Hasan M AL-Shalabi

Hasan M AL-Shalabi
  • PhD in computer Eng.
  • Vice President at Al-Hussein Bin Talal University

About

33
Publications
73,053
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
421
Citations
Current institution
Al-Hussein Bin Talal University
Current position
  • Vice President
Additional affiliations
August 2003 - present
Al-Hussein Bin Talal University
Position
  • Vice President
Description
  • www.ahu.edu.jo

Publications

Publications (33)
Article
Full-text available
This study was undertaken with the primary aim of identifying, examining and providing an understanding of the factors that could affect citizens' intention to adopt and use e-government services in Jordan. The preliminary research model used here had been developed from the Technology Acceptance Model by incorporating additional constructs from ot...
Article
Full-text available
Matrix multiplication is a basic concept that is used in engineering applications such as digital image processing, digital signal processing and graph problem solving. Multiplication of huge matrices requires a lot of computation time as its complexity is O(n3). Because most engineering applications require higher computational throughputs with mi...
Article
Full-text available
Enhancing gray image contrast is the first step of image preprocessing. A novel filter is proposed, implemented and tested using various dark and unclear images. It is seen that the proposed filter enhanced the image contrast by normalizing the image histogram and moving the average pixels value to the middle of the maximum gray level without affec...
Article
Full-text available
Different ANN architectures with a range of values for a set of network parameters will be tested and analyzed in order to get the relationship between the performance factors and ANN parameters; it will be shown how to use ANN parameters to evaluate ANN training time and absolute error.
Article
Full-text available
Voice recognition is the process of taking the spoken word as an input to a computer program. This process is important to virtual reality because it provides a fairly natural and intuitive way of controlling the simulation while allowing the user's hands to remain free. This paper will delve into the uses of voice recognition in the field of virtu...
Article
Full-text available
This paper presents the main findings of a survey conducted to evaluate the e-business readiness of small and medium enterprises in Jordan. A questionnaire was administered in the late 2011 to 200 SME operating in different economical sectors in the country. The survey aimed at analyzing the e-business readiness of these organizations by exploring...
Article
Full-text available
The proposed system comes to overcome the problem of writing a C.V. Cover letter which requires some linguistic skills and a lot of experience in this domain in addition to its cost in term of time and money. The ACLGS solved the problem by developing an auto generated cover letter based on the user C.V. regardless its format. The ACLGS takes the u...
Article
Full-text available
The paper investigates the intensity of (Social Networking Sites) SNSs use among the students of Jordanian universities. Four universities were involved in this study, while 727 undergraduate students respond to a questionnaire that measured their intensity of SNSs use. To answer research questions, the researchers used descriptive statistics, ANCO...
Article
Full-text available
Representing the data by smaller amount of clusters necessarily loses certain fine details, but achieves simplification. The most commonly used efficient clustering technique is k-means clustering. The better results of K-Means clustering can be achieved after computing more than one times. In this paper, a new approach is proposed for computing...
Article
Full-text available
Most of the Arab world youths are using Social Networks for many different uses, while academic uses are still not in a formal perspective. This study aimed at exploring the academic uses of Social Networks among the students of several Jordanian Universities. The sample was analyzed according to university, faculty, gender, and year level. The stu...
Article
Full-text available
The present paper examines social network sites (SNSs) usage among university students of four Jordanian universities distributed in different regions of the Kingdom. Seven hundred and twenty seven students were sampled and they completed a questionnaire based on the technology acceptance model. In addition, 16 participants, four from each universi...
Article
Full-text available
In the current time and next decades, Wireless Sensor Networks (WSNs) represents a new category of ad hoc networks consisting of small nodes with three functions: sensing, computation, and wireless communications capabilities. Many routing, power management, and data dissemination protocols have been designed for WSNs where energy awareness is an e...
Article
Full-text available
The present paper examines social network sites (SNSs) usage among university students of four Jordanian universities distributed in different regions of the Kingdom. Seven hundred and twenty seven students were sampled and they completed a questionnaire based on the technology acceptance model. In addition, 16 participants, four from each universi...
Article
Full-text available
This paper presents a V-model of e-learning using the well-known Gagne nine steps for quality education. Our suggested model is based on our experience at the computer engineering departments at AL-Hussein Bin Talal University, the University of Jordan and Albalqa Applied University. We applied the recommendations of the nine steps methodology to t...
Article
Full-text available
The RC5 encryption algorithm was designed by Roland Rivest in 1994. Since its publication, RC5 has attracted the attention of many researchers in the cryptographic community in efforts to accurately assess the security offered. The best previously known attack requires 2 54 chosen plaintexts in order to derive the full set of 25 subkeys for the 12...
Article
Full-text available
Neural networks are used extensively in time series forecasting because it can learn the non-linear pattern which is often present in time series data. Functional neural network is a modified neural network and is rapidly gaining popularity in different fields. The method of presenting the input to the network makes functional neural network differ...
Article
Full-text available
The present study proposes a novel technique for copyright protection by utilizing digital watermarking of Images. The watermark is embedded and detected by using Functional Link Artificial Neural Network (FLANN) and Discrete Cosine Transform (DCT). The exhaustive simulation results of the proposed scheme show improved performance over the existing...
Article
Full-text available
A new scheme for Arabic handwriting recognition by means of mat lab software is proposed. It can be seen as construction of neural networks that associate the hand writing Arabic text with the stored Arabic text in a specific data base are nearly equivalent. This result indicates that the new scheme have the potential to be robust in the presence o...
Article
Full-text available
For developing countries, Technology is considered to be a lever for development. The development of Information Technology (IT) has a wide potential in all aspects of the societal development. Especially, for any developing country, IT has brought an overall change and growth. The developing countries need to focus on 6Cs of IT i.e. Computer densi...
Article
Full-text available
Partitioning programs into smaller slices facilitates easy maintenance and testing of any software. A method for partitioning programs into segments performing single specific functions is required for simplifying the things. The notion of program slicing is observed to restrict the focus of a task to specific sub-components of a program. The slici...
Article
Full-text available
This paper presents the instructor's role through embedded e-learning at Al-Hussein Bin Talal University (AHU). Embedded e-learning at AHU is composed of two main parts: the electronic classroom arrangement and equipment and the classroom online provided at the homepage of AHU website. A description of these two parts has been given, and a summary...
Article
Full-text available
This paper presents the instructors' perspective of the embedded e-learning at Al-Hussein Bin Talal University (AHU). This e-learning experience, which started in September 2005, has been based on two main parts: the electronic classroom arrangement and equipment, and the classroom online provided at the homepage of AHU website. A complete descript...

Network

Cited By