| The Impact of Cloud Computing Involvement on Competitive Advantage | Suliman Mahmoud Asha | 2022 | Download
|
| Innovative Technique to Encrypt Data for Data Mining Purposes in Cloud Computing | Amer H. Khalifa | 2021 | Download
|
| Lightweight Cryptosystem for IoT Image Encryption Using DNA | Ra'ed Fatihy Abu-Shehab | 2020 | Download
|
| Jordanian Companies’ Stock Price Prediction using Hybrid RNN with Long Term Short Memory and Tabu List Memory | Abdullah Akram Al-Jumaili | 2020 | Download
|
| Detecting Bug Severity Level using Machine Learning Techniques | Hamza AL-Jundi | 2021 | Download
|
| An Empirical Study of Multi-instance RPL Protocol | Zainab Alassedi | 2021 | Download
|
| Agile Encryption Scheme for Multimedia Files Using Random Data | Mohanad Ali Hussein Al-Halboosi | 2021 | Download
|
| Energy Efficient Localization Model in Mobile Computing | Hadeel Shihadeh | 2021 | Download
|
| A Novel Framework to Secure Schema for Data Warehouse in Cloud Computing (Force Encryption Schema Solution) | Maad Ibrahim Ahmed | 2021 | Download
|
| A New Symmetric Lightweight Encryption Algorithm Based on DNA for Internet of Things Devices | Rame Jamil Al-Dwairi | 2021 | Download
|
| Homomorphic Encryption of Text Documents | Omar Hanash | 2020 | Download
|
| Enhanced Arabic Root-Based Lemmatizer | Halah Atta | 2020 | Download
|
| Deep CPC Deep Learning Model for Colorectal Polyps Classification (1) | Dima Hussein Taha | 2020 | Download
|
| How to Detect Phishing Website Using Three-Model Ensemble | Yussra M ALShareef | 2020 | Download
|
| Toward an Arabic Essay Grading Benchmark | Rawan abed Alhaleem alzyadat | 2020 | Download
|
| An Improved BIRCH Algorithm for Breast Cancer Clustering | Maysarah Mohammad Barham | 2020 | Download
|
| A Hadoop map reduce implementation of C5.0 decision | Mamoun AbuLubbad | 2020 | Download
|
| User Authentication Based on Statistical Mouse Dynamics Biometrics | Yousef Abdelrahman Abdelaziz Abudayeh | 2020 | Download
|
| A COMPARATIVE STUDY OF TWO OBJECTIVE FUNCTIONS | MOHMMAD SALAH AL-ESWID | 2020 | Download
|
| Efficient Graph-Based Image Segmentation for Natural Images | Laila Khalil Almugheer | 2017 | Download
|
| ANN and DNN-based Models for DDoS Detection via Network Traffic Forecasting | Amjad Ibrahim Gendary | 2019 | Download
|
| Tuning Approach to Improve Multilayer Perceptron for Breast Cancer Prediction | Fidaa Mousa Ahmad Al-Shami | 2019 | Download
|
| Automated Arabic Essay Grading System based on Support Vector Machine and Text Similarity Algorithm | Saeda Esmaile Odeh al-awaida | 2019 | Download
|
| Strengthening the MD5 File Integrity Algorithm with User Fingerprint | Marwa Hussein Issa Al-Awawdeh | 2019 | Download
|
| Image Analysis for Mandible Bone Properties on Cone-Beam CT to Detect Osteoporosis | Rasha Abu Marar | 2019 | Download
|
| PIN Authentication Using Multi-Model Anomaly Detection in Keystroke Dynamics on Mobile Devices | Ghofran mahmood khalaf | 2019 | Download
|
| Improving AES Algorithm using Multiple Secret Keys | Suhair haseeb al waith | 2019 | Download
|
| Steganalysis of Color Images for Low Payload Detection | Renad mekhled al manaseer | 2019 | Download
|
| Imperceptibility and Robustness Improvement using segmented DWT Watermarking Technique | Sura abdulmunem M. al-juboori | 2019 | Download
