Processing, Please wait...

  • Home
  • About Us
  • Search:
  • Advanced Search

Growing Science » Authors » Rami Shehab

Journals

  • IJIEC (777)
  • MSL (2643)
  • DSL (690)
  • CCL (528)
  • USCM (1092)
  • ESM (421)
  • AC (562)
  • JPM (293)
  • IJDS (952)
  • JFS (101)
  • HE (32)
  • SCI (26)

Keywords

Supply chain management(168)
Jordan(165)
Vietnam(151)
Customer satisfaction(120)
Performance(115)
Supply chain(112)
Service quality(98)
Competitive advantage(97)
Tehran Stock Exchange(94)
SMEs(89)
optimization(87)
Sustainability(86)
Artificial intelligence(85)
Financial performance(84)
Trust(83)
TOPSIS(83)
Job satisfaction(81)
Genetic Algorithm(78)
Factor analysis(78)
Social media(78)


» Show all keywords

Authors

Naser Azad(82)
Zeplin Jiwa Husada Tarigan(66)
Mohammad Reza Iravani(64)
Endri Endri(45)
Muhammad Alshurideh(42)
Hotlan Siagian(40)
Dmaithan Almajali(37)
Jumadil Saputra(36)
Muhammad Turki Alshurideh(35)
Ahmad Makui(33)
Barween Al Kurdi(32)
Hassan Ghodrati(31)
Basrowi Basrowi(31)
Sautma Ronni Basana(31)
Mohammad Khodaei Valahzaghard(30)
Shankar Chakraborty(29)
Ni Nyoman Kerti Yasa(29)
Haitham M. Alzoubi(28)
Sulieman Ibraheem Shelash Al-Hawary(28)
Prasadja Ricardianto(28)


» Show all authors

Countries

Iran(2192)
Indonesia(1311)
Jordan(813)
India(793)
Vietnam(510)
Saudi Arabia(478)
Malaysia(444)
China(231)
United Arab Emirates(226)
Thailand(160)
United States(114)
Ukraine(110)
Turkey(110)
Egypt(106)
Peru(94)
Canada(93)
Morocco(86)
Pakistan(85)
United Kingdom(80)
Nigeria(78)


» Show all countries
Sort articles by: Volume | Date | Most Rates | Most Views | Reviews | Alphabet
1.

Evolution and gaps in data mining research: Identifying the bibliometric landscape of data mining in managemen Pages 435-448 Right click to download the paper Download PDF

Authors: Romel Al-Ali, Sabri Mekimah, Rahma Zighed, Rima Shishakly, Mohammed Almaiah, Rami Shehab, Tayseer Alkhdour, Theyazn H.H Aldhyani

DOI: 10.5267/j.dsl.2024.12.011

Keywords: Data mining, Decision-making, Artificial intelligence, Forecasting, Sentiment analysis, Bibliometric

Abstract:
This study conducts a bibliometric analysis of data mining publications in the Scopus database, examining the evolution of the field from 2015 to 2024. The study examines the bibliometric structure of data mining in management. Analyzing 2,942 publications, the research identifies significant growth in data mining studies. It reveals gaps in integrating data mining with decision-making, artificial intelligence, forecasting, and sentiment analysis. Despite a large number of publications, interdisciplinary applications of data mining are limited. The scientific publication on data mining and its relationship with decision-making, artificial intelligence, forecasting, and sentiment analysis is found to be weak, showing significant research gaps in these areas. China and the USA are prominent contributors, indicating geographical concentration. The study highlights the need for broader interdisciplinary exploration in data mining beyond traditional areas, urging global researchers to diversify contributions. The analysis focuses solely on publications indexed in Scopus, potentially excluding relevant studies from other databases or sources. This study provides insights into the evolution of data mining research and identifies areas for further interdisciplinary exploration, contributing to the advancement of the field's boundaries.
Details
  • 0
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: DSL | Year: 2025 | Volume: 14 | Issue: 2 | Views: 379 | Reviews: 0

 
2.

