Processing, Please wait...

  • Home
  • About Us
  • Search:
  • Advanced Search

Growing Science » Authors » Romel Al-Ali

Journals

  • IJIEC (777)
  • MSL (2643)
  • DSL (690)
  • CCL (528)
  • USCM (1092)
  • ESM (421)
  • AC (562)
  • JPM (293)
  • IJDS (952)
  • JFS (96)
  • HE (32)
  • SCI (26)

Keywords

Supply chain management(168)
Jordan(165)
Vietnam(151)
Customer satisfaction(120)
Performance(115)
Supply chain(112)
Service quality(98)
Competitive advantage(97)
Tehran Stock Exchange(94)
SMEs(89)
optimization(87)
Artificial intelligence(85)
Financial performance(84)
Sustainability(84)
Trust(83)
TOPSIS(83)
Job satisfaction(81)
Factor analysis(78)
Genetic Algorithm(78)
Social media(78)


» Show all keywords

Authors

Naser Azad(82)
Zeplin Jiwa Husada Tarigan(66)
Mohammad Reza Iravani(64)
Endri Endri(45)
Muhammad Alshurideh(42)
Hotlan Siagian(40)
Dmaithan Almajali(37)
Jumadil Saputra(36)
Muhammad Turki Alshurideh(35)
Ahmad Makui(33)
Barween Al Kurdi(32)
Sautma Ronni Basana(31)
Basrowi Basrowi(31)
Hassan Ghodrati(31)
Mohammad Khodaei Valahzaghard(30)
Shankar Chakraborty(29)
Ni Nyoman Kerti Yasa(29)
Sulieman Ibraheem Shelash Al-Hawary(28)
Prasadja Ricardianto(28)
Haitham M. Alzoubi(28)


» Show all authors

Countries

Iran(2190)
Indonesia(1311)
Jordan(813)
India(793)
Vietnam(510)
Saudi Arabia(477)
Malaysia(444)
China(231)
United Arab Emirates(226)
Thailand(160)
United States(114)
Ukraine(110)
Turkey(110)
Egypt(105)
Peru(94)
Canada(92)
Morocco(86)
Pakistan(85)
United Kingdom(80)
Nigeria(78)


» Show all countries
Sort articles by: Volume | Date | Most Rates | Most Views | Reviews | Alphabet
1.

Evolution and gaps in data mining research: Identifying the bibliometric landscape of data mining in managemen Pages 435-448 Right click to download the paper Download PDF

Authors: Romel Al-Ali, Sabri Mekimah, Rahma Zighed, Rima Shishakly, Mohammed Almaiah, Rami Shehab, Tayseer Alkhdour, Theyazn H.H Aldhyani

DOI: 10.5267/j.dsl.2024.12.011

Keywords: Data mining, Decision-making, Artificial intelligence, Forecasting, Sentiment analysis, Bibliometric

Abstract:
This study conducts a bibliometric analysis of data mining publications in the Scopus database, examining the evolution of the field from 2015 to 2024. The study examines the bibliometric structure of data mining in management. Analyzing 2,942 publications, the research identifies significant growth in data mining studies. It reveals gaps in integrating data mining with decision-making, artificial intelligence, forecasting, and sentiment analysis. Despite a large number of publications, interdisciplinary applications of data mining are limited. The scientific publication on data mining and its relationship with decision-making, artificial intelligence, forecasting, and sentiment analysis is found to be weak, showing significant research gaps in these areas. China and the USA are prominent contributors, indicating geographical concentration. The study highlights the need for broader interdisciplinary exploration in data mining beyond traditional areas, urging global researchers to diversify contributions. The analysis focuses solely on publications indexed in Scopus, potentially excluding relevant studies from other databases or sources. This study provides insights into the evolution of data mining research and identifies areas for further interdisciplinary exploration, contributing to the advancement of the field's boundaries.
Details
  • 0
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: DSL | Year: 2025 | Volume: 14 | Issue: 2 | Views: 354 | Reviews: 0

 
2.