|
| Article Reformatting Algorithm for Multiple Journal Template | Sayel mohammad ali fayyad | 2019 | Download
|
| Enhancement of Digital Signature Scheme | Ruqa Abdulkareem Salih Al-Shnawa | 2018 | Download
|
| Implementation of proposed lightweight cryptosystem for use in Cloud Computing Security | Lubna Mutasem Al-Ramini | 2018 | Download
|
| Optimizing Indoor Tracking System for Wireless Sensor Networks Using ZigBee | Ahmad H. Mahafzah | 2018 | Download
|
| Comparative study for Order Preserving Encryption Characteristic | Anas Abdulrazzaq Ali Aljuboori | 2018 | Download
|
| An anomaly detection model for signature authentication on mobile devices | Shawq Salman Mahmood Al-Khafaji | 2018 | Download
|
| Image classification based on enhancement of local binary pattern | Ahmad A Suleiman | 2018 | Download
|
| Finding Cliques In Simulated Social Networks Using Graph Coloring Technique | Mohammad Hussein Alomari | 2017 | Download
|
| Building Ontology-based Metadata to Support Arabic Quality Assurance Documentation | Faisal Mohamed Alromaihi | 2017 | Download
|
| Multiple Pseudo Random Number Generators Implementation for Watermarking Technique | Aysar Shamil Alsaadi | 2017 | Download
|
| A Signcryption Approach Based on Rabin Digital Signature Schemes | Ali Mohammad Alzeinat | 2017 | Download
|
| Computation Complexity Improvement for Digital Signature Algorithm | Mohammed Mustafa Rifaat | 2017 | Download
|
| Security Enhancement of Image Steganography Using Embedded Integrity Features | Zinah Talaat Rashid AL-Windawi | 2017 | Download
|
| The Detection of Data Hiding in RGB Images Using Statistical Steganalysis | Zaid Ibrahim Rasool Rasool | 2017 | Download
|
| An Improved Text Watermarking Algorithm for Color Images | Akram Naser Al-Dakari | 2017 | Download
|
| Adoption Conceptual Framework based on Agility and Flexibility in Cloud Computing System | Mustafa Awad Farhan / Hesham Abusaimeh | 2017 | Download
|
| Performance Analysis for Hashing Over Encrypted Data Techniques | Esraa Sameer Al-Rawashdeh | 2016 | Download
|
| Statistical Steganalysis Detector Model for 8-bit Depth Images | Zaid Hadi Al-Taie - - Mudhafar Al-Jarrah | 2016 | Download
|
| Measuring the Quality of Online Learning Material Using Semantic Similarity Measures | Eman N. Aloraini - Ahmad Kayed | 2016 | Download
|
| Statistical Arabic Grammar Analyzer Based on Rules Mining Approach Using Naïve Bayesian Algorithm | Ahmad Wasef Alfares - Ahmad Adel Abu-Shareha | 2016 | Download
|
| Modified Random Early Detection (RED) Technique Using Various Congestion Indicators | Mohammad Ramez Abbas Ali - Ahmad Adel Abu-Shareha | 2016 | Download
|
| Accuracy Evaluation of Brain Tumor Detection using Entropy-based Image Thresholding | Amal.Q. Alyahya - Ahmad Adel Abu-Shareha | 2017 | Download
|
| Enhanced Distributed Defense Mechanism Against Volumetric DDoS Attacks | Emad Bani Melhem - Maamoun Ahmed | 2016 | Download
|
| Offline Arabic Handwritten Isolated Character Recognition System Using Support vector Machine and Neural Network | Mohamed Anas Hussein Al-Jubouri - Hesham Abusaimeh | 2016 | Download
|
| The Semantic Similarity Measures Using Arabic Ontology | Mohammad Ghandi Aldiery - - Ahmad K. A. Kayed | 2016 | Download
|
