关注
Prof.Tarig Mohamed Ahmed
Prof.Tarig Mohamed Ahmed
Information Technology Department- King abulaziz University
在 uofk.edu 的电子邮件经过验证
标题
引用次数
引用次数
年份
Developing prediction model of loan risk in banks using data mining
AJ Hamid, TM Ahmed
Machine Learning and Applications: An International Journal 3 (1), 1-9, 2016
1662016
Developing a predicted model for diabetes type 2 treatment plans by using data mining
TM Ahmed
Journal of Theoretical and Applied Information Technology 90 (2), 181, 2016
432016
Using data mining to develop model for classifying diabetic patient control level based on historical medical records
TM Ahmed
Journal of Theoretical and Applied Information Technology 87 (2), 316, 2016
382016
A Comparative Analysis of RAD and Agile Technique for Management of Computing Graduation Projects
* azal Qudus Khan1, Saim Rasheed1, Maged Alsheshtawi1, Tarig Mohamed Ahmed1 ...
Computers, Materials & Continua 2 (no.2), pp.777-796,, 2020
29*2020
Acceptance of e-government Services in Sudan: an Empirical Investigation
T Ahmed, N Alhadi, ME Seliaman
2015 International Conference on Cloud Computing (ICCC), 1-4, 2015
252015
Comparative study of customer relationship management (CRM) and electronic customer relationship management (E-CRM).
AM Eltahir, TM Ahmed, H Ahmed, TA Abdalfadil
International Journal of Advanced and Applied Sciences 8 (7), 1-6, 2021
172021
Using secure-image mechanism to protect mobile agent against malicious hosts
TM Ahmed
International Journal of Computer and Information Engineering 3 (11), 2578-2583, 2009
172009
Using secure-image mechanism to protect mobile agent against malicious host
MA Tarig, M Ahmed
Proc. of World Academy and Science, Engineering and Technology, 439-444, 2009
132009
Using TAM model to empirically examine students' attitudes towards e-services in college of business administration
S Bahaj, K Aljaaidi, T Ahmed
Management Science Letters 9 (5), 651-660, 2019
122019
Enhanced security of Rijndael algorithm using two secret keys
IMA Fadul, TMH Ahmed
International Journal of Security and its applications 7 (4), 127-134, 2013
112013
Using data mining in telecommunication industry: Customer's churn prediction model
R Masoud, TM Ahmed
Journal of Theoretical and Applied Information Technology 91 (2), 322, 2016
102016
Generating data warehouse schema
RA Ahmed, TM Ahmed
International Journal in Foundations of Computer Science & Technology …, 2014
92014
A Novel Classification Model for Employees Turnover Using Neural Network to Enhance Job Satisfaction in Organizations
T Mohamed Ahmed
Journal of Information and Organizational Sciences 45 (2), 361-374, 2021
72021
Developing technology acceptance model for e-service purposes
M Mohamed, T Ahmed
Management Science Letters 10 (10), 2221-2228, 2020
72020
Signing and verifying certificates by NTRU and RSA algorithms
MO Elbasheer, T Mohammed
2015 International Conference on Cloud Computing (ICCC), 1-4, 2015
72015
Increasing Mobile Agent Performance by Using Free Areas Mechanism.
TM Ahmed
J. Object Technol. 6 (4), 125-140, 2007
72007
A Comparative Analysis of Mobile Application Development Approaches: Mobile Application Development Approaches
MAMM Alsaid, TM Ahmed, S Jan, FQ Khan, AU Khattak
Proceedings of the Pakistan Academy of Sciences: A. Physical and …, 2021
62021
Admitted Ocular Emergencies: A Four Year Review
A Iqbal, S Jan, MN Khan, S Khan, S Muhammad
Pakistan Journal of Ophthalmology 23 (2), 2007
62007
Generate Sub-Agent Mechanism to protect mobile agent privacy
AT Mohamed
2012 IEEE Symposium on Computers & Informatics (ISCI), 86-91, 2012
52012
Encrypted Fingerprint into VoIP Systems using Cryptographic Key Generated by Minutiae Points
MF Anagreh, AM Hilal, TM Ahmed
International Journal of Advanced Computer Science and Applications 9 (1), 2018
42018
系统目前无法执行此操作,请稍后再试。
文章 1–20