An audio shuffle-encryption algorithm AA Tamimi, AM Abdalla The world congress on engineering and computer science, 2014 | 57 | 2014 |
Hiding an image inside another image using variable-rate steganography AA Tamimi, AM Abdalla, O Al-Allaf International Journal of Advanced Computer Science and Applications (IJACSA …, 2013 | 54 | 2013 |
A Shuffle Image-Encryption Algorithm AAM Yahya A.A, Journal of Computer Science 4 (12), 999-1002, 2008 | 52 | 2008 |
New outlier detection method based on fuzzy clustering AZ Moh’d Belal, A Al-Dahoud, AA Yahya WSEAS transactions on information science and applications 7, 681-690, 2010 | 51 | 2010 |
Public–Key Steganography Based on Matching Method AA Alia,M.A., Yahya European Journal of Scientific Research 40 (2), 223-231, 2010 | 48 | 2010 |
Face recognition system based on different artificial neural networks models and training algorithms ONA AL-Allaf, AA Tamimi, MA Alia International Journal of Advanced Computer Science and Applications 4 (6), 2013 | 37 | 2013 |
Disaster recovery techniques in cloud computing AA Tamimi, R Dawood, L Sadaqa 2019 IEEE Jordan International Joint Conference on Electrical Engineering …, 2019 | 36 | 2019 |
Pattern recognition neural network for improving the performance of iris recognition system ONA AL-Allaf, SA AbdAlKader, AA Tamimi Int'l Journal of Scientific & Engineering Research 4 (6), 661-667, 2013 | 30 | 2013 |
Comparison Studies for Different Shortest path Algorithms HM Abu-Ryash, AA Tamimi International Journal of Computers & Technology (IJCT) 14 (8), 5979-5986, 2015 | 25 | 2015 |
Cryptography based authentication methods MA Alia, AA Tamimi, ON AL-Allaf WCECS 2014, 22-24 October, 2014, San Francisco, USA, 2014 | 24 | 2014 |
Integrated system for monitoring and recognizing students during class session MA Alia, AA Tamimi, ONA Al-Allaf The International Journal of Multimedia & Its Applications 5 (6), 45, 2013 | 24 | 2013 |
User acceptance model of open source software: an integrated model of OSS characteristics and UTAUT TA Alrawashdeh, MW Elbes, A Almomani, F ElQirem, A Tamimi Journal of Ambient Intelligence and Humanized Computing 11, 3315-3327, 2020 | 21 | 2020 |
Performance analysis of biometric recognition modalities DR Ibrahim, AA Tamimi, AM Abdalla 2017 8th International Conference on Information Technology (ICIT), 980-984, 2017 | 20 | 2017 |
An AES-Based Encryption Algorithm with Shuffling. A Yahya, A Abdalla Security and Management, 113-116, 2009 | 20 | 2009 |
Using Program Slicing to Detect the Dead Code N AlAbwaini, A Aldaàje, T Jaber, M Abdallah, A Tamimi 2018 8th International Conference on Computer Science and Information …, 2018 | 19 | 2018 |
Real-time group face-detection for an intelligent class-attendance system AA Tamimi, ONA AL-Allaf, MA Alia International Journal of Information Technology and Computer Science (IJITCS …, 2015 | 18 | 2015 |
A survey of image encryption algorithms QH Makki, AM Abdalla, AA Tamimi 2021 International Conference on Information Technology (ICIT), 598-602, 2021 | 17 | 2021 |
An automated approach to generate test cases from use case description model TA Alrawashed, A Almomani, A Althunibat, A Tamimi Computer Modeling in Engineering & Sciences 119 (3), 409-425, 2019 | 17 | 2019 |
Fuzzy clustering-based approach for outlier detection MB Al-Zoubi, AD Ali, AA Yahya Proceedings of the 9th WSEAS international conference on Applications of …, 2010 | 17 | 2010 |
Artificial neural networks for iris recognition system: comparisons between different models, architectures and algorithms ONA Al-Allaf, AA Tamimi, SA AbdAlKader International journal of information and communication technology research 2 …, 2012 | 14 | 2012 |