| Detecting Phishing Emails Using Machine Learning Techniques | Sa’id Abdullah Al-Saaidah - Oleg Viktorov | 2016 | Download
|
| A New Technique to Protect the Ownership of Images in Social Network using Encryption and Steganography Algorithms | Imad Shafi Khuffash | 2016 | Download
|
| A Hybrid Approach for Web Change Detection | Sakher Khaleel Al-Qaaideh | 2009 | Download
|
| GPS – MCRM INTEGRATION SOLUTION | Maram Ayoub Da’ana - Professor Mohammad A. Al‐Fayoumi | 2009 | Download
|
| Secure Authentication Protocol and Key Agreement for Mobile Networks Using Public-Key Cryptography | Haneen Mohammed Al-Fayoumi - Prof. Nidal Shilbayeh | 2011 | Download
|
| A Decision Support System for E-banking Adoption in Jordan: A Critical Success Factors Perspective | Mohammed AbdulKareem Abukhadegeh - Dr. Mohammad Al – Fayoumi | 2008 | Download
|
| A Secure Home Appliances Remote Control Model | Mohammed Mohammed Jasim - Dr. Oleg Viktorov | 2014 | Download
|
| Image Steganography Technique Based on Predetermined Pattern and Histogram Analysis | Haya Mohammad Al Haj - Dr. Mohammed A. Fadhil Al Husainy | 2015 | Download
|
| Hiding Secret Images within RGB Images Using an Enhanced LSB Method | Mohamed Zeyad Alhaj Qasem - Dr. Mudhafar Al-Jarrah | 2014 | Download
|
| A Model for Cognitive Map Construction Using Spatial Information Indoor Environment | Mustafa Abdul-Baqi Raheem Al-Towaijary - Dr. Hussein H. Owaied | 2014 | Download
|
| Design of Anti Money Laundering Framework for Jordan | Kamel A.A.AL-Mahameed - Professor Mohammad A. Al-Fayoumi | 2009 | Download
|
| Integrating Internet of Things and Wireless Sensor Networks for Metropolitan Explosive Detection | Zahraa Abdul Hussein Jaaz - Dr. Maamoun Khaled Ahmed | 2014 | Download
|
| Enhanced Solutions for Misuse Network Intrusion Detection System using SGA and SSGA | Sabah Abdulazeez Jebur - Dr. Hebah H. O. Nasereddin | 2015 | Download
|
| Framework Model of Integration xRM with GIS | MOHAMMAD MAHMOUD SALEH ASRAWI - Dr. HAZIM FARHAN | 2011 | Download
|
| A Framework Model for Arabic Handwritten Text Recognition to Handle Missing Text Fragments | Baha Abd Al-wahhab Al-Garalleh-Dr. Hussein Hadi Owaied | 2013 | Download
|
| Evaluating Semantic Measures by Computing the Coverage of a Condensed Text | Zainab Mahmoud Bayram - Ahmad K. A. Kayed | 2016 | Download
|
| Task Scheduling Using Best-Level-Job-First on Private Cloud Computing | Mohammed Ibrahim Aridah- Dr. Mohammed A. F. Al -Husainy | 2016 | Download
|
| A Method for Static Video Summarization for Reducing Power Consumption and Its Impact on Bandwidth | Mohammed Hamid Al-Kubaisi-Dr. Mohammed A. F. Al-Husainy | 2016 | Download
|
| Image Encryption System by Generating Chains from the Secret Key | May Fawaz Al -Jabali - Dr. Mohammed A. F. Al Husainy | 2016 | Download
|
| Performance Analysis for Fully and Partially Homomorphic Encryption Techniques | Raya A. Al-Shibib - Ahmad Kayed | 2016 | Download
|
| A Comparative Study of Classification Techniques for English to Arabic Speech Recognition | ayoub abdelrahman al-omari -hebah nasereddin | 2016 | Download
|
| A New Statistical Anomaly Detector Model for Keystroke Dynamics on Touch Mobile Devices | Noor Mahmood Shakir Al-Obaidi - Mudhafar Al-Jarrah | 2016 | Download
|
