with the aim of tackling not only the trends that si...
Article
This chapter aims to give a comprehensive explanatory platform of simulation background. As this chapter comprises of four sections, it reviews simulation definitions, forms of models, the need for simulation, simulation approaches and modeling notations. Simulation definition is essential in order to set research boundaries. Moreover, the chapter...
Article
This chapter introduces a suggested system development life cycle "relay race methodology" (RRM). The RRM is based on the philosophy of relay race, where each runner in the race must hand off the baton within a certain zone, usually marked by triangles on the track race. This chapter is comprised of nine sections. First, it shows the relationship b...
Article
Full-text available
Some years ago, M'Raihi introduced an e-payment scheme employing a blinding office to attain anonymous scheme. This scheme permits both a blinding office and a bank to playact a user without being noticed. It may result in a disclaimer problem where the user can disclaim his bad actions by proposing that both the bank and the blinding office act in...
Article
This chapter introduces validation, verification, and testing tools and techniques pertaining to discrete event simulation. The chapter distinguishes between validation and verification within the context of discrete event simulation. Then, we will show the importance of such topic by revealing the amount research done in simulation validation and...
Article
Full-text available
The security of many cryptography techniques depends upon the intractability of the integer-factoring problem. However, in the recent years there has been a great deal of progress in the art of factoring, relaying mostly on non-deterministic methods. This research proposes a new deterministic factoring algorithm, that factors RSA n = p * q, the alg...
Chapter
This chapter introduces validation, verification, and testing tools and techniques pertaining to discrete event simulation. The chapter distinguishes between validation and verification within the context of discrete event simulation. Then, we will show the importance of such topic by revealing the amount research done in simulation validation and...
Article
Full-text available
There are many problems that hinder the simulation development process, two of those problems are: (1). Communication during the development life cycle. (2). The length of the development life cycle. This empirical paper proposes a solution for those two problems by using spreadsheets as simulation environment and by simplifying the program code. T...

Questions

Questions (3)
Question
I need the algorithm of "Arithmetic coding" compression and decompression.
Question
New JPEG standard based on Microsoft HD Photo.

Network

Cited By