Developing prediction model of loan risk in banks using data mining AJ Hamid, TM Ahmed Machine Learning and Applications: An International Journal 3 (1), 1-9, 2016 | 166 | 2016 |
Developing a predicted model for diabetes type 2 treatment plans by using data mining TM Ahmed Journal of Theoretical and Applied Information Technology 90 (2), 181, 2016 | 43 | 2016 |
Using data mining to develop model for classifying diabetic patient control level based on historical medical records TM Ahmed Journal of Theoretical and Applied Information Technology 87 (2), 316, 2016 | 38 | 2016 |
A Comparative Analysis of RAD and Agile Technique for Management of Computing Graduation Projects * azal Qudus Khan1, Saim Rasheed1, Maged Alsheshtawi1, Tarig Mohamed Ahmed1 ... Computers, Materials & Continua 2 (no.2), pp.777-796,, 2020 | 29* | 2020 |
Acceptance of e-government Services in Sudan: an Empirical Investigation T Ahmed, N Alhadi, ME Seliaman 2015 International Conference on Cloud Computing (ICCC), 1-4, 2015 | 25 | 2015 |
Comparative study of customer relationship management (CRM) and electronic customer relationship management (E-CRM). AM Eltahir, TM Ahmed, H Ahmed, TA Abdalfadil International Journal of Advanced and Applied Sciences 8 (7), 1-6, 2021 | 17 | 2021 |
Using secure-image mechanism to protect mobile agent against malicious hosts TM Ahmed International Journal of Computer and Information Engineering 3 (11), 2578-2583, 2009 | 17 | 2009 |
Using secure-image mechanism to protect mobile agent against malicious host MA Tarig, M Ahmed Proc. of World Academy and Science, Engineering and Technology, 439-444, 2009 | 13 | 2009 |
Using TAM model to empirically examine students' attitudes towards e-services in college of business administration S Bahaj, K Aljaaidi, T Ahmed Management Science Letters 9 (5), 651-660, 2019 | 12 | 2019 |
Enhanced security of Rijndael algorithm using two secret keys IMA Fadul, TMH Ahmed International Journal of Security and its applications 7 (4), 127-134, 2013 | 11 | 2013 |
Using data mining in telecommunication industry: Customer's churn prediction model R Masoud, TM Ahmed Journal of Theoretical and Applied Information Technology 91 (2), 322, 2016 | 10 | 2016 |
Generating data warehouse schema RA Ahmed, TM Ahmed International Journal in Foundations of Computer Science & Technology …, 2014 | 9 | 2014 |
A Novel Classification Model for Employees Turnover Using Neural Network to Enhance Job Satisfaction in Organizations T Mohamed Ahmed Journal of Information and Organizational Sciences 45 (2), 361-374, 2021 | 7 | 2021 |
Developing technology acceptance model for e-service purposes M Mohamed, T Ahmed Management Science Letters 10 (10), 2221-2228, 2020 | 7 | 2020 |
Signing and verifying certificates by NTRU and RSA algorithms MO Elbasheer, T Mohammed 2015 International Conference on Cloud Computing (ICCC), 1-4, 2015 | 7 | 2015 |
Increasing Mobile Agent Performance by Using Free Areas Mechanism. TM Ahmed J. Object Technol. 6 (4), 125-140, 2007 | 7 | 2007 |
A Comparative Analysis of Mobile Application Development Approaches: Mobile Application Development Approaches MAMM Alsaid, TM Ahmed, S Jan, FQ Khan, AU Khattak Proceedings of the Pakistan Academy of Sciences: A. Physical and …, 2021 | 6 | 2021 |
Admitted Ocular Emergencies: A Four Year Review A Iqbal, S Jan, MN Khan, S Khan, S Muhammad Pakistan Journal of Ophthalmology 23 (2), 2007 | 6 | 2007 |
Generate Sub-Agent Mechanism to protect mobile agent privacy AT Mohamed 2012 IEEE Symposium on Computers & Informatics (ISCI), 86-91, 2012 | 5 | 2012 |
Encrypted Fingerprint into VoIP Systems using Cryptographic Key Generated by Minutiae Points MF Anagreh, AM Hilal, TM Ahmed International Journal of Advanced Computer Science and Applications 9 (1), 2018 | 4 | 2018 |