| The Hiding of Multimedia Secret Files in Dual RGB Cover Images Using LSB Steganography Techniques | Marwa Tariq Ahmed Al-Bayati - Mudhafar Al-Jarrah | 2016 | Download
|
| Developing Parallel Technique for the Internet of Things Devices by using local Map Reduce at the sink node. | Muna George Oweis - Sadeq AlHamouz | 2016 | Download
|
| Analytical Study for the Mutable Order-Preserving Encoding with Periodically Encryption Key Changing | Suha Wasof Omar -Ahmad Al- Kayed | 2016 | Download
|
| Voice Encryption Using Twin Stream Cipher Algorithm | Omar Mejbel Hammad Aljouani-Dr. Hebah H. O. Nasereddin | 2016 | Download
|
| Performance Evaluation of Similarity Functions for Duplicate Record Detection | Methaq Kadhum Alnoory | 2011 | Download
|
| Proposed Model For Software Configuration Management Theoretical Tool | Yousef Salman Al-Shaikhly - Prof. Mohammad Al-Haj Hassan | 2011 | Download
|
| Performance Evaluation of Blocking Methods for Duplicate Record Detection | Raed Mahmmod Al Dummor -Prof. Musbah M. Aqel | 2010 | Download
|
| Towards Achieving, Self-Load Balancing In Autonomic Overlay Networks | Mwafaq Salim Al-Zboon - Dr. Hussein H. Owaied | 2012 | Download
|
| Precluding Software Piracy Using Asymmetric Cryptography | Zeana Sattar Jabbar - Professor Mohammad A. Al-Fayoumi | 2009 | Download
|
| CFD_Mine: Discovery of Conditional Functional Dependencies in Relational Databases. | Mohammed Raghep Mohammed Hakawati | 2009 | Download
|
| A New Secure Architecture for Trust and Privacy on Social Network Sites | Mohmmad Hamed Allymoun | 2011 | Download
|
| A Comparative Study of Indexing Techniques for Relational Database Management Systems | Huda Ayesh Mashaan Alrashidi - Dr.Hazim A. Farhan | 2011 | Download
|
| The Effectiveness of Haar Features and Threshold in Multiple Face Detection Systems Based on Adaboost Algorithm | Khadija Mustafa Khalil Al-Noori- Prof. Nidal .F Shilbayeh | 2011 | Download
|
| Mobile Trade Agent Security | Shaima Hameed Al-Khalifa | 2011 | Download
|
| Investigation on Order-Preserving Encryption for Database in Cloud Computing | Amro Akram Bazoon-Prof. Ahmad K. A. Kayed | 2016 | Download
|
| Applying the Kinect Device for Human Identification System in the ATM Environment | AliAkramAbdulKareem-Dr. Sadeq Al-Hamouz | 2016 | Download
|
| Kohonen SOM with conscience function neural network based energy efficient cluctering and routing wireless sensor networks | Saad Al-Azzam . Reyadh Shaker Naoum | 2015 | Download
|
| New Technique for Cross-Platform Availability Control over Electronic Messages | Ward Ahmed Al-Hussein , . Hebah H. O. Nasereddin | 2015 | Download
|
| Practical Measurements Framework for Software Integrity | Omar Natheer Basheer , . Hebah H. O. Nasereddin | 2015 | Download
|
| Enhance the Security of Cloud Computing Environment Using Semantic Segregation Techniques | Rami Yaser Matarneh. Ahmad K. A. Kayed | 2015 | Download
|
| User Authentication System Using Emoji pictures passwords | Raghda Ahmed Malih - Mohammed Abbas Fadhil Al-Husainy | 2015 | Download
|
| Secure Communication Based on Encryption and LSB Steganography Voice | Emad Tariq Allawi - Sadeq AlHamouz | 2015 | Download
|
| Document Classification Method Based on Contents Using an Improved Multinomial Naïve Bayes Model | Junaina Jamil NajimAldin AL-Bayati - Mohammed A. F. Al-Husainy | 2015 | Download
|
