متابعة
Amal Ahmad
Amal Ahmad
بريد إلكتروني تم التحقق منه على zuj.edu.jo
عنوان
عدد مرات الاقتباسات
عدد مرات الاقتباسات
السنة
On tackling social engineering web phishing attacks utilizing software defined networks (SDN) approach
M Masoud, Y Jaradat, AQ Ahmad
2016 2nd International Conference on Open Source Software Computing (OSSCOM …, 2016
182016
The power consumption cost of data encryption in smartphones
M Masoud, I Jannoud, A Ahmad, H Al-Shobaky
2015 International Conference on Open Source Software Computing (OSSCOM), 1-6, 2015
182015
Prison Perimeter Surveillance System Using WSN.
SS Ismail, E Alkhader, A Ahmad
J. Comput. Sci. 13 (11), 674-679, 2017
152017
Evaluating and adopting E-learning systems in Al-zaytoonah university of Jordan
M Abduljawad, A Ahmad, KM Jaber, AA Thunaibat, EA Maria, ...
Int. J. Advance Soft Compu. Appl 12 (3), 82-99, 2020
142020
E-learning mobile application evaluation: Al-Zaytoonah University as a case study
KM Jaber, M Abduljawad, A Ahmad, M Abdallah, M Salah, N Alhindawi
Int. J. Advance Soft Compu. Appl 13 (3), 88-99, 2021
132021
User selective encryption method for securing MANETs
A Ahmad, S Ismail
International Journal of Electrical and Computer Engineering (IJECE) 8 (5 …, 2018
132018
An intelligent road traffic management system based on a human community genetic algorithm
AA Hnaif, ALM Nagham, M Abduljawad, A Ahmad
2019 IEEE Jordan international joint conference on electrical engineering …, 2019
92019
Resource allocation for downlink non-orthogonal multiple access in joint transmission coordinated multi-point networks
MK Awad, MW Baidas, A Ahmad
Computer Communications 173, 134-149, 2021
82021
E-learning issues and solutions for students with disabilities during COVID-19 pandemic: Al-Zaytoonah University of Jordan case study
AQ Ahmad, MA Jawad, KM Jaber
International Journal of Evaluation and Research in Education 11 (4), 2087-2094, 2022
72022
Comparative Analysis of Different Encryption Techniques in Mobile Ad-Hoc Networks (MANETs)
A Sharma, G Kushwaha
IITM Journal of Management and IT 10 (1), 55-64, 2019
72019
Machine learning approach for categorizing internet autonomous systems’ links
M Masoud, Y Jaradat, A Ahmad
ICGHIT, Hanzhou, China Google Scholar, 2017
62017
An analysis of mobile learning (M-Learning) in education
M Abduljawad, A Ahmad
Multicultural Education 9 (2), 145-152, 2023
52023
Optimal downlink resource allocation for joint transmission CoMP-enabled NOMA networks: a benchmark implementation
MK Awad, MW Baidas, A Ahmad
2019 36th National Radio Science Conference (NRSC), 249-258, 2019
32019
Human identity verification via automated analysis of fingerprint system features
A Ahmad, S Ismail, MA Jawad
Int. J. Innov. Comput. Inf. Control. IJICIC 15, 2183-2196, 2019
22019
Evaluating Cache Power Dissipation Across Different Process Technologies
S Ismail, A Ahmad, M Awad, MA Jawad
2018 IEEE/ACS 15th International Conference on Computer Systems and …, 2018
12018
Average Memory Access Time ReductionVia Adding Victim Cache
AQ Ahmad, M Masoud, SS Ismail
International Journal of Applied Engineering Research 11 (19), 9767-9771, 2016
12016
8216cnc08. pdf
A Ahmad, A Swidan, R Saifan
يتعذر على النظام إجراء العملية في الوقت الحالي. عاود المحاولة لاحقًا.
مقالات 1–17