كتابة النص: الأستاذ الدكتور يوسف أبو العدوس - جامعة جرش قراءة النص: الدكتور أحمد أبو دلو - جامعة اليرموك مونتاج وإخراج : الدكتور محمد أبوشقير، حمزة الناطور، علي ميّاس تصوير : الأستاذ أحمد الصمادي الإشراف العام: الأستاذ الدكتور يوسف أبو العدوس
فيديو بمناسبة الإسراء والمعراج - إحتفال كلية الشريعة بجامعة جرش 2019 - 1440
فيديو بمناسبة ذكرى المولد النبوي الشريف- مونتاج وإخراج الدكتور محمد أبوشقير- كلية تكنولوجيا المعلومات
التميز في مجالات التعليم والبحث العلمي، وخدمة المجتمع، والارتقاء لمصاف الجامعات المرموقة محليا واقليميا وعالميا.
المساهمة في بناء مجتمع المعرفة وتطوره من خلال إيجاد بيئة جامعية، وشراكة مجتمعية محفزة للابداع، وحرية الفكر والتعبير، ومواكبة التطورات التقنية في مجال التعليم، ومن ثم رفد المجتمع بما يحتاجه من موارد بشرية مؤهلة وملائمة لاحتياجات سوق العمل.
تلتزم الجامعة بترسيخ القيم الجوهرية التالية: الإلتزام الإجتماعي والأخلاقي، الإنتماء،العدالة والمساواة، الإبداع، الجودة والتميّز، الشفافية والمحاسبة، الحرية المنظبطة والمستقبلية.
لقد أكملت شهادة البكالوريوس في علوم الكمبيوتر من جامعة جرش في عام 2011 ، وحصلت لاحقًا على درجة الماجستير في نظم المعلومات من جامعة البلقاء التطبيقية في عام 2013 ، ثم حصلت على الدكتوراه من الجامعة الإسلامية العالمية في إدارة الأعمال في مسار التكنولوجيا وعلوم المعلومات في عام 2019.
اهتمامي بالبحث في العلوم الحديثة في علوم الكمبيوتر وتكنولوجيا المعلومات.
درجة البكالوريوس في علم الحاسوب- جامعة جرش عام 2011
درجة الماجستير في نظم المعلومات - جامعة البلقاء التطبيقية عام 2013
دجة الدكتوراة في الاعمال مسار التكنولوجيا وعلوم المعلومات - جامعة العلوم الاسلامية العالمية عام 2019.
2011-2016 / Teaching Assistant, Jerash University, Jordan
Doctor, Jerash University, Jordan / 2020-current
This study aimed at testing the role of Deep learning techniques on predicting COVID-19 big data. The study adopted two tasks to measure Deep learning (classification, clustering), while the big data was measured through three dimensions: volume, variety and velocity. To achieve study aims, the researcher relied on measuring accuracy and parameters settings of classification and clustering techniques, and measuring the features of the covid-19 dataset. First, by presenting questions that reflects the dimensionality of the dataset and the features of the two techniques. Second, by analyzing the outcomes of the artificial neural network and K-means to answer those questions. Also, the results of both techniques, artificial neural network and K-means, proved to be suitable to classify instances into two categories of negative and positive covid-19 cases and some features of both techniques are of no significant impact on accuracy, and the classification has a greatest impact on accuracy contributed to a number of features.Keywords: Deep learning, big data, covid-19, ANN, K-means.
This study aimed to test the impact of information technology on Information systems effectiveness in Jordanian Telecom Companies. The study adopted a five-dimensional scale to measure information technology (people, hardware, software, databases, and networks), while the information systems' effectiveness was measured through four dimensions: end-user satisfaction, system usage, system security and suitability of the system for management levels. To achieve study aims, a descriptive-analytical method was used. The study was conducted on a sample of (152) managers working in these companies. This study found that there is a high-level average for information technology dimensions and Information Systems effectiveness dimensions. Also, the results showed a significant impact of information technology dimensions (people, software, databases, and networks) except hardware on effectiveness information systems. It was also evident that there a significant impact of information technology on Information systems effectiveness dimensions (end-user satisfaction, system usage, system security and suitability of the system for management levels). Keywords: information technology, information system effectiveness, Jordanian telecommunication companies
This study aimed to test the role of information security on enhancing cloud computing effectiveness in Jordanian Commercial Banks. The study adopted a fivedimensional scale to measure information security (confidentiality, physical security, application security, availability, identity management), while the cloud computing effectiveness was measured through six dimensions: control, transmission costs, accuracy, performance, reliability and privacy. To achieve study aims, a descriptive-analytical method was used equal random sample. The study was conducted on a sample of (212) employees working in these banks. This study found that there is a high-level average for information security dimensions and cloud computing effectiveness dimensions. Also, the results showed a significant impact of information security dimensions (confidentiality, physical security, application security, availability, identity management) on cloud computing effectiveness. It was also evident that there a significant impact of information security on cloud computing effectiveness dimensions (control, transmission costs, accuracy, performance, reliability and privacy). Keywords: Information Security, Cloud Computing Effectiveness, Commercial Banks, Jordan.
