DSpace at Hebron University: Recent submissions

  • Abuzahra, Nimer; Farrah, Mohammed (IUG Journal of Humanities Research, 2015-06-30)
    This quantitative paper investigative paper investigated the use of short stories in EFL classroom. It examined students’ general attitudes towards using short stories in the EFL classroom. Moreover, it evaluated if .....
  • Farrah, Mohammed (Journal of Creative Practices in Language Learning and Teaching (CPLT), 2015-11-15)
    This study investigated the attitudes of an English writing class towards online collaborative learning activities. A 20-item questionnaire was used to assess the students’ attitudes towards this experience. The participants ...
  • Dawood, Hamada; Abuzahra, Nimer; Farrah, Mohammed (IJRELT, 2014-12-28)
    This paper aims to examine, reveal and analyse Shylock's speech in Shakespeare's The Merchant of Venice, by connecting his words to the power, identity, and ideology in the play. The purposes of this study are to examine ...
  • Bader, Hazem (Publishing house: LAP LAMBERT Academic Publishing, 2017-07-19)
    A DICTIONARY OF ENGLISH LANGUAGE LEARNING AND TEACHING. Volume II is a dictionary for students of TESOL/Applied Linguistics as well as those who are studying language or linguistics. It also serves as a reference book for ...
  • Bader, Hazem (Publishing house: LAP LAMBERT Academic Publishing, 2015-06-15)
    The EFL Needs of Pharmacy Students: An Analysis Paradigm attempts to present succinctly and clearly an analysis model of the English language needs of undergraduate students in English as a foreign language (EFL) context. ...
  • Bader, Hazem (Publishing house: LAP LAMBERT Academic Publishing, 2015-05-18)
    Blended Learning in Tertiary ELT: A Survey of Students & Instructors' Attitudes at Hebron University-Palestine attempts to explore perceptions and attitudes of English major students & English instructors towards the Blended ...
  • Bader, Hazem (Publishing house: LAP LAMBERT Academic Publishing, 2011-04-07)
    THE INSIDER: A COMPREHENSIVE GUIDE FOR EFL TEACHERS IN READING, VOCABULARY, & STUDY SKILLS attempts to present succinctly and clearly the reading, vocabulary, and study skills that teachers need to help their students ...
  • Bader, Hazem (Publishing house: LAP LAMBERT Academic Publishing, 2011-04-01)
    A DICTIONARY OF ENGLISH LANGUAGE LEARNING AND TEACHING is a dictionary for students of TESOL/Applied Linguistics as well as those studying language or linguistics. It also serves as a reference book for those who already ...
  • Amro, Belal; Abu sabha, Ahmed; Qunaibi, Ammar; Najjar, Inrahim (IJCNT- University of Bahrain, 2019-01-01)
    Security and privacy have been considered a corner stone in all electronic transactions nowadays. People are becoming very cautious when conducting electronic transactions over internet. One of the major issues that frightens ...
  • Hasasneh, Nabil; Bell, Ian; Jesshope, Chris (2007 IEEE/ACS International Conference on Computer Systems and Applications - IEEE, 2007-01-01)
    Microgrid CMPs, that is based on microthreaded processors, use hardware scheduling and synchronisation and have structures to support this that are distributed, fully scalable and which can support hundreds of microthreads ...
  • Hasasneh, Nabil; Moreb, Mohammad (2013 Fourth International Conference on e-Learning" Best Practices in Management, Design and Development of e-Courses: Standards of Excellence and Creativity" - IEEE, 2013-01-01)
    This paper introduces a case study of the E-learning experience at Hebron University (HU). Over the last few years, we have been building up a set of case studies illustrating different ways in which learning technologies ...
  • Hasasneh, Nabil (University of Hull, 2006-01-01)
    Most microprocessor chips today use an out-of-order (OOO) instruction execution mechanism. This mechanism allows superscalar processors to extract reasonably high levels of instruction level parallelism (lLP). The most ...
  • Hasasneh, Nabil; Bell, Ian; Jesshope, Chris (International Conference on Architecture of Computing Systems - Springer, Berlin, Heidelberg, 2006-01-01)
    This paper presents a scalable and partitionable asynchrono-us bus arbiter for use with chip multiprocessors (CMP) and its corresponding pre-layout simulation results using VHDL. The arbiter exploits the advantage of a ...
  • Hasasneh, Nabil; Daraghmi, Yousef-Awwad; Hasaneh, Ahmad (J. Comput. Inf. Technol., 2017-01-01)
    Learning a good generative model is of utmost importance for the problems of computer vision, image classification and image processing. In particular, learning features from small tiny patches and perform further tasks, ...
  • Hasasneh, Nabil; Bell, Ian; Jesshope, Chris (Journal of Systems Architecture, 2007-01-01)
  • Hasasneh, Nabil; Bell, Ian; Jesshope, Chris (International Journal of Parallel Programming, 2006-01-01)
    Chip multiprocessors (CMPs) hold great promise for achieving scalability in future systems. Microthreaded CMPs add a means of exploiting legacy code in such systems. Using this model, compilers generate parametric concurrency ...
  • Hasasneh, Nabil; Bousias, Kostas; Jesshope, Chris (The Computer Journal, 2006-02-01)
    Most microprocessor chips today use an out-of-order instruction execution mechanism. This mechanism allows superscalar processors to extract reasonably high levels of instruction level parallelism (ILP). The most significant ...
  • Amro, Belal; Saygin, Yucel; Levi, Albert (SPRINGL '10 Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS Pages 55-59, 2010-11)
    Collaborative Traffic Monitoring (CTM) systems exploit the location information continuously collected from cars. Users collaborate by providing their location information to have a global picture of the current traffic ...
  • Amro, Belal; Saygin, Yucel; Levi, Albert (SPRINGL '11 Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS Pages 1-8, 2011-11)
    Collaborative Traffic Monitoring (CTM) systems exploit the location information continuously collected from vehicles. Users collaborate by providing their location information to have a global picture of the current traffic ...
  • Amro, Belal; Levi, Albert; Saygin, Yucel (2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third International Conference on Social Computing, 2011-10)
    In general service providing systems, user authentication is required for different purposes such as billing, restricting unauthorized access, etc. A good solution is to use pseudonyms as temporary identities. On the other ...