Evaluating technological intelligence dimensions in innovative startups: A confirmatory factor analysis approach Pages 677-686 Right click to download the paper Download PDF

Authors: Romel Al-Ali, Sabri Mekimah, Rahma Zighed, Ahmad Al-Adwan, Mohammed Almaiah, Rami Shehab, Tayseer Alkhdour, Theyazn H.H Aldhyani

DOI: 10.5267/j.uscm.2024.10.012

Keywords: Technological Intelligence, Intelligent systems, Competitive intelligence, Market intelligence, Intelligent processes, Confirmatory factor analysis

Abstract:
This article aims to study technological intelligence in innovative startups in Algeria using Kerr’s model. Technological intelligence consists of four main dimensions: intelligent systems, competitive intelligence, market intelligence, and intelligent processes. To collect data, a questionnaire was distributed to a sample of 255 innovative startups in Algeria, and the data were analyzed using confirmatory factor analysis (CFA) with Smart PLS software. The results indicated that the two-dimensional model combining intelligent systems and competitive intelligence provided the best fit, with a relationship value of 0.605 between these two dimensions. On the other hand, the relationship between market intelligence and competitive intelligence was weak, with a value of 0.281, reflecting the limited use of analytical methods by startups to monitor competitors. Based on these findings, the study recommends that innovative startups in Algeria enhance their use of competitive intelligence and intelligent systems to improve decision-making processes. Additionally, these startups should make better use of available market technologies to develop their products and services, while focusing on continuous competitor analysis and identifying opportunities. In conclusion, technological intelligence is a strategic element for startups, helping them improve their performance and achieve a competitive edge in the changing business environment in Algeria.
Details
  • 0
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: USCM | Year: 2025 | Volume: 13 | Issue: 4 | Views: 465 | Reviews: 0

 
3.

A novel IOT intrusion detection system: Integrating features position encoder with a tab transformer deep learning model Pages 677-688 Right click to download the paper Download PDF

Authors: Mohammad A. Alsharaiah, Mohammed Amin Almaiah, Amer Alqutaish, Udit Mamodiya, Rami Shehab, Mansour Obeidat

DOI: 10.5267/j.ijdns.2026.1.003

Keywords: SMOTE, TabTransformer, Binary Classification, IoT, Positional encodings

Abstract:
Internet of Things (IoT) and Internet of Medical Things (IoMT) networks provide a massive amount of data. These types of data need a protection level, such as an intrusion detection framework. Deep learning models become a powerful tool for this purpose. Therefore, this work proposes an intrusion detection framework based on a deep learning technique which employs TabTransformer and self-attention mechanisms to imprison intricate dependencies among tabular features and detect abnormal attack behaviors. Precisely, each numerical feature is mapped into a learnable embedding vector and augmented with positional encodings to preserve feature identity and inter-feature relationships within the embedding space. The main task for the proposed model is to achieve binary classification tasks the model should classify the traffic data as either normal or abnormal. Furthermore, the model utilized a benchmark dataset such as the CICIoMT2024. Furthermore, this type of dataset faces issues, such as imbalance. So, the system integrates SMOTE-based data balancing, Stratified K-Fold Cross-Validation, and threshold optimization to ensure fairness and reproducibility to accomplish a binary classification task. As a consequence, experiments on the CICIoMT2024 dataset yield superior results, achieving a mean accuracy of 99.85. Through SHAP-based interpretability, key features influencing model predictions are identified, confirming the framework’s transparency, robustness, and suitability for real-world ARP intrusion detection.
Details
  • 0
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: IJDS | Year: 2026 | Volume: 10 | Issue: 2 | Views: 240 | Reviews: 0

 
4.

Behavior-aware cybersecurity using artificial intelligence and cryptographic intelligence Pages 699-722 Right click to download the paper Download PDF

Authors: Udit Mamodiya, Indra Kishor, Mohammed Almaiah, Amer Alqutaish, Rami Shehab, Mansour Obeidat

DOI: 10.5267/j.ijdns.2026.1.001

Keywords: Behavior-aware cybersecurity, Adaptive cryptographic intelligence, Sequential behavior modelling, Secure learning systems, Intelligent threat response