Evaluating technological intelligence dimensions in innovative startups: A confirmatory factor analysis approach Pages 677-686 Right click to download the paper Download PDF

Authors: Romel Al-Ali, Sabri Mekimah, Rahma Zighed, Ahmad Al-Adwan, Mohammed Almaiah, Rami Shehab, Tayseer Alkhdour, Theyazn H.H Aldhyani

DOI: 10.5267/j.uscm.2024.10.012

Keywords: Technological Intelligence, Intelligent systems, Competitive intelligence, Market intelligence, Intelligent processes, Confirmatory factor analysis

Abstract:
This article aims to study technological intelligence in innovative startups in Algeria using Kerr’s model. Technological intelligence consists of four main dimensions: intelligent systems, competitive intelligence, market intelligence, and intelligent processes. To collect data, a questionnaire was distributed to a sample of 255 innovative startups in Algeria, and the data were analyzed using confirmatory factor analysis (CFA) with Smart PLS software. The results indicated that the two-dimensional model combining intelligent systems and competitive intelligence provided the best fit, with a relationship value of 0.605 between these two dimensions. On the other hand, the relationship between market intelligence and competitive intelligence was weak, with a value of 0.281, reflecting the limited use of analytical methods by startups to monitor competitors. Based on these findings, the study recommends that innovative startups in Algeria enhance their use of competitive intelligence and intelligent systems to improve decision-making processes. Additionally, these startups should make better use of available market technologies to develop their products and services, while focusing on continuous competitor analysis and identifying opportunities. In conclusion, technological intelligence is a strategic element for startups, helping them improve their performance and achieve a competitive edge in the changing business environment in Algeria.
Details
  • 0
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: USCM | Year: 2025 | Volume: 13 | Issue: 4 | Views: 452 | Reviews: 0

 
3.

Adoption deep learning approach using realistic synthetic data for enhancing network intrusion detection in intelligent vehicle systems Pages 77-86 Right click to download the paper Download PDF

Authors: Said A. Salloum, Tarek Gaber, Mohammed Amin Almaiah, Rami Shehab, Romel Al-Ali, Theyazan H.H Aldahyan

DOI: 10.5267/j.ijdns.2024.10.001

Keywords: Convolutional Neural Network (CNN), Cybersecurity, Intelligent Vehicle Systems, Network Intrusion Detection Scapy, Network Traffic Analysis, Simulation, Threat Detection

Abstract:
In the dynamic field of cybersecurity within intelligent vehicle systems, the sophistication of threats necessitates continual advancements in security technologies. Traditional Network Intrusion Detection Systems (NIDS) often fall short in detecting emerging and sophisticated intrusion methods, primarily due to their reliance on static datasets that fail to capture the nuanced dynamics and complexity of modern network intrusions. This study presents a sophisticated simulation for NIDS tailored to intelligent vehicle environments, utilizing the extensive capabilities of Scapy—a robust network manipulation tool—to generate a highly accurate dataset of network traffic reflective of real-world scenarios. We created a diverse dataset involving 100,000 network flows, covering a wide array of benign, malicious, and anomalous traffic patterns, to thoroughly evaluate the detection capabilities of our proposed system. This dataset was analyzed using a deep learning framework employing a Convolutional Neural Network (CNN), which demonstrated outstanding performance metrics: an accuracy of 99.08%, precision of 98.96%, recall of 99.11%, and an F1 score of 99.03%. These metrics showcase the system's enhanced capability to precisely classify various network flows, emphasizing the importance of realistic synthetic data in boosting the training and accuracy of NIDS in intelligent vehicles. The results of this research are significant, marking a step forward towards more flexible and preemptive security measures for intelligent vehicles, and effectively narrowing the gap between simulation-based testing and real-world network environments.

Details
  • 17
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: IJDS | Year: 2025 | Volume: 9 | Issue: 1 | Views: 382 | Reviews: 0

 
4.

Factors influencing students' attitude toward to use mobile learning applications using SEM-ANN hybrid approach Pages 115-124 Right click to download the paper Download PDF

Authors: Romel Al-Ali, Rima Shishakly, Mohammed Amin Almaiah, Rami Shehab

DOI: 10.5267/j.ijdns.2024.9.017

Keywords: Mobile learning application, UTAUT-2, M-learning, Actual use, Post COVID-19

Abstract:
Mobile learning application now is considered a powerful application for learning and was adopted in universities in the period of Covid-19. After Covid-19 pandemic, university students have been allowed to use mobile learning systems, it is needed to ensure students’ intention to continuously use mobile learning for their learning activities or not. Thus, the purpose of this paper is to understand the main determinants that encourage the continuous use of mobile learning. To achieve that, we used the UTAUT-2 model to predict the main determinants of mobile learning acceptance. In our study, a quantitative technique was employed to collect the data. A hybrid approach SEM-ANN was applied to validate the research model. The findings indicated that performance expectancy and effort expectancy had a strong effect on students' attitudes towards mobile learning platforms. In addition, the results showed that performance expectancy and effort expectancy have a significant impact on students' continuous intention to use mobile learning platforms after Covid-19. In addition, hedonic motivation and habit had a positive effect on both students' attitudes and continuous intention to use mobile learning platforms. Moreover, Social influence factor and facilitating conditions had a significant effect on students' continuous intention to use mobile learning platforms after Covid-19.
Details
  • 34
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: IJDS | Year: 2025 | Volume: 9 | Issue: 1 | Views: 575 | Reviews: 0

 
5.

