Track 1: Artificial Intelligence

Topics:

  • Machine learning
  • Computer vision
  • NLP
  • Health informatics
  • Industry 4.0
  • Neural Networks
  • Evolutionary Computation
  • Expert Systems
  • Speech Processing
  • and other related issues.

    Chair: Prof. Ahmad B. Hassanat, Faculty of Information Technology, Mutah University, Jordan. Co-Chair: Dr. Ahmad S. Tarawneh, Eötvös Loránd University, Budapest, Hungary. Co-Chair: Dr. Suleyman Al-Showarah, Faculty of Information Technology, Mutah University, Jordan

  • Track 2: Cyber Security

    Topics:

  • Cybersecurity Analytics
  • Insider Threat
  • Intrusion detection systems
  • Web Security
  • IoT Security
  • Applied cryptography
  • Blockchains and distributed Cloud computing security
  • Machine learning and computer security
  • Wireless and mobile security/privacy.

    Chair: Dr. Nidal Al-Dmour, Department of Computer Engineering, Faculty of Engineering, Mutah University, nidal@mutah.edu.jo

    Co-chair: Dr. Qussai Mahmoud Yaseen, College of Engineering and Information Technology, Ajman University, UAE, q.yaseen@ajman.ac.ae

  • Track 3: Networking

    Topics:

  • Network protocols
  • quality of service
  • congestion control
  • Cellular network and Future Networks Technologies
  • Adhoc and Sensor Networks
  • Mobile Networks & Wireless
  • Network Based Applications
  • Routing and Switching Techniques
  • Ubiquitous Networks
  • Related topics

    Chair: Ahmad Abadleh, Faculty of Information Technology, Mutah University, Jordan.

    Co-chair: Yazan Allawi, College of Engineering, Princess Nourah Bint Abdulrahman University, Saudi Arabia.

    Co-chair: Moath Alsafasfeh, Electrical and Computer Engineering, Al-Hussein Bin Talal University.

    Co-chair: Saqer S. Alja’Afreh, Electrical Engineering Dept, Mutah University.

  • Track 4: Software engineering

    Topics:

  • Software Architecture and Design
  • Software Analysis, Evolution, and Understanding
  • Software Product Line Engineering
  • Software Testing, Validation, and Verification
  • Software Reuse, Metrics, and Visualization
  • AI Systems for Software Engineering
  • Software Process Management and Improvement
  • Open Source Software Development
  • Software Reengineering and Refactoring
  • Mining Software Repositories
  • Requirements and Web Engineering
  • Software Reliability
  • Software Cost and Effort Modeling and Analysis

    Chair: Dr. Mustafa Hammad

    Co-chair: Dr. Hamzeh S. Eyal Salman

  • Track 5: IoT and Fog Computing

    Topics:

  • Fog and Edge computing
  • IoT Architectures and protocols.
  • IoT Applications.
  • IoT security and trust management.
  • Fog/ Edge computing architecture.
  • UAV-enabled Fog/Edge computing.
  • Service placement in Fog/Edge computing environments.
  • Task scheduling in Fog/Edge computing environments.
  • Task offloading in Fog/Edge computing environments.
  • Mobility management in Fog/Edge computing environments.
  • Load balancing in Fog/Edge computing environments.
  • Service discovery in Fog/Edge computing environments.
  • Service migration in Fog/Edge computing environments.
  • Fog/Edge computing applications.
  • Osmotic computing architectures and applications.
  • Energy harvesting in Fog/Edge computing.
  • Fog/Edge computing security and trust management
  • Vehicular edge computing

    Chair: Prof. Mutaz A. B. Al-Tarawneh

    Co-Chair: Dr. Ashraf Al-Khresheh, tafila technical university

  • Track 6: Data Science

    Topics:

  • General Data Science
  • Big Data Analytics
  • Statistics learning
  • Data Mining
  • Data Visualization
  • Social Media Analytics
  • Business Intelligence
  • Text and Web Analytics
  • Business Analytics

    Chair: Dr. Ghazi Naymat, Ajman University, UAE

  • Track 7: Industrial Track

    ETCEA2022 included an industrial track to allow the researchers to get an overview of current trends in the industry. We invited a number of highly recognized professionals from the region to deliver the track:

    Chair: Eng. Mohamad Al-Khodhary, Director of Green Circle “Cybersecurity Company”, Jordan.

