Rami Malkawi

Rami Malkawi
  • Doctor of Philosophy
  • Professor (Associate) at Yarmouk University

Director of Computer and Information Center - Yarmouk University - Jordan

About

27
Publications
4,864
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
118
Citations
Current institution
Yarmouk University
Current position
  • Professor (Associate)

Publications

Publications (27)
Article
Full-text available
Users of virtual reality (VR) systems assume that these systems are safe, which leads to significant risk. Despite this, there is little research examining the security of these VR systems. This study is distinguished by the fact that it expanded the scope of the impact of cyberspace vulnerabilities on VR systems and was not limited to one or two e...
Article
Users of virtual reality (VR) systems assume that these systems are safe, which leads to significant risk. Despite this, there is little research examining the security of these VR systems. This study is distinguished by the fact that it expanded the scope of the impact of cyberspace vulnerabilities on VR systems and was not limited to one or two e...
Article
Full-text available
The convergence of Internet of Things (IoT) and edge computing allows for the collection and sharing of data from human wearable devices. With the huge amount of data transferred among those devices, privacy lies at the forefront of the concerns that must be addressed while preserving the usefulness of the shared data. This research proposes a micr...
Article
Full-text available
Automated citation analysis is becoming increasingly important in assessing the scientific quality of publications and identifying patterns of collaboration among researchers. However, little attention has been paid to analyzing the scientific content of the citation context. This study presents an unsupervised citation detection method that uses s...
Article
Full-text available
When delivering digitalization of educational services, a specific administration plan should be established, designed for maximum access, quick recovery from failure, and lowering the length of time it is unavailable, all while guaranteeing good security performance. It should include responsibilities such as providing dedicated servers for digiti...
Article
Full-text available
This paper presents the results of the influence of reactivity on fuel temperature distribution for the neutron-physical characteristics of WWER 1000-1200 cores, which in turn affects the parameters of Xenon oscillation. The improved method for calculating Resonance Absorption in a238UO2 (Doppler reactivity effect) with a Nonuniform Temperature Pro...
Article
Full-text available
Faced with the widespread digitalization in educational services, every educational organization has to strive to meet modern-day quality and security standards for both information and other assets. The education organizations should invest in a methodology that identifies system flaws and, as a result, opportunities for improvement. To protect th...
Article
Full-text available
Software Defined Networks (SDN) recently evolves to give more roles to software in network control and management. It is feared that such significant roles may risk those networks in terms of reliability and security. As a new architecture, thorough testing and evaluation should take place to ensure that those networks are robust and reliable. In t...
Article
Full-text available
As a result of the rapid evolution of open source software, the entire software industry has been grown up in a way that made it harder to improve the software quality or even keep it as it is without any shortages in the quality level. However, data mining tools are considered as a good example of open source software, which has a big similarity b...
Article
Full-text available
There is a tendency formed during the last years–indicating that the default protocol for accessing web pages is the HTTPS protocol. In order this to be done, a valid SSL/TSL certificate issued by authority body should be used. In the scope of this study during the month of August 2019 we examined the web sites of 22 banks licensed in Czech Republi...
Article
Full-text available
the bee colony Optimisation (BCO) algorithm is a nature-inspired algorithm that models the natural behaviour of honey bees as they find nectar and share food sources information with other bees in the hive. This paper presents the BCO algorithm for the flexible job-shop scheduling problem (FJSP), in addition, to improve the neighbourhood search in...
Article
Full-text available
Maintaining the topical coherence while writing a discourse is a major challenge confronting novice and non-novice writers alike. This challenge is even more intense with Arabic discourse because of the complex morphology and the widespread of synonyms in Arabic language. In this research, we present a direct classification of Arabic discourse docu...
Article
Full-text available
There is a tendency formed during the last years – indicating that the default protocol for accessing web pages is the HTTPS protocol. In order this to be done, a valid SSL/TSL certificate issued by authority body should be used. In the scope of this study during the month of August 2019 we examined the web sites of 22 banks licensed in Czech Repub...
Article
Full-text available
Software complexity can be defined as the degree of difficulty in analysis, testing, design and implementation of software. Typically, reducing model complexity has had a significant impact on maintenance activities. A lot of metrics have been used to measure the complexity of source code such as Halstead, McCabe Cyclomatic, Lines of Code, and Main...
Article
Full-text available
Digital storytelling plays a vital role in passing information via attractive and interactive digital media. Therefore, there are several methods that help in assessing the quality of the Digital Stories (DSs) and classifying them into successful or failed stories, rubrics can be a solution. This paper introduces an assessment method for numbers of...
Article
Full-text available
this paper presents an approach for evaluating and confirming the quality of the external software documentation using topic modeling. Typically, the quality of the external documentation has to mirror precisely the organization of the source code. Therefore, the elements of such documentation should be strongly written, associated, and presented....
Article
Full-text available
Recently, videos are considered as a most efficient and effective way to share human knowledge around the world. This is due to advanced technologies such as high speed networks, fourth-generation wireless networks and existing smart video compression protocols. Nowadays, Video on Demand (VOD) system is used to making usage video services are easy,...
Conference Paper
Full-text available
The development of computer skills by individuals of various ages and backgrounds in this age of mass digital technology has been phenomenal. By combining various digital technologies it is possible to provide the users with an enhanced interface that produces a more attractive, interactive and functional experience for them. Commercial programmes...

Network

Cited By