oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Any time

2020 ( 8 )

2019 ( 194 )

2018 ( 278 )

2017 ( 275 )

Custom range...

Search Results: 1 - 10 of 18913 matches for " Saber Al-Rousan "
All listed articles are free for downloading (OA Articles)
Page 1 /18913
Display every page Item
Skeletal extension rate of the reef building coral Porites species from Aqaba and their environmental variables  [PDF]
Saber Al-Rousan
Natural Science (NS) , 2012, DOI: 10.4236/ns.2012.49097
Abstract: Annual skeletal extension rates of the sclera-actinian corals Porites species were investigated in 32 colonies from the northern Gulf of Aqaba fringing reef at various depths (1 - 42 m). All corals reveal clear and regular skeletal density banding patterns. Results showed that the high-density annual growth bands were formed during winter and the low-density annual growth bands during summer. The mean annual extension rates of the studied corals reveal a large inter-colony variability with values ranged between 2.36 to 20.0 mm/year. While a general trend of decreasing coral extension rate with depth was observed and best explained by a simple exponential model, the rates clustered into two groups: 10.86 ± 2.54 mm/year in water depths less than 10 m, and 5.23 ± 1.99 mm/year below 12 m. Light intensity seems to be the primary environmental factor responsible for decreasing coral extension rate with depth since the effect of other environmental parameters could be neglected from the Gulf of Aqaba. Time series record of the mean annual coral extension rate showed a slight increasing linear trend which could be linked to increase seawater temperature over the period of time represented.
Fish assemblages in seagrass habitat along the Jordanian coast of the Gulf of Aqaba  [PDF]
Maroof A. Khalaf, Saber Al-Rousan, Fuad A. Al-Horani
Natural Science (NS) , 2012, DOI: 10.4236/ns.2012.48069
Abstract: The spatial distribution and community structure of the fishes were studied at different depths and sites along the Jordanian coast in seagrass habitat. A total of 37,034 fishes were counted representing 132 species belonging to 35 families observed during visual census in three sites (average of 4741.6 fish per transect). Out of the 132 species encountered, 5 species of them including Neopomacentrus miryae Lethrinus borbonicus, Pseudanthias squamipinnis, Lethrinus variegatus, Siganus rivulatus accounted for 57.7% of all individuals. Fishes were most abundant and significantly higher at 12 m depths (mean N = 2889.6) in comparison with shallow 6m depth (mean = 1225.3 with (p = 0.0218). This may be attributed to many plank-tivorous fishes that inhabit this depth such as P. squampinnis, Paracheilinus octotaenia, Chromis pelloura, Decapterus macarellus, and Cirrhilabrus rubriventralis probably with high abundance of plankton at 12 m depth than 6 m. The number of species was significantly higher in Phosphate Loading Berth (PLB; mean S = 54.7) than in Hotels area site (HA; mean S = 12.8) with (p = 0.0002) and Tala Bay site (TB; mean S = 31) with (p = 0.0484). This may be due to higher hard coral cover at Phophate Loading Berth.
A Technical Experiment on Biogas Production from Small-Scale Dairy Farm  [PDF]
Ahmad Al-Rousan, Anas Zyadin
Journal of Sustainable Bioenergy Systems (JSBS) , 2014, DOI: 10.4236/jsbs.2014.41002
Abstract:

The key objective of this study was to evaluate the economic feasibility of producing biogas from privately-owned dairy farm in the North of Jordan. This experiment did not adopt Best-Available-Technology (BAT) but rather traditional unit manufactured with minimized costs through installing locally produced materials to avoid economic burden on the farmers’ production costs. A thermophilic biodigester unit was built sub-surface with 22 m3 capacity (15 m3 manure tank plus 7 m3 biogas holder) in a relatively small scale dairy farm. The daily feed was about 500 liter of cow slurry (150 - 200 liter cow manure) and the remaining