| A New Audio Steganography Method Using Bi-LSB Embedding and Secret Message Integrity Validation | Mahmood Maher Salih - Mudhafar Al-Jarrah | 2015 | Download
|
| A MULTI-MODEL KEYSTROKE DYNAMICS ANOMALY DETECTOR FOR USER AUTHENTICATION | Sajjad Ali Al-Robayei - MudhafarAl-Jarrah | 2016 | Download
|
| Comparative Analysis for the Performance of Order Preserving Encryption Technique | Hadeel Bahjet Alkazaz - Ahmad K. A. Kayed | 2016 | Download
|
| A Content-Based Brain Tumor Images System for Classification, Retrieval and Diagnosis | Muhannad Hamad Hussein - Sadeq AlHamouz | 2016 | Download
|
| Data Gathering Using Mobile Elements In Wireless Sensors Networks (WSNs) | Khaled Mohammed AL-hasanat - Maamoun Khalid Ahmad | 2016 | Download
|
| Partial query processing over encrypted data with Object Relational Mapping. | Iyad Naim - Ahmad Kayed | 2016 | Download
|
| Enhancing the Performance of the Hybrid Recovery Method by Defining Video Content Type | Dr . Hebah H. O. Nasereddin A- -Dalia Yousef AL-Jallad | 2016 | Download
|
| Background Subtraction Using Coplanar Filter and Quadtree Decomposition for Objects Counting | Fayez Kamal ALZaghal-Dr. SadeqAlhamouz | 2016 | Download
|
| Comparative Study between (SVM) and (KNN) Classifiers after adding (PCA) to Improve of IntrusionDetection System | Nafea Ali Majeed Alhammadi -Dr.Sadeq AlHamouz | 2016 | Download
|
| Analytical Study for Measuring the Effects of Database Segregation Multi-tenancy Approaches on Cost and Performance in Cloud Computing | Ala K. I. Dawoud -Ahmed Kayed | 2016 | Download
|
| An Enhanced model For government applications in iraq | reyadh naoum,zaid ahmed nadhim | 2014 | Download
|
| An Enhancement of the Replacement Steady State Genetic Algorithm for Intrusion Detection | Shatha Abd - Ahafid Aziz,Reyadh Shaker Naoum | 2014 | Download
|
| Bandwidth Saving method based Sharing Data Downloaded From Cloud Between Smartphones In Wifi Network | Ali Abbas Mohammad Alshammary,Mohammad AlHameed | 2014 | Download
|
| Cloud Customer Relationship Management (CRM)Ontology | Samar Khalid Alkubaisy,Ahmad K.A. Kayed | 2014 | Download
|
| Comparative analysis of Database Performance for Well-Known Cloud Computing Enviroments | Jasour Ahmed Obeidat,Ahmad Al- Kayed | 2014 | Download
|
| Comparative Analysis of the Performance for Cloud Computing Hypervisors with Encrypted Algorithms | Ahmad Al- Kayed,Waleed Khaled Amin Abdulraheem | 2014 | Download
|
| Extracting instances to improve semantic matching in the domain of Renewable Energy | Ahmad K. Kayed,Sadam Hamdan Ahmed | 2014 | Download
|
| Increasing The Lifetime of Wireless Sensor Networks using LEACH Protocol | Omar Nazar Hamdoon Shuker,Mihammed Alhamid | 2014 | Download
|
| Resource Allocation Technique to Obtain Energy Efficient Cloud | Taleen Jack Akijian,Ahmad K. Kayed | 2014 | Download
|
| Scaling Cloud resources under different Virtualization Hybervisors Types with Regards to Machine Utilization | Sultan Ali Abu Sharkh,Ahmad Kayed | 2014 | Download
|
| Text Hiding in (RGBA) Images Using the Alpha Channel and Indicator Method | Ghaith Salem Sarayreh,Mudhafar Al-Jarrah | 2014 | Download
|
| Text Image steganography Using LSD Method | Ahmad Jalal Ahmad,Oleg Victoro | 2014 | Download
|
