No. |
Title |
Author |
Year |
Publisher |
Abstract |
801 |
Beacon-Based Non-Delay Tolerant Routing Protocols for VANET: A Systematic Comparison |
Mahmoud Ali Al Shugran
|
2021 |
Canadian Center of Science and Education |
|
802 |
Automating SWOT Analysis Using Machine Learning Methods |
Ahmad Abu-Alaish, Ghaith Jaradat, Mahmoud Al-Shugran, Iyas Alodat |
2021 |
|
|
803 |
Applicability of Overlay Non-Delay Tolerant Position-Based Protocols in Highways and Urban Environments for Vanet |
Mahmoud Ali Al Shugran |
2021 |
Academy and Industry Research Collaboration Center (AIRCC) |
|
804 |
Hybrid Elitist-Ant System for Nurse-Rostering Problem |
Ghaith M Jaradat, Anas Al-Badareen, Masri Ayob, Mutasem Al-Smadi, Ibrahim Al-Marashdeh, Mahmoud Ash- |
2019 |
King Saud University |
|
805 |
An Enhanced Queue Management Approach for Greedy Routing in MANETs |
Ahmad Habboush, Mahmoud AlShugran |
2018 |
Canadian Center of Science and Education |
|
806 |
Performance Evaluation of Unicast Routing Protocols in MANETs-Current State and Future Prospects |
Mohammad Alnabhan, Mahmoud Alshuqran, Mustafa Hammad, Mohammad Al Nawayseh |
2017 |
Kassel University Press GmbH |
|
807 |
Performance evaluation of position-based routing protocols using different mobility models in manet |
Almomani, Omar, Mahmoud Al-shugran, Jafar A. Alzubi, A. Alzubi |
2015 |
Foundation of Computer Science (FCS) |
|
808 |
A Qualitative Comparison Evaluation of the Greedy Forwarding Strategies in Mobile Ad Hoc Network |
Mahmoud Al-shugran, Osman Ghazali,Suhaidi Hassan,KashifNisar, , A. Suki M. Arif |
2013 |
Elsevier |
|
809 |
An Elite Pool-Based Big Bang-Big Crunch Metaheuristic for Data Clustering |
Ibrahim Al-Marashdeh, Ghaith M. Jaradat, Masri Ayob, Ahmad Abu-Al-Aish, Mutasem Alsmadi |
2018 |
|
|
810 |
Collaborative and ubiquitous mobile learning system prototype |
Mohammad Alnabhan, Ahmad Abu-Al-Aish, Sultan A. Al-Masaeed |
2018 |
|
|
811 |
Automating SWOT Analysis Using Machine Learning Methods |
Ahmad Abu-Al-Aish, Ghaith Jaradat, Mahmoud Al-Shugran, Iyas Alodat |
2021 |
|
|
812 |
Exploring Technical Quality Factors That Enhance Mobile Learning Applications Services Using Data Mining Techniques |
Ahmad Abu-Al-Aish |
2021 |
IGI Global |
|
813 |
Using E-learning System in Jordanian Universities during the COVID-19 Pandemic: Benefits and Challenges |
Ahmad Abu-Al-Aish |
2021 |
Canadian Center of Science and Education |
|
814 |
Resolving Conflict of Wireless Sensor Networks Using Subjective Logic |
Shadi Al-khateeb, Vladimir Zadorozhny |
2021 |
IEEE |
|
815 |
An Automated Approach to Identify RNA Editing Sites |
Amal Alzu'bi, Shadi Al-khateeb, Leming Zhou, Qingde Wang and Mohannad AL Saghir |
2021 |
|
|
816 |
the phenomena of quotation and inclusion in Andalusian poetry in the fifth century AH |
dr. muhammad a. alruqibat |
2020 |
جامعة جرش |
|
817 |
Badee' Repetition in the poetry of Ibn Shuhaid Al-Andalusi -Rhetorical Study |
dr. muhammad a. alruqibat |
2020 |
جامعة إربد الأهلية |
|
818 |
Automating swot analysis using machine learning methods |
Abu-Alaish, Ahmad; Jaradat, Ghaith; Al-Shugran, Mahmoud; Alodat, Iyas |
2021 |
|
|
819 |
Surveillance rapid detection of signs of traffic services in real time |
Mohammad Alodat, Iyas Abdullah |
2018 |
|
|
820 |
Hybrid elitist-ant system for nurse-rostering problem |
Ghaith M Jaradat, Anas Al-Badareen, Masri Ayob, Mutasem Al-Smadi, Ibrahim Al-Marashdeh, Mahmoud Ash- |
2019 |
Elsevier |
|
821 |
Monitor Potential Attack Locations in a Specific Area within DTN Network |
IYAS ALODAT |
2021 |
|
|
822 |
EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIES |
Iyas Alodat |
2021 |
|
|
823 |
Detect Image Malware Steganography Using Deep Transfer Learning Model |
Iyas Alodat , Mohammad Alodat |
2022 |
|
|
824 |
Analysing and predicting COVID-19 AI tracking using artificial intelligence |
IYAS ALODAT |
2021 |
|
|
825 |
BioCloud: A Network Cloud-Computing Method for Predicting RNA Secondary Structure |
Ahmad Habboush, Mohammad Al Rawajbeh, Ahmed M. Manasrah, and Ra’ed M. Al-Khatib |
2016 |
International Journal of Humanities and Applied Sciences (IJHAS) |
