No. |
Title |
Author |
Year |
Publisher |
Abstract |
801 |
Knowledge, Attitude, and Practice of Jordanian Nursing and Pharmacy Students towards COVID-19: A Cross Sectional Study |
Amal Ababneh, Rana Al Awamleh, Ibrahim Ayasreh |
2021 |
|
|
802 |
Design and Applications of Microprocessor Based Digital Filter |
Takialddin Al-smadi
|
2011 |
Medwell |
|
803 |
The Impact Of Social Media On Electronic Loyalty Of Jordanian Consumer |
Majd Mohammad AL-Hawamdeh |
2020 |
www.ijstr.org |
|
804 |
The Function Mechanism for a Selected Group of Macro Viruses |
Yasir Khalil Ibrahim Hassan M. Wahahat, Takialddin Alsmadi
|
2007 |
International Journal of Computer Science and Network Security |
|
805 |
The association between fat mass and subclinical atherosclerosis in healthy schoolchildren |
Alaa Al-Shorman, Buthaina AlKhatib, Baha'a Abusalma, Hayder Al-Domi |
2020 |
Clinical Nutrition ESPEN- Elsevier Ltd. |
|
806 |
Assessment of Distance Learning For Online College of Agriculture Students During The COVID-19 Crisis |
Samar Shawaqfeh, Radi A. Tarawneh and Khaled Al-Najjar |
2021 |
Pakistan Journal of Society, Education and Language |
|
807 |
A historical sense in The novel (Returning to Athena) by Jordanian novelist Amer Tahboub |
Judy Fares Al-Batayneh |
2020 |
جامعة محمد خيضر- بسكرة، الجزائر |
|
808 |
Humor in Jordanian Literature "Returning to Athena" as a model |
Judy Fares Al-Batayneh |
2021 |
alorooba |
|
809 |
Intelligent and Dynamic Neighbourhood Entry Lifetime for Position-based Routing Protocol Using Fuzzy Logic Controller |
Jafar A Alzubi, Omar Almomani, Omar A Alzubi, Mahmoud Al-shugran |
2016 |
LJS Publishing |
|
810 |
Dynamic and reactive multi-objective routing decision in position-based routing protocols |
Almomani Omar, Firas Al Balas, Jafar A. Alzubi, Mahmoud Al-shugran, Omar A. Alzubi |
2016 |
|
|
811 |
Non-Delay Tolerant Non-Overlay Routing Protocols Performance Evaluation for VANET |
Mahmoud Ali Al Shugran |
2021 |
Canadian Center of Science and Education |
|
812 |
Beacon-Based Non-Delay Tolerant Routing Protocols for VANET: A Systematic Comparison |
Mahmoud Ali Al Shugran
|
2021 |
Canadian Center of Science and Education |
|
813 |
Automating SWOT Analysis Using Machine Learning Methods |
Ahmad Abu-Alaish, Ghaith Jaradat, Mahmoud Al-Shugran, Iyas Alodat |
2021 |
|
|
814 |
Applicability of Overlay Non-Delay Tolerant Position-Based Protocols in Highways and Urban Environments for Vanet |
Mahmoud Ali Al Shugran |
2021 |
Academy and Industry Research Collaboration Center (AIRCC) |
|
815 |
Hybrid Elitist-Ant System for Nurse-Rostering Problem |
Ghaith M Jaradat, Anas Al-Badareen, Masri Ayob, Mutasem Al-Smadi, Ibrahim Al-Marashdeh, Mahmoud Ash- |
2019 |
King Saud University |
|
816 |
An Enhanced Queue Management Approach for Greedy Routing in MANETs |
Ahmad Habboush, Mahmoud AlShugran |
2018 |
Canadian Center of Science and Education |
|
817 |
Performance Evaluation of Unicast Routing Protocols in MANETs-Current State and Future Prospects |
Mohammad Alnabhan, Mahmoud Alshuqran, Mustafa Hammad, Mohammad Al Nawayseh |
2017 |
Kassel University Press GmbH |
|
818 |
Performance evaluation of position-based routing protocols using different mobility models in manet |
Almomani, Omar, Mahmoud Al-shugran, Jafar A. Alzubi, A. Alzubi |
2015 |
Foundation of Computer Science (FCS) |
|
819 |
A Qualitative Comparison Evaluation of the Greedy Forwarding Strategies in Mobile Ad Hoc Network |
Mahmoud Al-shugran, Osman Ghazali,Suhaidi Hassan,KashifNisar, , A. Suki M. Arif |
2013 |
Elsevier |
|
820 |
An Elite Pool-Based Big Bang-Big Crunch Metaheuristic for Data Clustering |
Ibrahim Al-Marashdeh, Ghaith M. Jaradat, Masri Ayob, Ahmad Abu-Al-Aish, Mutasem Alsmadi |
2018 |
|
|
821 |
Collaborative and ubiquitous mobile learning system prototype |
Mohammad Alnabhan, Ahmad Abu-Al-Aish, Sultan A. Al-Masaeed |
2018 |
|
|
822 |
Automating SWOT Analysis Using Machine Learning Methods |
Ahmad Abu-Al-Aish, Ghaith Jaradat, Mahmoud Al-Shugran, Iyas Alodat |
2021 |
|
|
823 |
Exploring Technical Quality Factors That Enhance Mobile Learning Applications Services Using Data Mining Techniques |
Ahmad Abu-Al-Aish |
2021 |
IGI Global |
|
824 |