| new techniqure to embed encrypted or code in colored image by using first and third lsb | muataz safauldeen abdulrahman,hebah nasereddin | 2014 | Download
|
| Back Propagation Recursive Least Squares Algorithm for Intrusion Detection Systems | Omar Hisham Rasheed Al-sadoon. Reyadh Shaker Naoum | 2014 | Download
|
| Multimedia Information Acquisition and Retrieval Enhancement using Intelligent Search System_. | Maamoun Khalid Ahmad,Salameh Ahmad Salameh AL-Etaywi | 2015 | Download
|
| Cost Break-Even Model for Cloud Computing | Raghda Abdulbaqi Mugher . Ahmad K. A. Kayed | 2015 | Download
|
| Computer Aided Diagnosis of Breast Cancer Using Image Processing Techniques and Neural Networks with Logistic Regression | Rajaa Faraj Mahmoud Suleiman. MudhafarAl-Jarrah | 2015 | Download
|
| Deriving a new Markup Language from the Extensible Markup Language (XML) to enhance Electrical Engineering Applicaions | Areej Yousef Abu Hadbah,Heba H.O. Nasereddin | 2014 | Download
|
| a hybrid broadcasting technique based on massage priority in vanet | alaa m . alsaffar,maamoun ahmed | 2014 | Download
|
| A Model of Environment Representation Architecture for Intelligent Robot | Hussein H. Owaied,Musa Abdullah Hameed Aldouri | 2014 | Download
|
| A new approach for real time Face recognition System using a modified Eigenfaces with Edge Tracking | Randa Mohammad Sharif Maraqa,Abdelfatah Aref Tamimi | 2014 | Download
|
| An Enhanced Classifier for an Authentication in Keystroke Dynamics Using Experimental Data | Abdullah Osamah Al- Rahmani,Mudhafar Al- Jarrah | 2014 | Download
|
| Developing a computer - based information system to improve the diagnosis of blood anemia | bashar abdallah issa khawaldeh,basim alhadidi | 2013 | Download
|
| Developing a high-performance adjustable-quality data compressipn scheme for multimedia messaging | hussein al-bahadili,tamer waleed alsous | 2013 | Download
|
| Enhanced k_way method in apriori algorithm for mining the association rules through embedding SQL commands | Hazim Farhan,basel ali dbwan | 2013 | Download
|
| Enhancement of a steganographic algorithm for hiding text messages in image | oleg viktorov,yazan abdallah H . seidan | 2013 | Download
|
| Enhancing open space method in data hiding technique - text under text | yaman fakhri issa abdallah,hebah H.O. nasereddin | 2013 | Download
|
| Enhancing the compression ratio of the HCDC-based text compression scheme | hussein al-bahadili,ahmed imad mohammed ali | 2013 | Download
|
| hybrid technique for arabic text compression | enas mahmoud abu jrai,arafat awajan | 2013 | Download
|
| latent semantic analysis LSA and ontological concepts to support e-recruitment | Ahmad K.A.Kayed,khaleel quftan al-lasassmeh | 2013 | Download
|
| Real time arabic translation system for signboard images based on printed character recognition | shoroq almamon alsharari,rafeeq abdul rahman a. al-hashemi | 2013 | Download
|
| Using semantic ontology to evaluate tenders and bidders for e-government applications | Ahmad K.A.Kayed,abdullah rashed al kashem | 2013 | Download
|
| a semantic ontology based concept for measuring security compliance of cloud service providers | mustafa nouman murad al-hassan,mohammad alharibat | 2013 | Download
|
| An efficient associative classification algorithm for text categorization | bashar suleiman abdallah aburumman,fadi fayez abdel-jaber | 2013 | Download