Guest Editorial
Mohammad AL-Rousan
Journal of Emerging Technologies in Web Intelligence , 2012, DOI: 10.4304/jetwi.4.2.117-118
Abstract: The International Conference on Information and Communications Systems (ICICS2011) is a forum for Industry Professionals and Academics from Companies, Governmental Agencies, and Universities around the world to present their latest research results, ideas, developments and applications in all areas of Computer and Information Sciences. The topics that have been covered in the ICICS2011 include, but are not limited to: Artificial Intelligence, Mobile Computing, Networking, Information Security and Cryptography, Web Content Mining, Bioinformatics and IT Applications, Database Technology, Systems Integration, Information Systems Analysis and Specification, and Telecommunications. We selected 11 high quality papers (out of 54 papers, which were presented at the ICICS2-11) and invited the authors of the selected papers to extend them and submit them for a complete new peer-review for consideration in this Special Issue (SI). The final decision for the inclusion in the SI has been strictly based on the outcome of the review process. The main objective of the SI is to make available the latest results in the field to the research community and report state-of-the-art and in-progress research on all aspects of information and communication systems. The selected papers span a broad range on the information retrieval, E-business and Internet. The contributions of these papers are outlined below. Jackson et. al, have studied the boundaries of natural language processing techniques in extracting Knowledge from emails, where they aimed to determine if natural language processing techniques can be used to fully automate the extraction of knowledge from emails. Based on the system built by the authors and it has been shown that although the f-measure results are world leading, there is still a requirement for user intervention to enable the system to be accurate enough to be of use to an organisation. On the hand, Al-Dwairi and Alsalman fcused on a very major problem in the World Wide Web where they proposed a lightweight system to detect malicious websites online based on URL lexical and host features and call it MALURLs. The system relies on Na ve Bayes classifier as a probabilistic model to detect if the target website is a malicious or benign. It introduces new features and employs self learning using Genetic Algorithm to improve the classification speed and precision. The system achieves an
Prospects of Synthetic Biodiesel Production from Various Bio-Wastes in Jordan  [PDF]
Ahmad Al-Rousan, Anas Zyadin, Salah Azzam, Mohammed Hiary
Journal of Sustainable Bioenergy Systems (JSBS) , 2013, DOI: 10.4236/jsbs.2013.33030
Abstract: The main objectives of this technical experiment are to quantify the amount of various bio-wastes available for the bioenergy development in Jordan and investigate the prospects of biodiesel potentials from such bio-wastes using catalytic depolymerization technology developed in the German company ALPHAKAT. The quantification process revealed substantial quantities of bio-wastes originated from various sectors such as dairy and poultry farms, by-products of wastewater treatment plants, and agriculture by-products. The results show that olive cake provides the highest potential for biodiesel production with a ratio of 39%. Chemical analysis showed varying levels of sulfur contents, which required desulfurization unit to produce standard quality biodiesel. Chemical analysis also showed high phosphorus content, which provided another economic opportunity to use the biodiesel by-products as a fertilizer. The statistical correlation test showed a strong linear correlation between the percentage of organic content and caloric value and biodiesel output. The study also unveiled that the C:H ratio is strongly correlated with the biodiesel production model. The regression analysis generated a model for biodiesel production, which can be used to evaluate the biodiesel production based on the net dry biomass and C:H ratio in the substrate. Based on the model, the study estimated the potential of biodiesel from olive cake to reach up to 4 million liters annually. Policymakers and involved governmental institutes are advised to develop new regulations and laws to increase the share of bioenergy in the primary energy mix through attracting co-public investments accompanied by supportive economic tools such as starter loans, tax exemptions, and feedin-tariffs. Further research is needed to quantify other sources of bio-wastes such as cooking-oil wastes.
C3SM: Information Assurance Based on Cryptographic Checksum with Clustering Security Management Protocol  [PDF]
Moad Mowafi, Lo'ai Tawalbeh, Walid Aljoby, Mohammad Al-Rousan
Journal of Information Security (JIS) , 2012, DOI: 10.4236/jis.2012.34034
Abstract: Wireless Sensor Networks (WSNs) are resource-constrained networks in which sensor nodes operate in an aggressive and uncontrolled environment and interact with sensitive data. Traffic aggregated by sensor nodes is susceptible to attacks and, due to the nature of WSNs, security mechanisms used in wired networks and other types of wireless networks are not suitable for WSNs. In this paper, we propose a mechanism to assure information security against security attacks and particularly node capturing attacks. We propose a cluster security management protocol, called Cryptographic Checksum Clustering Security Management (C3SM), to provide an efficient decentralized security management for hierarchal networks. In C3SM, every cluster selects dynamically and alternately a node as a cluster security manager (CSM) which distributes a periodic shared secrete key for all nodes in the cluster. The cluster head, then, authenticates identity of the nodes and derive a unique pairwise key for each node in the cluster. C3SM provides sufficient security regardless how many nodes are compromised, and achieves high connectivity with low memory cost and low energy consumption. Compared to existing protocols, our protocol provides stronger resilience against node capture with lower key storage overhead.