Using E-learning System in Jordanian Universities during the COVID-19 Pandemic: Benefits and Challenges |
Ahmad Abu-Al-Aish |
2021 |
Canadian Center of Science and Education |
|
825 |
Resolving Conflict of Wireless Sensor Networks Using Subjective Logic |
Shadi Al-khateeb, Vladimir Zadorozhny |
2021 |
IEEE |
|
826 |
An Automated Approach to Identify RNA Editing Sites |
Amal Alzu'bi, Shadi Al-khateeb, Leming Zhou, Qingde Wang and Mohannad AL Saghir |
2021 |
|
|
827 |
the phenomena of quotation and inclusion in Andalusian poetry in the fifth century AH |
dr. muhammad a. alruqibat |
2020 |
جامعة جرش |
|
828 |
Badee' Repetition in the poetry of Ibn Shuhaid Al-Andalusi -Rhetorical Study |
dr. muhammad a. alruqibat |
2020 |
جامعة إربد الأهلية |
|
829 |
Automating swot analysis using machine learning methods |
Abu-Alaish, Ahmad; Jaradat, Ghaith; Al-Shugran, Mahmoud; Alodat, Iyas |
2021 |
|
|
830 |
Surveillance rapid detection of signs of traffic services in real time |
Mohammad Alodat, Iyas Abdullah |
2018 |
|
|
831 |
Hybrid elitist-ant system for nurse-rostering problem |
Ghaith M Jaradat, Anas Al-Badareen, Masri Ayob, Mutasem Al-Smadi, Ibrahim Al-Marashdeh, Mahmoud Ash- |
2019 |
Elsevier |
|
832 |
Monitor Potential Attack Locations in a Specific Area within DTN Network |
IYAS ALODAT |
2021 |
|
|
833 |
EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIES |
Iyas Alodat |
2021 |
|
|
834 |
Detect Image Malware Steganography Using Deep Transfer Learning Model |
Iyas Alodat , Mohammad Alodat |
2022 |
|
|
835 |
Analysing and predicting COVID-19 AI tracking using artificial intelligence |
IYAS ALODAT |
2021 |
|
|
836 |
BioCloud: A Network Cloud-Computing Method for Predicting RNA Secondary Structure |
Ahmad Habboush, Mohammad Al Rawajbeh, Ahmed M. Manasrah, and Ra’ed M. Al-Khatib |
2016 |
International Journal of Humanities and Applied Sciences (IJHAS) |
|
837 |
Enhancing the eGovernment functionality using Knowledge Management |
Mohammad Al Rawajbeh, Ahmad Habboush |
2011 |
World Academy of Science, Engineering and Technology |
|
838 |
Parallel sequential searching algorithm for unsorted array |
Ahmad Habboush, Sami Qawasmeh |
2011 |
Medwell Journals |
|
839 |
Acceptance of mobile learning by university students |
Ahmad Habboush, Ayman Nassuora, Abdel-Rahman Hussein |
2011 |
EuroJornals |
|
840 |
Arabic text summarization model using clustering techniques |
Ahmad Haboush, Maryam Al-Zoubi, Ahmad Momani, Motassem Tarazi |
2012 |
WCSIT |
|
841 |
Fuzzy Optimized Metric for Adaptive Network Routing |
Ahmad Khader Habboush |
2012 |
IJCSS |
|
842 |
Load balancing using multiple node disjoint paths |
Ahmad Haboush, Mohammad Al Nabhan, Motassem Al-Tarazi, Mohammad Al-Rawajbeh |
2012 |
Canadian Center of Science and Education |
|
843 |
Handling Safety-Related Requirements in Critical Systems Product Lines |
Ahmad Khader Habboush |
2013 |
Canadian Center of Science and Education |
|
844 |
A framework for wireless sensor network fault rectification |
Ahmad Haboush, Mihir Narayan Mohanty, Binod Kumar Pattanayak, Motassem Al-Tarazi |
2014 |
IJMUE |
|
845 |
investigating software maintainability development: a case for iso 9126 |
Ahmad Haboush, Mohammad Alnabhan, Anas AL-Badareen, Mohammad Al-nawayseh and Bassam EL-Zaghmouri |
2014 |
IJCSI |
|
846 |
A Hybrid Modified Semantic Matching Algorithm Based on Instances Detection With Case Study on Renewable Energy |
Ahmad Khader Haboush |
2014 |
arXiv:1402.3937 |
|
847 |
An evaluation framework for requirements definition of software development |
Mohammad Alnabhan, Ahmad Haboush, Anas AL-Badareen, Mohammad Al-nawayseh and Bassam EL-Zaghmouri |
2014 |
JCIT |
|
848 |
Emerging trends in intrusion detection in mobile ad hoc networks (MANETs) |
Mohammad Alnabhan, Ahmad Haboush, Binod Kumar Pattanayak, Mohammad Alnawayseh, Anas Bassam Al-Badare |
2014 |
Asian Network for Scientific Information (ANSINET) |
|
849 |
A Review Paper In Steganography Method that Using Message Integrity Techniques |
Mohammed Salem Atoum, Ahmad Khader Habboush |
2015 |
Research India Publications |
|
850 |
FSK modulation based image steganography |
Ahmad Khader Habboush |
2016 |
Advanced Institutes of Convergence Information Technology |
|