|
826 |
Enhancing the eGovernment functionality using Knowledge Management |
Mohammad Al Rawajbeh, Ahmad Habboush |
2011 |
World Academy of Science, Engineering and Technology |
|
827 |
Parallel sequential searching algorithm for unsorted array |
Ahmad Habboush, Sami Qawasmeh |
2011 |
Medwell Journals |
|
828 |
Acceptance of mobile learning by university students |
Ahmad Habboush, Ayman Nassuora, Abdel-Rahman Hussein |
2011 |
EuroJornals |
|
829 |
Arabic text summarization model using clustering techniques |
Ahmad Haboush, Maryam Al-Zoubi, Ahmad Momani, Motassem Tarazi |
2012 |
WCSIT |
|
830 |
Fuzzy Optimized Metric for Adaptive Network Routing |
Ahmad Khader Habboush |
2012 |
IJCSS |
|
831 |
Load balancing using multiple node disjoint paths |
Ahmad Haboush, Mohammad Al Nabhan, Motassem Al-Tarazi, Mohammad Al-Rawajbeh |
2012 |
Canadian Center of Science and Education |
|
832 |
Handling Safety-Related Requirements in Critical Systems Product Lines |
Ahmad Khader Habboush |
2013 |
Canadian Center of Science and Education |
|
833 |
A framework for wireless sensor network fault rectification |
Ahmad Haboush, Mihir Narayan Mohanty, Binod Kumar Pattanayak, Motassem Al-Tarazi |
2014 |
IJMUE |
|
834 |
investigating software maintainability development: a case for iso 9126 |
Ahmad Haboush, Mohammad Alnabhan, Anas AL-Badareen, Mohammad Al-nawayseh and Bassam EL-Zaghmouri |
2014 |
IJCSI |
|
835 |
A Hybrid Modified Semantic Matching Algorithm Based on Instances Detection With Case Study on Renewable Energy |
Ahmad Khader Haboush |
2014 |
arXiv:1402.3937 |
|
836 |
An evaluation framework for requirements definition of software development |
Mohammad Alnabhan, Ahmad Haboush, Anas AL-Badareen, Mohammad Al-nawayseh and Bassam EL-Zaghmouri |
2014 |
JCIT |
|
837 |
Emerging trends in intrusion detection in mobile ad hoc networks (MANETs) |
Mohammad Alnabhan, Ahmad Haboush, Binod Kumar Pattanayak, Mohammad Alnawayseh, Anas Bassam Al-Badare |
2014 |
Asian Network for Scientific Information (ANSINET) |
|
838 |
A Review Paper In Steganography Method that Using Message Integrity Techniques |
Mohammed Salem Atoum, Ahmad Khader Habboush |
2015 |
Research India Publications |
|
839 |
FSK modulation based image steganography |
Ahmad Khader Habboush |
2016 |
Advanced Institutes of Convergence Information Technology |
|
840 |
ZigBee Nodes’ EMI Immunity by Automatic Channel Selection Algorithm Paper |
Ahmad Habboush, Mohammad Alnabhan, Mohammad Otoum |
2017 |
IJCSIS |
|
841 |
Advanced LSB technique for audio stenography |
Mohammed Salem Atoum, Mohammad M Alnabhan, Ahmad Habboush |
2017 |
CS & IT-CSCP |
|
842 |
Speech Recognition Using Neural Networks" |
Bassam M. El-Zaghmouri |
2015 |
IC4E |
|
843 |
Fuzzy C-Mean Clustering Algorithm Modification and Adaptation for Applications |
Bassam. El-Zaghmouri and Marwan Abu-Zanona |
2012 |
WCSIT |
|
844 |
Hybridization between Iterative Simulated Annealing and Modified Great Deluge for Medical Clustering Problems |
Anmar Abuhamdah and Bassam. El-Zaghmouri, Anas Quteishat and Rawnaq Kittaneh |
2012 |
WCSIT |
|
845 |
Current Arabic (Hindi) Hand Written Numbers Segmentation and Recognition Advance Image Processing and Neural Network |
Marwan Abu-Zanona and Bassam. El-Zaghmouri |
2012 |
cisjournal |
|
846 |
Adaptive Iris Localization And Recognition: Modification On Daugman’s Algorithm |
Marwan Abu-Zanona and Bassam. El-Zaghmouri |
2013 |
IJCSIS |
|
847 |
Protein Family Recognition based on Fuzzy Logic |
Bassam. El-Zaghmouri and Marwan Abu-Zanona |
2013 |
IJERMT |
|
848 |
An Enhanced Queue Management Approach for Greedy Routing in MANETs. |
Ahmad Habboush, Mahmoud AlShugran |
2018 |
Canadian Center of Science and Education |
|
849 |
Arabic Handwritten Character Recognition Based on Contour Matching and Feed-Forward Neural Network |
Marwan Abu-Zanona and Anmar Abuhamdah ,Bassam. El-Zaghmouri, |
2019 |
Computer and Information Science |
|
850 |
Hybrid Fingerprint Recognition Algorithm Based on Self Organized Map Neural Networks |
Marwan Abu-Zanona and Bassam. El-Zaghmouri |
2016 |
IJCSI |
|