    Reviewers’ Committee:

    Reviewers’ Committee:

  • AAl-haj, Computer Engineering Department, Princess Sumaya University for Technology.
  • AAl-Sherbaz, School of Computing and Engineering at the University of Gloucestershire, UK.
  • ABDALLAH YOUSEF ALMA'AITAH, Network Engineering and Security department, Jordan University of Science and Technology.
  • Abdelrahman Abu Arqoub, Computer science department, Middle-east University.
  • Abdulla Alqaddoumi, University of Bahrain, Bahrain
  • Abdullah Almuhaimeed, The National Centre for Genomics and Bioinformatics, King Abdulaziz City for Science and Technology, Saudi Arabia
  • Abeer Al-Hyari, Electrical Engineering Department, Al-Balqa Applied University, Jordan.
  • Ahmad Aloqaily, Computer Science, The Hashemite University, Jordan , aloqaily@hu.edu.jo
  • Ahmad Al-Qerem, Zarqa University, Jordan, ahmad_qerm@zu.edu.jo
  • Ahmad Hammouri, Network Engineering and Security department, Jordan University of Science and Technology
  • Ahmad S. Tarawneh, Eötvös Loránd University, Budapest, Hungar
  • Ahmed Shatnawi Jordan University of Science and Technology, Jordan
  • AJassim Abboud, Department of Computer Engineering, College of Engineering, University of Diyala, Iraq.
  • Alaelddin F. Y. Mo, School of Computing, Gachon University, South Korea.
  • Amin Beheshti, School of Computing, Macquarie University, Australia, amin.beheshti@mq.edu.au
  • Amjad Nusayr, University of Houston-Victoria, USA
  • Amjed Al-Mousa, Computer Engineering Department, Princess Sumaya University for Technology
  • Anas Ali Alkasasbeh, Faculty of Information Technology, Mutah University, Jordan.
  • Anas Shatnawi, Berger-levrault company, France.
  • Arturo Geigel, Independent Researcher, Puerto Rico
  • Ashraf Aboulnaga, Hamad bin Khalifa University.
  • Ashrah Alkhresheh, Computer Science Department, Tafila Technical University.
  • Asmaa Jameel Alnawaiseh, Faculty of Information Technology, Mutah University, Jordan
  • Atta ur Rehman Khan, College of Engineering and Information Technology, Ajman University, UAE.
  • Aysh Alhroob, Isra University, Jordan, Aysh@iu.edu.jo
  • Balázs Harangi, Department of Data Science and Visualization, Faculty of Informatics, University of Debrecen, Hungary. harangi.
  • Basem Matalgah, Faculty of Information Technology, Mutah University, Jordan.
  • Bashar Al-Shboul, King Abdullah II School of Information Technology,The University of Jordan.
  • Basheer Isah Dodoo,Computer Science, University of York, UK
  • Brij B. Gupta, Asia University, Taichung, Taiwan
  • Ceyhun Celik, Department of Computer Engineering, Gazi University, Ankara, Turkey.
  • Chaman Verma, Eötvös Loránd University, Budapest, Hungary. chaman.
  • Colin Bellinger, National Research Council of Canada, Canada.
  • Eshraq Hawari, Faculty of Information Technology, Mutah University.
  • Esra'a Alkafaween, Faculty of Information Technology, Mutah University, Jordan.
  • Esra'a Alkafaween, Faculty of Information Technology, Mutah University, Jordan.
  • Fadi I. Wedyan, Duquesne University, USA
  • Farah Kandah, University of Tennessee at Chattanooga, USA
  • Faris Alwzinani, Computer Science, Brunel University London, UK
  • Ghada Awad Altarawneh, Faculty of business, Mutah University, Karak, Jordan.
  • Ghazi Al-Naymat, Ajman University, UAE.