Real-Time Communications for Wireless Sensor Networks: A Two-Tiered Architecture
Mohammad Al-Rousan,Dima Kullab
International Journal of Distributed Sensor Networks , 2009, DOI: 10.1080/15501320903048647
Abstract: While many approaches have been proposed to deal with energy/latency trade-offs, they are likely to be insufficient for the applications where reduced delay guarantee is the main concern. In this article, we investigated the potential application of a decentralized two-tiered network architecture, in large-scale wireless sensor networks, where an upper layer Wireless Local Area Network (WLAN), offering more powerful capabilities, serves as a backbone to an adaptively-clustered Low-Energy Adaptive Clustering Hierarch (LEACH)-based wireless sensor network. The WLAN layer will be involved in the communication between the sensor network and the control station, mitigating the impact of the limited capacities of the sensor nodes. With this two-tiered architecture we target to provide more reliable data delivery with reduced delay bounds, and lower energy consumption in the underlying sensor network, thereby increasing its lifetime. Simulation results show that the two-tiered network architecture achieved a relatively long lifetime, while preserving remarkably low latencies, compared to a single-tiered LEACH and a super-clustered LEACH-based network architectures.
Adaptive FEC Technique for Multimedia Applications Over the Internet
Mohammad AL-Rousan,Ahamd Nawasrah
Journal of Emerging Technologies in Web Intelligence , 2012, DOI: 10.4304/jetwi.4.2.142-147
Abstract: Forward Error Correction (FEC) is a common technique for transmitting multimedia streams over the Internet. In this paper we propose a new approach of adaptive FEC scheme for multimedia applications over the Internet. This adaptive FEC will optimize the redundancy of the generated codewords from a Reed-Solomon (RS) encoder, in–order to save the bandwidth of the channel. The adaptation of the FEC scheme is based on predefined probability equations, which are derived from the data loss rates related to the recovery rates at the clients. The server uses the RTCP reports from clients and the probability equations to approximate the final delivery ratio of the sent packets to the client after applying the adaptive FEC. The server uses the RTCP reports also to predict the next network loss rate using curve fitting technique to generate the optimized redundancy in-order to meet certain residual error rates at the clients.
Recognition of Arabic Sign Language Alphabet Using Polynomial Classifiers
Assaleh Khaled,Al-Rousan M
EURASIP Journal on Advances in Signal Processing , 2005,
Abstract: Building an accurate automatic sign language recognition system is of great importance in facilitating efficient communication with deaf people. In this paper, we propose the use of polynomial classifiers as a classification engine for the recognition of Arabic sign language (ArSL) alphabet. Polynomial classifiers have several advantages over other classifiers in that they do not require iterative training, and that they are highly computationally scalable with the number of classes. Based on polynomial classifiers, we have built an ArSL system and measured its performance using real ArSL data collected from deaf people. We show that the proposed system provides superior recognition results when compared with previously published results using ANFIS-based classification on the same dataset and feature extraction methodology. The comparison is shown in terms of the number of misclassified test patterns. The reduction in the rate of misclassified patterns was very significant. In particular, we have achieved a 36% reduction of misclassifications on the training data and 57% on the test data.
Guest Editorial
Mohammad Al-Rousan,Wei Li,Ahmed Al-Dubai
Journal of Emerging Technologies in Web Intelligence , 2010, DOI: 10.4304/jetwi.2.3.158-159
Abstract: There is too much content on the Internet, so people who consult it can lose sight of their own objective without strong intention. A similar thing can also occur on a Web site. To solve this issue, some Web sites have employed recommender systems such as collaborative filtering to help a user browsing the Web site. Thus, using a recommender system for computer-based content selection and presentation is a way to strike a balance between content generated by other people and a user. Usually, the target of a recommender system is a single Web site. The International Conference on Information and Communications Systems (ICICS2009) is a forum for Industry Professionals and Academics from Companies, Governmental Agencies, and Universities around the world to present their latest research results, ideas, developments and applications in all areas of Computer and Information Sciences. The topics that have been covered in the ICICS2009 include, but are not limited to: Artificial Intelligence, Mobile Computing, Networking, Information Security and Cryptography, Intrusion Detection and Computer Forensics, Web Content Mining, Bioinformatics and IT Applications, Database Technology, Systems Integration, Information Systems Analysis and Specification, Telecommunications, and Human-computer Interaction. We selected 12 high quality papers (out of 62 papers, which were presented at the ICICS2009) and invited the authors of the selected papers to extend them and submit them for a complete new peer-review for consideration in this Special Issue (SI). The final decision for the inclusion in the SI has been strictly based on the outcome of the review process. The main objective of the SI is to make available the latest results in the field to the research community and report state-of-the-art and in-progress research on all aspects of information and communication systems. The selected papers span a broad range on the information retrieval, E-business and Internet. The contributions of these papers are outlined below. Muath Alzghool and Diana Inkpen have studied the data fusion method that should be able to combine the results that have high retrieval effectiveness with the results that have low retriev
Page 1 /18913
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.