关注
Amal Ahmad
Amal Ahmad
在 zuj.edu.jo 的电子邮件经过验证
标题
引用次数
引用次数
年份
On tackling social engineering web phishing attacks utilizing software defined networks (SDN) approach
M Masoud, Y Jaradat, AQ Ahmad
2016 2nd International Conference on Open Source Software Computing (OSSCOM …, 2016
202016
The power consumption cost of data encryption in smartphones
M Masoud, I Jannoud, A Ahmad, H Al-Shobaky
2015 International Conference on Open Source Software Computing (OSSCOM), 1-6, 2015
192015
Evaluating and adopting E-learning systems in Al-zaytoonah university of Jordan
M Abduljawad, A Ahmad, KM Jaber, AA Thunaibat, EA Maria, ...
Int. J. Advance Soft Compu. Appl 12 (3), 82-99, 2020
172020
E-learning mobile application evaluation: Al-Zaytoonah University as a case study
KM Jaber, M Abduljawad, A Ahmad, M Abdallah, M Salah, N Alhindawi
Int. J. Advance Soft Compu. Appl 13 (3), 88-99, 2021
152021
Prison Perimeter Surveillance System Using WSN.
SS Ismail, E Alkhader, A Ahmad
J. Comput. Sci. 13 (11), 674-679, 2017
152017
User selective encryption method for securing MANETs
A Ahmad, S Ismail
International Journal of Electrical and Computer Engineering (IJECE) 8 (5 …, 2018
132018
E-learning issues and solutions for students with disabilities during COVID-19 pandemic: Al-Zaytoonah University of Jordan case study
AQ Ahmad, MA Jawad, KM Jaber
International Journal of Evaluation and Research in Education 11 (4), 2087-2094, 2022
102022
An intelligent road traffic management system based on a human community genetic algorithm
AA Hnaif, ALM Nagham, M Abduljawad, A Ahmad
2019 IEEE Jordan international joint conference on electrical engineering …, 2019
92019
Resource allocation for downlink non-orthogonal multiple access in joint transmission coordinated multi-point networks
MK Awad, MW Baidas, A Ahmad
Computer Communications 173, 134-149, 2021
82021
An analysis of mobile learning (M-Learning) in education
M Abduljawad, A Ahmad
Multicultural Education 9 (2), 2023, 2023
72023
Comparative Analysis of Different Encryption Techniques in Mobile Ad-Hoc Networks (MANETs)
A Sharma, G Kushwaha
IITM Journal of Management and IT 10 (1), 55-64, 2019
72019
Machine learning approach for categorizing internet autonomous systems’ links
M Masoud, Y Jaradat, A Ahmad
ICGHIT, Hanzhou, China Google Scholar, 2017
62017
Optimal downlink resource allocation for joint transmission CoMP-enabled NOMA networks: a benchmark implementation
MK Awad, MW Baidas, A Ahmad
2019 36th National Radio Science Conference (NRSC), 249-258, 2019
32019
Human identity verification via automated analysis of fingerprint system features
A Ahmad, S Ismail, MA Jawad
Int. J. Innov. Comput. Inf. Control. IJICIC 15, 2183-2196, 2019
22019
Evaluating Cache Power Dissipation Across Different Process Technologies
S Ismail, A Ahmad, M Awad, MA Jawad
2018 IEEE/ACS 15th International Conference on Computer Systems and …, 2018
12018
Average Memory Access Time ReductionVia Adding Victim Cache
AQ Ahmad, M Masoud, SS Ismail
International Journal of Applied Engineering Research 11 (19), 9767-9771, 2016
12016
Comparative Study for Virtual Personal Assistants (VPA) and State-of-the-Art Speech Recognition Technology
M Lafi, AAA Alkhatib, AK AbedAlghafer, MA Jawad, AQ Ahmad
International Journal of Computational and Experimental Science and …, 2024
2024
How to Attract Learners Using the Content of Online Interactive Courses? A Case Study
A Ahmad, M Abduljawad
Journal of Higher Education Theory and Practice 24 (4), 203-211, 2024
2024
8216cnc08. pdf
A Ahmad, A Swidan, R Saifan
系统目前无法执行此操作,请稍后再试。
文章 1–19