|
| An enhanced hopfield network model for misuse intrusion detection system | reyadh naoum,zaid jameel al-nuimat | 2013 | Download
|
| An enhanced technique for segmentation and encrypt data to storing in cloud computing | hazim A. Farhan,talal abdulkarem aldhaheri | 2013 | Download
|
| automobile accident prediction and avoidance system using multilayer preceptron neural networks | oleg viktorov,omar abd-elaziz ibrahim | 2013 | Download
|
| design and implementation of knowledge-based system for text retrieval based on context and user's prior knowledge | ghaith abdulsattar alkubaisi,hussein h.owaied | 2013 | Download
|
| Communication impact on non-contiguous allocation strategies for 2- D mesh multicomputer system | reyadh naoum,zaid mustafa al-lami,suliman bani-ahmad | 2012 | Download
|
| Design and implementation of portal system for schools in less-developed area : A field study in karak governorate | Hussein Hadi Owaied,ahmad tawfiq alhalhouli | 2012 | Download
|
| Developing a decision support system for seaport management case study : iraqi seaports | hazim A. Farhan,ammar abdul wahhab abdul hakeem | 2012 | Download
|
| Developing a virtual-machine-based distributed web crawling model | hamzah mahmoud qtishat,hussein al-bahadili | 2012 | Download
|
| enhancing the bellovin and cheswick's algorithm by adding dummy values and reoder process | fadi yousef ali eshtaiwi,oleg viktorov | 2012 | Download
|
| Framework model for strategic planning using dynamic workflow | abdulameer khalaf hussain,zaid mohammad al-alqanabu -hamour | 2012 | Download
|
| Geographical information systems in analysis and enhancement for problems solving and decision making | zaid farhood makki,alaa H. alhamami | 2012 | Download
|
| Improving scheduling on symmetric multiprocessing SMP architecture based on process behavior | Hussein Hadi Owaied,ali mousa alrahahleh | 2012 | Download
|
| Modeling and analysis of cloud collaborative commerce | hussein al-bahadili,awad al sabbah | 2012 | Download
|
| XML database schema refinement through functional dependencies and normalization | Musbah M. Aqel,zina zuhair al shamaa | 2012 | Download
|
| A framework model for arabic handwritten text recognittion to handle missing text fragments | baha abd al-wahhab al-garalleh,hussein hadi owaied | 2013 | Download
|
| A model for handwriting recognition using wavelet function and genetic algorithm | Hussein H. Owaied,ali ibrahim al alusi | 2013 | Download
|
| an efficient digital image watermarking system based on contourlet transform and discrete wavelet transform | Nidal Shilbayeh,zainab nouman yousif alqudsy | 2011 | Download
|
| Anonymous and non-repudiation E-cash scheme based on partially blind sigature | Nidal Shilbayeh,hani M. almatari | 2011 | Download
|
| desigen of intelligent database system for vehicle fault diagnosis | Hussein H. Owaied,saeed mohammad saeed tayem | 2011 | Download
|
| intrusion detection model inspired by immune using k-means and naive bayes as hybrid learning approach | hazim A. Farhan,emad fares salim islim | 2011 | Download
|
| A comparative study of duplicate record detection techniques | Musbah M. Aqel,osama helmi akel | 2011 | Download
|
| A Hybrid statistical and morphological arabic language diacritizing system | abdullah mamoun hattab,abdulameer khalaf hussain | 2012 | Download