this study aimed to identifying the impact of social media on electronic loyalty to the Jordanian consumer. The current study is based on four dimensions of social media for measuring and it’s as follows: informatics, interaction, credibility and content sharing. This study has also followed two dimensions for measuring electronic loyalty, namely; electronic trust and electronic satisfaction. The study was conducted on a sample of 739 Jordanian consumers who use social media for purchasing goods and services on a regular basis. This study has found that there are middle levels of average for three dimensions of social media (informatics, interaction and content sharing), while the level of credibility dimension was high. Also the study results found out that the electronic loyalty and its dimensions (electronic trust and electronic satisfaction), they came as high levels. Results also indicated that there is a significant effect of social media on electronic loyalty of Jordanian consumer, and there is a significant effect for social media on electronic trust and electronic satisfaction of Jordanian consumer. Index terms: Content sharing, Electronic loyalty, electronic satisfaction, electronic trust, interaction, Jordanian consumer, Social media.
كلية علوم الحاسوب وتكنولوجيا المعلومات
الكلية
قسم علم الحاسوب
القسم
د.مجد الحوامدة
اسم عضو هيئة التدريس
كلية الهندسة
المبنى
المبنى ورقم القاعة
الوقت
اليوم
المادة
المواد التي يدرسها
الهندسة 602
8
ح ث
مهارات حاسوب/استدراكي
ن ر
الهندسة 609
11
قواعد البيانات
الهندسة 611
مقدمة في البرمجة
الساعات
الساعات المكتبية
الى
من
11:00
09:30
أحد
الاثنين
الثلاثاء
الاربعاء
التوقيع
د. مجد محمد الحوامدة
عضو هيئة التدريس
د.بسام محمد الزغموري
مشرف مكتب الجودة في الكلية
رئيس القسم
أ.د أحمد حبوش
عميد الكلية
This course is an introductory course to the Object Oriented Design. Topics covered include the C++ programming concepts, structures, functions, objects and classes, Class members: Data members (fields) and member functions (methods). Class member visibility (private, public, protected). Class hierarchies. Single and multiple inheritance. Inter-class relationships. Class variables and instance variables. Class methods and instance methods. Service methods and support methods. Scope. Constructors and destructors. Object initialization. Memory management. Garbage collection. Methods and messages. Method signatures. Method and operator overloading. Method overriding. Abstract classes. Dynamic (late) binding. Polymorphism. Software reuse. Subclasses (derived classes). Super classes (base classes). Invocation of super class methods and constructors.
This course provides a comprehensive introduction to the fundamental concepts and principles of computer networking. The students will explore the layered architecture of computer networks, beginning with the application layer and progressing through the transport, network, and link layers. Key topics include:
This course provides a clear understanding of wireless networks’ concepts, architecture, protocols, and applications. It describes various security architectures for different wireless communication networks to design secure wireless networks. It will also discuss 5G and Internet of Things. Finally, the course will discuss all different types of wireless networks: wireless LAN, wireless MAN, wireless PAN, and wireless WAN from design, use, and security point of view.
Course Description:
This course, Data Analytics, provides a comprehensive exploration of data analysis techniques and tools, equipping students with the skills to extract meaningful insights from diverse datasets. Students will learn to apply statistical methods, data visualization, and machine learning algorithms using industry-standard tools like Excel, Tableau, Power BI, and Python libraries. Through hands-on exercises and a capstone project, students will develop the ability to analyze data, build predictive models, and communicate findings effectively, preparing them for careers in data science and related fields.
Course Objectives:
Upon successful completion of this course, students will be able to:
Course Schedule:
Week 1:
Week 2:
Week 3:
Week 4:
Week 5:
Week 6:
Week 8:
Week 9:
Week 10:
Week 11:
Week 12:
Week 13:
Week 14:
Week 15:
Week 16:
Assessment:
Recommended Textbooks and Resources:
https://youtu.be/N4wJ0h8O7YQ lecture 12-3-2024
All Rights Reseved © 2025 - Developed by: Prof. Mohammed M. Abu Shquier Editor: Ali Zreqat