{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T09:22:51Z","timestamp":1730193771723,"version":"3.28.0"},"reference-count":49,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,11,22]],"date-time":"2022-11-22T00:00:00Z","timestamp":1669075200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,11,22]],"date-time":"2022-11-22T00:00:00Z","timestamp":1669075200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,11,22]]},"DOI":"10.1109\/acit57182.2022.9994138","type":"proceedings-article","created":{"date-parts":[[2023,1,4]],"date-time":"2023-01-04T18:38:43Z","timestamp":1672857523000},"page":"1-7","source":"Crossref","is-referenced-by-count":5,"title":["Internet of Robotic Things in Early Childhood Education: Domains and Challenges"],"prefix":"10.1109","author":[{"given":"Ghassan","family":"Samara","sequence":"first","affiliation":[{"name":"Zarqa University,Computer Science Department,Zarqa,Jordan"}]},{"given":"Ghassan M.","family":"Alsayyed","sequence":"additional","affiliation":[{"name":"Zarqa University,Computer Science Department,Zarqa,Jordan"}]},{"given":"Mohammad","family":"Aljaidi","sequence":"additional","affiliation":[{"name":"Zarqa University,Computer Science Department,Zarqa,Jordan"}]},{"given":"Sattam","family":"Almatarneh","sequence":"additional","affiliation":[{"name":"Zarqa University,Artificial Intelligence Department,Zarqa,Jordan"}]},{"given":"Feras","family":"Almashakbah","sequence":"additional","affiliation":[{"name":"Zarqa University,Department of Cyber Security,Zarqa,Jordan"}]},{"given":"Firas","family":"Omar","sequence":"additional","affiliation":[{"name":"Department of E-Business &#x0026; Commerce University of Petra,Amman,Jordan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3844\/jcssp.2010.1056.1061"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/icfcc.2010.5497419"},{"issue":"10","key":"ref3","article-title":"Dynamic Safety Message Power Control in VANET Using PSO","volume-title":"World of Computer Science & Information Technology Journal","volume":"3","author":"Samara","year":"2013"},{"issue":"8","key":"ref4","first-page":"180","volume":"3","author":"Khatari","year":"2015","journal-title":"Congestion control approach based on effective random early detection and fuzzy logic, MAGNT Research Report"},{"key":"ref5","first-page":"1","article-title":"December. Encryption for End-User Privacy: A Cyber-Secure Smart Energy Management System","volume-title":"IEEE","author":"Hussain"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3923\/jas.2011.2606.2612"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.11591\/ijai.v9.i3.pp439-447"},{"key":"ref8","article-title":"Lane prediction optimization in VANET","author":"Ghassan","year":"2020","journal-title":"Egyptian Informatics Journal"},{"issue":"1","key":"ref9","article-title":"A Low Cost ZigBee Sensor Network Architecture for Indoor Air Quality Monitoring","volume":"15","author":"Alhmiedat","year":"2017","journal-title":"International Journal of Computer Science and Information Security (IJCSIS)"},{"issue":"2","key":"ref10","article-title":"Performance Analysis of Dynamic Source Routing Protocol","volume":"5","author":"Salem","year":"2014","journal-title":"Journal of Emerging Trends in Computing and Information Sciences"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9122071"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.11591\/ijece.v9i1.pp496-504"},{"issue":"1","key":"ref13","first-page":"100","article-title":"Increasing Network Visibility Using Coded Repetition Beacon Piggybacking","volume":"13","author":"Samara","year":"2011","journal-title":"World Applied Sciences Journal"},{"key":"ref14","first-page":"238","article-title":"April. Optimal placement and capacity of electric vehicle charging stations in urban areas: Survey and open challenges","volume-title":"IEEE","author":"Aljaidi"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/IECON43393.2020.9255254"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2022-Spring54318.2022.9860535"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSec.2012.6246119"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1504\/IJAHUC.2018.094399"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3923\/itj.2012.1235.1242"},{"issue":"1","key":"ref20","first-page":"4415","article-title":"Energy-efficiency routing algorithms in wireless sensor networks: A survey","volume":"9","author":"Samara","year":"2020","journal-title":"International Journal of Scientific and Technology Research"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACIT50332.2020.9300065"},{"issue":"8","key":"ref22","article-title":"Cache Discovery Policies of MANET","volume":"3","author":"Salem","year":"2013","journal-title":"World of Computer Science & Information Technology Journal"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3991\/ijoe.v9i5.2848"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICICS49469.2020.239501"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICITECH.2017.8079980"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.30534\/ijatcse\/2020\/127912020"},{"issue":"3A","key":"ref27","first-page":"592","article-title":"Aware-routing protocol using best first search algorithm in wireless sensor","volume":"15","author":"Samara","year":"2018","journal-title":"Int. Arab J. Inf. Technol."},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ACIT53391.2021.9677453"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-69548-8_2"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1080\/1350293X.2020.1735738"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1080\/1475939x.2019.1656667"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.29207\/resti.v4i3.1962"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT48130.2020.9221339"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.3390\/s20123355"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-0514-6_64"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-3338-5_23"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CloudNet.2016.27"},{"key":"ref38","first-page":"97","article-title":"Internet of robotic things: converging sensing\/actuating, hypoconnectivity, artificial intelligence and IoT Platforms","author":"Vermesan","year":"2017","journal-title":"River Publishers"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2877919"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/s10803-016-3021-0"},{"key":"ref41","first-page":"1","article-title":"Personalized robot interactions to intercept behavioral disturbances of people with dementia","volume-title":"15th International Semantic Web Conference (ISWC2016)","author":"Ongenae"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ACIIW.2019.8925269"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-31232-3_19"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICAIIT.2019.8834486"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/SIITME47687.2019.8990763"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/SITIS.2016.74"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-31232-3_19"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-0866-6_4"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108074"}],"event":{"name":"2022 International Arab Conference on Information Technology (ACIT)","start":{"date-parts":[[2022,11,22]]},"location":"Abu Dhabi, United Arab Emirates","end":{"date-parts":[[2022,11,24]]}},"container-title":["2022 International Arab Conference on Information Technology (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9994070\/9994081\/09994138.pdf?arnumber=9994138","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T12:22:02Z","timestamp":1706790122000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9994138\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,22]]},"references-count":49,"URL":"https:\/\/doi.org\/10.1109\/acit57182.2022.9994138","relation":{},"subject":[],"published":{"date-parts":[[2022,11,22]]}}}