|
| A Knowledge acquisition framework in trace - based reasoning for valuing knowledge | Hussein H. Owaied,dareen sayed khattab | 2012 | Download
|
| A Proposed software description language for representing program logic in XML | khaled zuhair mahmoud,azzam sleit | 2012 | Download
|
| An enhanced steady state genetic algorithm model for misuse network intrusion detection system | reyadh naoum,firas mohammad ahmad alabsi | 2012 | Download
|
| Designing A model for Wireless Load Data Sheet in Aircraft | Mohammad Ahmad Mahmoud Yousef,Hazim Farhan | 2010 | Download
|
| Developing a Payment System Using Contactless Smart card | Ayman Jamal Najm,hazim A. Farhan | 2010 | Download
|
| mouse Gestural hindi Digits Recopgnition Using Neural Network | Nidal Shilbayeh,Maisa M. naser | 2010 | Download
|
| THE VERIFICATION FROM THE CITIZEN IN E-GOVERNMENT APPLICATION | Hazim Farhan,Yaser Rasheed Ali Jasim | 2010 | Download
|
| Towards An Ontology for Software Product Quality Attributes | Ahmad Abdelhafiz Samhan,Mohammad A. Al Fayoumi | 2008 | Download
|
| A Model For E-Learnhng Content Design | Rasha faiq Suliman Aljaafreh,Mohammad A. Al-Fayoumi | 2009 | Download
|
| A Multi-Layer Perceptron neural network Based -model for Face Detection | Nidal Shilbayeh,Ghaith Ahmad Al-Qudah | 2009 | Download
|
| design and implementation of mobile learning content model | eman fraij karadsheh. | 2009 | Download
|
| Designing A Secure E- Payment protocol | Mahmmoud Muslem Ishtean Al- Tarawneh,Mohammad Al-Fayoumi | 2009 | Download
|
| Towards Ontology For Reguirements Engineering process in E-Government Application | Mohammad Nizar AHMAD,Mohammad A.Al Fayoumi,Ahmad K.A.Kayed | 2009 | Download
|
| Deriving System Model From Business Process Model (JCR Case Study) | Ahmad Jehad Ghazal Mohammad Al – Fayoumi | 2009 | Download
|
| A knowledge based system for developing cognitive map based on geographical map | Hussein H. Owaied,ali mohammad rawashdeh | 2010 | Download
|
| A model for Outsourcing Monitoring System | Anas Ali Al-Kasasbeh - Hussein Hadi Owaied | 2010 | Download
|
| A Robust Framework for Watermarking System | Nidal Shilbayeh,Adham mohsin Seed Alshamary | 2010 | Download
|
| Database fragmentation Technque for News Websites | Mohammad A. Al-Fayoumi,Wael Sulaiman Hamad Al- murafi | 2010 | Download
|
| Design A Model for Dynamic workflow Management System | yazan Waleed Ahmad Hudeib,Hussein Hadi Owaied Al- shemery | 2010 | Download
|
| A Customer - Oriented Software Development Life Cycle | Yazan Al. Masafah,Ali Meligy | 2008 | Download
|
| A Decision Support System for E-banking Adoption in Jordan : A Critical Success Factors Perspective | Mohammed Abdulkareem AbuKhadegeh | 2008 | Download
|
| A Generic Menu - Based Interface for Web Querying | Musbah AQEL | 2008 | Download
|
| A Model For Designing And Adapting Mobile Learning Content | Zaina Abdel Hamid Hamdan,M | 2008 | Download
|
| An Intelligent Face Authentication System for ATM aAccess | Abdallah Mahmoud Saleh Asrawi,Nidal Shilbayeh | 2008 | Download
|
| Design Secure E-Voting Scheme | Sattar J Aboud,Omar Al Hnaity | 2008 | Download
|
| Embedding Hex-Cells into Tree- Hybercube Network | Awad Ibrahim,Prof.Dr.Ali Meligy | 2008 | Download
|