Filters
Clear AllFilters
Clear AllLoading
- publication . Article . 2014Open AccessAuthors:Shaher H. Hamaideh; Saleh N. Azzeghaiby; Diana H. Arabiat; Ayman M. Hamdan-Mansour;Publisher: Elsevier BV
AbstractThe purpose of this study was to examine the relationship between intrinsic motivation to academic accomplishment (IMTA) and psychosocial wellbeing among university students in Jordan. Methods: cross sectional correctional design utilized to collect data from 21...
- publication . Article . 2008Open Access EnglishAuthors:S. H. Hosseinnia; Abolfazl Ranjbar; Shaher Momani;Publisher: Elsevier Ltd.
AbstractConvergence and stability are main issues when an asymptotical method like the Homotopy Perturbation Method (HPM) has been used to solve differential equations. In this paper, convergence of the solution of fractional differential equations is maintained. Meanwh...
- publication . Article . 1998Open AccessAuthors:Mohammad Youssef; Abdallah Al Shurman; Elisabeth Chachaty; Antoine Andremont; Abder-Rahman Bsoul;Publisher: Elsevier BV
Objective To investigate whether translocation of intestinal Enterobacteriaceae was a likely source of bacteremia in children of 2 years or less hospitalized for fever and moderate malnutrition. Methods Blood and fecal cultures were obtained from 198 such children admit...
- publication . Article . 2015Open Access EnglishAuthors:Mohammed G. H. al Zamil;Publisher: The Authors. Published by Elsevier B.V.
Abstract Recently, smart applications implemented on cloud platforms have been widely adapted to provide quality-of-life services in different domains such as: agriculture, medical, and transportation systems. Such applications benefit from the advanced wireless sensor ...
- publication . Article . 2015Open AccessAuthors:Fatima Mohammad Amin Omari;Publisher: Elsevier BV
Abstract Syntax for non-speaker of Arabic: real usage, reality of syntax lessons for non-speakers of Arabic, and the Arabic sentence as a symbol.
- publication . Article . 2013Open AccessAuthors:Rana AlQurem; Sahel Alouneh; Mazen Kharbutli;Publisher: Elsevier BV
Abstract With software systems continuously growing in size and complexity, the number and variety of security vulnerabilities in those systems is increasing in an alarming rate. Vulnerabilities in the program's stack are commonly exploited by attackers in the form of s...
- publication . Other literature type . Article . 2011Open AccessAuthors:Wasfi Shatanawi; Calogero Vetro; Hassen Aydi;Publisher: Elsevier BV
AbstractIn this paper, we establish some common fixed point results for two self-mappings f and g on a generalized metric space X. To prove our results we assume that f is a generalized weakly G-contraction mapping of types A and B with respect to g.
- publication . Article . 2016Open AccessAuthors:Yu. Kuznetsov; T. Tsvyd; Tareq M. A. Al-Quraan;Publisher: Elsevier BV
Abstract The operation principles of both new and improved clamping mechanisms of the CNC lathe with the automatic no–reinstallation workpiece manipulation are described in this article. The theoretical analysis of power characteristics with the spindle in rotary and no...
- publication . Article . 2012Open Access EnglishAuthors:Wasfi Shatanawi;Publisher: Elsevier Ltd.
Abstract Recently, Abbas et al. [M. Abbas, M.A. Khan, S. Radenovic, Common coupled fixed point theorems in cone metric spaces for w -compatible mapping, Applied Mathematics and Computation (2010) doi:10.1016/j.amc.2010.05.042 ] introduced the concept of w -compatible ma...
- publication . Article . 2007Open AccessAuthors:Shaher Momani; Rami Qaralleh;Publisher: Elsevier BV
Abstract This paper presents an efficient numerical algorithm for approximate solutions of a fractional population growth model in a closed system. The time-fractional derivative is considered in the Caputo sense. The algorithm is based on Adomian’s decomposition approa...