Abstract:
Cyber-attacks become manifested as a series of behavioral patterns, but not as an event, and many current security regimes stay based upon a static detection and fixed trust implementation. Such incongruence restricts their capability to act in a dependable manner in fluctuating and unpredictable threat situations. The existing artificial intelligence-based cybersecurity products mainly focus on the detection performance. Due to this, such systems will still be vulnerable to false positives, erratic reactions, and degradation of performance over time. This paper proposes a behavior-sensitive cybersecurity model that brings together sequential behavioral modelling, risk-adaptive cryptography implementation, and integrity-guaranteed learning in an architecture with closed loops. The temporally structured patterns of activity are considered as behavioral risk, which allows making proportional, not binary, trust decisions. Cryptographic policies are adaptively changed based on the inferenced risk, whereas learning updates are explicitly secured to maintain the model reliability as time goes by. The experimental findings indicate that the proposed framework can obtain a detection accuracy of 96.7% and F 1-score of 96.0, as well as a false positive rate decreased to 3.1%. Moreover, the adaptive response latency is also decreased by a factor of about 20-30% relative to the representative baselines and also enhanced stability in response to adversarial noise. These results indicate behavior-based intelligence.
Details
  • 0
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: IJDS | Year: 2026 | Volume: 10 | Issue: 2 | Views: 142 | Reviews: 0

 
5.

Enhancing cyber threat detection transparency through explainable artificial intelligence models and data-driven security analytics Pages 969-982 Right click to download the paper Download PDF

Authors: Indra Kishor, Udit Mamodiya, Mohammed Almaiah, Amer Alqutaish, Rami Shehab, Mansour Obeidat

DOI: 10.5267/j.ijdns.2025.11.002

Keywords: Data-driven security analytics, Explainable artificial intelligence, Cyber threat detection in cloud networks, Network intrusion interpretable modeling, Adaptive risk scoring

Abstract:
The recent explosion of cyber threats in big data ecosystems has exposed the vulnerability of black-box machine learning models that prioritize accuracy over explainability. Traditional cybersecurity mechanisms do not create a sense as to why a prediction is provided and the analysts are left with doubts and the response mechanisms are slow. This is not very transparent and therefore compromises the operational trust and the traceability of high-risk decisions in real-time defense infrastructures. Current explainable AI (XAI) methods, despite their usefulness, are mostly stagnant, not connected to the changing situation of network behavior and human monitoring. They seldom inculcate the feedback mechanisms that can adjust the model explanations with new threat patterns. The research paper introduces an Explainable Artificial Intelligence and Data-Driven Security Analytics Framework that is hybrid and serves to combine global interpretability with SHAP, local reasoning with LIME, and adaptive refinement with an analyst-in-loop feedback layer. The architecture converts the threat detection to a self-fixing transparent process in which the analytical reasoning is dynamically developed with the data flow. In experimental tests of less than 10k concurrent traffic conditions, experimental results indicate that the system had a detection accuracy of 98.4 and Spearman correlation (0.91) between predicted risk scores and real levels of severity with a quantifiable 3.9% stability improvement over the similar XAI-based systems of intrusion detection. The combination of explainability with real-time analytics will further enhance the accuracy of detecting cyber threats and its interpretability reliability as well. The findings indicate the essential change to credible, self-explanatory, and adaptive security intelligence of the next-generation data networks.
Details
  • 0
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: IJDS | Year: 2026 | Volume: 10 | Issue: 2 | Views: 217 | Reviews: 0

 
6.

The role of digital industrial strategy and human creativity in transformational technopreneurship development Pages 471-482 Right click to download the paper Download PDF

Authors: Arie Wahyu Prananta, Jony Puspa Kusuma, Yogi Makbul, Hence Beedwel Lumentut, Rami Shehab, Bejo Slamet, Ardiani Ika Sulistyawati, Mochammad Isa Anshori, Gurendro Putro

DOI: 10.5267/j.ijdns.2025.9.005

Keywords: Industrial digital strategy, Transformational development, Area tecnopreneurship, Human creativity, SMEs