A comparative analysis between ChatGPT & Google as learning platforms: The role of media-tors in the acceptance of learning platform Pages 2151-2162 Right click to download the paper Download PDF

Authors: Said A. Salloum, Raghad Alfaisal, Rana Saeed Al-Maroof, Rima Shishakly, Mohammed Almaiah, Romel Al-Ali

DOI: 10.5267/j.ijdns.2024.6.016

Keywords: ChatGPT, Google, Online learning platforms, Virtual reality simulations

Abstract:
Advancements in technology have had a profound impact on the way we learn, teach, and access knowledge. From online learning platforms to interactive educational games and virtual reality simulations, technology has transformed the traditional classroom into a dynamic, engaging, and inclusive space for education. One of the promising advancements in the field of artificial intelligence technology is ChatGPT which offers personalized and effective learning experiences by providing students with customized feedback and explanation. The effect of ChatGPT must be compared with the effect of Google at the educational level since both present a source of information and explanation. Thus, this study aims at investigating the differences between these two learning sources to measure their effectiveness from different perspectives. The model proposed in this study was evaluated using the PLS-SEM approach, utilizing data collected from 153 university students in the UAE. The results of this evaluation indicate that the GPT (Generative Pre-trained Transformer) has a significant impact on user acceptance, mediated by information quality, system quality, perceived learning value, and perceived satisfaction. These factors play a crucial role in determining users' acceptance of the GPT. However, it is important to note that some aspects of the model were not supported, suggesting that they do not have a significant predictive effect on the use of ChatGPT. Nonetheless, the findings of this study contribute to the existing literature on AI and environmental sustainability, providing valuable insights for practitioners, policymakers, and AI product developers. These insights can help guide the development and implementation of AI technologies in a way that aligns with users' needs and preferences while considering the larger environmental context.
Details
  • 17
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: IJDS | Year: 2024 | Volume: 8 | Issue: 4 | Views: 674 | Reviews: 0

 
6.

Detecting DDoS attacks using machine learning algorithms and feature selection methods Pages 2307-2318 Right click to download the paper Download PDF

Authors: Mohammed Amin Almaiah, Rana Alrawashdeh, Tayseer Alkhdour, Romel Al-Ali, Gaith Rjoub, Theyazan Aldahyani

DOI: 10.5267/j.ijdns.2024.6.001

Keywords: DDoS Attacks, Machine learning algorithms, Salp swarm algorithm (SSA), PSO, GWO, SVM, KNN, ML

Abstract:
A Distributed Denial of Service (DDoS) attack occurs when an attacker tries to disrupt a network, service or website by flooding huge numbers of packets on the internet traffic. Detecting DDoS attacks serves the goal of spotting and addressing them promptly to reduce their effects on the network, system or service being targeted. Detecting Distributed Denial of Service (DDoS) attacks is crucial, for people, companies and network managers. The detection of DDoS attacks has ranging uses in industries such as network security safeguarding websites, managing cloud services ensuring the security of online systems and services. Detecting DDoS attacks is essential for safeguarding infrastructure upholding service availability and guaranteeing the security of online systems and services. To achieve this objective, we proposed a framework to detect DDoS attacks including six steps. In step one, we start by gathering information, which includes network activity and system records, for operations as well as instances of DDoS attacks. Step two, we identify characteristics of the data collected such as patterns in network traffic, packet details, IP addresses, types of protocols used and more. Step three, we utilize algorithms for feature selection such as Salp Swarm Algorithm (SSA), Gray Wolf Algorithm (GWA), Particle Swarm Algorithm (PSO) to pinpoint the features that can distinguish between normal activities and DDoS attack patterns. After that in step four, we divide the processed dataset into sections for training and testing purposes to develop and assess the machine learning models such as SVM (support vector machine), and KNN (K-nearest neighbor). Step five we develop a classification model using machine learning techniques like decision trees, forests, support vector machines (SVM) logistic regression models or neural networks. Finally, we assess the effectiveness of models through metrics such as accuracy rates, precision levels, recall rates, and F1 scores. The results show that the proposed models achieve high results (99.9%). In summary detecting DDoS attacks is crucial for protecting networks, systems and online services against disruptions.
Details
  • 34
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: IJDS | Year: 2024 | Volume: 8 | Issue: 4 | Views: 1385 | Reviews: 0

 

® 2010-2026 GrowingScience.Com