  • Hamad Iqab Alsawalqah, Jordan University, Jordan
  • Hamad Iqab Alsawalqah, Jordan University, Jordan
  • Hani Bani-Salameh, The Hashemite University, Jordan
  • Hubert Anysz, Warsaw University of Technology, Poland.
  • Ibrahim Abu Alhaol, Computer Science, Princess Sumaya University for Technology, Jordan
  • Ibrahim Aljarah, Department of Information Technology, University of Jordan, Jordan.
  • Islam Al-Qudah, Computer Science, University of Sharjah, UAE, ialqudah@sharjah.ac.ae
  • Ismail Altaharwa, The University of Jordan, Aqaba branch.
  • Issa Hani Qiqieh, Computer engineering department, Al Balqa' Applied University.
  • Iyad Abu Doush, Computer Science & Information Systems, American University of Kuwait, Kuwait, idoush@auk.edu.kw
  • Jaafar Al-ghazo, Department of electrical and computer engineering, Virginia Military Institute.
  • Jamal Bani Salamah, Department of Computer Engineering , Faculty of Engineering, Mutah University.
  • Jamal Bani Salamah, Department of Computer Engineering , Faculty of Engineering, Mutah University.
  • Janusz Kozubal. Wroclaw University of Science and Technology, Poland.
  • Javid Taheri Department of Computer Science, Karlstad University, Sweden, javid.taheri@kau.se
  • Khair Eddin Sabri, Jordan University, Jordan.
  • Khaled Aldebei, Information Technology Department, the University of Jordan
  • Khaled Al-maaitah, Computer engineering department, Mutah University.
  • Alaelddin F. Y. Mo, School of Computing, Gachon University, South Korea.
  • Liaqat Ali, College of Engineering and Technology, University of Science and Technology of Fujairah, Fujairah, UAE.
  • liNoureddin Sadawi, Computer Science, University of London, UK
  • Maen Hammad, The Hashemite University, Jordan
  • Mahmoud Al-Ayyoub, Computer Science Department, Jordan University of Science and Technology, Jordan
  • Mahmoud Alhasanat, College of Engineering, Al-Hussein Bin Talal University, Jordan.
  • Malek Alrashidi, Applied College, University of Tabuk, Tabuk, Saudi Arabia.
  • Mansoor Alghamdi, Applied College, University of Tabuk, Tabuk, Saudi Arabia.
  • Maram Majali, Faculty of Information Technology, Mutah University.
  • Mariam Khader, Information Technology & Science, Champlain College, USA, mkhader@champlain.edu
  • Mashael F. Al-luhaybi, Computer Science, Umm Al-Qura University, KSA
  • Moath Alsafasfeh, Electrical and Computer Engineering, Al-Hussein Bin Talal University.
  • Mohammad Alauthman, Information Security Department, University of Petra, Jordan
  • Mohammad Almseidin, Faculty of Information Technology, Aqaba University of Technology, Jordan.
  • Mohammad Aluthman, Petra University, Department of information security, mohammad.
  • Mohammad Mashhour, Computer science department, Najran Universiy.
  • Mohammed Akour, Prince Sultan University, KSA
  • Mohammed Al-Saleh Higher Colleges of Technology HCT, UAE
  • Mohammed Azmi Al-Betar, IT department, Ajman University, m.albetar@ajman.ac.ae
  • Mokhled Al-Tarawneh, Department of Computer Engineering, Faculty of Engineering, Mutah University.
  • Mokhled Al-Tarawneh, Department of Computer Engineering, Faculty of Engineering, Mutah University.
  • Mostafa Z. Ali, Computer Information Systems, Jordan University of Science & Technology, Jordan.