Abstract:
The purpose of this study is to analyze the relationship between industrial digital strategy in the area of transformational technopreneurship development and analyze the relationship between human creativity in the area of transformational technopreneurship development. This study uses a quantitative approach with an explanatory research design, which aims to examine the influence of integrity, organizational commitment, and motivation on sustainable employee performance with job satisfaction as a mediating variable. The population consists of all employees of SME organizations, totaling 765 employees. The sampling technique applied is simple random sampling. The research instrument is a questionnaire using a 5-point Likert scale. The research variables are: Digital Work Environment (X1), Job Satisfaction (X2), Organizational Culture (X3) and Employee Work Productivity (Y). Data were analyzed using Partial Least Square – Structural Equation Modeling (PLS-SEM) with SmartPLS 4.0. The analysis consists of two stages: Outer Model (Measurement Model): Convergent validity, discriminant validity, and reliability testing. Inner Model (Structural Model): Testing path coefficients, R² values, and direct and indirect influences between variables. The results of the study show that the Industrial digital strategy variable has a positive relationship with the transformational development area of technopreneurship, human creativity has a positive relationship with the transformational development area of technopreneurship.
Details
  • 0
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: IJDS | Year: 2026 | Volume: 10 | Issue: 1 | Views: 148 | Reviews: 0

 
7.

Client-side runtime integrity agent for detecting man-in-the-browser attacks using forensic monitoring and anomaly detection Pages 483-498 Right click to download the paper Download PDF

Authors: Dena Abu Laila, Mohammed Amin, Amer Alqutaish, Rami Shehab

DOI: 10.5267/j.ijdns.2025.9.004

Keywords: Man-in-the-Browser, Cybersecurity, Anomaly detection, Runtime integrity, Browser security, Malware detection, Financial fraud preventio

Abstract:
Man-in-the-Browser (MitB) attacks represent a sophisticated class of web-based threats that manipulate browser functionality to intercept and modify user transactions in real-time. Traditional server-side detection mechanisms often fail to identify these attacks due to their client-side nature and encrypted communication channels. This paper presents a novel client-side runtime integrity agent that employs forensic monitoring and machine learning-based anomaly detection to identify MitB attacks at their source. The proposed system integrates DOM integrity verification, memory forensic analysis, and behavioral pattern recognition to detect malicious browser modifications before they can compromise user sessions. Our experimental evaluation demonstrates a detection accuracy of 97.3% with a false positive rate of 2.1%, significantly outperforming existing client-side detection methods. The system successfully identified various MitB attack vectors, including Zeus, SpyEye, and custom injection payloads, while maintaining a minimal computational overhead of less than 3% CPU utilization.
Details
  • 0
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: IJDS | Year: 2026 | Volume: 10 | Issue: 1 | Views: 324 | Reviews: 0

 
8.

An IoT-enabled reinforcement learning-driven ground robot for precision navigation and smart interaction in dynamic environments Pages 773-782 Right click to download the paper Download PDF

Authors: Indra Kishor, Udit Mamodiya, Mohammed Almaayah, Mansour Obeidat, Rami Shehab, Theyazn H. H. Aldhyani

DOI: 10.5267/j.ijdns.2025.8.007

Keywords: Reinforcement Learning, Edge Computing, Ground Robotics, IoT Communication, Semantic Mapping, Human–Robot Interaction, Raspberry Pi

Abstract:
Autonomous ground robots are increasingly relied upon in dynamic environments where reliable navigation and context-aware interaction are essential. However, existing robotic control systems often rely on cloud-based reinforcement learning (RL) frameworks or static algorithms that fail to adapt in real-time to noisy, unpredictable scenarios. These models typically overlook the constraints of edge deployment and lack robust integration with human interaction modalities such as voice and semantic object awareness. To address these limitations, this work proposes a fully embedded, IoT-enabled ground robot powered by a reinforcement learning-based adaptive control framework. The system leverages Raspberry Pi 4B+ as its core computational unit, integrating MQTT-driven communication, multimodal interaction through speech and vision, and lightweight policy convergence for obstacle-aware navigation. A novel RL-based state-action pipeline is trained and deployed entirely on-device, ensuring real-time responsiveness without external computation. Experimental evaluations show that the proposed framework reduces navigation errors by 22% and improves interaction latency by 37% over traditional PID and A*-based systems. The RL model converges in under 2200 episodes, with stable reward curves and high reliability across variable acoustic and physical terrains. This study showcases how low-cost, edge-based robots can achieve high autonomy and situational awareness contributing to future advancements in resilient, self-adaptive robotic systems within smart and resource-constrained environments.
Details
  • 0
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: IJDS | Year: 2025 | Volume: 9 | Issue: 4 | Views: 640 | Reviews: 0

 
9.

