Data mining: A preprocessing engine L Al Shalabi, Z Shaaban, B Kasasbeh Journal of Computer Science 2 (9), 735-739, 2006 | 643 | 2006 |
Bi-directional mapping system as a new IPv4/IPv6 translation mechanism J Mellor, M Kamala, B Kasasbeh Tenth International Conference on Computer Modeling and Simulation (uksim …, 2008 | 27 | 2008 |
Using the sound recognition techniques to reduce the electricity consumption in highways KT Al-Sarayreh, RE Al-Qutaish, BM Al-Kasasbeh Journal of American Science 5 (2), 1-12, 2009 | 21 | 2009 |
A new cryptographic algorithm for the real time applications AH Omari, BM Al-Kasasbeh, RE Al-Qutaish, MI Muhairat Proceedings of the 7th WSEAS international conference on Information …, 2008 | 19 | 2008 |
The analytical hierarchy process as a tool to select open source software RE Al-Qutaish, MI Muhairat, BM Al-Kasasbeh, BM Al-Kasasbeh Proceedings of the 8th WSEAS International Conference on Software …, 2009 | 16 | 2009 |
An optimal sensor placement algorithm (O-SPA) for improving tracking precision of human activity in real-world healthcare systems A Alarifi, AA AlZubi, M Al-Maitah, B Al-Kasasbeh Computer Communications 148, 9-16, 2019 | 13 | 2019 |
A novel and robust hybrid blockchain and steganography scheme M Takaoğlu, A Özyavaş, N Ajlouni, A Alshahrani, B Alkasasbeh Applied Sciences 11 (22), 10698, 2021 | 11 | 2021 |
Efficiency model of information systems as an implementation of key performance indicators AA AlRababah, A AlShahrani, B Al-Kasasbeh International Journal of Computer Science and Network Security (IJCSNS) 16 …, 2016 | 11 | 2016 |
Polygon Number Algorithm for Peak‐to‐Average Ratio Reduction of Massive 5G Systems Using Modified Partial Transmit Sequence Scheme H Alkatrani, M Ilyas, S Alyassri, A Nahar, F Al-Turjman, J Rasheed, ... Wireless Communications and Mobile Computing 2021 (1), 7498240, 2021 | 10 | 2021 |
DEA-RTA: A dynamic encryption algorithm for the real-time applications AH Omari, BM Al-Kasasbeh, RE Al-Qutaish, MI Muhairat International journal of computers 3 (1), 191-199, 2009 | 10 | 2009 |
Authentication method in software-defined network based on ciphertext-policy attributes encryption A Alshahrani, K Suwais, B Alkasasbeh International Journal of Innovative Computing, Information and Control 14 (5 …, 2018 | 6 | 2018 |
Linear random early detection for congestion control at the router buffer A Abu-Shareha, B Al-Kasasbeh, QY Shambour, MM Abualhaj, ... Informatica 46 (5), 2022 | 5 | 2022 |
Artificial Intelligence Scheme for Medical Images Classification and Prediction. B Al-Kasasbeh International Journal of Advances in Soft Computing & Its Applications 14 (2), 2022 | 3 | 2022 |
Android-based mobile application for door-to-door product delivery S Atawneh, B Al-Kasasbeh, MB Rshed International Association of Online Engineering, 2019 | 3 | 2019 |
Al-Kasasbeh, Rafa E AH Omari, M Basil Al-Qutaish and Mohammad I. Muhairat, 191-199, 2009 | 3 | 2009 |
Indirect routing of mobile ip: A non-encapsulation approach BM Al-Kasasbeh, RE Al-Qutaish, KT Al-Sarayreh IJCSNS 8 (7), 124, 2008 | 3 | 2008 |
A Fully Adaptive Active Queue Management Method for Congestion Prevention at the Router Buffer. A Alshahrani, AA Abu-Shareha, QY Shambour, B Al-Kasasbeh Computers, Materials & Continua 77 (2), 2023 | 2 | 2023 |
Model of the information security protection subsystem operation and method of optimization of its composition B Al-Kasasbeh Egyptian Informatics Journal 23 (3), 511-516, 2022 | 2 | 2022 |
Fuzzy comprehensive random early detection of router congestion AA Abu-Shareha, B Al-Kasasbeh, QY Shambour, MM Abualhaj, ... Information Technology and Control 51 (2), 252-267, 2022 | 2 | 2022 |
Robust Nonlinear Non-Referenced Inertial Frame Multi-Stage PID Controller for Symmetrical Structured UAV F Takaoğlu, A Alshahrani, N Ajlouni, F Ajlouni, B Al Kasasbah, A Özyavaş Symmetry 14 (4), 689, 2022 | 2 | 2022 |