  • Munir Ahmad, National College of Business Administration and Economics, Lahore, Pakistan.
  • Mutaz M. Al-Debei ,Dean of Business School · Al Ahliyya Amman University, Jordan, mdebei@gmail.com
  • Nabeel Zanoon, Al Balqa Applied University, Jordan.
  • Nizar Dahir, Department of computer science, Kufa University
  • Noora Fetais, Department of Computer Science and Engineering, College of Engineering Qatar University.
  • Omar Lasassmeh, faculty of Information Technology, Mutah University.
  • Omar Lasassmeh, faculty of Information Technology, Mutah University.
  • Qasem Abu Al-Haija, Princess Sumaya University for Technology.
  • Qasem Truki Obeidat, University of Bahrain, Bahrain
  • Qutaibah Althebyan Alain University, UAE
  • Ra’fat Al-msie’deen, Faculty of Information Technology, Mutah University, Jordan
  • Radwa El Shawi, Computer Science at Tartu University, Estonia, radwa.elshawi@ut.ee
  • Raed Althomai, Electrical and electronics engineering technology department, Yanbu Industrial College.
  • Raed Seetan, Slippery Rock University of Pennsylvania, USA
  • Raghda Hriez, Computer Science, Princess Sumaya University for Technology, Jordan.
  • Rania Halasah, Faculty of Information Technology, Mutah University, Jordan.
  • Rao Naveed Bin Rais, Department of Electrical and Computer Engineering, College of Engineering and Information Technology, Ajman University, UAE
  • Rawad Hammad, Department of Engineering & Computing, University of East London, UK
  • Salam Fraihat, IT department, Ajman University, UAE, s.fraihat@ajman.ac.ae
  • Saleh Mulhem, University of Lübeck, Germany.
  • Saleh Suleman Saraireh, Al-Hussein Bin Talal University, Maan, Jordan, Al-Hussein Bin Talal University, Maan, Jordan.
  • Sami Mnasri, Community College, University of Tabuk, Tabuk 71491, Saudi Arabia
  • Sami Smadi, Information and network security department, he World Islamic Sciences and Education University.
  • Saud Althunibat, Communication Engineering, Al-Hussein Bin Talal University.
  • Shadi Banitaan, University of Detroit Mercy, USA
  • Sharif Makhadmeh, IT department, Ajman University, UAE, s.makhadmeh@ajman.ac.ae
  • Taher M. Ghazal, School of Information Technology, Skyline University College, University City Sharjah, Sharjah, UAE.
  • Talal A. Edwan, Computer engineering department, Al-Ahliyya Amman University.
  • Thair Al-Dala’in, Computer Science, Western Sydney University, Australia, thair.dn@gmail.com
  • Thamer Rawashdeh, Faculty of Science & Information Technology, Al-Zaytoonah Private University.
  • Thiab Taha, University of Georgia, USA
  • Wael Jumah Alzyadat, Alzytoona University, Jordan
  • Waleed T. Al-Sit, Department of Computer Engineering, Mu'tah University. Al-Karak, Jordan, Higher Colleges of Technology, Dubai, United Arab Emirates
  • Wesam Almobaideen, Electrical Engineering & Computing Department, Rochester Institute of Technology (RIT), UAE.
  • Yazan Allawi, College of Engineering, Princess Nourah Bint Abdulrahman University, Saudi Arabia.
  • Yazeed Al Sbou, Department of Computer Engineering, Faculty of Engineering, Mutah University.
  • Zaid Halholi, College of Information and Communication Technology, Tafila Technical University.
  • Zakarea Alshara, Jordan University of Science and Technology, Jordan.
  • Ziad Al-Sharif Jordan University of Science and Technology, Jordan