Adoption deep learning approach using realistic synthetic data for enhancing network intrusion detection in intelligent vehicle systems Pages 77-86 Right click to download the paper Download PDF

Authors: Said A. Salloum, Tarek Gaber, Mohammed Amin Almaiah, Rami Shehab, Romel Al-Ali, Theyazan H.H Aldahyan

DOI: 10.5267/j.ijdns.2024.10.001

Keywords: Convolutional Neural Network (CNN), Cybersecurity, Intelligent Vehicle Systems, Network Intrusion Detection Scapy, Network Traffic Analysis, Simulation, Threat Detection

Abstract:
In the dynamic field of cybersecurity within intelligent vehicle systems, the sophistication of threats necessitates continual advancements in security technologies. Traditional Network Intrusion Detection Systems (NIDS) often fall short in detecting emerging and sophisticated intrusion methods, primarily due to their reliance on static datasets that fail to capture the nuanced dynamics and complexity of modern network intrusions. This study presents a sophisticated simulation for NIDS tailored to intelligent vehicle environments, utilizing the extensive capabilities of Scapy—a robust network manipulation tool—to generate a highly accurate dataset of network traffic reflective of real-world scenarios. We created a diverse dataset involving 100,000 network flows, covering a wide array of benign, malicious, and anomalous traffic patterns, to thoroughly evaluate the detection capabilities of our proposed system. This dataset was analyzed using a deep learning framework employing a Convolutional Neural Network (CNN), which demonstrated outstanding performance metrics: an accuracy of 99.08%, precision of 98.96%, recall of 99.11%, and an F1 score of 99.03%. These metrics showcase the system's enhanced capability to precisely classify various network flows, emphasizing the importance of realistic synthetic data in boosting the training and accuracy of NIDS in intelligent vehicles. The results of this research are significant, marking a step forward towards more flexible and preemptive security measures for intelligent vehicles, and effectively narrowing the gap between simulation-based testing and real-world network environments.

Details
  • 17
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: IJDS | Year: 2025 | Volume: 9 | Issue: 1 | Views: 425 | Reviews: 0

 
10.

Factors influencing students' attitude toward to use mobile learning applications using SEM-ANN hybrid approach Pages 115-124 Right click to download the paper Download PDF

Authors: Romel Al-Ali, Rima Shishakly, Mohammed Amin Almaiah, Rami Shehab

DOI: 10.5267/j.ijdns.2024.9.017

Keywords: Mobile learning application, UTAUT-2, M-learning, Actual use, Post COVID-19

Abstract:
Mobile learning application now is considered a powerful application for learning and was adopted in universities in the period of Covid-19. After Covid-19 pandemic, university students have been allowed to use mobile learning systems, it is needed to ensure students’ intention to continuously use mobile learning for their learning activities or not. Thus, the purpose of this paper is to understand the main determinants that encourage the continuous use of mobile learning. To achieve that, we used the UTAUT-2 model to predict the main determinants of mobile learning acceptance. In our study, a quantitative technique was employed to collect the data. A hybrid approach SEM-ANN was applied to validate the research model. The findings indicated that performance expectancy and effort expectancy had a strong effect on students' attitudes towards mobile learning platforms. In addition, the results showed that performance expectancy and effort expectancy have a significant impact on students' continuous intention to use mobile learning platforms after Covid-19. In addition, hedonic motivation and habit had a positive effect on both students' attitudes and continuous intention to use mobile learning platforms. Moreover, Social influence factor and facilitating conditions had a significant effect on students' continuous intention to use mobile learning platforms after Covid-19.
Details
  • 34
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: IJDS | Year: 2025 | Volume: 9 | Issue: 1 | Views: 596 | Reviews: 0

 
1 2
Previous Next

® 2010-2026 GrowingScience.Com