On tackling social engineering web phishing attacks utilizing software defined networks (SDN) approach M Masoud, Y Jaradat, AQ Ahmad 2016 2nd International Conference on Open Source Software Computing (OSSCOM …, 2016 | 20 | 2016 |
The power consumption cost of data encryption in smartphones M Masoud, I Jannoud, A Ahmad, H Al-Shobaky 2015 International Conference on Open Source Software Computing (OSSCOM), 1-6, 2015 | 19 | 2015 |
Evaluating and adopting E-learning systems in Al-zaytoonah university of Jordan M Abduljawad, A Ahmad, KM Jaber, AA Thunaibat, EA Maria, ... Int. J. Advance Soft Compu. Appl 12 (3), 82-99, 2020 | 17 | 2020 |
E-learning mobile application evaluation: Al-Zaytoonah University as a case study KM Jaber, M Abduljawad, A Ahmad, M Abdallah, M Salah, N Alhindawi Int. J. Advance Soft Compu. Appl 13 (3), 88-99, 2021 | 15 | 2021 |
Prison Perimeter Surveillance System Using WSN. SS Ismail, E Alkhader, A Ahmad J. Comput. Sci. 13 (11), 674-679, 2017 | 15 | 2017 |
User selective encryption method for securing MANETs A Ahmad, S Ismail International Journal of Electrical and Computer Engineering (IJECE) 8 (5 …, 2018 | 13 | 2018 |
E-learning issues and solutions for students with disabilities during COVID-19 pandemic: Al-Zaytoonah University of Jordan case study AQ Ahmad, MA Jawad, KM Jaber International Journal of Evaluation and Research in Education 11 (4), 2087-2094, 2022 | 10 | 2022 |
An intelligent road traffic management system based on a human community genetic algorithm AA Hnaif, ALM Nagham, M Abduljawad, A Ahmad 2019 IEEE Jordan international joint conference on electrical engineering …, 2019 | 9 | 2019 |
Resource allocation for downlink non-orthogonal multiple access in joint transmission coordinated multi-point networks MK Awad, MW Baidas, A Ahmad Computer Communications 173, 134-149, 2021 | 8 | 2021 |
An analysis of mobile learning (M-Learning) in education M Abduljawad, A Ahmad Multicultural Education 9 (2), 2023, 2023 | 7 | 2023 |
Comparative Analysis of Different Encryption Techniques in Mobile Ad-Hoc Networks (MANETs) A Sharma, G Kushwaha IITM Journal of Management and IT 10 (1), 55-64, 2019 | 7 | 2019 |
Machine learning approach for categorizing internet autonomous systems’ links M Masoud, Y Jaradat, A Ahmad ICGHIT, Hanzhou, China Google Scholar, 2017 | 6 | 2017 |
Optimal downlink resource allocation for joint transmission CoMP-enabled NOMA networks: a benchmark implementation MK Awad, MW Baidas, A Ahmad 2019 36th National Radio Science Conference (NRSC), 249-258, 2019 | 3 | 2019 |
Human identity verification via automated analysis of fingerprint system features A Ahmad, S Ismail, MA Jawad Int. J. Innov. Comput. Inf. Control. IJICIC 15, 2183-2196, 2019 | 2 | 2019 |
Evaluating Cache Power Dissipation Across Different Process Technologies S Ismail, A Ahmad, M Awad, MA Jawad 2018 IEEE/ACS 15th International Conference on Computer Systems and …, 2018 | 1 | 2018 |
Average Memory Access Time ReductionVia Adding Victim Cache AQ Ahmad, M Masoud, SS Ismail International Journal of Applied Engineering Research 11 (19), 9767-9771, 2016 | 1 | 2016 |
Comparative Study for Virtual Personal Assistants (VPA) and State-of-the-Art Speech Recognition Technology M Lafi, AAA Alkhatib, AK AbedAlghafer, MA Jawad, AQ Ahmad International Journal of Computational and Experimental Science and …, 2024 | | 2024 |
How to Attract Learners Using the Content of Online Interactive Courses? A Case Study A Ahmad, M Abduljawad Journal of Higher Education Theory and Practice 24 (4), 203-211, 2024 | | 2024 |
8216cnc08. pdf A Ahmad, A Swidan, R Saifan | | |