Segui
Prof. Abdelfatah Aref Tamimi
Prof. Abdelfatah Aref Tamimi
Email verificata su zuj.edu.jo
Titolo
Citata da
Citata da
Anno
An audio shuffle-encryption algorithm
AA Tamimi, AM Abdalla
The world congress on engineering and computer science, 2014
572014
Hiding an image inside another image using variable-rate steganography
AA Tamimi, AM Abdalla, O Al-Allaf
International Journal of Advanced Computer Science and Applications (IJACSA …, 2013
542013
A Shuffle Image-Encryption Algorithm
AAM Yahya A.A,
Journal of Computer Science 4 (12), 999-1002, 2008
522008
New outlier detection method based on fuzzy clustering
AZ Moh’d Belal, A Al-Dahoud, AA Yahya
WSEAS transactions on information science and applications 7, 681-690, 2010
512010
Public–Key Steganography Based on Matching Method
AA Alia,M.A., Yahya
European Journal of Scientific Research 40 (2), 223-231, 2010
482010
Face recognition system based on different artificial neural networks models and training algorithms
ONA AL-Allaf, AA Tamimi, MA Alia
International Journal of Advanced Computer Science and Applications 4 (6), 2013
372013
Disaster recovery techniques in cloud computing
AA Tamimi, R Dawood, L Sadaqa
2019 IEEE Jordan International Joint Conference on Electrical Engineering …, 2019
362019
Pattern recognition neural network for improving the performance of iris recognition system
ONA AL-Allaf, SA AbdAlKader, AA Tamimi
Int'l Journal of Scientific & Engineering Research 4 (6), 661-667, 2013
302013
Comparison Studies for Different Shortest path Algorithms
HM Abu-Ryash, AA Tamimi
International Journal of Computers & Technology (IJCT) 14 (8), 5979-5986, 2015
242015
Cryptography based authentication methods
MA Alia, AA Tamimi, ON AL-Allaf
WCECS 2014, 22-24 October, 2014, San Francisco, USA, 2014
242014
Integrated system for monitoring and recognizing students during class session
MA Alia, AA Tamimi, ONA Al-Allaf
The International Journal of Multimedia & Its Applications 5 (6), 45, 2013
242013
User acceptance model of open source software: an integrated model of OSS characteristics and UTAUT
TA Alrawashdeh, MW Elbes, A Almomani, F ElQirem, A Tamimi
Journal of Ambient Intelligence and Humanized Computing 11, 3315-3327, 2020
212020
Performance analysis of biometric recognition modalities
DR Ibrahim, AA Tamimi, AM Abdalla
2017 8th International Conference on Information Technology (ICIT), 980-984, 2017
202017
An AES-Based Encryption Algorithm with Shuffling.
A Yahya, A Abdalla
Security and Management, 113-116, 2009
202009
Using Program Slicing to Detect the Dead Code
N AlAbwaini, A Aldaàje, T Jaber, M Abdallah, A Tamimi
2018 8th International Conference on Computer Science and Information …, 2018
192018
Real-time group face-detection for an intelligent class-attendance system
AA Tamimi, ONA AL-Allaf, MA Alia
International Journal of Information Technology and Computer Science (IJITCS …, 2015
182015
A survey of image encryption algorithms
QH Makki, AM Abdalla, AA Tamimi
2021 International Conference on Information Technology (ICIT), 598-602, 2021
172021
An automated approach to generate test cases from use case description model
TA Alrawashed, A Almomani, A Althunibat, A Tamimi
Computer Modeling in Engineering & Sciences 119 (3), 409-425, 2019
172019
Fuzzy clustering-based approach for outlier detection
MB Al-Zoubi, AD Ali, AA Yahya
Proceedings of the 9th WSEAS international conference on Applications of …, 2010
172010
Artificial neural networks for iris recognition system: comparisons between different models, architectures and algorithms
ONA Al-Allaf, AA Tamimi, SA AbdAlKader
International journal of information and communication technology research 2 …, 2012
142012
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20